Transmission Control Protocol/Internet Protocol (TCP/IP) Essay Example
Transmission Control Protocol/Internet Protocol (TCP/IP) Essay Example

Transmission Control Protocol/Internet Protocol (TCP/IP) Essay Example

Available Only on StudyHippo
  • Pages: 14 (3712 words)
  • Published: November 27, 2017
  • Type: Essay
View Entire Sample
Text preview

The TCP/IP protocol is commonly used as the standard for facilitating communication between different computer systems. It ensures interoperability and is often utilized as an internetworking protocol for routing in most networks.

TCP/IP was developed by the United States Department of Defense as a set of wide area network protocols. Its purpose is to ensure efficient and reliable communication between different locations across the country.

The TCP/IP protocol is widely recognized as the default open standard for the Internet. It enables connectivity between various operating systems and offers several benefits, such as a scalable and cross-platform client-server architecture that can easily adapt to future trends.

TCP/IP: An Introduction

The birth of TCP/IP took place due to the need for communication between multiple networks. This was crucial du

...

ring a time of war when the US Army heavily relied on important information for their missions' success. TCP/IP was created by the Advanced Research Projects Agency (ARPA) of the Department Of Defense (DOD), led by Vincent Cerf and Robert Khan, with the objective of connecting and enabling communication among diverse networks. Currently, TCP/IP is extensively utilized as a protocol that not only facilitates transmission of messages between networks but also ensures their delivery.

The Internet community widely utilizes TCP/IP to transmit data between them. Its success is attributed to its ability to provide basic services like file transfer, e-mail, and remote logons across networks, enabling efficient communication. Moreover, large corporations also employ TCP/IP for connecting their Local Area Networks together, ensuring the integrity of data transmission and facilitating inter-departmental communication. Additionally, TCP/IP protocols are utilized in Wide Area Networks (WAN) and

View entire sample
Join StudyHippo to see entire essay

Metropolitan Area Networks (MAN). The secure transmission of important information relies on this protocol for daily business activities. One challenge posed by the use of packets is that intruders can only obtain partial packets instead of the complete message, making it difficult for them to access the entire message unless they are on the receiver's side.

TCP/IP is a networking framework that derives its name from two key protocols: Internet Protocol (IP) and Transmission Control Protocol (TCP). These protocols collaborate to deliver fundamental network operations for internet users. In previous instances, TCP/IP has demonstrated its ability to sustain communication in battlefield scenarios by recovering from node or phone failures. For instance, the US network comprises multiple nodes, and if one becomes offline, TCP/IP can discover alternative routes to ensure packets reach their intended recipients. Furthermore, TCP/IP aids in the expansion and growth of large networks by permitting the addition of nodes that can function as potential routers for packet transmission. As the number of nodes in a network increases, so does its size, resulting in greater opportunities for accelerated packet transmission.

An overview of TCP/IP.

TCP/IP, which stands for Transmission Control Protocol/Internet Protocol, is essentially a collection of standard protocols that are specifically designed for wide area networks. These protocols can be categorized into four layers: Network Interface, Internet, Transport, and Application.

The TCP/IP model is shown in Figure 1.

The network interface layer is in charge of transmitting and receiving frames. I will later explain how this layer works. The following layer, called the Internet layer, deals with packet addressing and packaging for routing purposes. This layer consists of three protocols:

style="text-align: justify;">The main function of Internet Protocol (IP) is to address and route packets between hosts and networks.

The Address Resolution Protocol (ARP) is used to obtain the hardware addresses of hosts that are on the same physical network.

The purpose of the Internet Control Message Protocol (ICMP) is to send messages and report errors related to packet delivery.

The Transport layer facilitates communication between two hosts.

Transmission Control Protocol (TCP) is a dependable communication protocol that provides a service based on connection. It is intended for applications that frequently transfer large amounts of data or require confirmation for received data.

UDP (User Datagram Protocol) is a form of communication that functions without establishing a connection and offers no assurance of packet delivery. It is commonly employed for transmitting small amounts of data, with the responsibility for ensuring reliability falling on the application.

The Application layer is situated at the highest point of the model and grants network access to applications.

The process of transmitting data over a network involves multiple layers contributing their own details to create a header. This header is then converted into data by the lower layer protocol. When the data reaches its destination, the associated layer removes the header and treats the remaining packet as data. The packet is then forwarded up the stack to the relevant protocol.

The network interface layer's responsibility is to combine outbound frames onto the wire and retrieve incoming frames from the wire. When a packet is received from the layer above, the network interface adds a preamble and Cyclic Redundancy Check (CRC) for frame integrity. The preamble, represented

by a sequence of bytes, signifies the beginning of a frame. The CRC is included to ensure that the frame remains intact. Upon reaching its destination host, the preamble is removed and the CRC value is calculated. If the computed CRC values match, then the frame is forwarded to the layer above it. However, if they do not match, it indicates transmission errors and therefore, results in discarding of the frame.

The Internet layer is the next layer in the stack, which addresses and packages packets for routing. IP provides a connectionless delivery service, meaning a session is not required before delivering a packet. Despite this, the delivery service of IP does not guarantee reliability; packets can arrive out of order or become lost during routing. It is the responsibility of higher layer protocols and applications to ensure reliability. When a packet is sent from the transport layer, IP adds its header to the packet. The IP header includes:

The packet originates from the source IP address.

The packet is going to the destination IP address.

The transport protocol is responsible for initiating the request. It informs the destination host's IP whether to route the packet using TCP or UDP.

A checksum value is used to verify the integrity of the packet through a simple mathematical computation.

Time to live (TTL) controls how long a packet stays on the wire before being discarded to prevent continuous looping in the network.

When the destination address is local, IP sends the packet directly to the host. But if it's remote, IP checks the local routing table for a route to the remote

host.

The process of routing IP packets involves obtaining the destination hardware address. ARP, used by IP on broadcast-based networks such as Ethernet and Token Ring, helps with this task. When IP needs a hardware address, it first checks the ARP cache for the corresponding address to the destination IP address. If the mapping is not found in the cache, ARP creates an ARP request frame for the hardware address of the destination host. This frame also includes the mapping of the source host's IP and hardware addresses for future connections. The frame is then broadcasted on the network, received by all hosts, and passed up to ARP. If a receiving host's IP address matches the requested one, an ARP reply is generated containing the requested hardware address and sent directly to the source host. Upon receiving this information, both IPs and hardware addresses are stored in the local ARP cache as entries. With knowledge ofthe destination hardware address obtained from these steps, successful delivery oftheIP packet can be achieved.

In cases of routing issues, the ICMP will transmit messages and error reports back to the source host. The messages sent by ICMP encompass:

* Source quench occurs when there is congestion at a router due to traffic.

Redirect occurs when a preferred route is detected.

When a line goes down and there is no available route, it results in a destination being unreachable.

The IP datagram is used to package and route the ICMP message to the source host.

The Transport layer, which is the next layer in our model, facilitates communication between two hosts. In

UDP and TCP, this communication is achieved through ports. UDP is frequently employed for transferring small amounts of data and it possesses two primary characteristics.

UDP messages can be broadcast to many hosts, making it a connectionless delivery protocol. Unlike establishing a session between two hosts before exchanging data, UDP does not require such connection.

UDP does not ensure message delivery, as messages can arrive out of order or be duplicated. The responsibility of ensuring reliable delivery lies with the application.

UDP creates a header containing necessary information to send data to another host.

The origin port

The destination port is responsible for providing an address for delivering messages.

The checksum is a value assigned to the data and header for verification purposes.

UDP delivers the packet to the destination port on the destination host.

TCP is commonly utilized by applications for the purpose of transferring substantial quantities of information due to its three primary attributes.

TCP is connection-oriented, meaning that it establishes a session between two hosts before any data is exchanged.

TCP ensures reliable delivery using sequence numbers and acknowledgements. Sequence numbers allow TCP segments to be fragmented into packets and then reconstructed. Acknowledgements validate the data reception.

TCP uses byte stream communication, treating the data as a sequence of bytes without message boundaries.

The next two sections of this report will provide a more detailed explanation of the two fundamental building blocks of TCP/IP.

The Internet Protocol Suite (IPS) utilizes Transmission Control Protocol (TCP) as a communication protocol.

Transfer Control Protocol, commonly known as TCP, has the purpose

of establishing a connection between two hosts in order to exchange data. Its primary function is to guarantee the dependable delivery of data from one location to another. To accomplish this, TCP divides the data into smaller packets and transmits them through the network using the IP protocol. Upon reaching the receiving host, TCP reconstructs these packets to restore the original data. Essentially, TCP manages both the fragmentation and reassembly of data packets. Once all packets have been sent, TCP terminates the connection by exchanging management packets.

TCP, or Transmission Control Protocol, offers numerous benefits. Its foremost advantage lies in its reliability and ability to protect against various data issues such as data loss, corruption, packet reordering, and duplication. Data loss occurs when routing is interrupted due to a router being down. Data corruption refers to discrepancies between sent and received data. Packet reordering and duplication commonly occur in congested networks. TCP addresses these concerns effectively.

TCP's protection capabilities contribute significantly to the Internet's success. Checksums and sequence numbers are added to packets for secure delivery. Upon receiving a packet, an acknowledgment is sent back for confirmation of successful transmission. In case of a lost packet, no acknowledgment triggers resending by the sender. Additionally, TCP maximizes network efficiency by optimizing data capacity within IP packets using which reduce transfer time. Furthermore, TCP incorporates a multi-stage flow control mechanism that helps adjust the sender's rate.

Packet transmission in Figure 2

The diagram above illustrates the process of transmitting data packets, ensuring their successful delivery. The sender initiates the transmission to a receiver. TCP divides the data into

smaller packets, depicted as colored circles in the initial step of the diagram. Meanwhile, the IP protocol assigns an IP address to each packet and directs them towards their intended destination within the network.

Regardless of the chosen route, packets (also known as datagrams) will utilize the IP protocol to traverse the internet and arrive at the same destination. These individual packets possess knowledge of their intended destination, thereby minimizing the significance of the actual route taken.

In step 3, the TCP protocol is responsible for rearranging the receiver packets to restore the original state. The packets can arrive in any order, but they are arranged based on their arrival time.

TCP is crucial in the networking field as it enables reliable communication over the Internet. While it can occasionally experience transmission errors, it remains a dependable service. To overcome these errors, data can be resent and delivery confirmed.

The Internet Protocol (TCP/IP) is used as a communication protocol for sending data over the internet.

The Internet Protocol (IP) is a standardized protocol based on IETF RFC791. It serves as the routing layer datagram service of the TCP/IP suite, connecting separate networks through hosts and routers. In the OSI model, IP functions at the network layer (layer 3) and transmits data in IP datagrams across networks using higher-level protocols like TCP and UDP. It also guides datagrams through gateways and employs IP addresses to identify networks. Moreover, IP handles fragmentation and reassembly of datagrams according to the MTU of the underlying network.

To comprehend how IP operates, we will explore three primary elements: the configuration of the IP packet, the addressing

system employed by IP, and the procedure for routing packets from their origin to their destination.

The Internet Protocol (IP) layer facilitates data exchange between hosts through IP datagrams. Higher-level protocols like TCP or UDP receive these datagrams and append headers before handing them over to IP. An IP datagram comprises an IP header and data. The main role of IP is to determine an appropriate path and method for delivering the datagrams to the destination servers. However, error checking is not carried out by IP itself.

The IP adds a header to the datagram, which includes routing and control information. It consists of the source address, destination address, protocol number, and header checksum. The source address is the sender's IP address, while the destination address is for the intended recipient. The protocol field indicates the upper-layer protocol that will handle the datagram. The header checksum ensures data integrity during transit and allows verification by the receiving machine at its end. Both TCP and IP have their own distinct checksums.

The structure of the IP header includes various other headers. The Version field indicates the format of the Internet header. The Internet Header Length specifies the length of the IP header in multiples of 32 words. The Type of Services field represents the desired quality of service for the delivery. The Total length field indicates the total length of the datagram in bytes. The Identification field assigns a value to the sender to aid in datagram fragment assembly. Options can be used to incorporate timestamps, security measures, source routing, and more. The Data field contains either the IP data or a header

for a higher layer protocol. Flags and fragment offset are utilized to keep track of datagram pieces when they are divided. Time to Live specifies the maximum lifespan of a datagram within the network.

The first three classes (A to C) have assignable addresses for hosts, but some addresses are reserved. For example, a host ID of zero indicates the network ID's location within the network. Similarly, a host ID with all binary bits set to one serves as the broadcast address for a network. Any IP datagrams sent to this address will be delivered to all hosts on that network. When an address has a network ID of zero, it specifies the local network and is used for initialization procedures when the local network ID is unknown. The addresses 0.0.0.0 and 255.255.255.255 are also reserved addresses. The former represents the local host on the local network and is used for initialization procedures, while the latter represents limited broadcast addresses.

Class D is designated for multicast communication, meaning data can be sent to a group of hosts. When an IP datagram is directed to the multicast address, all hosts within the multicast group will receive it. In contrast, Class E is set aside for future advancements and usage.

When sending data from source to destination using IP, packets are routed through the link layer. The data can only be delivered to connected hosts. When a sending host sends a datagram, the internet layer examines the destination IP address. This is crucial for informing the link layer about which machine should receive the data. If the address does not indicate a host on

the local network, the internet layer verifies the routing table. The routing table includes entries with pairs of a destination address (host or network address) and a router address.

The internet layer uses the destination address to search for a router and send a datagram. It compares the destination address with the routing network's destination and if there are no matches, it checks for matching network entries. If there are still no matches, it uses a default entry. Once an entry is found, the Internet layer instructs the link layer to send the datagram to that specific address using the corresponding router address.

Once the datagram reaches the router, it is transferred from the link layer to the internet layer. The search for a destination machine remains similar, but routers must choose the appropriate interface to transmit data as they are connected to multiple networks. This process continues until the datagram reaches its intended endpoint.

The current IP has alternatives, proposal and enhancements. IPv6 is a newer IP that is based on IPv4. The main difference in IPv6 is the larger size of IP addresses, which increased from 32 bits to 128 bits. This allows for a higher level of hierarchy support, more addressable nodes, and easier auto-configuration of addresses. IPv6 also includes multicast addresses. Additionally, it provides better support for extensions and options.

In IPv6, options are placed in separate headers between the IPv6 header and the transport layer header. These changes improve forwarding efficiency and allow for greater flexibility with options in the future. The extension headers in IPv6 include Hop-by-Hop Option, Routing (Type 0), Fragment, Destination Option, Authentication, Encapsulation Payload.

IPv6 also introduces

flow labeling capability to handle packets for specific traffic flows that require special handling as part of Quality of Service or real-time service.

There are four proposals for a new version of IP, Simple Internet Protocol (SIP), PIP, TUBA, and TP/IX. SIP suggests using a 64-bit address and a different header format for IP. PIP proposes a larger, variable length, and hierarchical address with a different header format. TUBA (TCP and UDP with Bigger Address) proposes much larger addresses with variable lengths up to 20 bytes. TP/IX suggests using a 64-bit address and making changes to the TCP and UDP headers, using 32-bit port numbers, 64-bit sequence numbers, 64-bit acknowledgment numbers, and 32-bit windows for TCP.


Related essay: “Values and Standards of the British Army”

Despite being widely used, IP is considered unreliable since it does not guarantee data delivery and relies on upper layer protocols for reliability. IP lacks flow control, retransmission, acknowledgement, and error recovery capabilities. It can be seen as a best-effort protocol that attempts to transmit data without guaranteeing its arrival at the intended destination. Nevertheless, despite these limitations, IP remains the preferred protocol in the industry due to the absence of superior alternatives.

Glossary of Terms

The Address Resolution Protocol (ARP) is utilized to collectively access hardware addresses of hosts that are situated on the same physical network.

Cyclic Redundancy Check (CRC) is a mathematical computation that is used to verify the integrity of the frame and prevent corruption.

The Internet Control Message Protocol (ICMP) is in charge of sending messages and reporting errors associated with packet delivery.

The main function

of Internet Protocol (IP) is to address and route packets between hosts and networks.

The Maximum Transmission Unit (MTU) is the largest size of a physical packet that a network is capable of transmitting, measured in bytes.

The term multicast refers to the action of sending a single message to a specific group of recipients.

Transmission Control Protocol (TCP) offers a reliable, connection-oriented communication service for applications that either transfer large data quantities at once or demand acknowledgment for received data.

The User Datagram Protocol (UDP) is a communication method that operates without establishing connections and does not guarantee packet delivery. It is often used for transmitting small data amounts, with the application being responsible for ensuring reliability.

Bibliography

The mentioned text is about the book "Networking Essentials Plus 3rd Edition" by Microsoft Press. It mentions that Chapter 6 of this book provides definitions for network protocols. The book was published in Washington by Microsoft Press in the year 2000 and spans pages 245 to 251.The book "Business Data Communications" by William Stallings is published by Prentice Hall in its 4th edition.The text below has beenand unified while keeping the and their contents.

Introduction to TCP/IP

The website http://www.private.org.il/tcpip_rl.html is mentioned in paragraph 4 and is enclosed within a center-aligned HTML paragraph tag.

Uri's TCP/IP Resources List

Find FAQs, tutorials, guides, web pages, and books all relating to TCP/IP.

By Uri Raz

5. http://www.sangoma.com/fguide.htm

TCP/IP and IPX routing Tutorial

The website http://www.itprc.com/tcpipfaq/default.htm is a helpful resource for TCP/IP related questions and information.

TCP/IP Frequently Asked Questions

style="text-align: center;">The provided link directs to webopedia's page that offers an explanation of TCP/IP. You can access it at http://www.webopedia.com/TERM/T/TCP_IP.html


www.webopedia.com
The TCP/IP protocols are discussed on the website http://www.protocols.com/pbook/tcpip.htm.

Protocol Dictionary

The TCP/IP Suite

The website link is:

http://www.msln.maine.edu/msln/support/archive/tcptut/tcptut-2.htm

Introductory chapter 2 on IP

Maine School and Library Network

10. The website astalavista.com/library/protocols/tcp-ip/tcp-ip_for_newbies.shtml provides information on TCP/IP for newbies.

TCPIP: An Extensive Explanation

Ankit Fadia

The link http://www.freesoft.org/CIE/Topics/79.htm is centered on the page.IP Protocol Overview

Freesoft.org

The link to http://www.protocols.com/pbook/tcpip.htm is centered on the page.

Protocol Directory - TCP/IP

Protocols.com

The web address for the Internet Protocol (IP) page is "http://www.geocities.com/SiliconValley/Vista/8672/network/ip.html". It is centered on the page.

Internet Protocol: Questions and Answers

Yegappan Lakshmanan

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New