Premium Essay

Tcp/Ip Protocols

In:

Submitted By jrenee88
Words 370
Pages 2
Jenell Davis
12.21.12
IS-3220
Assignment 1

TCP/IP stands for Transmission Control Protocol/ Internet Protocol. TCP is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received. IP responsible for moving packet of data from node to node and it forwards each packet based on a four byte destination address also known as the IP number. The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world.
DNS stands for Domain Name Space and it has three major components, the database, the server, and the client. The database is a distributed database and is comprised of the Domain Name Space, which is essentially the DNS tree, and the Resource Records that define the domain names within the Domain Name Space. The server is commonly referred to as a name server. Name servers are typically responsible for managing some portion of the Domain Name Space and for assisting clients in finding information within the DNS tree. Name servers are authoritative for the domains in which they are responsible. They can also serve as a delegation point to identify other name servers that have authority over subdomains within a given domain. The Resource Records data found on the name server that makes up a domain is commonly referred to as zone information. A single zone can either be a forward zone, this is information that pertains to a given domain or an inverse zone, this is information that maps IP addresses into DNS host names. DNS allows more than one name server per zone, but only one name server

Similar Documents

Free Essay

The Tcp/Ip Protocol Suite

...The internet protocol suite is the protocol stack used on the internet. It is usually called TCP/IP after two of its most important protocols but there are other protocols as well. The TCP/IP is based on a five-layer model for networking. These layers are the physical, data link, network, transport, and application layers. The physical layer contains all the functions needed to carry the bit stream over a physical medium to another system. This layer has four parts: mechanical, electrical/optical, functional, and procedural. The mechanical part specifies the physical size and shape of the connector itself so that components will plug into each other easily. The electrical/optical part determines what value of voltage or line condition determines whether a pin is active or what represents a 0 or 1 bit. The functional specifies the function of each pin or lead on the connector. The procedural details the sequence of actions that must take place to send or receive bits on the interface. The Ethernet twisted- pair interfaces from IEEE are common implements of the physical layer that includes these four part With only the physical layer, a system would have no way to tell another system to get bits ready. The data link layer solves this problem by organizing the bit stream into a data unit called a frame. The data link layer moves bits across the link and can add reliability to the raw communications link. The data link layer can be very simple, or make the link appear error free...

Words: 1025 - Pages: 5

Premium Essay

Protocols

...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer Security...

Words: 278 - Pages: 2

Premium Essay

Nt1210 Unit 3 Assignment 1

...uses standards defined in TCP/IP RFCs, plus other standards. 2. C. Ethernet D. TCP/IP mapping 3. A. It exists as a written document. C. It has been passed through some form of review and approval or certification process. 4. A. De facto standard documents have been reviewed more thoroughly. C. De facto standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries. 5. B. The data link layer sits lower in the model than the transport layer. C. The physical layer sits just below the data link layer. 6. B. IEEE D. ANSI 7. D. To keep intellectual property rights to the technology inside the company 8. B. IP is a network layer protocol. 9. B. TCP/IP 10. B. The lower four layers of TCP/IP define the same kinds of functions as the matching layer numbers from OSI. 11. C. The PCs use two wires to create a circuit to send data from PC1 to PC2. 12. B. Ethernet defines MAC addresses, but when used in a TCP/IP network, it does not use the addresses, instead relying on IP addresses. 13. D. Datagram 14. B. Can be written in DDN format D. Used by routers to make a forwarding decision 15. A. 48 bits in length 16. A. LANs generally connect devices that are nearer to each other, compared to WANs. D. LANs are purchased, and WANs are leased. 17. B. Two TCP/IP data-link protocols are Ethernet and PPP. ...

Words: 699 - Pages: 3

Premium Essay

Computernt Plus

...This Cisco IOS command would display the current status of EIGRP? Show IP eigrp neighbors Two metrics used by default in EIGRP metric calculation? Bandwidth and Delay Dynamic routing protocols is considered an exterior gateway protocol only? BGP Is an encapsulation protocol that can be used on cisco routers when configuring subinterfaces? 802.1Q Is the binary equivalent to the dotted decimal netmask- 255.255.192.0? 1111.1111.11100.0000 This routing protocol is considered to use distance vector logic? Rip Has the lowest Cisco IOS administrative distance? Static route Describe the point-to-point WAN connection protocol provided by Telco? Leased Lines This cisco IOS command copies the current running configuration to a tftp server? Copy running-config tftp The concept of EIGRP Feasible distance is the computed metric of a SUCCESSOR route Is the dotted decimal equivalent to slash notation /25 255.255.255.128 The routing protocol that doesn’t support support VLSM? RIP v1 Is the broadcast address for the ip subnet 8.5.8.232 mask 255.255.0.0 8.5.255.255 Is the slash notation dotted decimal mask of 255.255.255.252 /30 The following mask could create an IP subnet from a class B that contains 500 hosts? 255.255.255.0 Port of STMP? 25 Protocol responsible for resolving mac addresses from IP addresses? ARP Two protocols commonly used in WANS at layer 2 of the OSI model? HDLC and PPP 192.168.254.0 is private up networks, classified by? RFC1918 Bits comprise the network...

Words: 2228 - Pages: 9

Premium Essay

Analysis of Wireless Protocols

...Wireless Protocols Analysis of Wireless Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols...

Words: 285 - Pages: 2

Free Essay

Nt1210 Mid-Term Study Guide

...1. nibble, byte, word, double word- define 2. how does the RAM know when its on and off, full and half 3. converting binary’s 4. how are the tracks and setctors separated on a hard drive 5. pg 12 adding binary 6. Read about file systems 7. Video compression and what is it for 8. 9. Internet core 10. How do you define a network (more than one computer) 11. Topologies (bus,ring,star,and mesh) 12. Networking standards 13. Defacto standards vs vendor standards vs vendor group standards 14. Tcp/ip 15. Open networking model and the osi model 16. Ip routing 17. Pg 136 authors note 18. Frame and packet 19. IP addressing 20. IP addressing 21. Physical layer, layer 1 of the OSI model 22. Lab 3.1.1 (wouldn’t be able to communicate) 23. Data link layer 24. LAN vs WAN 25. Different between ac and dc currents 26. Difference between the circitury and node 27. Full duplex vs half duplex 28. Sending data through electricity foucusing on sound waves 29. RJ 45 connectors 30. Fiber optics 31. The wireless standards 32. CSMA CSCA 33. When you have a fiber optic cable and two buildings, which would you use single mode or multi mode? Multi mode 34. Copper cable and standards. (EMI) 35. Two types of utp cable a and b, cross over and straight cable 36. Max distance for UTP cables (100M) 37. FORFIT! 38. What is trouble shooting bottom up and...

Words: 366 - Pages: 2

Free Essay

Intro to Networking

...Building TCP/IP Networks This chapter will allow you to explore the common models of networking from the physical media connection to the application that displays the information, including how these layers interact and how they map to real networking devices. The labs in this chapter are designed to reinforce concepts from Chapter 3 of your Introduction to Networking textbook and allow you to explore some of the more important ideas with greater depth. You will explore the different types of network reference models available and analyze how each one applies to real network technology. You will also use packet capturing to look at real network traffic and explore the data link layer of networking. At the end of this chapter, you should be able to ■ Explain the purpose of network reference models ■ Describe the layers of the OSI reference model and explain what each layer provides ■ Describe the layers of the TCP/IP model and relate it to the OSI model and real networking equipment ■ Capture live packet information on a network and explain the data link layer portion of the packets captured ■ Enable network resources such as shared printers and file sharing on your own PC Lab 3.1: Network Reference Models approximate Lab Time: 10–15 min. Materials Needed: paper/pencil, Textbook, and Internet research This lab reviews the importance of modeling communication on a network. This will include a review of the state of networking before standardized reference models existed...

Words: 270 - Pages: 2

Free Essay

Physics

...Figure 1 is the soil layer. Ground water table is at 5m depth. The thickness of each layer is determined by Case 1 uses H1 = 4m, H2 = 5m, H3 = 7m, and H4 = 2m. Case 2 uses H1 = 2m, H2 = 7m, H3 = 5m, and H4 = 4m. Soil below Layer 4 is considered as a rigid stratum which can control failure mechanism. Case 1 Layer 1: c’ = 3kPa, φ’ = 38°, and γ = 19kN/m3 (γsat = 20.3kN/m3) Layer 2 : cu = 25kPa, c’ = 8kPa, φ’ = 25°, OCR = 2, Cc = 0.8, Cs = 0.16, e = 1.1 and γ = 15kN/m3 (γsat = 16kN/m3) Layer 3: c’ = 0kPa, φ’ = 38°, and γ = 18kN/m3 (γsat = 19.1kN/m3) Layer 4 : cu = 40kPa, φ’ = 28°, OCR = 1, Cc = 0.5, e = 0.9 and γ = 16kN/m3 (γsat = 17kN/m3) Case 2 Layer 1 : cu = 30kPa, c’ = 15kPa, φ’ = 23°, OCR = 3.0, Cc = 0.8, Cs = 0.16, e = 1.1 and γ = 15kN/m3 (γsat = 16.5kN/m3) Layer 2: c’ = 1kPa, φ’ = 35°, and γ = 19kN/m3 (γsat = 20.8kN/m3) Layer 3 : cu = 35kPa, c’ = 5kPa, φ’ = 28°, OCR = 1.5, Cc = 0.5, e = 0.9 and γ = 16kN/m3 (γsat = 17.3kN/m3) Layer 4: c’ = 0kPa, φ’ = 35°, and γ = 18kN/m3 (γsat = 19.1kN/m3) Design the cut slopes for 12m height (Case 1) and for 7m height (Case 2), based on F = 1.3 (short-term), F = 1.5 (long-term) and F = 1.15 (seismic). There are only three options that can be used to increase F for the slope. They are, 1) reduce the slope angle; 2) reduce the slope height; and 3) dewater. The optimum design is the slope cut as less as possible. The water table change will induce the consolidation. The maximum vertical displacement due to dewatering on the slope crest must be...

Words: 449 - Pages: 2

Free Essay

Samba Research

...IT 302 LINUX ADMIN PROJECT I chose to do my final project on the Samba server, such as how to set up the server, security, and maintenance. Samba “is an Open Source/Free Software suite that provides seamless file and print services to SMB/CIFS clients. Samba is freely available, unlike other SMB/CIFS implementations, and allows for interoperability between Linux/Unix servers and Windows-based clients.” (source1) The whole purpose of the samba software is to make it possible to operate on many platforms. To install the server you would use the yum command in terminal. You then would enter su for the “super user” to install files as root. Then create a new directory containing three empty files which you'll share. While logged on as root create the new directory “/smbdemo” using this command “mkdir /smbdemo”. Then you would change permissions on the new directory to 770 with the following command “chmod 770 /smbdemo”. Now you navigate to the new directory with “cd /smbdemo” for the command. Add three empty files to the directory with the following command “touch file1 file2 file3”. Next step one would most likely add a user to the server. You do this first by “adding users to the Samba database in order for them to have access to their home directory and other Samba shares.”(source2) Using this command “smbpasswd -a ” you will then be able to add a new samba user. The user must be an existing Linux user or else the command will fail. Then if you “perform the following...

Words: 681 - Pages: 3

Free Essay

System Engineerring Roles in Software Enginerring

...CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. TCP provides reliable, in-order delivery of a stream of bytes, making it suitable for applications like file transfer and e-mail. It is so important in the Internet protocol suite that sometimes the entire suite is referred to as "the TCP/IP protocol suite." TCP is the transport protocol that manages the individual...

Words: 2390 - Pages: 10

Free Essay

Nt1210

...NT1210 INTRO TO NETWORKING UNIT3 LAB3.3 The TCP/IP Model Mr. Randy Vogl Gus Perez 19593003 The TCP/IP network model Exercise 3.3.1 What are the distinct differences between OSI and TCP/IP models? TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection. Model TCP/IP is developed on points toward a model the internet. TCP/IP has 4 layers. OSI has 7 layers. TCP/IP more reliable than OSI OSI has strict boundaries; TCP/IP does not have very strict boundaries. TCP/IP follow a horizontal approach. OSI follows a vertical approach. In the application layer, TCP/IP uses both session and presentation layer. OSI uses different session and presentation layers. TCP/IP developed protocols then model. OSI developed model then protocol. TCP/IP offers support for connectionless communication within the network layer. In the network layer, OSI supports both connectionless and connection-oriented communication. TCP/IP is protocol dependent. OSI is protocol independent. http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/ Read more: Difference between OSI and TCP IP Model | Difference Between | Difference between OSI vs TCP IP Model http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/#ixzz3f4nyPzTU TCP/IP model protocols and functions. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. Using figure 3.4 from the Lab manual...

Words: 1306 - Pages: 6

Free Essay

Nt1210 Intro to Networking Lab 3.3

...NT1210 Lab 3.3: the TCP/IP Model Exercise 3.3.1 Using your textbook and Internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? Applications, Transport, Network, Network Interface this the TCP/IP model. A huge difference is that TCP/IP model uses 4 major layers instead of 7 layers to OSI model. OSI Model is Applications, Presentation, Session, Transport, Network, Data Link and Physical composed to 7 layers. OSI was developed as theoretical model, while TCP/IP was more practical model. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model Transport layers: The Internet Protocol (IP), Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). These core protocols support many other protocols, to perform a variety of functions at each of the TCP/IP model layers. Still others enable user applications to function. Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and function of each of these. Use your textbook and Internet research to support your answer. TCP (Transmission Control Protocol) Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. User Datagram Protocol a connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery services...

Words: 331 - Pages: 2

Free Essay

Internet Protocols

...INTERNET PROTOCOLS & APPLICATIONS * TCP/IP: The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. * IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX. * NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. * AppleTalk: AppleTalk is a protocol suite to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology...

Words: 1711 - Pages: 7

Free Essay

Nt1210 Unit 3 Lab 3.3

...your textbook and Internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? The four layers of the TCP/IP architecture can be compared to certain levels of the OSI model. It’s important to know what each level of the TCP/IP protocol architecture does, and how these layers map to the OSI model. The Application Layer of the TCP/IP model performs much the same tasks as the Application, Presentation, and Session layers of the OSI model. The Transport layer in the TCP/IP architecture is similar to the Transport layer in the OSI model. This layer can use TCP or UDP as well. The Internetwork layer in the TCP/IP architecture uses IP addresses to determine how packets should be routed. Remember that the OSI model uses IP addresses, or “Layer 3 Addresses”, at the Network layer. The two layers do much the same thing. This layer is also referred to in the TCP/IP model as the Internet layer. The Network Interface layer in the TCP/IP architecture serves to define the protocols and the hardware needed to actually deliver the data across the network. The Network Interface model does the work of both the Data Link and Physical Layers in the OSI model. exercise 3.3.2 : Identify the layer in which each protocol resides according to the TCP/IP model. See the above. exercise 3.3.3 : The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and function of each of...

Words: 691 - Pages: 3

Premium Essay

Nt1310 Unit 5 Network Models

...information should use a common protocol, and set of rules and regulations for the operation of networks together. Network models include many of protocols, such as HTTP, DHCP, IPv4, UDP and ARP, which include the rules and regulations to manage the communication between the network devices, also the limits of communication with each other (Kozierok, 2001-2005). The most commonly used are: 1. Transmission Control Protocol/Internet Protocol (TCP/IP), which established by the Defense Advanced Research Projects Agency (DARPA), and managed by the Internet Engineering Task Force (IETF), to connect the various Defense Department with each other, and uses the TCP/IP protocol to connect all governmental, educational and business institutions in the world. 2....

Words: 769 - Pages: 4