Sarah Miller Extra Credit Chapter 9 TCP/IP Management TCP/IP internets require continuous regulating and provisioning. With this in mind, it takes a great amount of competence and management effort to effectively and efficiently run TCP/IP. TCP/IP is a collection of protocols and tools used for communicating over a network. TCP/IP is also the main protocol used for internetwork communications. While TCP/IP is quite complicated, it is the most versatile protocol around. Some commonly used notions that surround TCP/IP management is that generally with TCP/IP, a client-server mode of operation is used. To run the TCP/IP server software, a gateway is used. A controlling host will run the client software. Also, an authentication method is needed to access to the server. To keep status reports, a management information base is used (Adnet, 44). IP Subnet Planning An organization has 32 bits for their IP addresses. While the network part is assigned and unchangeable, an organization can decide what to do with the rest of the address. One option that an organization can choose is to subnet its IP address space, which means the remaining bits are divided into a subnet part and a host part. When figuring out how many possibilities one has for their subnet, they can use the equation 2N. However, it is important to remember that a network, subnet, or host can’t be all 0s or 1s. With this in mind, an organization can have 2N-2 networks, subnets, or hosts. When it comes to creating one’s IP address, one realizes that the larger the subnet part is, the more subnets an organization can have. Yet, the larger the subnet part is, the smaller the host part will be. Therefore there will be less hosts per subnet. This means that if one wants more... ... middle of paper ... ...t, a second-level domain name is worthless unless the organization buys or rents a webserver, builds a website, and then pays for an ISP to connect the website to the Internet. DHCP Servers A DHCP server is in charge of assigning IP addresses and other configuration information to a client PC. This allows for the PC to boot up with all its current configuration information. With the way this system works, every time the client PC boots up, it will have a different IP address. This is different from servers, which receive static IP addresses that allows them to have the same IP address every time. Having a static IP address allows for clients to find the servers. A DHCP server responds to a client PC when the PC broadcasts a dynamic host configuration protocol message to all of the nearby hosts. The Simple Network Management Protocol (SNMP) IPv6 Management
In this lab, we used Transmission Control Protocol (TCP) which is a connection oriented protocol, to demonstrate congestion control algorithms. As the name itself describes, these algorithms are used to avoid network congestion. The algorithms were implemented in three different scenarios i.e. No Drop Scenario, Drop_Fast Scenario and Drop_NoFast Scenario.
What does TCP mean? TCP is a set of rules that governs the delivery of data over the internet or other network that uses the Internet Protocol, and sets up a connection between the sending and receiving computers.
IP – The Internet Protocol (IP) - is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.
The main location, which is a much larger office, uses a Class A IP address schema. This class is for very large networks. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses.
[3] The Design Philosophy of the DARPA Internet Protocols by David D. Clark [M.I.T. Laboratory for Computer Science]
The TCP/IP model is what is currently used for IPv4. This is the current standard protocol for internet addressing (Tetz, 2011). The Network interface layer is responsible for dealing with the physical aspects of connectivity in a network. This like the physical, network and data link layer of the OSI model has to do with converting data, establishing connectivity, sending out data, and it also hold the MAC address. The Application Layer in the TCP/IP model is similar to the OSI model. Two network hosts have a communication session and the application layer is the end point at either end of that
TCP/IP addresses are made up of 4 sets of numbers called "Octets." Each octet is an 8 bit binary string. The largest possible value that can be created with 8 characters in binary is 255.
The Open Systems Interconnection (OSI) reference model has significantly influenced the development of internet protocol we use today. Created in the 1980’s by the International Standards Organization (ISO), a multinational body dedicated to worldwide agreement on international standards, this reference model has defined the entire network communication process into seven structured layers. In ascending order these layers are the physical, data link, network, transport, session, presentation, and application layers. The purpose of this model was, and still is, to simplify and set a standard for the design of communication and networking products that can communicate with each other, regardless of system differences.
Invisible to the public Internet: The implementation of the sub-networks so that the internal division of the network into subnets is only visible within the organization; organization to the rest of the Internet is still just one big, flat, Network.
Internet Protocol version 4 is the current standard “IP” protocol used with Transmission Control Protocol/Internet Protocol (TCP/IP), which is the protocol for Internet addressing. Like the Open System Interconnection (OSI) model, TCP/IP has its own model. The TCP/IP network model represents reality in the world, whereas the OSI model represents an ideal. The TCP/IP network model has four basic layers. The first layer, Network interface layer, deals with all physical components of network connectivity between the network and the IP protocol. Next the Internet layer contains all functionality that manages the movement of data between two network devices over a routed network. Then the Transport layer manages the flow of traffic between two hosts or devices, ensuring that data arrives at the application on the host for which it is targeted. And last, the Application layer acts as final endpoints at either end of a communication session between two network hosts (Tetz).
TCP/IP is a network model which enables the communication across the Internet. The most fundamental protocol on which the Internet is built. This is made up of the 2 common networking protocols, TCP, for Transmission Control Protocol, and IP, for Internet Protocol. TCP maintains and handles packet flow linking the systems and IP protocol has the ability to handle the routing of packets. However The TCP/IP stack consists of 5 layers first being application layer, the transport layer, then the network layer, the link layer and finally the physical layer. The assignment focuses on the three middle layers and is divided into five parts. Firstly explaining how the TCP and UDP the most vital protocols needed to deliver and communicate.
Congestion Control Transfer Protocol (CCTP) is an advanced, stable message-determined transport layer protocol. CCTP lies in between the Network layer and Application layer and serves as the agent between network operation and application programs. Figure below shows the IP suite associated with the relationship of CCTP protocol with others. This protocol blends the prominent characteristics of TCP, UDP and SCTP.
TCP/IP operates at both levels 3 and 4 of the OSI model. The TCP portion of TCP/IP operates at level 3 (Network) as its primary function is to control the flow of data. IP operates at level 4 (Transport) of the OSI model. IP is the protocol responsible for the actual transmission of packet across the network.
A network can be based on either a peer-to-peer level or server-based, also referred to as domain-based. To distinguish the difference, a peer-to-peer network, also known as a workgroup, is a network in which a group of computers are connected together to share resources, such as files, applications, or peripherals. The computers in a peer-to-peer network are peers to one another, meaning no single computer has control over one another. There is also no central location for users to access resources, which means that each individual computer must share their files in order for other computers to have access (Muller, 2003, p.411). “In a peer-to-peer environment, access rights are governed by setting sharing permissions on individual machines.” (Cope, 2002) On the other hand, in a domain-based network, the computers connected together are either servers or clients. All of the other computers connected to the network are called client computers. The server is a dedicated machine that acts as a central location for users to share and access resources. The server controls the level of authority each user has to the shared resources. When logging on to the network, users on client machines are authenticated by the server, based on a user name and password (Lowe, 2004, p.13).