tcpip

Lemur zaprasza

An Overview of TCP/IP Protocols

and the Internet



Gary C. Kessler

Hill Associates, Inc.



13 February 1997




This paper was originally submitted to the InterNIC, and posted, on 5 August 1994. This document is an updated version of that paper.




Contents


















































1. Introduction


An increasing number of people are using the Internet and, many for the first time, are using the tools and utilities that at one time were only available on a limited number of computer systems (and only for really intense users!). One sign of this growth in use has been the significant number of TCP/IP and Internet books, articles, courses, and even TV shows that have become available in the last several years; there are so many such books that publishers are reluctant to authorize more because bookstores have reached their limit of shelf space! This memo provides a broad overview of the Internet and TCP/IP, with an emphasis on history, terms, and concepts. It is meant as a brief guide and starting point, referring to many other sources for more detailed information.




2. What are TCP/IP and the Internet?


While the TCP/IP protocols and the Internet are different, their histories are most definitely intertwingled! This section will discuss some of the history. For additional information and insight, readers are urged to read two excellent histories of the Internet: Casting The Net: From ARPANET to INTERNET and beyond... by Peter Salus (Addison-Wesley, 1995) and Where Wizards Stay Up Late: The Origins of the Internet by Katie Hafner and Mark Lyon (Simon & Schuster, 1997).



2.1. The Evolution of TCP/IP (and the Internet)


Prior to the 1960s, what little computer communication existed comprised simple text and binary data, carried by the most common telecommunications network technology of the day; namely, circuit switching, the technology of the telephone networks for nearly a hundred years. Because most data traffic is bursty in nature (i.e., most of the transmissions occur during a very short period of time), circuit switching results in highly inefficient use of network resources. In 1962, Paul Baran, of the Rand Corporation, described a robust, efficient, store-and-forward data network in a report for the U.S. Air Force; Donald Davies suggested a similar idea in independent work for the Postal Service in the U.K., and coined the term packet for the data units that would be carried. According to Baran and Davies, packet switching networks could be designed so that all components operated independently, eliminating single point-of-failure problems. In addition, network communication resources appear to be dedicated to individual users
but, in fact, statistical multiplexing and an upper limit on the size of a transmitted entity result in fast, economical data networks.


The modern Internet began as a U.S. Department of Defense (DoD) funded experiment to interconnect DoD-funded research sites in the U.S. In December 1968, the Advanced Research Projects Agency (ARPA) awarded a contract to design and deploy a packet switching network to Bolt Beranek and Newman (BBN). In September 1969, the first node of the ARPANET was installed at UCLA. With four nodes by the end of 1969, the ARPANET spanned the continental U.S. by 1971 and had connections to Europe by 1973.


The original ARPANET gave life to a number of protocols that were new to packet switching. One of the most lasting results of the ARPANET was the development of a user-network protocol that has become the standard interface between users and packet switched networks; namely, ITU-T (formerly CCITT) Recommendation X.25. This "standard" interface encouraged BBN to start Telenet, a commercial packet-switched data service, in 1974; after much renaming, Telenet is now a part of Sprint's X.25 service.


The initial host-to-host communications protocol introduced in the ARPANET was called the Network Control Protocol (NCP). Over time, however, NCP proved to be incapable of keeping up with the growing network traffic load. In 1974, a new, more robust suite of communications protocols was proposed and implemented throughout the ARPANET, based upon the Transmission Control Protocol (TCP) and Internet Protocol (IP). TCP and IP were originally envisioned functionally as a single protocol, thus the protocol suite, which actually refers to a large collection of protocols and applications, is usually referred to simply as TCP/IP. The original versions of both TCP and IP that are in common use today were written in September 1981, although both have had several modifications applied to them (in addition, the IP version 6, or IPv6, specification was released in December 1995). In 1983, the DoD mandated that all of their computer systems would use the TCP/IP protocol suite for long-haul communications, further enhancing the scope and importance of the ARPANET.


In 1983, the ARPANET was split into two components. One component, still called ARPANET, was used to interconnect research/development and academic sites; the other, called MILNET, was used to carry military traffic and became part of the Defense Data Network. That year also saw a huge boost in the popularity of TCP/IP with its inclusion in the communications kernel for the University of California s UNIX implementation, 4.2BSD (Berkeley Software Distribution) UNIX.


In 1986, the National Science Foundation (NSF) built a backbone network to interconnect four NSF-funded regional supercomputer centers and the National Center for Atmospheric Research (NCAR). This network, dubbed the NSFNET, was originally intended as a backbone for other networks, not as an interconnection mechanism for individual systems. Furthermore, the "Appropriate Use Policy" defined by the NSF limited traffic to non-commercial use. The NSFNET continued to grow and provide connectivity between both NSF-funded and non-NSF regional networks, eventually becoming the backbone that we know today as the Internet. Although early NSFNET applications were largely multiprotocol in nature, TCP/IP was employed for interconnectivity (with the ultimate goal of migration to Open Systems Interconnection).


The NSFNET originally comprised 56-kbps links, and was completely upgraded to T1 (1.544 Mbps) links in 1989. Migration to a "professionally-managed" network was supervised by a consortium comprising Merit (a Michigan state regional network headquartered at the University of Michigan), IBM, and MCI. Advanced Network & Services, Inc. (ANS), a non-profit company formed by IBM and MCI, was responsible for managing the NSFNET and supervising the transition of the NSFNET backbone to T3 (44.736 Mbps) rates by the end of 1991. During this period of time, the NSF also funded a number of regional Internet service providers (ISPs) to provide local connection points for educational institutions and NSF-funded sites.


In 1993, the NSF decided that it did not want to be in the business of running and funding networks, but wanted instead to go back to the funding of research in the areas of supercomputing and high-speed communications. In addition, there was increased pressure to commercialize the Internet; in 1989, a trial gateway connected MCI, CompuServe, and Internet mail services, and commercial users were now finding out about all of the capabilities of the Internet that once belonged exclusively to academic and hard-core users! In 1991, the was formed by General Atomics, Performance Systems International (PSI), and UUNET Technologies to promote and provide a commercial Internet backbone service. Nevertheless, there remained intense pressure from non-NSF ISPs to open the network to all users.


In 1994, a plan was put in place to reduce the NSF's role in the public Internet. The new structure comprises three parts:

l, where individual ISPs would . Although the NSF is only funding four such NAPs (Chicago, New York, San Francisco, and Washington, D.C.), several non-NSF NAPs are also in operation.
lThe , a network interconnecting the NAPs and NSF-funded centers, operated by MCI. This network was installed in 1995 and operated at OC-3 (155.52 Mbps); it is being upgraded and should be running at OC-12 (622.08 Mbps) by 1997.
lThe , to ensure adequate routing protocols for the Internet.

In addition, NSF-funded ISPs were given five years of reduced funding to become commercially self-sufficient.


In 1988, meanwhile, the DoD and most of the U.S. Government chose to adopt OSI protocols. TCP/IP was now viewed as an interim, proprietary solution since it ran only on limited hardware platforms and OSI products were only a couple of years away. The DoD mandated that all computer communications products would have to use OSI protocols by August 1990 and use of TCP/IP would be phased out. Subsequently, the U.S. Government OSI Profile (GOSIP) defined the set of protocols that would have to be supported by products sold to the federal government and TCP/IP was not included.


Despite this mandate, development of TCP/IP continued during the late 1980s as the Internet grew. TCP/IP development had always been carried out in an open environment (although the size of this open community was small due to the small number of ARPA/NSF sites), based upon the creed "We reject kings, presidents, and voting. We believe in rough consensus and running code" [Dave Clark, M.I.T.]. OSI products were still a couple of years away while TCP/IP became, in the minds of many, the real open systems interconnection protocol suite.


It is not the purpose of this memo to take a position in the OSI vs. TCP/IP debate. Nevertheless, a number of observations are in order. First, the ISO Development Environment (ISODE) was developed in 1990 to provide an approach for OSI migration for the DoD. ISODE software allows OSI applications to operate over TCP/IP. During this same period, the Internet and OSI communities started to work together to bring about the best of both worlds as many TCP and IP features started to migrate into OSI protocols, particularly the OSI Transport Protocol class 4 (TP4) and the Connectionless Network Layer Protocol (CLNP), respectively. Finally, a report from the National Institute for Standards and Technology (NIST) in 1994 suggested that GOSIP should incorporate TCP/IP and drop the "OSI-only" requirement. [NOTE: Some industry observers have pointed out that OSI represents the ultimate example of a sliding window; OSI protocols have been "two years away" since about 1986.]



2.2. Internet Growth


The ARPANET started with four nodes in 1969 and grew to just under 600 nodes before it was split in 1983. The NSFNET also started with a modest number of sites in 1986. After that, the network has experienced literally exponential growth. Internet growth between 1981 and 1991 is documented in "Internet Growth (1981-1991)" ().


Network Wizard's distributes a semi-annual . According to them, the Internet had nearly 13 million reachable hosts as of July 1996. The Internet is growing at a rate of about a new network attachment every half-hour, interconnecting more than 90,000 networks. It is estimated that the Internet is doubling in size every ten to twelve months, and has been for the last several years.


And what of the original ARPANET? It grew smaller and smaller during the late 1980s as sites and traffic moved to the Internet, and was decommissioned in July 1990. Cerf & Kahn ("Selected ARPANET Maps," Computer Communications Review, October 1990) re-printed a number of network maps documenting the growth (and demise) of the ARPANET.



2.3. Internet Administration


The Internet has no single owner, yet everyone owns (a portion of) the Internet. The Internet has no central operator, yet everyone operates (a portion of) the Internet. The Internet has been compared to anarchy, but some claim that it is not nearly that well organized!


Some central authority is required for the Internet, however, to manage those things that can only be managed centrally, such as addressing, naming, protocol development, standardization, etc. The administrative and technical activities on the Internet are governed by the . The IAB's two primary sub-bodies are the and the . The IETF's working groups have primary responsibility for the technical activities of the Internet, including writing specifications and protocols; the impact of these specifications is significant enough that ISO accredited the IETF as an international standards body at the end of 1994. The IESG provides direction to the IETF. All of the activities are monitored and authorized by the IAB; the , chartered in 1992, provides oversight and communications for the IAB.


RFCs and describe the organizations involved in the IETF standards process and the relationship between the IETF and ISOC, respectively. The background and history of the IETF and the Internet standards process can be found in "."




3. The TCP/IP Protocol Architecture


Figure 1 shows the TCP/IP protocol architecture; this diagram is by no means exhaustive, but shows the major protocol and application components common to most commercial TCP/IP software packages and their relationship.



----------------------------------------------------- ------
APPLICATION |Telnet|FTP|Gopher|SMTP|HTTP|Finger|POP|DNS|SNMP|RIP| |Ping|
|------+---+------+----+----+------+---+-+-+----+---| |----+-----
TRANSPORT | TCP | UDP | |ICMP|OSPF|
|----------------------------------------+----------+--+----+----+----
INTERNET | IP |ARP|
|----------+-------+----+------+-------+------+-----+-----+------+---|
NETWORK | Ethernet | Token |FDDI| X.25 | Frame | SMDS | ISDN| ATM | SLIP |PPP|
INTERFACE | | Ring | | | Relay | | | | | |
----------------------------------------------------------------------

FIGURE 1. Simplified TCP/IP protocol stack.



The sections below will provide a brief overview of each of the layers in the TCP/IP suite and the protocols that compose those layers. A large number of books and papers have been written that describe all aspects of TCP/IP as a protocol suite, including detailed information about use and implementation of the protocols. Readers are referred to Internetworking with TCP/IP, Vol. I: Principles, Protocols, and Architecture, 2/e, by D. Comer (Prentice-Hall, 1991), TCP/IP: Architecture, Protocols, and Implementation with IPv6 and IP Security, 2nd. ed. by S. Feit (McGraw-Hill, 1997), "TCP/IP Tutorial" by T.J. Socolofsky and C.J. Kale (), and TCP/IP Illustrated, Volume I: The Protocols by W.R. Stevens (Addison-Wesley, 1994).



3.1. The Network Interface Layer


The TCP/IP protocols have been designed to operate over nearly any underlying local or wide area network technology. Although certain accommodations may need to be made, IP messages can be transported over all of the technologies shown in the figure, as well as numerous others.


Two of the underlying interface protocols are particularly relevant to TCP/IP. The Serial Line Internet Protocol (SLIP, ) and Point-to-Point Protocol (PPP, ), respectively, may be used to provide data link layer protocol services where no other underlying data link protocol may be in use, such as in leased line or dial-up environments. Most commercial TCP/IP software packages for PC-class systems include these two protocols. With SLIP or PPP, a remote computer can attach directly to a host server and, therefore, connect to the Internet using IP rather than being limited to an asynchronous connection. PPP, in addition, provides support for simultaneous multiple protocols over a single connection, security mechanisms, and dynamic bandwidth allocation (e.g., when running over ISDN).



3.2. The Internet Layer


The Internet Protocol (), provides services that are roughly equivalent to the OSI Network Layer. IP provides a datagram (connectionless) transport service across the network. This service is sometimes referred to as unreliable because the network does not guarantee delivery nor notify the end host system about packets lost due to errors or network congestion. IP datagrams contain a message, or one fragment of a message, that may be up to 65,535 bytes (octets) in length. IP does not provide a mechanism for flow control.



3.2.1. IP Addresses


One important aspect of IP, even to a typical end-user, is the format and notation used for addressing. IP addresses are always 32 bits in length, as shown in Figure 2. They are typically written as a sequence of four numbers, representing the decimal value of each of the address bytes. Since the values are separated by periods, the notation is referred to as dotted decimal. A sample IP address is 199.182.20.17.




1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
--+-------------+------------------------------------------------
Class A |0| NET_ID | HOST_ID |
|-+-+-----------+---------------+-------------------------------|
Class B |1|0| NET_ID | HOST_ID |
|-+-+-+-------------------------+---------------+---------------|
Class C |1|1|0| NET_ID | HOST_ID |
|-+-+-+-+---------------------------------------+---------------|
Class D |1|1|1|0| MULTICAST_ID |
|-+-+-+-+-------------------------------------------------------|
Class E |1|1|1|1| EXPERIMENTAL_ID |
--+-+-+-+--------------------------------------------------------

FIGURE 2. IP Address Format.



IP addresses are hierarchical for routing purposes and are subdivided into two subfields. The Network Identifier (NET_ID) subfield identifies the TCP/IP subnetwork connected to the Internet. The NET_ID is used for high-level routing between networks, much the same way as the country code, city code, or area code is used in the telephone network. The Host Identifier (HOST_ID) subfield indicates the specific host within a subnetwork.


To accommodate different size networks, IP defines several address classes, as shown in the figure. A Class A address has a 7-bit NET_ID and 24-bit HOST_ID. Class A addresses are intended for very large networks and can address up to 16,777,216 (224) hosts per network. The first digit of a Class A addresses will be a number between 1 and 126. Relatively few Class A addresses have been assigned; examples include 9.0.0.0 (IBM) and 35.0.0.0 (Merit).


A Class B address has a 14-bit NET_ID and 16-bit HOST_ID. Class B addresses are intended for moderate sized networks and can address up to 65,536 (216) hosts per network. The first digit of a Class B address will be a number between 128 and 191. The Class B address space is most in danger of being exhausted of any of the classes and it is very difficult to get a Class B address assigned at this time; examples include 128.138.0.0 (Colorado SuperNet) and 147.225.0.0 (ANSNET).


A Class C address has a 21-bit NET_ID and 8-bit HOST_ID. These addresses are intended for small networks and can address only up to 256 (28) hosts per network. The first digit of a Class C address will be a number between 192 and 223. Most addresses assigned to networks today are Class C; examples include 192.100.81.0 (Netcom) and 192.80.64.0 (St. Michael's College, Colchester, VT).


The remaining two address classes are used for special functions only and are not commonly assigned to individual hosts. Class D addresses may begin with a value between 224 and 239, and are used for IP multicasting (i.e., sending a single datagram to multiple hosts). Class E addresses begin with a value between 240 and 255 and are reserved for experimental use.


Several address values are reserved and/or have special meaning. A HOST_ID of 0 (as used above) is a dummy value reserved as a place holder when referring to an entire subnetwork; the address 10.0.0.0, then, refers to the Class A address with a NET_ID of 10 (this was the old ARPANET address). A HOST_ID of all ones (usually written "255" when referring to an all-ones byte, but also denoted as "-1") is a broadcast address and refers to all hosts on a network. A NET_ID value of 127 is used for loopback testing.


An additional addressing tool is the subnet mask. Subnet masks are used to indicate to applications the portion of the address that identifies the network from the portion that identifies the individual hosts. The subnet mask is written in dotted decimal and the number of 1s indicates the significant NET_ID bits. A Class B address, for example, would typically have a subnet mask of 255.255.0.0 since the first 16 bits are NET_ID.


Subnet masks can also be used to subdivide a large address space or to combine multiple small address spaces. For example, a network may subdivide their address space to define multiple logical networks by segmenting the HOST_ID subfield into a Subnetwork Identifier (SUBNET_ID) and (smaller) HOST_ID (e.g., define the Class B address space 130.20.0.0 into a 16-bit NET_ID, 4-bit SUBNET_ID, and 12-bit HOST_ID; in this case, the subnet mask for individual subnet routing would be 255.255.240.0). Alternatively, a single user might be assigned the four Class C addresses 200.77.128.0, 200.77.129.0, 200.77.130.0, and 200.77.131.0, and use the subnet mask 255.255.252.0 for routing to the domain. This use of subnet masks in routing tables to circumvent the limitations of class-based addresses is called Classless Interdomain Routing (CIDR), described in RFCs and .


As of January 1996, there were 95 Class A addresses, 5892 Class B addresses, and 128,378 Class C addresses assigned. Because CIDR is becoming so widely used, however, these numbers are not a true reflection of the number of networks attached to the public Internet because multiple addresses may be assigned to a single organizational entity.



3.2.2. IP Domains and Host Names


While IP addresses are 32 bits in length, most users do not memorize the numeric addresses of the hosts to which they attach; instead, people are more comfortable with host names. Most IP hosts, then, have both a numeric IP address and a name. While this is convenient for people, however, the name must be translated back to a numeric address for routing purposes.


Internet hosts use a hierarchical naming structure comprising a top-level domain (TLD), domain and subdomain (optional), and host name. The IP address space (and all TCP/IP-related numbers) is assigned and maintained by the . Domain names are assigned by the TLD naming authority; the has overall authority of these names, with NICs in different countries and geographic regions handling non-U.S. domains. The InterNIC also is responsible for the overall coordination and management of the Domain Name System (DNS), the distributed database that reconciles host names and IP addresses on the Internet. The concepts, structure, and delegation of the DNS is described in RFCs and .


The domain name structure is best understood if the name is read from right-to-left. Internet hosts names end with a top-level domain name. World-wide generic top-level domains include:


    l.com: Commercial organizations (administered by the InterNIC)
    l.edu: Educational institutions, although today usually limited to 4-year colleges and universities (administered by the InterNIC)
    l.net: Network providers (administered by the InterNIC)
    l.org: Non-profit organizations (administered by the InterNIC)
    l.int: Organizations established by international treaty
    l.gov: U.S. Federal government agencies (delegated to the and administered by the InterNIC)
    l.mil: U.S. military (managed by the U.S. )

The host name smcvax.smcvt.edu, for example, is assigned to a VAX computer (smcvax) in the St. Michael's College domain (smcvt), within the educational top-level domain (edu). The host name golem.hill.com refers to a host (golem) in the Hill Associates domain (hill) within the commercial top-level domain (com). Guidelines for selecting host names is the subject of .


Other top-level domain names use the two-letter country codes defined in , and , respectively, which delegate most of the country TLDs to national registries.


Different countries may organize the country-based subdomains in any way that they want. Many countries use a subdomain similar to the TLDs, so that .com.mx and .edu.mx are the suffixes for commercial and educational institutions in Mexico, and .co.uk and .ac.uk are the suffixes for commercial and educational institutions in the United Kingdom. The us domain is unusual, since it is largely organized on the basis of geography, using names of the form entity-name.city-telegraph-code.state-postal-code.us. The domain name cnri.reston.va.us, for example, refers to the Corporation for National Research Initiatives in Reston, Virginia. More information about the US domain may be found in .


The scheme of TLD assignment and management has worked well for many years, but the pressures of increased commercial activity, network size, and international use have caused controversy about how names can be fairly assigned without violating trademarks and conflicting claims to names. In November 1996, an Internet was formed to resolve some of these naming issues and to act as a focal point for the international debate over a proposal to establish additional global naming registries and global Top Level Domains (gTLDs). In February 1997, the IAHC proposed the creation of seven new gTLDs:


    l.firm for businesses, or firms.
    l.store for businesses offering goods to purchase.
    l.web for entities emphasizing activities related to the WWW.
    l.arts for entities emphasizing cultural and entertainment activities.
    l.rec for entities emphasizing recreation/entertainment activities.
    l.info for entities providing information services.
    l.nom for those wishing individual or personal nomenclature.


The IAHC also proposed that up to 28 new registrars be established to grant second-level domain names under the new gTLDs, all of which will be shared among the new registrars. Furthermore, the three existing gTLDs .com, .net, and .org will also be shared upon conclusion of the NSF contract in the U.S.



3.2.3. ARP and Address Resolution


Early IP implementations ran on hosts commonly interconnected by Ethernet local area networks (LAN). Every transmission on the LAN contains the local network, or medium access control (MAC), address of the source and destination nodes. The MAC address is 48-bits in
length and is non-hierarchical; MAC addresses are never the same as IP addresses.


When a host needs to send a datagram to another host on the same network, the sending
application must know both the IP and MAC addresses of the intended receiver. Unfortunately, the IP process may not know the MAC address of the receiver. The Address Resolution Protocol (ARP), described in , provides a mechanism so that a host can determine a receiver's MAC address from the IP address. The process is actually quite simple: the host sends an ARP packet in a frame containing the MAC broadcast address; the ARP request advertises the destination IP address and asks for the associated MAC address. The station on the LAN that recognizes its own IP address will send an ARP response with its own MAC address. As Figure 2 shows, an ARP message is carried directly in an IP datagram.


Other address resolution procedures have also been defined, including those which allow a disk-less processor to determine its IP address from its MAC address (Reverse ARP, or RARP), provides a mapping between an IP address and a frame relay virtual circuit identifier (Inverse ARP, or InARP), and provides a mapping between an IP address and ATM virtual path/channel identifiers (ATMARP).



3.2.4. OSPF and RIP


OSPF and RIP are two of the main routing protocols associated with TCP/IP and routing within a particular domain. It is important to note the function of the routing protocol. IP, as the Network Layer protocol, is responsible for routing datagrams. It performs this task by examining a routing table. The routing protocol's job is to populate the routing table with information that can be used by the Network Layer protocol.


The Routing Information Protocol, described in , describes how routers will exchange routing table information using a distance-vector algorithm. With RIP, neighboring routers periodically exchange their entire routing tables. RIP uses hop count as the metric of a path's cost, and a path is limited to 16 hops. Unfortunately, RIP has become increasingly inefficient on the Internet as the network continues its fast rate of growth. Current routing protocols for many of today's LANs are based upon RIP, including those associated with NetWare, AppleTalk, VINES, and DECnet.


The Open Shortest Path First protocol is a link state algorithm that is more robust than RIP, converges faster, requires less network bandwidth, and is better able to handle larger networks. With OSPF, a router broadcasts only changes in its links' status rather than entire routing tables. OSPF Version 2, described in , is rapidly replacing RIP in the Internet.


Figure 2 shows the protocol relationship of RIP and OSPF to IP. A RIP message is carried in a UDP datagram which, in turn, is carried in an IP datagram. An OSPF message, on the other hand, is carried directly in an IP datagram.



3.2.5. ICMP


The Internet Control Message Protocol, described in , is an adjunct to IP that notifies the sender of IP datagrams about abnormal events. ICMP might indicate, for example, that an IP datagram cannot reach an intended destination, cannot connect to the requested service, or that the network has dropped a datagram due to old age. ICMP also provides information back to the transmitter, such as end-to-end delay for datagram transmission.



3.2.6. IP version 6


The official version of IP that has been in use since the early 1980s is version 4. Due to the tremendous growth of the Internet and new emerging applications, it was recognized that a new version of IP was becoming necessary. In late 1995, IP version 6 (IPv6) was entered into the Internet Standards Track. The primary description of IPv6 is contained in and a number of related specifications.


IPv6 is designed as an evolution from IPv4, rather than a radical change. Primary areas of change relate to:


    lIncreasing the IP address size to 128 bits
    lBetter support for traffic types with different quality-of-service objectives
    lExtensions to support authentication, data integrity, and data confidentiality


For more information about IPv6, check out:


    lIPng: Internet Protocol Next Generation by Scott Bradner and Allison Mankin (Addison-Wesley, 1996)
    lIPv6: The New Internet Protocol by Christian Huitema (Prentice-Hall, 1996).
    l by Gary Kessler.
    lIPng and the TCP/IP Protocols by Stephen Thomas (John Wiley & Sons, 1996)
    l
    l
    l



3.3. The Transport Layer


The TCP/IP protocol suite comprises two protocols that correspond roughly to the OSI Transport and Session Layers; these protocols are called the Transmission Control Protocol and the User Datagram Protocol (UDP). Individual applications are referred to by a port identifier in TCP/UDP messages. The port identifier and IP address together form a socket. Well-known port numbers on the server side of a connection include 20 (FTP data transfer), 21 (FTP control), 23 (Telnet), 25 (SMTP), 43 (whois), 70 (Gopher), 79 (finger), and 80 (HTTP).


TCP, described in , provides a virtual circuit (connection-oriented) communication service across the network. TCP includes rules for formatting messages, establishing and terminating virtual circuits, sequencing, flow control, and error correction. Most of the applications in the TCP/IP suite operate over the reliable transport service provided by TCP.


UDP, described in , provides an end-to-end datagram (connectionless) service. Some applications, such as those that involve a simple query and response, are better suited to the datagram service of UDP because there is no time lost to virtual circuit establishment and termination. UDP's primary function is to add a port number to the IP address to provide a socket for the application.



3.4. Applications


The Application Layer protocols shown in Figure 2 are examples of common TCP/IP applications and utilities, which include (not all of the following are shown in Figure 2):


    lTelnet: Short for Telecommunication Network, a virtual terminal protocol allowing a user logged on to one TCP/IP host to access other hosts on the network ().
    lFTP: The File Transfer Protocol allows a user to transfer files between local and remote host computers ().
    lArchie: A utility that allows a user to search all registered anonymous FTP sites for files on a specified topic.
    lGopher: A tool that allows users to search through data repositories using a menu-driven, hierarchical interface, with links to other sites ().
    lSMTP: The Simple Mail Transfer Protocol is the standard protocol for the exchange of electronic mail over the Internet (). specifically describes the mail message body format, and RFCs and describe MIME (Multipurpose
    Internet Mail Extensions). Reference books on electronic mail systems include !%@:: Addressing and Networks by D. Frey and R. Adams (O'Reilly & Associates, 1993) and THE INTERNET MESSAGE: Closing the Book With Electronic Mail by M. Rose (PTR Prentice Hall, 1993).
    lHTTP: The Hypertext Transfer Protocol is the basis for exchange of information over the World Wide Web (WWW). Various versions of HTTP are in use over the Internet, with HTTP version 1.0 () being the most current. WWW pages are written in the Hypertext Markup Language (HTML), an ASCII-based, platform-independent formatting language ().
    lFinger: Used to determine the status of other hosts and/or users ().
    lPOP: The Post Office Protocol defines a simple interface between a user's mail reader software and an electronic mail server; the current version is POP3 ().
    lDNS: The Domain Name System (described in slightly more detail in above) defines the structure of Internet names and their association with IP addresses, as well as the association of mail, name, and other servers with domains.
    lSNMP: The Simple Network Management Protocol defines procedures and management information databases for managing TCP/IP-based network devices. SNMP () is widely deployed in local and wide area network. SNMP Version 2 (SNMPv2, ) adds security mechanisms that are missing in SNMP, but is also very complex; widespread use of SNMPv2 has yet to be seen. Additional information on SNMP and TCP/IP-based network management can be found in SNMP by S. Feit (McGraw-Hill, 1994) and THE SIMPLE BOOK: An Introduction to Internet Management, 2/e, by M. Rose (PTR Prentice Hall, 1994).
    lPing: A utility that allows a user at one system to determine the status of other hosts and the latency in getting a message to that host. Uses ICMP Echo messages.
    lWhois/NICNAME: Utilities that search databases for information about Internet domain and domain contact information (
    RFC 954).
    lTraceroute: A tool that displays the route that packets will take when traveling to a remote host.

3.5. Summary


As this discussion has shown, TCP/IP is not merely a pair of communication protocols but is a suite of protocols, applications, and utilities. Increasingly, these protocols are referred to as the Internet Protocol Suite, but the older name will not disappear anytime soon.




---------------- ----------------
| Application || Application |
|--------------| |--------------|
| TCP || TCP |
|--------------| ----------------- |--------------|
| IP || IP || IP |
|--------------| |-------+-------| |--------------|
| Subnetwork 1 ||Subnet1|Subnet2|| Subnetwork 2 |
---------------- --------+-------- ----------------
HOST GATEWAY HOST

FIGURE 3. TCP/IP protocol suite architecture.



Figure 3 shows the relationship between the various protocol layers of TCP/IP. Applications and utilities reside in host, or end-communicating, systems. TCP provides a reliable, virtual circuit connection between the two hosts. (UDP, not shown, provides an
end-to-end datagram connection at this layer.) IP provides a datagram (DG) transport service over any intervening subnetworks, including local and wide area networks. The underlying subnetwork may employ nearly any common local or wide area network technology.


Note that the term gateway is used for the device interconnecting the two subnets, a device usually called a router in LAN environments or intermediate system in OSI environments. In OSI terminology, a gateway is used to provide protocol conversion between two networks and/or applications.




4. Other Information Sources


This memo has only provided background information about the TCP/IP protocols and the Internet. There is a wide range of additional information that the reader can access to further use and understand the tools and scope of the Internet. The real fun
begins now!


Internet specifications, standards, reports, humor, and tutorials are distributed as Request for Comments (RFC) documents. RFCs are all freely available on-line, and most are available in ASCII text format.


Internet standards are documented in a subset of the RFCs, identified with an "STD" designation. describes the
Internet standards process and
always contains the official list of Internet standards.


For Your Information (FYI) documents are another RFC subset, specifically providing background information for the Internet community. The FYI notes are described in .


Frequently Asked Question (FAQ) lists may be found for a number of topics, ranging from ISDN and cryptography to the Internet and Gopher. Two such FAQs are of particular interest to Internet users: "FYI on Questions and Answers - Answers to Commonly asked 'New Internet User' Questions" () and "FYI on Questions and Answers: Answers to Commonly Asked 'Experienced Internet User' Questions" (). In addition, "A Primer on Internet and TCP/IP Tools" () provides detailed examples of the various utilities and applications not described in this document. All three of these documents point to even more information sources.




5. Acronyms and Abbreviations

ARPAddress Resolution Protocol
ARPANETAdvanced Research Projects Agency Network
ASCIIAmerican Standard Code for Information Interchange
ATMAsynchronous Transfer Mode
BSDBerkeley Software Development
CCITTInternational Telegraph and Telephone Consultative Committee
CIXCommercial Internet Exchange
DARPADefense Advanced Research Projects Agency
DNSDomain Name System
DoDU.S. Department of Defense
FAQFrequently Asked Questions lists
FDDIFiber Distributed Data Interface
FTPFile Transfer Protocol
FYIFor Your Information series of RFCs
GOSIPU.S. Government Open Systems Interconnection Profile
HTMLHypertext Markup Language
HTTPHypetext Transfer Protocol
IABInternet Activities Board
IANAInternet Assigned Numbers Authority
ICMPInternet Control Message Protocol
IESGInternet Engineering Steering Group
IETFInternet Engineering Task Force
IPInternet Protocol
ISOInternational Organization for Standardization
ISOCInternet Society
ITU-TInternational Telecommunication Union Telecommunication Standardization Sector
MACMedium (or media) access control
MbpsMegabits (millions of bits) per second
NICNAMENetwork Information Center name service
NSFNational Science Foundation
NSFNETNational Science Foundation Network
OSIOpen Systems Interconnection
OSPFOpen Shortest Path First
PPPPoint-to-Point Protocol
RARPReverse Address Resolution Protocol
RIPRouting Information Protocol
RFCRequest For Comments
SLIPSerial Line IP
SMDSSwitched Multimegabit Data Service
SMTPSimple Mail Transfer Protocol
SNMPSimple Network Management Protocol
STDInternet Standards series of RFCs
TCPTransmission Control Protocol
TLDTop-level domain
UDPUser Datagram Protocol




6. Author's Address

Gary C. Kessler

Hill Associates

17 Roosevelt Highway

Colchester, VT 05446-3641

+1 802-655-0940 (main number)

+1 802-655-7974 (fax)

+1 802-879-3375 (home office & fax)

E-mail:


  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • teen-mushing.xlx.pl
  • Wątki
    Powered by wordpress | Theme: simpletex | © Lemur zaprasza