Protocol Review of Telephone and Data Networks
The Internet protocol suite is a highly related collection of protocols. It is also commonly referred to as TCP/IP. TCP and IP were the first and primary protocols developed for internetworking. However, it is comprised of many other protocols that collaborate with each other to perform each distinct task required for communication on and to other network components. Based on the network topology and devices that reside on the network, the protocols that will be discussed are IMCP, TCP, IP, UDP, DNS, FTP, HTTP, IMAP4, POP3, SIP, SMTP, SNMP, SSH, and Rlogin. These protocols are integral to Ethernet networks; some are required, some optional, and some to be avoided but replaced with better solutions.
The Internet Control Message Protocol (ICMP) is a network layer protocol. "It is one of the core protocols of the Internet protocol suite." IMCP is primarily used in reporting network errors on the network commonly seen when pinging or using trace routes when trouble shooting connectivity.
Transport Control protocol (TCP) is the interface between the application layer and the network layer. TCP provides a reliable connect between the applications and the network. Conversely, UDP does not provide a reliable connection. It sends packets without regards to delivery or sequence. However the advantage of UDP is that it is fast. "While the total amount of UDP traffic found on a typical network is often on the order of only a few percent, numerous key applications use UDP, including the Domain Name System (DNS), the simple network management protocol (SNMP), the Dynamic Host Configuration Protocol (DHCP) and the Routing Information Protocol (RIP), to name just a few."3
Internet Protocol (IP) is the protocol used for encapsulating the data into a packet, and then assigning a unique address of the source and the destination of the packet in the packet header. "Because of the abstraction provided by encapsulation, IP can be used over a heterogeneous
network (i.e., a network connecting two computers can be any mix of Ethernet, ATM, FDDI, Wi-fi, Token ring, etc.) and it makes no difference to the upper layer protocols."5 This is one reason why IP is widely used and accepted in the telecommunication industry. The disadvantage of IP is that it is unreliable in of itself. However combined with the reliability of TCP and the flexibility of MPLS, it makes this disadvantage a moot point.
A state variable known as congestion window is implemented by the TCP protocol which stops the clogging of the network by regulating and putting a limit on the data that is sent on the network in turn reducing congestion, timeouts and lost packets.
In this lab, we used Transmission Control Protocol (TCP) which is a connection oriented protocol, to demonstrate congestion control algorithms. As the name itself describes, these algorithms are used to avoid network congestion. The algorithms were implemented in three different scenarios i.e. No Drop Scenario, Drop_Fast Scenario and Drop_NoFast Scenario.
An example of a highly important protocol which will be utilized at application level, is HTTP or hypertext transfer protocol. HTTP is the protocol used within web browsers and the entire internet to send and receive specific web page data. HTTP is a controlling protocol, as it determines how documents should be sent, and what the browser should do in response to commands. When accessing a web page, a HTTP command is sent to the pages web server, so that the server may send that specific page’s data to the user. PCO’s Learning Centre will be using the hypertext transfer protocol on a regular basis. In order for students to access web pages, the HTTP must exist to ensure speedy and accurate navigation, especially in a learning
IPv4 is the original internet addressing system. It is a protocol which was used on packet-switched networks. Delivery model is how it operates at its best without a guaranteed avoidance of duplicate in delivery or assurance of proper sequencing. Some aspects include data integrity which is mostly addressed by TCP. IPV4 uses binary notation to sort at time IP address that consist of 32 bits. It is a practice to convert the 32 bits of an IPv4 address into four 8 bit known as octets. With each octet converted to a decimal number (base 10) from (0–255) and parted by a period developed a format called dotted decimal notation. IPv4 has a category of address class types: Class A, B, C, D and E. The class A addresses are used for big networks and always start with zero bits. Each Class A address network can hold up as many as 16,777,216 hosts.
What does IP stand for and what is it used for? Internet Protocol, and it's a set of rules governing the format of data sent over the Internet or other
IP – The Internet Protocol (IP) - is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.
Sending data through the internet efficiently has always posed many problems. The two major technologies used, Ethernet and Asynchronous Transfer Mode (ATM), have done an admirable job of porting data, voice and video from one point to another. However, they both fall short in differing areas; neither has been able to present the "complete" package to become the single, dominant player in the internet market. They both have dominant areas they cover. Ethernet has dominated the LAN side, while ATM covers the WAN (backbone). This paper will compare the two technologies and determine which has a hand-up in the data trafficking world.
Network Address Translation (NAT) is a standard used to allow multiple PCs on a private network to share a single, globally routable IPv4 address. NAT enables a user to have a large set of addresses internally and usually one address externally. The main reason NAT is often deployed is because IPv4 addresses are getting scarce. NAT is an immediate, but temporary, solution to the IPv4 address exhaustion problem that will eventually be rendered unnecessary with the deployment of the IPv6. The Internet Engineering Task Force has been aware of the impending depletion of the current address space for almost a decade.
Perhaps the most redundant, fault-tolerant of all network topologies is the mesh LAN. Each node is connected to every other node for a true point-to-point connection between every device on the network.
Protocol compatibility is an important issue. Since a protocol is like a language for computers on a network, it is important that the devices on a network speak the same language, or use the same protocol, so that data can be successfully delivered. For example, if a computer on a network needs to print a document, it is necessary for the computer and the network printer to have the same protocol. Once a standard is established, all the devices on a network will be able to work together in a network environment. If two devices on a network are not using the same protocol, the two devices will be unable to communicate (Whitehead 125).
When electronic devices transfer information to another electronic device, the devices need to know when data flow is beginning and ending. This is done with signals for synchronization.i
The Internet has revolutionized the computer and communications world like nothing before. The Internet enables communication and transmission of data between computers at different locations. The Internet is a computer application that connects tens of thousands of interconnected computer networks that include 1.7 million host computers around the world. The basis of connecting all these computers together is by the use of ordinary telephone wires. Users are then directly joined to other computer users at there own will for a small connection fee per month. The connection conveniently includes unlimited access to over a million web sites twenty-four hours a day, seven days a week. There are many reasons why the Internet is important these reasons include: The net adapts to damage and error, data travels at 2/3 the speed of light on copper and fiber, the internet provides the same functionality to everyone, the net is the fastest growing technology ever, the net promotes freedom of speech, the net is digital, and can correct errors. Connecting to the Internet cost the taxpayer little or nothing, since each node was independent, and had to handle its own financing and its own technical requirements.
The downside of this technology is the potential for security problems. Intruders can see packets traveling on a network and can perhaps interpret them to obtain confidential information.
TCP/IP is a network model which enables the communication across the Internet. The most fundamental protocol on which the Internet is built. This is made up of the 2 common networking protocols, TCP, for Transmission Control Protocol, and IP, for Internet Protocol. TCP maintains and handles packet flow linking the systems and IP protocol has the ability to handle the routing of packets. However The TCP/IP stack consists of 5 layers first being application layer, the transport layer, then the network layer, the link layer and finally the physical layer. The assignment focuses on the three middle layers and is divided into five parts. Firstly explaining how the TCP and UDP the most vital protocols needed to deliver and communicate.
The TCP portion of TCP/IP operates at level 3 (Network) as its primary function is to control the flow of data. IP operates at level 4 (Transport) of the OSI model. IP is the protocol responsible for the actual transmission of packets across the network. What are the benefits of the OSI model? There are several advantages to the layered approach provided by the OSI model.