Tcp/Ip Overview Essay

1573 words - 6 pages

TCP/IP Overview
When designing networked applications one key protocol stands out as the foundation for making it possible. That protocol is TCP/IP. There are many protocols out there that allow two applications to communicate. What makes TCP/IP a nice protocol is that it allows applications on two physically separate computers to talk. What makes TCP/IP great is that it can do with two computers across a room or across the world. In this paper I will show you how TCP/IP allows a wide array of computer hardware to work together without ever having to knowing what the other machine is or how it even works. At the same time you will learn how it allows information to find its way around the world in a faction of a second without knowing in advance how to get there.
Before we go too far it should be noted that TCP/IP is really two protocols. The first is the Transmission Control Protocol or TCP. The second protocol is IP which stands for Internet Protocol. These two combined provide the basis for the virtual level of most of the networks we use today. The roots of the protocols reach back into the 1970’s. At that time networks were built by wires connecting one computer to the next directly. This is called direct connect. If you wanted information to get to a computer that yours was not direct connected to you would have to create a bridge on a common machine you are both connected to. This way messages you send in one connection are transferred in the computer to the other connection and sent to the computer you were trying to talk to. This is sometimes called a gateway.
In 1973 the Defense Advanced Research Projects Agency (DARPA) tasked two engineers to design a way for information to travel more easily between these early networks. The engineers were Robert Kahn and Vinton Cerf. In the summer of 1973 the pair worked out what is now IP. This protocol works in a virtual layer of networks. Networks and computers at a fundamental level work on bits. Bits are nothing more than a way of representing information in a series of 1s and 0s. At a physical layer this can be done by a lot of different ways. In copper networks it is done by turning power on and off to a wire to represent 1 and 0 to a computer on the far end of the wire. In fiber networks it is done by turning a laser on and off. The point being that there are lots of ways to physically pass data between computers. What Kahn and Cerf had invented was not a physical way for computers to talk to each other. Instead they provided a common format for the data that was passed independent of the physical means.
A common way to analyze networks is with the OSI Network model which breaks networks down into 7 layers. We are going to focus on layers 1through 4. For more information on the OSI model you may reference www.iso.org. In an effort to simplify the principles of what Kahn and Cerf created we will talk about the network and the OSI model in terms of mailing a package through the postal...

Find Another Essay On TCP/IP Overview

CMIP vs. SNMP - Network Management Protocols

2247 words - 9 pages - Structure and Identification of ManagementInformation for TCP/IP based internets.RFC 1156 - Management Information Base NetworkManagement of TCP/IP based internetsRFC 1157 - A Simple Network Management ProtocolRFC 1158 - Management Information Base NetworkManagement of TCP/IP based internets: MIB-IIRFC 1161 - SNMP over OSIRFC 1212 - Concise MIB DefinitionsRFC 1213 - Management Information Base for Network Managementof TCP/IP-based internets: MIB-IIRFC

The Internet and Its Services Essay

4893 words - 20 pages The Internet and Its Services Working with Internet does not mean just browsing www and sending and receiving e-mails. The Basic Structure of the Internet was developed through last 30 years of existence of the Internet. The Internet is a heterogeneous worldwide network consisting of a large number of host computers and local area networks. The Internet uses the TCP/IP suite of protocols. This allows the integration of a large number of

E. Miller floor Washington School TCS

2415 words - 10 pages computer in the network and 100 Mbps to any server host in the network. Only two OSI layer 3&4 protocols will be allowed to be implemented in this network, they are TCP/IP and Novell IPX.TABLE OF CONTENTSSECTION 1 - Wide Area Network SECTION 2 - Local Area Network & Wiring Scheme SECTION 3 - District Supplied Servers and Functions SECTION 4 - Address and Network Management SECTION 5 - Security SECTION 6 - Internet Connectivity SECTION 7 - User

Border Gateway Protocol: Origin Misconfigurations and Effects

2116 words - 8 pages . Rekhter, Y., et al. "Address Allocation for Private Internets", BCP 5, RFC 1918, February 1996. Freedman, Avi. “7007: From the Horse’s Mouth” Merit Networks Inc. North American Network Operators Group. 25th April 1997. Web. 19th March 2014. Wikipedia. “Black Hole (networking)”. 13th January 2014. Web. 19th March 2014. Gallagher, Sean. “Google DNS briefly hijacked to Venezuela” Ars Technica. 17th March 2014. Web. 19th March 2014. JNCIA-JUNOS Study Guide—Part 1. Sunnyvale: Juniper Networks. 2012. PDF File. Doyle, Jeff, and Jennifer Carroll. Routing TCP/IP. 2nd ed. Volume 1. India: Pearson/Dorling Kindersley Pvt. Ltd. 2006. Print.

Open Systems Interconnections Protocol

1375 words - 6 pages means that more cells will need to be sent which will increase the overhead of the system. ATM seems to have been developed with the high capacity of fiber optics in mind as ATM switches can operate between 10 and 160 Gbps or even high in newer products. Transmission Control Protocol/Internet Protocol (TCP/IP) We should all be at least a little familiar with Internet Protocol as it is among the most commonly used methods to connect to the

Cisco Tcs WAN Design

6016 words - 24 pages Logical Plan 19 Appendix G - Acacia School IDF 1 Logical Plan 20 Appendix H - Acacia School IDF 2 Logical Plan 21 Appendix I - Acacia School Cable Run Overview 22 Appendix J - Acacia School Cable Runs: MDF 23 Appendix K - Acacia School Cable Runs: IDF 1 24 Appendix L - Washington School District Addressing 25 Subnetting 25 Acacia IP addressing 25 Appendix M - Washington School District Access Lists 26 District Office Access 26 Acacia LAN Access

TOR: Onion Routing

1524 words - 7 pages application layer of the TCP protocol. It essentially anonymizes all TCP-based applications like web-browsing, SSH, instant messaging. Using TOR can protect against common form of Internet surveillance known as “traffic analysis” (Electronic Frontier Foundation). Knowing the source and destination of your internet traffic allows others to track your behavior and interests. An IP packet has a header and a data payload, even if one encrypts the data

Design a Network Infrastructure Because Networks are Configured in Many Ways, Network Systems and Data Communications Analysts are Needed to Design, Test, and Evaluate Systems Such as Local Area...

8965 words - 36 pages Protocol are known as Network Service Providers (NSP's). These form the core of the Internet.The OSI (Open System Interconnection) Model: -ApplicationPresentationSessionTransportNetworkData LinkPhysicalAddressing and routingOn a Wide Area Network, the routing of data is done mainly using TCP/IP (Transmission Control protocol/Internet Protocol).TCP is the protocol, which "enables two hosts to establish a connection and exchange streams of data. TCP

Routers - how they work and how their used

1185 words - 5 pages on how many packets the data is broken down to, and the information on rebuilding the package. Each packet also contains the data of the Transmission Control Protocol/Internet Protocol (TCP/IP) for using the Internet. The packet is then sent off through the network using routers to find the best available route. Since each packet is sent separately, all the packets may end up taking different routes to reach its destination. The main advantages

Independent Research Paper-Internet Security

1847 words - 7 pages first factor has been research interests and laboratories; these groups have always needed to share files, email and other information across wide areas. The research labs developed several protocols and methods for this data transfer, most notably TCP/IP. Business interests are the second factor in network growth. For quite some time, businesses were primarily interested in sharing data within an office or campus environment, this led to the

Chine

5231 words - 21 pages (TCP 23)". As an example for opening a port, two entries are required to enable the static port used by the Internet Key Exchange (IKE) protocol, which uses UDP 500, for a scope of all IP addresses in the default exceptions lists for both of Windows Firewall's profiles. This entry is added to the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file: HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters

Similar Essays

Refining Tcp´S Rtt Dependent Mechanisms With An Advent Of Link Retransmission Delay Measurement In Wireless Lan

3133 words - 13 pages their performance remained protected in a congested environment. The increase in the number of Wi-Fi hotspots for Internet provisioning has been and continues to be remarkable due to the existence of Wi-Fi enabled cellular handsets and portable devices [1][2][3]. To address the unreliability of IP based networks, most Internet applications rely on the TCP [4]. It is well known that TCP is designed and tuned for wired networks, with an initial

The Abc's Of 'hacking' Part 2

1421 words - 6 pages aspects of the TCP/IP protocol really are.References:Tim Parker, Karanjit Siyan., "Overview of TCP/IP." TCP/IP Unleashed, 3rd Edition. InformIT. 23 Aug 2003Seth Fogie, Cyrus Peikari.., "The Ingredients to ARP Poison." Prentice Hall PTR. InformIT. 18 Aug 2002 http://www.informit.com/articles/article.asp?p=29750TCP/IP:TCP/IP is a stable, well-established, complete set of protocols, and this chapter takes a close look at exactly what makes it tick. TCP

Ip Security Essay

1417 words - 6 pages new keys. New SAs can be established before the existing SAs expire, so that a given flow can continue uninterrupted. The components of IPSec, SAs, and IKE, are covered in more detail later. IPSec in Detail Within the TCP/IP environment, IPSec protocols offer security services at the IP layer. These security services include access control, connectionless integrity, data origin authentication, protection against replay, confidentiality

Switching Technologies Essay

1294 words - 5 pages switch these cells very quickly. Much as we saw above with Frame Relay is the key word "predictability". Both of these switching technologies allow for faster switching of data due to their predictable nature. This is done via their encapsulation of upper layer data in their respective formats. This was very much a high level overview of both Frame Relay and ATM. Hopefully it will be enough to whet your appetite to research them both more. As we are beginning to see all of the world is not composed of only TCP/IP. Till next time!