Analyze Essential Tcp/Ip Network Protocols

In: Computers and Technology

Submitted By jerzydevil3
Words 484
Pages 2
1. What is the purpose of the address resolution protocol (ARP)?
ARP is used as a mediator between Ethernet and IP protocols. It converts the IP addresses to Ethernet addresses.
2. What is the purpose of the dynamic host control protocol (DHCP)?
DCHP is “the protocol used to assign a pool of IP addresses to requesting clients.” (Beasley & Nilkaew, p. 459) DCHP will allow a network administrator to centrally manage the assignment of the IP addresses in an organization’s network.
3. Identify the DHCP allocated source IP host address for the vWorkstation desktop and the TargetWindows01 virtual server.
The IP host address for the vWorkstation is and the TargetWindows01 virtual server IP address is 4. When you pinged the targeted IP host ( or, what was the source IP address and destination IP address of the ICMP echo-request packet?
The source IP address was and the destination IP address was 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source?
Yes, the targeted IP host responded to the ICMP echo-request packet with an ICMP echo-reply packet. I believe there were 4 packets sent back to the IP source. 6. Find a TCP three-way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three-way handshake?
A TCP three-way handshake is needed to initiate a connection. It is when three data packets are exchanged at the beginning of a TCP connection that occurs between two hosts. The sequence happens as follows: The synchronizing packet, the synchronizing acknowledgment packet, then the acknowledgment packet. (Beasley & Nilkaew, p. 230)
7. What was the SEQ# of the initial SYN TCP packet and ACK# of the SYN ACK TCP packet?
The SEQ# for the…...

Similar Documents

Tcp/Ip Protocols

...Jenell Davis 12.21.12 IS-3220 Assignment 1 TCP/IP stands for Transmission Control Protocol/ Internet Protocol. TCP is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received. IP responsible for moving packet of data from node to node and it forwards each packet based on a four byte destination address also known as the IP number. The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world. DNS stands for Domain Name Space and it has three major components, the database, the server, and the client. The database is a distributed database and is comprised of the Domain Name Space, which is essentially the DNS tree, and the Resource Records that define the domain names within the Domain Name Space. The server is commonly referred to as a name server. Name servers are typically responsible for managing some portion of the Domain Name Space and for assisting clients in finding information within the DNS tree. Name servers are authoritative for the domains in which they are responsible. They can also serve as a delegation point to identify other name servers that have authority over......

Words: 370 - Pages: 2


...TCP/IP - Socket Programming Jim Binkley 1 sockets - overview sockets ◆ simple client - server model ◆ – – – look at tcpclient/tcpserver.c look at udpclient/udpserver.c tcp/udp contrasts “normal” master/slave setup for TCP ◆ inetd on UNIX - mother server ◆ some details - there are more... ◆ Jim Binkley 2 sockets in BSD world since early 80’s, 4.2 BSD ◆ client/server model ◆ “like” unix file i/o up to a point, can be redirected to stdin/stdout/stderr (on unix) ◆ sockets are dominant tcp/ip application API ◆ – – other API is System V TLI (OSI-based) winsock - windows variations on sockets » sockets in windows event-driven framework 3 Jim Binkley sockets ◆ basic definition - “endpoint of communication” allows connected streams (TCP) or discrete messages (UDP) between processes on same machine, cross network ◆ in o.s., really read/write data queues + TCP has connection Queue (server side) ◆ talk to “socket” with handle/sock descriptor ◆ Jim Binkley 4 kinds of sockets acc. to address family; i.e. how does addressing work ◆ IP address family -> IP addr, tcp/udp port ◆ traditional BSD families ◆ – TCP/IP (AF_INET; i.e., Internet) » TCP/UDP/”raw” (talk to IP) – – – Jim Binkley UNIX (intra-machine, pipes) XNS, and even APPLETALK, DECNET, IPX ... 5 sockets client handle read write read write server socket layer r/w queues tcp stack Jim Binkley 6 syscalls - TCP client/simple test server int s......

Words: 1236 - Pages: 5

The Tcp/Ip Protocol Suite

...The internet protocol suite is the protocol stack used on the internet. It is usually called TCP/IP after two of its most important protocols but there are other protocols as well. The TCP/IP is based on a five-layer model for networking. These layers are the physical, data link, network, transport, and application layers. The physical layer contains all the functions needed to carry the bit stream over a physical medium to another system. This layer has four parts: mechanical, electrical/optical, functional, and procedural. The mechanical part specifies the physical size and shape of the connector itself so that components will plug into each other easily. The electrical/optical part determines what value of voltage or line condition determines whether a pin is active or what represents a 0 or 1 bit. The functional specifies the function of each pin or lead on the connector. The procedural details the sequence of actions that must take place to send or receive bits on the interface. The Ethernet twisted- pair interfaces from IEEE are common implements of the physical layer that includes these four part With only the physical layer, a system would have no way to tell another system to get bits ready. The data link layer solves this problem by organizing the bit stream into a data unit called a frame. The data link layer moves bits across the link and can add reliability to the raw communications link. The data link layer can be very simple, or make the link appear error......

Words: 1025 - Pages: 5

Tcp/Ip Osi Model

...TCP/IP OSI MODEL TCP/IPMODEL OS MODEL Eric Jones 1/31/2014 TCP/IP MODEL OS MODEL TCP/IP is a set of protocols that allows communication between to different computers. It separates networking functions into different layers. Each layer has a different task that is similar to another layer or functions. The TCP/IP is a short version of the OS Model it has four layers instead of seven. TCP/IP is the language of how computers communicate with other computers through the internet. TCP/IP is not a single network protocols it’s a suite of protocols. The TCP layer handles the message being sent and breaks it down into small units called packets which are transferred over to the network. The IP layer is most concerned about transmission. By using unique IP addresses assign to every active receiver on the network. TCP/IP combines the OSI application and the presentation layers and supports flexibility in hostnames and also handles Dns errors and mapping domain names. The OSI also known as the reference model it provides a method of standards and protocols which can be compared to assist in other connectivity. Most developers today now use a reference model/OSI Model learn how transmissions are framed and created to translate to other systems. I it begins with the physical layer of the transmitting system and travels through the other layers to the application layer. Once the data reaches the application layer it is processed by the receiving system. In some cases,......

Words: 379 - Pages: 2

Lab 1 Analyze Essential Tcp/Ip Networking Protocols

...Analyze Essential TCP/IP Networking Protocols A copy of my Wireshark Lab 1 .pcap file in electronic format is also attached. A screen capture of your successful NetWitness Investigator packet capture import Lab Assessment Questions 1. What is the purpose of the address resolution protocol (ARP)? ARP is used to mediate between Ethernet or other broadcast link-level protocols and the network layer, or IP protocols. Put more simply, ARP converts IP addresses to Ethernet addresses. 2. What is the purpose of the dynamic host control protocol (DHCP)? DHCP is a method for assigning IP addresses to individual machines in an organization. The IP addresses can be assigned permanently or temporary. 3. Identify the DHCP allocated source IP host address for the vWorkstation desktop and the TargetWindows01 virtual server. – Student VM (Ubuntu) – Target VM (Windows) 4. When you pinged the targeted IP host ( or, what was the source IP address and destination IP address of the ICMP echo-request packet? Source: Target: 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes, the targeted IP host responded to the ICMP echo-request packet with an ICMP echo-reply packet. There were 8 packets sent back to the IP source. 6. Find a TCP three-way handshake for a Telnet, FTP, or SSH......

Words: 467 - Pages: 2

Short Answer Tcp/Ip

...HTTP, HTML and TCP/IP. The benefits of open standards are you have the option not to be locked into one vendor. Since the specifics are open and detailed another vendor could come in and also give work and or solutions to the project. Another benefit would be it is easier for systems using different vendors to be able to adapt to the technology and communicate with each other. Therefore open standards are here to stay and further the internet and other projects well from what it is now. Layered architecture is beneficial to society for the reason of easily organizing the tasks at hand. With this method it not only pertains to networking but to real life as well. Layered architecture is not a new process it has been around for quite some time. A protocol is a set of rules that allows the communications between computers on the network. These rules help regulate the guidelines of speed data transfer and access method. A society based protocol would be like a motorcycle club. For example the network would be the president and the computers would be the other members. The protocol would be the Sgt of Arms as for he would be the one that controls the communication between he members and the president. The four types of different networks are LAN (local area network), WLAN (wireless local area network), WAN (wide area network), and VPN (virtual private network). LAN is your most basic form or network; this is where all the computers belong to the same network and......

Words: 449 - Pages: 2

Tcp Ip Lan Plan

... | | |Network layer |Is concerned with the addressing and |Path determination and logical addressing | | |routing processes necessary to move data | | | |from one network to another | | |Transport layer |It is responsible for reliable transparent |End-to-end connections and reliability, | | |transfer of data between two end points |flow control | |Session layer |Allows remote users to establish, manage |Interhost communication | | |and terminate a connection (session) | | |Presentation layer |Ensures that the information sent by an |Data representation, encryption and | | |application-layer protocol on one system |decryption, convert machine dependent data | | |will be readable by the application layer |to machine independent data | | |protocol on the remote system | ...

Words: 549 - Pages: 3


...TCP/IP This week’s paper will provide an overview into the world of the Transmission Control Protocol (TCP) and Internet Protocol (IP), and how they are used together in business and telecommunications. Frist, the current TCP/IP offerings as, as they apply to the OSI model, will be discussed. Second, the future of TCP/IP will be discussed with relevant research support as well as recommendations for new software and equipment. Finally, an overview of different methods for reducing network congestion through the use of equipment, software and multiplexing will be given. Current Offerings of TCP/IP In business, the OSI and TCP/IP have been the standard method of network classification for many years. The Open Systems Interconnect Model (OSI) can be thought of as an idea or guideline, while TCP/IP more closely relates to reality. Both models do mostly the same thing, but TCP/IP is a more efficient method, and usually matches up directly with the network. Because OSI is more of an idea, it is not utilized as much as TCP/IP. With the creation of smart switches and other advanced network equipment and functions, more layers can be combined and a more streamlined process can be gained. Because of this, TCP/IP is the most used model in modern networks, while OSI is used for describing network activity. Improving TCP/IP As TCP/IP ages and new technology comes about, there is a need to upgrade software and hardware to keep up with the demands of modern networking. Below we......

Words: 1158 - Pages: 5


...communications protocol (TCP/IP), Client/server computing 2. Latency? How does it interfere with internet function? = low level of service quality (delay/late) 3. Explain how packet switching works? = Packet switch is a method slices digital message into packets, routes the packets along different communication paths as they become available, and then reassembles the the packets once they arrive at their destination 4. How is the TCP/LP protocol related to information transfer on the internet? = it is the core combinations protocol for the internet. TCP establishes the connections among sending and receiving web computers and makes sure the packets sent by one computer aww received in the correct sequence by the other, without any packets missing IP provides the addressing scheme and is responsible for the actual delivery of the packet 5. What technological innovation made client/server computing possible? = Client 6. What is cloud computing, how has it impacted the internet? = Cloud computing refers to a model of computing in which firms and individuals obtain computing power and software applications over the internet, rather than purchasing the hardware and software and installing it on their own computers. Cloud computing is the fastest growing form of computing 7. Why are smartphones a disruptive technology? = that radically alters the personal computing and e-commerce landscape 8. What types of companies form the internet backbone today? =......

Words: 346 - Pages: 2

Tcp/Ip Model

...TCP/IP MODEL TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP. TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination. TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use......

Words: 509 - Pages: 3

Network Protocols

... Networking Protocols and Facts What is meant by protocol? A protocol is a special set of rules that governs the communications between computers on a network. They specify the interactions between the communicating entities like one computer to another. There is a protocol for every part that connects a network known as TCP/IP which means Transmission Control Protocol and Internet Protocol. They TCP and IP are two different protocols that preform different tasks in the networking world they are built into all major operating systems. TCP allows and enables two computers or hosts to connect and exchange data streams from one to the other guaranteeing that the delivery of data and packets being delivered come in the same order they were sent out. Utilizing the Idea of TCP being like your Mail courier dropping off your mail because he has the link and means to communicate or find your destination. Internet Protocols use a packets instead of streams, also known as datagrams, and addressing scheme. Picture the IP protocol as a post office you drop off a packet of information, without being combined with TCP it cannot be delivered. The TCP part of the protocol it the mail truck or the courier like I stated in the last paragraph. The reasons why IP cannot be a standalone software is because it deals in packets which is small bits of information with now true way of keeping it order, from going missing, and even duplicating itself. A fact of the TCP/IP protocol was that it......

Words: 365 - Pages: 2

Tcp/Ip Research Paper

...itself is simply a large network of computers connected together via some type of connection communicating back and forth. While many individuals are exposed to the internet on a daily basis, those individuals may not know the complex process that the information goes though. Enormous amounts of ones and zeroes are processed and translated daily throughout the internet. The basis of how we communicate with a computer includes inputs turned into these bits, processing these bits, and producing an output. Fortunately, when it comes to machine language, these very bits stay the same and the rules that are in place help to translate any spoken language in order to communicate throughout the internet. While many languages may vary throughout the world, speaking and writing to communicate with one another requires certain rules so the conversation is understood from both parties. The machine language used to access the internet is no different from the many human languages spoken throughout the world. Many standards and protocols are in place for communications to exist throughout the internet. The foundation of the internet infrastructure evolved from the Transmission Control Protocol/Internet Protocol, most commonly known as TCP/IP. Prior to becoming known as TCP/IP, these protocols initially began as a project conducted by the US Department of Defense (DoD) named Advanced Research Projects Agency Network (ARPANET). This is the very reason why the TCP/IP model is......

Words: 1457 - Pages: 6

Tcp/Ip Security Concerns on the TCP/IP security. As we have seen the transmission of data as securely as possible has become top on the list for many companies and persons. As we have begun using the Internet more and more to conduct business remotely, we need to ensure that our most sacred data is protected from harm. To ensure that we understand the transmission of data using TCP/IP, I will explain the history of the protocol and the reason for this being the established standard used. As we have read and know it is a combination of two known protocols that were combined to become one. The Transport Control Protocol is used to ensure successful delivery of data. It carries the destination and source information such as the address for both. The IP protocol or Internet Protocol is the second. This protocol is only for sending data. It combined with TCP will ensure that the data is transmitted successfully. When the protocols began to communicate they can use on of many ways to ensure successful communication. One being the hand shake method. There are more than one and will be explained in the paper. With that transmission come the possibility of interference and high jacking of data. One common discussed security hole is the prediction of the send sequence. There is also the SYN and FIN scanning, which each attack. Then there is UDP security concerns, which an attacker uses empty UDP ports to send datagram’s. These are just a few ways there are security holes defined with using TCP/IP and I......

Words: 373 - Pages: 2

Essential Protocol

...Essential Network Protocols Modern computer networking leverages many components to enable computers on one network (or opposite side of the world) to communicate with a computer on a different network (or other side of the world). Of the components that enable network communication, there are several in the TCP/IP suite of protocols that work in the background to provide reliable Internet connection and data transport every day for millions of computers worldwide. Internet protocol or IP is an essential component of modern internetwork communication. IP is a connectionless protocol that provides neither fault tolerance nor error correction. It is also not responsible for the setup or teardown of network communications. The primary job assigned to IP is logical addressing and routing as it resides at layer 3 (the Network layer) of the OSI model. While every host on the network has a hardware address (also called a MAC address), hosts can only communicate with other hosts in the same broadcast domain using MAC addressing. For internetwork communication, a logical, unique network address is required so that the devices forwarding network traffic (primarily routers), can determine the source and destination and best route to forward data packets. The ARP or Address Resolution Protocol enables devices on a single network, in a single broadcast domain, to find the hardware or MAC address of a device on the network given the IP......

Words: 1258 - Pages: 6


...The Transmission Control Protocol/Internet Protocol (TCP/IP) suite is indisputably one of the most popular networking protocol suites ever developed. TCP/IP is an industry standard designed for large networks consisting of network segments connected by routers, and is the protocol used on the Internet (Hillpot & Ivy, 2005). TCP/IP’s roots can be traced back to research conducted by the United States Department of Defense (DOD) Advanced Research Projects Agency (DARPA) as early as 1960. In the best bureaucratic tradition, DARPAs (or ARPA, as it was called at the time) involvement in the creation of the internet began with a memo dated April 23, 1969 that was authored by Joseph Licklider (Waldrop, 2012). Between1970 to 1996 the Internet evolved, ARPANET hosts started to use Network Control Protocol, a preliminary form of what would become the Transmission Control Protocol (TCP). Than the TCP/IP protocol suite was established which led to the Domain Name System (DNS), ISPs, and the introduction of HTTP. In retrospect, the program that Licklider put together in the early 60’s would evolve into perhaps the most successful federal research program with the greatest significant impact on society in history. The TCP/IP suite maps to a four-layer conceptual model known as the DARPA model, which was named after the U.S. government agency that initially developed it (Waldrop, 2012). Each layer of the DARPA model corresponds to one or more layers of the seven-layer OSI model. ......

Words: 664 - Pages: 3

Samsung Galaxy S8 or Galaxy S8+ Plus Case w/Holster Clip Fits Otterbox Defender | Sale temps à lhôtel El Royale | Phim Lẻ 2013