Protocol Review of Telephone and Data Networks
The Internet protocol suite is a highly related collection of protocols. It is also commonly referred to as TCP/IP. TCP and IP were the first and primary protocols developed for internetworking. However, it is comprised of many other protocols that collaborate with each other to perform each distinct task required for communication on and to other network components. Based on the network topology and devices that reside on the network, the protocols that will be discussed are IMCP, TCP, IP, UDP, DNS, FTP, HTTP, IMAP4, POP3, SIP, SMTP, SNMP, SSH, and Rlogin. These protocols are integral to Ethernet networks; some are required, some optional, and some to be avoided but replaced with better solutions.
The Internet Control Message Protocol (ICMP) is a network layer protocol. "It is one of the core protocols of the Internet protocol suite." IMCP is primarily used in reporting network errors on the network commonly seen when pinging or using trace routes when trouble shooting connectivity.
Transport Control protocol (TCP) is the interface between the application layer and the network layer. TCP provides a reliable connect between the applications and the network. Conversely, UDP does not provide a reliable connection. It sends packets without regards to delivery or sequence. However the advantage of UDP is that it is fast. "While the total amount of UDP traffic found on a typical network is often on the order of only a few percent, numerous key applications use UDP, including the Domain Name System (DNS), the simple network management protocol (SNMP), the Dynamic Host Configuration Protocol (DHCP) and the Routing Information Protocol (RIP), to name just a few."3
Internet Protocol (IP) is the protocol used for encapsulating the data into a packet, and then assigning a unique address of the source and the destination of the packet in the packet header. "Because of the abstraction provided by encapsulation, IP can be used over a heterogeneous
network (i.e., a network connecting two computers can be any mix of Ethernet, ATM, FDDI, Wi-fi, Token ring, etc.) and it makes no difference to the upper layer protocols."5 This is one reason why IP is widely used and accepted in the telecommunication industry. The disadvantage of IP is that it is unreliable in of itself. However combined with the reliability of TCP and the flexibility of MPLS, it makes this disadvantage a moot point.
In this lab, we used Transmission Control Protocol (TCP) which is a connection oriented protocol, to demonstrate congestion control algorithms. As the name itself describes, these algorithms are used to avoid network congestion. The algorithms were implemented in three different scenarios i.e. No Drop Scenario, Drop_Fast Scenario and Drop_NoFast Scenario.
What does IP stand for and what is it used for? Internet Protocol, and it's a set of rules governing the format of data sent over the Internet or other
IP – The Internet Protocol (IP) - is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.
[3] The Design Philosophy of the DARPA Internet Protocols by David D. Clark [M.I.T. Laboratory for Computer Science]
In the networking of computers and devices, the Internet Protocol (IP) plays a very important role. The IP, found at the internet layer of the Department of Defence (DoD) model provides the means for the devices to communicate using logical addresses called IP addresses. The importance of an IP address to communication will be felt in the analogy of a surface mail. How possible would it be to send a letter to someone whose address we do not know? The IP address enables us to know the source of a packet and the destination for proper delivery by the IP protocol.
Meanwhile, the advent of early PC’s and the recognition of the value in networking devices together gave rise to Local Area Networks. These LAN’s were developed from a business customer perspective, which placed more emphasis on costs and ease of use over reliability. There were a number of different competing LAN technologies, two of the most common being Token Ring (IBM) and Ethernet (everyone else). The triumph of Ethernet in the marketplace, to the extent where it is included in every PC, game console and some refrigerators, provides a consistent and relatively inexpensive way to build internal networks with relative ease.
TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is the protocol of the Internet. In a private network, TCP/IP can be used as a communications protocol; the TCP/IP can either be an intranet or extranet. A computer is provided with a copy of the TCP/IP program when it is set up with direct access to the Internet. (“What Is TCP/IP”)
The Open Systems Interconnection (OSI) reference model has significantly influenced the development of internet protocol we use today. Created in the 1980’s by the International Standards Organization (ISO), a multinational body dedicated to worldwide agreement on international standards, this reference model has defined the entire network communication process into seven structured layers. In ascending order these layers are the physical, data link, network, transport, session, presentation, and application layers. The purpose of this model was, and still is, to simplify and set a standard for the design of communication and networking products that can communicate with each other, regardless of system differences.
The latest version of the Internet protocol which we should be implemented is IPv4, also known as the TCP/IP structure. The reason why IPv4 is referred to as TCP/IP for the first two main protocols, out of its suite of protocols, which were developed by United States Defense Advanced Research Project Agency, also known as DARPA around the 1970s (Kozierok, 2005). ...
Sending data through the internet efficiently has always posed many problems. The two major technologies used, Ethernet and Asynchronous Transfer Mode (ATM), have done an admirable job of porting data, voice and video from one point to another. However, they both fall short in differing areas; neither has been able to present the "complete" package to become the single, dominant player in the internet market. They both have dominant areas they cover. Ethernet has dominated the LAN side, while ATM covers the WAN (backbone). This paper will compare the two technologies and determine which has a hand-up in the data trafficking world.
Next, the writer goes over the second type of network architecture - the TCP/IP reference model, the granddaddy of the wide area computer network. This architecture allows the connection of multiple networks seamlessly. The architecture is flexible and capable of running even if some of the subnet hardware is destroyed or non-functional as long as the source and destination machines are functioning. In a similar fashion to the OSI model, the TCP/IP model has layers as well. In this case, we have four layers: the link
TCP/IP is a network model which enables the communication across the Internet. The most fundamental protocol on which the Internet is built. This is made up of the 2 common networking protocols, TCP, for Transmission Control Protocol, and IP, for Internet Protocol. TCP maintains and handles packet flow linking the systems and IP protocol has the ability to handle the routing of packets. However The TCP/IP stack consists of 5 layers first being application layer, the transport layer, then the network layer, the link layer and finally the physical layer. The assignment focuses on the three middle layers and is divided into five parts. Firstly explaining how the TCP and UDP the most vital protocols needed to deliver and communicate.
From the protocol operation perspective, the existing protocols can be classified into negotiation based, query based, QoS based, multipath based and coherent-based protocols.
As the use of computers is on the rise, the understanding of networks and how they interact with computers becomes a necessity for its end users. One of the pieces that allow the interaction of computers and networks is the protocol. According to Merriam-Webster dictionary, a protocol is essentially a set of rules that define how computers communicate with other computers over a network (Merriam-Webster). There are many protocols that presently exist (e.g. HyperText Transfer Protocol, Internet Protocol), but one of the most useful protocols to users who have the desire of sharing files with one another may just be the File Transfer Protocol, or FTP. This paper is designed to explain the history behind the FTP, its purpose, how it is used, and why it is useful to this group of users.