Post

7.5 Transport Layer 7.6 Network Layer 7.7 Link Layer

CC by Aru

💡 Layer 3: Transport Layer

  • Service in charge of breaking information into pieces.
  • Pieces must be less than or equal to 64 KB.
  • Pieces can travel using:

    • TCP
    • UDP
  • The protocol used depends on the application/service.

✅ TCP (Transfer Control Protocol)

  • Reliable communication protocol.
  • Every piece requires confirmation.
  • Confirmations themselves are also confirmed.

☑️ TCP Communication Phases

✔️ 1. Establishment of Connection (SYNC)

  • Machines establish communication first.
  • Uses 3-way handshaking.

☑️ Process

✔️ Step 1

  • Machine 1 requests communication with Machine 2.

✔️ Step 2

  • Machine 2 confirms request.

✔️ Step 3

  • Machine 2 also requests communication.

✔️ Step 4

  • Machine 1 confirms.

☑️ Notes

  • Made of 4 messages functioning as 3.

✔️ 2. Flow

  • Data pieces begin transmission.
  • Every sent piece requires:

    • ACK
    • ACK of the ACK

✔️ 3. Termination (FIN)

  • Communication is closed properly.
  • Both sides:

    • announce termination
    • confirm termination

☑️ Notes

  • Composed of 3 messages.

✅ Protocols that Use TCP

  • FTP
  • SMTP
  • POP3
  • IMAP

☑️ Reason

  • They require ACK confirmations.

✅ UDP (User Data Protocol)

  • Fast but unreliable protocol.

☑️ Characteristics

  • No SYNC.
  • No ACK.
  • No FIN.
  • Data is simply sent.

☑️ Important Note

  • Nobody checks if pieces arrive correctly.

✅ Protocols that Use UDP

  • TFTP

☑️ Reason

  • TFTP does not use ACK confirmations.

✅ Ports to Remember

☑️ Socket

  • Combination of:

    • IP address
    • port
  • Represents:

    • machine + service

☑️ Example

✔️ 192.10.8.6:25

  • Sending an email.
  • Port 25 = SMTP/email service.

💡 Layer 2: Network Layer

  • Layer responsible for mixing communication portions in channels and sending them.
  • Usually handled by routers.

✅ IP (Internet Protocol)

  • Checks whether IP addresses are correct.

✅ ICMP (Internet Control Message Protocol)

  • Warns about communication problems.
  • Detects dangerous events.

☑️ Examples

  • Destination not reachable.
  • Communication delay.

☑️ Ping Command

  • Uses ICMP.
  • Checks whether destination is safely reachable.

✅ ARP (Address Resolution Protocol)

  • Identifies which IP belongs to which MAC address.

☑️ Characteristics

  • Requires huge database containing:

    • machines
    • IPs
    • MAC addresses

☑️ Important Note

  • Modifying database can detach IP from MAC.

  • Checks for transmission errors in bits.

☑️ FCS (Frame Checking Sequence)

  • Redundancy information added to portions.
  • Guarantees correction and error detection.

✅ Layer 1 Techniques

☑️ ECC

  • Error Correction Code.
  • Technique for correcting errors.

☑️ CRC

  • Cyclic Redundancy Check.
  • Technique for detecting transmission errors.

☑️ Important Note

  • Layer 1 does not really use protocols/rules.
  • Mainly based on correction and checking techniques.
This post is licensed under CC BY 4.0 by the author.