Académique Documents
Professionnel Documents
Culture Documents
Chapter 7: TCP/IP
List three components of the TCP/IP protocol stack.
•protocols to support file transfer, e-mail, remote login, and other applications
•reliable and unreliable transports
•connectionless datagram (packet) delivery at the network layer
Later, TCP/IP was included with the Berkeley Software Distribution of UNIX.
You can use the Internet protocols to communicate across any set of interconnected networks.
They are equally well-suited for both LAN and WAN communication.
The TCP/IP protocol stack maps closely to the OSI reference model in the lower
layers. It supports all standard physical and data link protocols.
reliability, provided by
sequence numbers and
acknowledgments.
Some ports are reserved in both TCP and UDP, although applications might not be written to support
them. Port numbers have the following assigned ranges:
Numbers below 255 are for public applications.
Numbers 255-1023 are assigned to companies for marketable applications.
• Numbers above 1023 are unregulated.
End systems use port numbers to select the proper application.
At the receiving station, TCP reassembles the segments into a complete message. If a
sequence number is missing in the series, that segment is retransmitted.
If segments are not acknowledged within a given time period, retransmission occurs
Application layer protocols must provide for reliability if necessary. UDP uses no
windowing or acknowledgments.
It is designed for applications that do not need to put sequences of segments together.
Protocols that use UDP include the following:
•TFTP
•SNMP
•Network File System (NFS)
•Domain Name System (DNS)
Several protocols operate at the TCP/IP Internet layer that corresponds to the OSI
network layer:
•IP - provides connectionless, best-effort delivery routing of datagrams; is not
concerned with the content of the datagrams; looks for a way to move the
datagrams to their destination
•ICMP - provides control and messaging capabilities
•ARP - determines the data link layer address for known IP addresses
•RARP - determines network addresses when data link layer addresses are known
The fields in this IP datagram are as follows:
•VER - version number
•HLEN - header length, in 32-bit words
•type of service - how the datagram should be
handled
•total length - total length (header + data)
•identification, flags, frag offset - provides
fragmentation of datagrams to allow
differing MTUs in the internetwork
•TTL - Time-To-Live
•protocol - he upper-layer (Layer 4) protocol
sending the datagram
•header checksum - an integrity check on the
header
•source IP address and destination IP address
- 32-bit IP addresses
•VIP options - network testing, debugging,
security, and other options
The protocol field
determines the Layer 4
protocol being carried
within an IP datagram.
To determine a destination MAC address for a datagram, a table called the ARP cache
is checked. If the address is not in the table, ARP sends a broadcast that will be
received by every station on the network, looking for the destination station.
The term "local ARP" is used to describe the search for an address when the
requesting host and the destination host share the same medium or wire.
Prior to issuing the ARP, the subnet mask must be consulted. The mask determines
that the nodes are on the same subnet.
RARP relies on the
presence of a RARP
server with a table
entry or other
means to respond to
requests.
On the local
segment, you can
use RARP to
initiate a remote
operating system
load sequence.
Internet protocols enable
communications between
any set of interconnected
networks. They are
equally well suited for
both LAN and WAN
communications,
HOSTS is a file created by network administrators and maintained on servers. They are
used to provide static mapping between IP addresses and computer names.
POP3 (Post Office Protocol) is an Internet standard for storing e-mail on a mail server
until you can access it and download it to your computer. It allows users to receive
mail from their inboxes using various levels of security.
SMTP (Simple Mail Transport Protocol) governs the transmission of e-mail over
computer networks. It does not provide support for transmission of data other than
plain text.
SNMP (Simple Network Management Protocol) is a protocol that provides a means to
monitor and control network devices, and to manage configurations, statistics
collection, performance and security.
FTP (File Transfer Protocol) is a reliable connection-oriented service that uses TCP to
transfer files between systems that support FTP. It supports bi-directional binary file
and ASCII file transfers
TFTP (Trivial File Transfer Protocol) is a connectionless unreliable service that uses
UDP to transfer files between systems that support the TFTP. It useful in some LANs
because it operates faster than FTP in a stable environment.
HTTP (Hypertext Transfer Protocol) is the Internet standard that supports the
exchange of information on the World Wide Web, as well as on internal networks. It
supports many different file types, including: text, graphic, sound , and video.
It defines the process by which Web browsers originate requests for information to
send to Web servers.
Telnet is a standard terminal emulation protocol used by clients for the purpose of
making remote terminal connections to Telnet server services; enables users to
remotely connect to routers to enter configuration commands.
There are also a few Windows-based protocols that you should be familiar with:
•ipconfig/winipcfg - utilities used to view current network settings for all adapters
on a device; can be used to view the MAC address, IP address, and gateway
The END