Professional Documents
Culture Documents
1
AIM:
Study and use of common TCP/IP protocols and term viz. telnet rlogin ftp, ping, finger, Socket,
Port etc.
THEORY: -
Importance of TCP/IP
TCP/IP is nonproprietary and, as a result, is not controlled by any single company. Therefore, the
internet protocol suite can be modified easily. It is compatible with all operating systems, so it
can communicate with any other system. The internet protocol suite is also compatible with all
types of computer hardware and networks. TCP/IP is highly scalable and, as a routable protocol,
can determine the most efficient path through the network.
TCP/IP Protocol Stack Maps to the OSI Model
OSI Layer TCP/IP Layer TCP/IP Protocols
Application, Application Telnet, FTP, SMTP, TFTP,
Presentation, Session DNS, HTTP, DHCP
Transport Transport TCP, UDP
Network Internet IP, ICMP, ARP, RARP
Data Link, Physical Network Access Ethernet, Token Ring,
APPLICATION LAYER
The application layer of the TCP/IP Model consists of various protocols that performs all the
functions of the OSI model’s Application, Presentation and Session layers. This includes
interaction with the application, data transition and encoding, dialogue control and
communication coordination between systems.
The following are few of the most common Application Layer protocols: -
TELNET
The Telnet program provides a remote login capability. Telnet is a terminal emulation protocol
used to access the resources of a remote host. A host, called the Telnet server, runs a telnet server
application that receives a connection from a remote host called the Telnet client. This
connection is presented to the operating system of the telnet server as though it is a terminal
connection connected directly (using keyboard and mouse). It is a text-based connection and
usually provides access to the command line interface of the host. Remember that the application
used by the client is usually named telnet also in most operating systems. One should not confuse
the telnet application with the Telnet protocol.
HTTP
The Hypertext Transfer Protocol is foundation of the World Wide Web. It is used to transfer
Webpages and such resources from the Web Server or HTTP server to the Web Client or the
HTTP client. Web client is used when a web browser such as Internet Explorer or Firefox is
used. It uses HTTP to transfer web pages that you request from the remote servers.
FTP
File Transfer Protocol (FTP) enables a file on one system to be copied to another system. File
Transfer Protocol is a protocol used for transferring files between two hosts. Just like telnet and
HTTP, one host runs the FTP server application and is called the FTP server while the FTP client
runs the FTP client application. A client connecting to the FTP server may be required to
authenticate before being given access to the file structure. Once authenticated, the client can
view directory listings, get and send files, and perform some other file related functions. Just like
telnet, the FTP client application available in most operating systems is called ftp. So, the
protocol and the application should not be confused.
SMTP
Simple Mail Transfer Protocol is used to send e-mails. An email client is configured to send e-
mails then one is using SMTP. The mail client acts as a SMTP client here. SMTP is also used
between two mails servers to send and receive emails. However, the end client does not receive
emails using SMTP. The end clients use the POP3 protocol to do that.
TFTP
Trivial File Transfer Protocol is a stripped-down version of FTP. Where FTP allows a user to see
a directory listing and perform some directory related functions, TFTP only allows sending and
receiving of files. It is a small and fast protocol, but it does not support authentication. Because
of this inherent security risk, it is not widely used.
DNS
Every host in a network has a logical address called the IP address. These addresses are a bunch
of numbers. When user go to a website such as www.cisco.com then user is actually going to a
host which has an IP address, but user do not have to remember the IP Address of every
WebSite. This is because Domain Name Service (DNS) helps map a name such as
www.cisco.com to the IP address of the host where the site resides. This obviously makes it
easier to find resources on a network. When user type the address of a website in browser, the
system first sends out a DNS query to its DNS server to resolve the name to an IP address. Once
the name is resolved, a HTTP session is established with the IP Address.
DHCP
Every host requires a logical address such as an IP address to communicate in a network. The
host gets this logical address either by manual configuration or by a protocol such as Dynamic
Host Configuration Protocol (DHCP). Using DHCP, a host can be provided with an IP address
automatically. To understand the importance of DHCP, imagine having to manage 5000 hosts in
a network and assigning them IP address manually! Apart from the IP address, a host needs other
information such as the address of the DNS server it needs to contact to resolve names,
gateways, subnet masks, etc. DHCP can be used to provide all these information along with the
IP address.
TRANSPORT LAYER
The TCP/IP transport layer’s function is same as the OSI layer’s transport layer. It is concerned
with end-to-end transportation of data and setups up a logical connection between the hosts.
Network protocols are either connection-oriented or connectionless.
The functions of the transport layer are:
1. It facilitates the communicating hosts to carry on a conversation.
2. It provides an interface for the users to the underlying network.
3. It can provide for a reliable connection. It can also carry out error checking, flow control,
and verification.
Connection-oriented protocols - require that a direct connection be established between two
devices before data can begin to transfer between the devices. Packets are transferred using a
prescribed sequence of actions that include an acknowledgment to signal when a packet arrives,
and possibly resending the packet if there are errors. This method is reliable and, as a result of its
reliability and the overhead involved, much slower than connectionless protocols.
Connectionless protocols - Packets are sent over the network without regard to whether they
actually arrive at their destinations. There are no acknowledgments or guarantees, but user can
send a datagram to many different destinations at the same time. Connectionless protocols are
fast because no time is used in establishing and tearing down connections. Connectionless
protocols are also referred to as best-effort protocols.
A port is a logical connection place and specifically, using the Internet's protocol, TCP/IP, the
way a client program specifies a particular server program on a computer in a network. Higher-
level applications that use TCP/IP such as the Web protocol, Hypertext Transfer Protocol, have
ports with pre-assigned numbers. These are known as well-known ports that have been assigned
by the Internet Assigned Numbers Authority (IANA). Other application processes are given port
numbers dynamically for each connection. When a service (server program) initially is started, it
is said to bind to its designated port number.
Two protocols available in this layer are Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP).
ETHERNET
The Ethernet protocol is by far the most widely used one. Ethernet uses an access method called
CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each
computer listens to the cable before sending anything through the network. If the network is
clear, the computer will transmit. If some other nodes have already transmitted on the cable, the
computer will wait and try again when the line is clear. Sometimes, two computers attempt to
transmit at the same instant. A collision occurs when this happens. Each computer then backs off
and waits a random amount of time before attempting to retransmit. With this access method, it
is normal to have collisions. However, the delay caused by collisions and retransmitting is very
small and does not normally affect the speed of transmission on the network. The Ethernet
protocol allows for linear bus, star, or tree topologies. Data can be transmitted over wireless
access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps.
TOKEN RING
The Token Ring protocol was developed by IBM in the mid-1980s. The access method used
involves token-passing. In Token Ring, the computers are connected so that the signal travels
around the network from one computer to another in a logical ring. A single electronic token
moves around the ring from one computer to the next. If a computer does not have information to
transmit, it simply passes the token on to the next workstation. If a computer wishes to transmit
and receives an empty token, it attaches data to the token. The token then proceeds around the
ring until it comes to the computer for which the data is meant. At this point, the data is captured
by the receiving computer. The Token Ring protocol requires a star-wired ring using twisted pair
or fiber optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Due to the
increasing popularity of Ethernet, the use of Token Ring in school environments has decreased.
Ping
Ping is a computer network administration utility used to test the reachability of a host on an
Internet Protocol (IP) network and to measure the round-trip time for messages sent from the
host to a destination computer. The name comes from active sonar terminology. Ping operates by
sending Internet Control Message Protocol (ICMP) echo request packets to the target host and
waiting for an ICMP response. In the process it measures the time from transmission to reception
(round-trip time) and records any packet loss. The results of the test are printed in form of a
statistical summary of the response packets received, including the minimum, maximum, and the
mean round-trip times, and sometimes the standard deviation of the mean.
Finger
Finger was one of the first computer network applications. It enabled people to see who else was
using the computer system as well as find basic information on that user. To find information
about a specific user, it was necessary to know that person's email address. Typical information
provided by Finger would be a person's real name, their office location and phone number, and
they last time they logged in. Users also could modify the plan field to add whatever text they
wished.
Socket
A socket represents a single connection between two network applications. These two
applications nominally run on different computers, but sockets can also be used for interposes
communication on a single computer. Applications can create multiple sockets for
communicating with each other.
CONCLUSION: -
We have successfully studied about the TCP/IP Model, protocols and associated computer
network terms.
DISCUSSION: -
1. What do you mean by network?
2. What is OSI model and explain the different layers of the OSI model.?
3. Compare connection oriented and connection less protocols.
4. What do you mean by TCP/IP model and explain the different layers of TCP/IP model?
5. What is the importance of TCP/IP?
6. Compare TCP and UDP protocols.