Premium Essay

TCP/IP Network Model

Submitted By
Words 1024
Pages 5
ABSTRACT
Without TCP/IP, there would be no internet. TCP and IP are two separate data communication and transmission protocols. They are considered the core protocols of TCP/IP network model. The model encompass four layers; application layer, host-to-host transport layer, Internet layer, and network access layer. Each layer process data that it receives and push up and down the model layers according to its intended function. This paper will provide an analysis of the layered protocol structure of TCP/IP networks.

Keywords: TCP/IP networks model, application layer, host-to-host transport layer, Internet layer, and network access layer.

INTRODUCTION
All internet services that we use and rely on in our daily life are based on TCP/IP networks. …show more content…
It was developed by the Defense Advanced Research Projects Agency (DARPA) in 1960, and was declared by US Department of Defense (DoD) as the standard for all military computer networks in 1982 (Tanenbaum, 2013).

In essence, TCP/IP model is a suite of protocols designed to establish end to end connection so that a reliable data transmission can take place. The key protocols that allow this to happen are; Transmission Control Protocol (TCP) and Internet Protocol (IP), and this is where the name of the model is coming from. The model encompasses four layers as illustrated in figure 1. Each of which is designed to provide a specific function(s). The layers are:

Application Layer
All the services that a user needs to access any type of resources over a network are facilitated via protocols reside in this layer. A user might be able to deal with such protocols directly or via an interface or application such as web browser. The Hypertext Transfer Protocol (HTTP), for instance, is an example of protocols that reside in the Application layer and allows for the exchange of web content (Tanenbaum, 2013). User can use any web browser to request any web content such as the one provided by Dublin Institute of Technology (e.g. http://www.dit.ie/) via …show more content…
The key protocols in this layer are; TCP and UDP (User Datagram Protocol). The former is connection oriented protocol that provides guarantee on data delivery as well as error detection. TCP uses segmentation to split big data chunks into smaller pieces and assigns a sequence number for each segment. The sequence number is used at destination side to put the data in the correct order. It is also used to resent the segments that the destination fail to receive for any reason. The UDP on the other hand is a connection less protocol that make use of ports for end-to-end communication but it does not provide guarantee on data delivery. However, it is faster than TCP in

Similar Documents

Premium Essay

Protocols

...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer Security...

Words: 278 - Pages: 2

Premium Essay

Nt1210 Unit 3 Assignment 1

...1. B. The network uses standards defined in TCP/IP RFCs, plus other standards. 2. C. Ethernet D. TCP/IP mapping 3. A. It exists as a written document. C. It has been passed through some form of review and approval or certification process. 4. A. De facto standard documents have been reviewed more thoroughly. C. De facto standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries. 5. B. The data link layer sits lower in the model than the transport layer. C. The physical layer sits just below the data link layer. 6. B. IEEE D. ANSI 7. D. To keep intellectual property rights to the technology inside the company 8. B. IP is a network layer protocol. 9. B. TCP/IP 10. B. The lower four layers of TCP/IP define the same kinds of functions as the matching layer numbers from OSI. 11. C. The PCs use two wires to create a circuit to send data from PC1 to PC2. 12. B. Ethernet defines MAC addresses, but when used in a TCP/IP network, it does not use the addresses, instead relying on IP addresses. 13. D. Datagram 14. B. Can be written in DDN format D. Used by routers to make a forwarding decision 15. A. 48 bits in length 16. A. LANs generally connect devices that are nearer to each other, compared to WANs. D. LANs are purchased, and WANs are leased. 17. B. Two TCP/IP data-link protocols are Ethernet...

Words: 699 - Pages: 3

Free Essay

Nt1210 Mid-Term Study Guide

...1. nibble, byte, word, double word- define 2. how does the RAM know when its on and off, full and half 3. converting binary’s 4. how are the tracks and setctors separated on a hard drive 5. pg 12 adding binary 6. Read about file systems 7. Video compression and what is it for 8. 9. Internet core 10. How do you define a network (more than one computer) 11. Topologies (bus,ring,star,and mesh) 12. Networking standards 13. Defacto standards vs vendor standards vs vendor group standards 14. Tcp/ip 15. Open networking model and the osi model 16. Ip routing 17. Pg 136 authors note 18. Frame and packet 19. IP addressing 20. IP addressing 21. Physical layer, layer 1 of the OSI model 22. Lab 3.1.1 (wouldn’t be able to communicate) 23. Data link layer 24. LAN vs WAN 25. Different between ac and dc currents 26. Difference between the circitury and node 27. Full duplex vs half duplex 28. Sending data through electricity foucusing on sound waves 29. RJ 45 connectors 30. Fiber optics 31. The wireless standards 32. CSMA CSCA 33. When you have a fiber optic cable and two buildings, which would you use single mode or multi mode? Multi mode 34. Copper cable and standards. (EMI) 35. Two types of utp cable a and b, cross over and straight cable 36. Max distance for UTP cables (100M) 37. FORFIT! 38. What is trouble shooting bottom up and...

Words: 366 - Pages: 2

Premium Essay

Computernt Plus

...the current status of EIGRP? Show IP eigrp neighbors Two metrics used by default in EIGRP metric calculation? Bandwidth and Delay Dynamic routing protocols is considered an exterior gateway protocol only? BGP Is an encapsulation protocol that can be used on cisco routers when configuring subinterfaces? 802.1Q Is the binary equivalent to the dotted decimal netmask- 255.255.192.0? 1111.1111.11100.0000 This routing protocol is considered to use distance vector logic? Rip Has the lowest Cisco IOS administrative distance? Static route Describe the point-to-point WAN connection protocol provided by Telco? Leased Lines This cisco IOS command copies the current running configuration to a tftp server? Copy running-config tftp The concept of EIGRP Feasible distance is the computed metric of a SUCCESSOR route Is the dotted decimal equivalent to slash notation /25 255.255.255.128 The routing protocol that doesn’t support support VLSM? RIP v1 Is the broadcast address for the ip subnet 8.5.8.232 mask 255.255.0.0 8.5.255.255 Is the slash notation dotted decimal mask of 255.255.255.252 /30 The following mask could create an IP subnet from a class B that contains 500 hosts? 255.255.255.0 Port of STMP? 25 Protocol responsible for resolving mac addresses from IP addresses? ARP Two protocols commonly used in WANS at layer 2 of the OSI model? HDLC and PPP 192.168.254.0 is private up networks, classified by? RFC1918 Bits comprise the network portion of a class C address? 24 ...

Words: 2228 - Pages: 9

Free Essay

Intro to Networking

...Building TCP/IP Networks This chapter will allow you to explore the common models of networking from the physical media connection to the application that displays the information, including how these layers interact and how they map to real networking devices. The labs in this chapter are designed to reinforce concepts from Chapter 3 of your Introduction to Networking textbook and allow you to explore some of the more important ideas with greater depth. You will explore the different types of network reference models available and analyze how each one applies to real network technology. You will also use packet capturing to look at real network traffic and explore the data link layer of networking. At the end of this chapter, you should be able to ■ Explain the purpose of network reference models ■ Describe the layers of the OSI reference model and explain what each layer provides ■ Describe the layers of the TCP/IP model and relate it to the OSI model and real networking equipment ■ Capture live packet information on a network and explain the data link layer portion of the packets captured ■ Enable network resources such as shared printers and file sharing on your own PC Lab 3.1: Network Reference Models approximate Lab Time: 10–15 min. Materials Needed: paper/pencil, Textbook, and Internet research This lab reviews the importance of modeling communication on a network. This will include a review of the state of networking before standardized reference models existed...

Words: 270 - Pages: 2

Premium Essay

Analysis of Wireless Protocols

...Analysis of Wireless Protocols Analysis of Wireless Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction...

Words: 285 - Pages: 2

Free Essay

Physics

...Figure 1 is the soil layer. Ground water table is at 5m depth. The thickness of each layer is determined by Case 1 uses H1 = 4m, H2 = 5m, H3 = 7m, and H4 = 2m. Case 2 uses H1 = 2m, H2 = 7m, H3 = 5m, and H4 = 4m. Soil below Layer 4 is considered as a rigid stratum which can control failure mechanism. Case 1 Layer 1: c’ = 3kPa, φ’ = 38°, and γ = 19kN/m3 (γsat = 20.3kN/m3) Layer 2 : cu = 25kPa, c’ = 8kPa, φ’ = 25°, OCR = 2, Cc = 0.8, Cs = 0.16, e = 1.1 and γ = 15kN/m3 (γsat = 16kN/m3) Layer 3: c’ = 0kPa, φ’ = 38°, and γ = 18kN/m3 (γsat = 19.1kN/m3) Layer 4 : cu = 40kPa, φ’ = 28°, OCR = 1, Cc = 0.5, e = 0.9 and γ = 16kN/m3 (γsat = 17kN/m3) Case 2 Layer 1 : cu = 30kPa, c’ = 15kPa, φ’ = 23°, OCR = 3.0, Cc = 0.8, Cs = 0.16, e = 1.1 and γ = 15kN/m3 (γsat = 16.5kN/m3) Layer 2: c’ = 1kPa, φ’ = 35°, and γ = 19kN/m3 (γsat = 20.8kN/m3) Layer 3 : cu = 35kPa, c’ = 5kPa, φ’ = 28°, OCR = 1.5, Cc = 0.5, e = 0.9 and γ = 16kN/m3 (γsat = 17.3kN/m3) Layer 4: c’ = 0kPa, φ’ = 35°, and γ = 18kN/m3 (γsat = 19.1kN/m3) Design the cut slopes for 12m height (Case 1) and for 7m height (Case 2), based on F = 1.3 (short-term), F = 1.5 (long-term) and F = 1.15 (seismic). There are only three options that can be used to increase F for the slope. They are, 1) reduce the slope angle; 2) reduce the slope height; and 3) dewater. The optimum design is the slope cut as less as possible. The water table change will induce the consolidation. The maximum vertical displacement due to dewatering on the slope crest must be...

Words: 449 - Pages: 2

Premium Essay

Nt1310 Unit 5 Network Models

...across one or more networks. To transfer and receive these packets of information should use a common protocol, and set of rules and regulations for the operation of networks together. Network models include many of protocols, such as HTTP, DHCP, IPv4, UDP and ARP, which include the rules and regulations to manage the communication between the network devices, also the limits of communication with each other (Kozierok, 2001-2005). The most commonly used are: 1. Transmission Control Protocol/Internet Protocol (TCP/IP), which established by the Defense Advanced Research Projects Agency (DARPA), and managed by the Internet Engineering Task Force (IETF), to connect the various Defense Department with each other, and uses the TCP/IP protocol to connect all governmental, educational and business institutions in the world. 2....

Words: 769 - Pages: 4

Free Essay

Internet Protocols

...INTERNET PROTOCOLS & APPLICATIONS * TCP/IP: The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. * IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX. * NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. * AppleTalk: AppleTalk is a protocol suite to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology...

Words: 1711 - Pages: 7

Free Essay

Nt1210

...INTRO TO NETWORKING UNIT3 LAB3.3 The TCP/IP Model Mr. Randy Vogl Gus Perez 19593003 The TCP/IP network model Exercise 3.3.1 What are the distinct differences between OSI and TCP/IP models? TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection. Model TCP/IP is developed on points toward a model the internet. TCP/IP has 4 layers. OSI has 7 layers. TCP/IP more reliable than OSI OSI has strict boundaries; TCP/IP does not have very strict boundaries. TCP/IP follow a horizontal approach. OSI follows a vertical approach. In the application layer, TCP/IP uses both session and presentation layer. OSI uses different session and presentation layers. TCP/IP developed protocols then model. OSI developed model then protocol. TCP/IP offers support for connectionless communication within the network layer. In the network layer, OSI supports both connectionless and connection-oriented communication. TCP/IP is protocol dependent. OSI is protocol independent. http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/ Read more: Difference between OSI and TCP IP Model | Difference Between | Difference between OSI vs TCP IP Model http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/#ixzz3f4nyPzTU TCP/IP model protocols and functions. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. Using figure 3.4 from the Lab manual...

Words: 1306 - Pages: 6

Free Essay

Nt1210 Intro to Networking Lab 3.3

...NT1210 Lab 3.3: the TCP/IP Model Exercise 3.3.1 Using your textbook and Internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? Applications, Transport, Network, Network Interface this the TCP/IP model. A huge difference is that TCP/IP model uses 4 major layers instead of 7 layers to OSI model. OSI Model is Applications, Presentation, Session, Transport, Network, Data Link and Physical composed to 7 layers. OSI was developed as theoretical model, while TCP/IP was more practical model. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model Transport layers: The Internet Protocol (IP), Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). These core protocols support many other protocols, to perform a variety of functions at each of the TCP/IP model layers. Still others enable user applications to function. Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and function of each of these. Use your textbook and Internet research to support your answer. TCP (Transmission Control Protocol) Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. User Datagram Protocol a connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery services...

Words: 331 - Pages: 2

Free Essay

Tcp/Ip

...TCP/IP This week’s paper will provide an overview into the world of the Transmission Control Protocol (TCP) and Internet Protocol (IP), and how they are used together in business and telecommunications. Frist, the current TCP/IP offerings as, as they apply to the OSI model, will be discussed. Second, the future of TCP/IP will be discussed with relevant research support as well as recommendations for new software and equipment. Finally, an overview of different methods for reducing network congestion through the use of equipment, software and multiplexing will be given. Current Offerings of TCP/IP In business, the OSI and TCP/IP have been the standard method of network classification for many years. The Open Systems Interconnect Model (OSI) can be thought of as an idea or guideline, while TCP/IP more closely relates to reality. Both models do mostly the same thing, but TCP/IP is a more efficient method, and usually matches up directly with the network. Because OSI is more of an idea, it is not utilized as much as TCP/IP. With the creation of smart switches and other advanced network equipment and functions, more layers can be combined and a more streamlined process can be gained. Because of this, TCP/IP is the most used model in modern networks, while OSI is used for describing network activity. Improving TCP/IP As TCP/IP ages and new technology comes about, there is a need to upgrade software and hardware to keep up with the demands of modern networking. Below we will...

Words: 1158 - Pages: 5

Free Essay

Nt1210 Unit 3 Lab 3.3

...your textbook and Internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? The four layers of the TCP/IP architecture can be compared to certain levels of the OSI model. It’s important to know what each level of the TCP/IP protocol architecture does, and how these layers map to the OSI model. The Application Layer of the TCP/IP model performs much the same tasks as the Application, Presentation, and Session layers of the OSI model. The Transport layer in the TCP/IP architecture is similar to the Transport layer in the OSI model. This layer can use TCP or UDP as well. The Internetwork layer in the TCP/IP architecture uses IP addresses to determine how packets should be routed. Remember that the OSI model uses IP addresses, or “Layer 3 Addresses”, at the Network layer. The two layers do much the same thing. This layer is also referred to in the TCP/IP model as the Internet layer. The Network Interface layer in the TCP/IP architecture serves to define the protocols and the hardware needed to actually deliver the data across the network. The Network Interface model does the work of both the Data Link and Physical Layers in the OSI model. exercise 3.3.2 : Identify the layer in which each protocol resides according to the TCP/IP model. See the above. exercise 3.3.3 : The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and function of each of...

Words: 691 - Pages: 3

Premium Essay

Nt1310 Unit 7 Protocol And Standards

...Protocols and standards TCP/IP TCP/IP is a suite of communication protocols which are used to interconnect device on the networks to the internet. This can also be made into a private connection as an intranet. This protocol specifies how data is exchanged using the internet which provides end to end connections. This will then determine how the exchange items should be broken into packets, transmitted, received, routed and addressed to a destination. TCP/IP doesn’t need much central management with the ability to recover if any device on the network were to fail and is also designed in order to make a network much more reliable. There are two parts to this protocol, TCP and IP. The TCP shows how application are able to make different channels of communication in a...

Words: 1544 - Pages: 7

Premium Essay

Phase 3 Db

...Transmission Control Protocol/Internet Protocol (TCP/IP) model and how this model compares to the Open Systems Interconnection (OSI) Model. These two models are similar to one another yet they are also very different. The main difference is the two models is the fact that the TCP/IP model was implemented as a model to represent the Internet. The TCP/IP model was created after the OSI model in an effort to bring about international standards for the Internet that the OSI could not. The basic foundation of the Internet was built around the TCP/IP model. The layers found in the OSI model and the TCP/IP model also differ. The OSI model has a specific layer structure that has seven layers that are identified from top layer to the bottom layer as follows; Application, Presentation, Session, Transport, Network, Data Link, and Physical. The TCP/IP model does not have a specific layer structure, but the protocols used along with this model implies that the layers are as follows; Application, Transport, Internet, Network Access, and Physical. The TCP/IP model can have four or five layers depending on user preferences. In comparison to the OSI model, the topmost layer of TCP/IP, the application layer would be the equivalent of the Application, Presentation, and Session layers in the OSI model. This level of the model uses high-level protocols and also provides access to network services and resources for applications. The transport layer of TCP/IP is the delivery method for the applications...

Words: 624 - Pages: 3