Tcp Ip Lan Plan

In: Computers and Technology

Submitted By tonievans
Words 549
Pages 3
Axia College Material
Appendix C

OSI Model Key Terms Table
Use the table to define the key terms related to the OSI Model. Describe the functions of any hardware connectivity devices and tools listed.
| | |Function |
|Term |Definition |(if applicable) |
|Physical layer |Is responsible for the actual transmission |Media, signal and binary transmission |
| |of the bits sent across a physical medium | |
|Data link layer |Is responsible for providing error-free |Physical addressing |
| |data transmission and establishes local | |
| |connections between two computers or host | |
|Network layer |Is concerned with the addressing and |Path determination and logical addressing |
| |routing processes necessary to move data | |
| |from one network to another | |
|Transport layer |It is responsible for reliable transparent |End-to-end connections and reliability, |
| |transfer of data between two end points |flow control |
|Session layer |Allows remote users to…...

Similar Documents

Tcp/Ip Lan Plan

...TCP/IP LAN Plan CheckPoint An IPv6 address is 128 bits compared to the IPv4, which is only 32 bits. The subnet mask of an IP address, defines the network portions and which part is the host portion. Each of the three class IP addresses have a range, which cannot be routed across the internet. Since the IP address 172.19.243.254 falls in the range of the class B 172.16 to 172.31 ranges it cannot be routed across the internet. Computers to communicate on a TCP/IP logical network they must have an IP address. An IP address is unique to the devices on a network providing the network ID and the host ID there for, for a computer to talk to another computer within a logical network they both must have an network ID and a host ID. Reallocating bits from the host ID to a network ID one must remember subnets take the power of 2, meaning to create 16 subnets one must reallocate 4 bits to the 2 power (2x2=4x2=8x2=16). A class C network address is 255.255.255.0, leaving the last octet for identification of subnets. 32 subnets equals 6 bits, converted to binary provides a 11111100 binary bit pattern with the sixth 1 representing the 32nds place. The binary bit pattern 11111100 is equal to (128+64+32+16+8+4) 252, which is a subnet mask of 255.255.255.252. To assign address to 62 hosts one must use the formula 2n-2 with n representing the number of host bits. 62 host is (2*2=4*2=8*2=16*2=32*2=64-2=62) 6 host bits. Why subnet, the ability to break up large networks......

Words: 315 - Pages: 2

Tcp/Ip Protocols

...Jenell Davis 12.21.12 IS-3220 Assignment 1 TCP/IP stands for Transmission Control Protocol/ Internet Protocol. TCP is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received. IP responsible for moving packet of data from node to node and it forwards each packet based on a four byte destination address also known as the IP number. The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world. DNS stands for Domain Name Space and it has three major components, the database, the server, and the client. The database is a distributed database and is comprised of the Domain Name Space, which is essentially the DNS tree, and the Resource Records that define the domain names within the Domain Name Space. The server is commonly referred to as a name server. Name servers are typically responsible for managing some portion of the Domain Name Space and for assisting clients in finding information within the DNS tree. Name servers are authoritative for the domains in which they are responsible. They can also serve as a delegation point to identify other name servers that have authority over......

Words: 370 - Pages: 2

Tcp/Ip

...TCP/IP - Socket Programming Jim Binkley 1 sockets - overview sockets ◆ simple client - server model ◆ – – – look at tcpclient/tcpserver.c look at udpclient/udpserver.c tcp/udp contrasts “normal” master/slave setup for TCP ◆ inetd on UNIX - mother server ◆ some details - there are more... ◆ Jim Binkley 2 sockets in BSD world since early 80’s, 4.2 BSD ◆ client/server model ◆ “like” unix file i/o up to a point, can be redirected to stdin/stdout/stderr (on unix) ◆ sockets are dominant tcp/ip application API ◆ – – other API is System V TLI (OSI-based) winsock - windows variations on sockets » sockets in windows event-driven framework 3 Jim Binkley sockets ◆ basic definition - “endpoint of communication” allows connected streams (TCP) or discrete messages (UDP) between processes on same machine, cross network ◆ in o.s., really read/write data queues + TCP has connection Queue (server side) ◆ talk to “socket” with handle/sock descriptor ◆ Jim Binkley 4 kinds of sockets acc. to address family; i.e. how does addressing work ◆ IP address family -> IP addr, tcp/udp port ◆ traditional BSD families ◆ – TCP/IP (AF_INET; i.e., Internet) » TCP/UDP/”raw” (talk to IP) – – – Jim Binkley UNIX (intra-machine, pipes) XNS, and even APPLETALK, DECNET, IPX ... 5 sockets client handle read write read write server socket layer r/w queues tcp stack Jim Binkley 6 syscalls - TCP client/simple test server int s......

Words: 1236 - Pages: 5

The Tcp/Ip Protocol Suite

...The internet protocol suite is the protocol stack used on the internet. It is usually called TCP/IP after two of its most important protocols but there are other protocols as well. The TCP/IP is based on a five-layer model for networking. These layers are the physical, data link, network, transport, and application layers. The physical layer contains all the functions needed to carry the bit stream over a physical medium to another system. This layer has four parts: mechanical, electrical/optical, functional, and procedural. The mechanical part specifies the physical size and shape of the connector itself so that components will plug into each other easily. The electrical/optical part determines what value of voltage or line condition determines whether a pin is active or what represents a 0 or 1 bit. The functional specifies the function of each pin or lead on the connector. The procedural details the sequence of actions that must take place to send or receive bits on the interface. The Ethernet twisted- pair interfaces from IEEE are common implements of the physical layer that includes these four part With only the physical layer, a system would have no way to tell another system to get bits ready. The data link layer solves this problem by organizing the bit stream into a data unit called a frame. The data link layer moves bits across the link and can add reliability to the raw communications link. The data link layer can be very simple, or make the link appear error......

Words: 1025 - Pages: 5

Tcp/Ip Osi Model

...TCP/IP OSI MODEL TCP/IPMODEL OS MODEL Eric Jones 1/31/2014 TCP/IP MODEL OS MODEL TCP/IP is a set of protocols that allows communication between to different computers. It separates networking functions into different layers. Each layer has a different task that is similar to another layer or functions. The TCP/IP is a short version of the OS Model it has four layers instead of seven. TCP/IP is the language of how computers communicate with other computers through the internet. TCP/IP is not a single network protocols it’s a suite of protocols. The TCP layer handles the message being sent and breaks it down into small units called packets which are transferred over to the network. The IP layer is most concerned about transmission. By using unique IP addresses assign to every active receiver on the network. TCP/IP combines the OSI application and the presentation layers and supports flexibility in hostnames and also handles Dns errors and mapping domain names. The OSI also known as the reference model it provides a method of standards and protocols which can be compared to assist in other connectivity. Most developers today now use a reference model/OSI Model learn how transmissions are framed and created to translate to other systems. I it begins with the physical layer of the transmitting system and travels through the other layers to the application layer. Once the data reaches the application layer it is processed by the receiving system. In some cases,......

Words: 379 - Pages: 2

Short Answer Tcp/Ip

...these open standards include such prefixes as: HTTP, HTML and TCP/IP. The benefits of open standards are you have the option not to be locked into one vendor. Since the specifics are open and detailed another vendor could come in and also give work and or solutions to the project. Another benefit would be it is easier for systems using different vendors to be able to adapt to the technology and communicate with each other. Therefore open standards are here to stay and further the internet and other projects well from what it is now. Layered architecture is beneficial to society for the reason of easily organizing the tasks at hand. With this method it not only pertains to networking but to real life as well. Layered architecture is not a new process it has been around for quite some time. A protocol is a set of rules that allows the communications between computers on the network. These rules help regulate the guidelines of speed data transfer and access method. A society based protocol would be like a motorcycle club. For example the network would be the president and the computers would be the other members. The protocol would be the Sgt of Arms as for he would be the one that controls the communication between he members and the president. The four types of different networks are LAN (local area network), WLAN (wireless local area network), WAN (wide area network), and VPN (virtual private network). LAN is your most basic form or network; this is where all......

Words: 449 - Pages: 2

Checkpoint Tcp/Ip

...Checkpoint: TCP/IP LAN Plan 1. An IPv6 address is made up of how many bits? a. 32 b. 48 c. 64 d. 128 e. 256 The answer to this question is d. Ipv6 address has 128 bits which is better than Ipv4 which has only 32 bit addresses. If I understand it with Ipv4 the amount of addresses will soon run out. With Ipv6 as stated in the book unless every star in the universe were assigned an address it is unlikely to run out of addresses. With Ipv4 it was stated that there are only 4 billion possible addresses. With Ipv6 there are 3.4x10^38 or 34 followed by 37 zeroes. Ipv6 resolves some problems found in Ipv4 such as limited addresses, security, sometimes complicated setup and quality of service (QoS). QoS describes the ability of a network to prioritize data packets based on the type of information. Ipv6 makes the handling of special packets easier to implement, such as applications that use video or audio. Whereas Ipv4 uses a dotted decimal in 8 bit sections, Ipv6 uses a hexadecimal format in 16 bit sections. At first I was a bit confused over what this meant and looking at the address example further confused me. Then after further reading I discovered that each 16 bit section was ended with a colon. It was explained that there are three sections to the address they are public topology, a site topology, and an interface identifier. If I am right then the address giving in the book would break down like this: 2001:DB8:0:0:0:2ed3:340:ab The first 3 16 bit sections 2001:DB8:0:......

Words: 1749 - Pages: 7

Analyze Essential Tcp/Ip Network Protocols

...between Ethernet and IP protocols. It converts the IP addresses to Ethernet addresses. 2. What is the purpose of the dynamic host control protocol (DHCP)? DCHP is “the protocol used to assign a pool of IP addresses to requesting clients.” (Beasley & Nilkaew, p. 459) DCHP will allow a network administrator to centrally manage the assignment of the IP addresses in an organization’s network. 3. Identify the DHCP allocated source IP host address for the vWorkstation desktop and the TargetWindows01 virtual server. The IP host address for the vWorkstation is 172.30.0.2 and the TargetWindows01 virtual server IP address is 172.30.0.8. 4. When you pinged the targeted IP host (172.30.0.8 or 172.30.0.200), what was the source IP address and destination IP address of the ICMP echo-request packet? The source IP address was 172.30.0.2 and the destination IP address was 172.30.0.8. 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes, the targeted IP host responded to the ICMP echo-request packet with an ICMP echo-reply packet. I believe there were 4 packets sent back to the IP source. 6. Find a TCP three-way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three-way handshake? A TCP three-way handshake is needed to initiate a connection. It is when three data packets are exchanged at the beginning of a TCP......

Words: 484 - Pages: 2

Tcp/Ip

...TCP/IP This week’s paper will provide an overview into the world of the Transmission Control Protocol (TCP) and Internet Protocol (IP), and how they are used together in business and telecommunications. Frist, the current TCP/IP offerings as, as they apply to the OSI model, will be discussed. Second, the future of TCP/IP will be discussed with relevant research support as well as recommendations for new software and equipment. Finally, an overview of different methods for reducing network congestion through the use of equipment, software and multiplexing will be given. Current Offerings of TCP/IP In business, the OSI and TCP/IP have been the standard method of network classification for many years. The Open Systems Interconnect Model (OSI) can be thought of as an idea or guideline, while TCP/IP more closely relates to reality. Both models do mostly the same thing, but TCP/IP is a more efficient method, and usually matches up directly with the network. Because OSI is more of an idea, it is not utilized as much as TCP/IP. With the creation of smart switches and other advanced network equipment and functions, more layers can be combined and a more streamlined process can be gained. Because of this, TCP/IP is the most used model in modern networks, while OSI is used for describing network activity. Improving TCP/IP As TCP/IP ages and new technology comes about, there is a need to upgrade software and hardware to keep up with the demands of modern networking. Below we......

Words: 1158 - Pages: 5

Tcp/Ip

...1. Three basic building blocks of the internet? = Packet-switch hardware, a communications protocol (TCP/IP), Client/server computing 2. Latency? How does it interfere with internet function? = low level of service quality (delay/late) 3. Explain how packet switching works? = Packet switch is a method slices digital message into packets, routes the packets along different communication paths as they become available, and then reassembles the the packets once they arrive at their destination 4. How is the TCP/LP protocol related to information transfer on the internet? = it is the core combinations protocol for the internet. TCP establishes the connections among sending and receiving web computers and makes sure the packets sent by one computer aww received in the correct sequence by the other, without any packets missing IP provides the addressing scheme and is responsible for the actual delivery of the packet 5. What technological innovation made client/server computing possible? = Client 6. What is cloud computing, how has it impacted the internet? = Cloud computing refers to a model of computing in which firms and individuals obtain computing power and software applications over the internet, rather than purchasing the hardware and software and installing it on their own computers. Cloud computing is the fastest growing form of computing 7. Why are smartphones a disruptive technology? = that radically alters the personal computing and e-commerce......

Words: 346 - Pages: 2

Tcp/Ip Model

...TCP/IP MODEL TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP. TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination. TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use......

Words: 509 - Pages: 3

Tcp/Ip Research Paper

...infrastructure evolved from the Transmission Control Protocol/Internet Protocol, most commonly known as TCP/IP. Prior to becoming known as TCP/IP, these protocols initially began as a project conducted by the US Department of Defense (DoD) named Advanced Research Projects Agency Network (ARPANET). This is the very reason why the TCP/IP model is interchangeably referred to as the DoD model. Many individuals may have heard about TCP/IP with which they often associate it with the internet and IP addresses. Although this may be partly true, the process of getting on the internet requires much more than just turning on a computer and simply clicking away at links. Understanding the rules of TCP/IP will help explain the concept of how computers communicate on a network. The modular components that make up the model are conveniently separated with each section containing a set of protocols that it follows. There are five layers that best describes the TCP/IP model and although there are instances when four layers are used to describe it, the most common reference uses five stacked layers. A layer has a specific task that it accomplishes prior to handing off the data to the next layer. At this point, each layer interacts with the layer directly adjacent to it handing off data to the other layers until it reaches its destination. This structure proves very helpful when it comes to understanding the TCP/IP model. All data that is moved on a network has an origination point. The......

Words: 1457 - Pages: 6

Osi Model and Tcp/Ip Model

...model sets standards for sending and receiving electrical signals between devices. Protocols at the Physical layer identify: * How digital data (bits) are converted to electric pulses, radio waves, or pulses of lights. * Specifications for cables and connectors. * The physical topology.Data at the Physical layer is referred to as bits. | The TCP/IP model incorporates the general concepts and structure of the OSI model. The layers of the TCP/IP model are as follows: Layer | Description | Application | The Application layer corresponds to the Session, Presentation, and Application layers of the OSI model. Protocols associated with the Application layer include FTP, HTTP, Telnet, Smtp, DNS, and SNMP. | Host-to-host | The Host-to-host layer is comparable to the Transport layer of the OSI model and is responsible for error checking and reliable packet delivery. Here, the data stream is broken into segments that must be assigned sequence numbers so that the segments can be reassembled correctly on the remote side after they are transported. Protocols associated with the Host-to-host layer include Transport Control Protocol (TCP) and User-Datagram Protocol (UDP). | Internet | The Internet layer is comparable to the Network layer of the OSI model. It is responsible for moving packets through a network. This involves addressing of hosts and making routing decisions to identify how the packet traverses the network. Protocols associated with the Internet layer include......

Words: 836 - Pages: 4

Tcp/Ip Security Concerns

...is on the TCP/IP security. As we have seen the transmission of data as securely as possible has become top on the list for many companies and persons. As we have begun using the Internet more and more to conduct business remotely, we need to ensure that our most sacred data is protected from harm. To ensure that we understand the transmission of data using TCP/IP, I will explain the history of the protocol and the reason for this being the established standard used. As we have read and know it is a combination of two known protocols that were combined to become one. The Transport Control Protocol is used to ensure successful delivery of data. It carries the destination and source information such as the address for both. The IP protocol or Internet Protocol is the second. This protocol is only for sending data. It combined with TCP will ensure that the data is transmitted successfully. When the protocols began to communicate they can use on of many ways to ensure successful communication. One being the hand shake method. There are more than one and will be explained in the paper. With that transmission come the possibility of interference and high jacking of data. One common discussed security hole is the prediction of the send sequence. There is also the SYN and FIN scanning, which each attack. Then there is UDP security concerns, which an attacker uses empty UDP ports to send datagram’s. These are just a few ways there are security holes defined with using TCP/IP and I......

Words: 373 - Pages: 2

Tcp/Ip

...The Transmission Control Protocol/Internet Protocol (TCP/IP) suite is indisputably one of the most popular networking protocol suites ever developed. TCP/IP is an industry standard designed for large networks consisting of network segments connected by routers, and is the protocol used on the Internet (Hillpot & Ivy, 2005). TCP/IP’s roots can be traced back to research conducted by the United States Department of Defense (DOD) Advanced Research Projects Agency (DARPA) as early as 1960. In the best bureaucratic tradition, DARPAs (or ARPA, as it was called at the time) involvement in the creation of the internet began with a memo dated April 23, 1969 that was authored by Joseph Licklider (Waldrop, 2012). Between1970 to 1996 the Internet evolved, ARPANET hosts started to use Network Control Protocol, a preliminary form of what would become the Transmission Control Protocol (TCP). Than the TCP/IP protocol suite was established which led to the Domain Name System (DNS), ISPs, and the introduction of HTTP. In retrospect, the program that Licklider put together in the early 60’s would evolve into perhaps the most successful federal research program with the greatest significant impact on society in history. The TCP/IP suite maps to a four-layer conceptual model known as the DARPA model, which was named after the U.S. government agency that initially developed it (Waldrop, 2012). Each layer of the DARPA model corresponds to one or more layers of the seven-layer OSI model. ......

Words: 664 - Pages: 3