This website uses cookies to ensure you have the best experience. Learn more

Internet Protocols Essay

1727 words - 7 pages


* TCP/IP: The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks.
* IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX.
* NetBEUI: NetBIOS Extended User Interface is a protocol used ...view middle of the document...

* SSH: Secure Shell is used to securely connect to a remote computer.
* Telnet: An application used to connect to a remote computer that lacks security features.
* POP3: Post Office Protocol is used to download e-mail from a remote mail server.
* IMAP: Internet Message Access Protocol is also used to download e-mail from a remote mail server.
* SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server.
* Internet Control Message Protocol (ICMP): Send control and error messages to computers and servers. ICMP has several different uses, such as announcing network errors, announcing network congestion, and troubleshooting.

TCP/IP Model
The TCP/IP reference model provides a common frame of reference for developing the protocols used on the Internet. It consists of layers that perform functions necessary to prepare data for transmission over a network. Table 8-6 describes the four layers of the TCP/IP model.

A message begins at the top layer, the application layer, and moves down the TCP/IP layers to the bottom layer, the network access layer. Header information is added to the message as it moves down through each layer and then is transmitted. After reaching the destination, the message travels back up through each layer of the TCP/IP model. The header information that was added to the message is stripped away as the message moves up through the layers toward its destination.

TCP/IP Model Layer Description
Application 4 Where high-level protocols such as SMTP and FTP operate
Transport 3 Where flow-control and connection protocols exist
Internet 2 Where IP addressing and routing take place
Network access 1 Where MAC addressing and physical network components exist

Application Protocols
Application layer protocols provide network services to user applications such as web browsers and e-mail programs. Here are some of the application protocols that operate at the TCP/IP application layer:

* Hypertext Transfer Protocol (HTTP) governs how files such as text, graphics, sound, and video are exchanged on the Internet or World Wide Web (WWW). HTTP is an application layer protocol. A web server runs an HTTP service or daemon. A daemon is a program that services HTTP requests. These requests are transmitted by HTTP client software, which is another name for a web browser.
* Telnet is an application that you can use to access, control, and troubleshoot remote computers and network devices.
* File Transfer Protocol (FTP) is a set of rules governing how files are transferred. FTP allows multiple simultaneous connections to remote file systems.
* Simple Mail Transport Protocol (SMTP) provides messaging services over TCP/IP and supports most Internet e-mail programs.
* Domain Name System (DNS) translates domain names, such as, to IP addresses.
* Hypertext Markup Language (HTML) is a page description language. Web designers use HTML to indicate to web browser...

Other Papers Like Internet Protocols

Nt1210 Intro to Networking 3.2 Essay

619 words - 3 pages NT1210 Lab 3.2. The OSI reference Model Exercise 3.2.1 Using Figure 3-1, define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or Internet research to support your answer. The Physical layer is something simple like wiring, fiber and network cards. Devices that allow communication between the OSI networks. Data link layer is the Ethernet, among other protocols; we're keeping this simple

Osi Model Essay

816 words - 4 pages OSI Model Paper OSI Model And How It Relates To A Network This paper serves as an introduction to OSI Model. To build a home network you do not need to understand the OSI Model, however in order to troubleshoot the network it will be helpful to have a basic understanding of how the network works. Based on the seven layers of the OSI Model, it defines a networking framework for implementing protocols. Each layer functions independently

Web Sites - the Osi Model and Layer Protocols

1381 words - 6 pages Web Sites - The OSI Model and Layer Protocols NTC/362 March 9, 2015 The building of a web site begins with considering the multilayered framework of the Open System Interconnection (OSI) model or the Transmission Control Protocol/Internet Protocol (TCP/IP) model. Network models are designed to categorize all the required functionality around computer communications as well as explain the relationship and flow of information from

What Is Internet and How Does It Work?

1426 words - 6 pages , modems, to transfer information between your personal computer and the “World Wide Web”. “It is important to divide the internet into two main components : the hardware and the protocols. The hardware is made out of each and every cable transferring terabits of information and your computer. Hardware can be made of anything able to capture internet signals, such as smartphones, radios, routers, etc. These are called clients, anything used to connect

What Is Internet and How Does It Work?

1426 words - 6 pages , modems, to transfer information between your personal computer and the “World Wide Web”. “It is important to divide the internet into two main components : the hardware and the protocols. The hardware is made out of each and every cable transferring terabits of information and your computer. Hardware can be made of anything able to capture internet signals, such as smartphones, radios, routers, etc. These are called clients, anything used to connect

Internet Evolution

1353 words - 6 pages -T) around 1976. X.25 was independent of the TCP/IP protocols that arose from the experimental work of DARPA on the ARPANET, Packet Radio Net and Packet Satellite Net during the same time period. Vinton Cerf and Robert Kahn developed the first description of the TCP protocols during 1973 and published a paper on the subject in May 1974. Use of the term "Internet" to describe a single global TCP/IP network originated in December 1974 with the

Internet in Daily Life

2355 words - 10 pages its own policies.[11] Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System (DNS), are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols are an activity of the Internet Engineering Task Force (IETF), a non-profit organization of

History of the Internet

610 words - 3 pages , and the University of Utah. Soon after several other universities connected to ARPANET. In order for ARPANET to communicate via the telephone lines a series of protocols were developed Transmission Control Protocol (TCP) and Internet Protocol (IP) came first then TCP/IP developed from these. These protocols communicated transparently across multiple, linked packet networks. The ultimate infrastructure was designed that if “sites were destroyed

Indp Part 2 Final

1798 words - 8 pages Indp Part 2 Denetso NTC/362 November 24, 2014 Indp Part 2 Protocols ensure that programs and networks are written in the same format to communicate and work properly. For upgrades to happen, communication must take place for the Patton-Fullers’s network. The Internet has protocols designed for its use and these protocols will integrate into the new system. A small portion of the network architecture is discussed as it fits these new

Interior Gateway Routing Protocol (Igrp)

1894 words - 8 pages convergence properties and operating efficiency, and combines the advantages of link state protocols with those of distance vector protocols. OSPF (Open Shortest Path First) - Link-state, hierarchical IGP routing protocol proposed as a successor to RIP in the Internet community. OSPF features include least-cost routing, multipath routing, and load balancing. OSPF was derived from an early version of the ISIS protocol. Network Layer (Protocol

Implement a Vpn Tunnel Between a Microsoft Server and Microsoft Client

653 words - 3 pages internet where it can be intercepted but with a strong encryption the people who have intercepted this information will not be able to read it or do anything with it. 6. Name the available authentication methods (protocols) available when configuring the VPN. Which authentication method is considered stronger? Why? There were three available authentication protocols available. Microsoft Protected EAP (PEAP), Microsoft Encrypted Authentication

Related Essays

Resource Essay

376 words - 2 pages , layer 5 to 7 are normally integrated into a single application layer. The use of spefic application layer protocols may be inferred from the network diagrams. For example, if an email server is shown, you may assume that SMTP and POP/IMAP are used. 3       To make more convincing your recommendations on network elements and protocols, please use referenced networks in other health care organizations. Note that you should NOT call hosiptals to inquire about their IT infrastructure nor should you use proprietary information. Instead the research should be done based on public domain info, such as Internet and case study papers.

Nt1210 Intro To Networking Lab 3.3

331 words - 2 pages , Network, Data Link and Physical composed to 7 layers. OSI was developed as theoretical model, while TCP/IP was more practical model. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model Transport layers: The Internet Protocol (IP), Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). These core protocols support many other protocols, to perform a variety of functions at each of the

Tcp/Ip Model Essay

526 words - 3 pages continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.) Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to

Disk Redundancy Essay

643 words - 3 pages types of port numbers: ephemeral port numbers and well-known port numbers. True. 7. A Windows 7 computer that is connected to a LAN has a hardware address and a computer that is connected to the Internet has an IP address. False. LAN and Internet computers have both hardware addresses and IP addresses. 8. The only two layers of the OSI reference model that do not have individual protocols associated with them are the transport layer and the