SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
A
Seminar Report
On
TCP-IP
Submitted to
The Rajasthan Technical University
In partial fulfillment of the requirements of the
Award of the Degree
Of
Bachelor Of Technology (Information Technology)
KAUTILYA INSITUTE OF TECHNOLOGY AND ENGINEERING
JAIPUR
Submitted to: Submitted By:
Mr. Chetan Kumar Ayush Bilala
(Dept. Head) Roll No. 07EKTIT013
B-Tech 4th
Year,8th
Sem
Department Of Information Technology
Kautilya Institute Of Technology And Engineering
Affiliated To
Rajasthan Technical University, Kota
2010-2011
2
AACCKKNNOOWWLLEEDDGGMMEENNTT
This seminar report could not have been prepared without the
help and encouragement from various people. Hence for the same
reason I would like to thank my faculties without whom this report
would have been a difficult task. It was for support that I got proper
guidelines preparing my presentation . I would also like to thank my
everyone who helped me directly or indirectly.
KRIPASHANKAR SHARMA
(07EKTIT013)
3
CCOONNTTEENNTT
01. ABSTRACT««««««««««««««4
02. INTRODUCTION............................................ 5
03. TCP-IP BASICS««««.«««««««.. 6
03.1 Origin of TCP-IP
03.2 TCP-IP and Intranets
03.3 Basic Function of TCP-IP
03.4 User Datagram protocol
03.5 Other important protocols
04. TCP-IP ARCHITECTURE«..««««««12
04.1 Flowing of data through each layer
04.2 Transmission of data in real world n/w
05. ACRONYMS««..«««««««««««16
06. CONCLUSION««««««««««««...18
07. BIBLIOGRAPHY««.««««««««.....19
4
11.. AABBSSTTRRAACCTT
One of the most important achievement of last decade is popularity of
internet. Today internet has become part of our day to day life.TCP/IP in a
broad sense can be explained as the concept on which internet works.The paper
attempts to familiarize with some of the basic concepts of TCP/IP.
It starts with a brief introduction of TCP/IP and provides the basics of it.It
also gives a brief origin of TCP/IP and the basic function of these protocols.It
also gives the structure of TCP/IP and explains how transmission of data takes
place in real world network.It also gives description of some of the protocols
that constitute TCP/IP.The conclusion summarizes the key points of TCP/IP.
5
22.. IINNTTRROODDUUCCTTIIOONN
Most of us know of TCP/IP as the glue that binds the Internet. But not as
many can offer a cogent description of what it is and how it works. So what is
TCP/IP, really?
TCP/IP is a means for networked computers to communicate with each
other. It doesn't matter whether they are part of the same network or are
attached to separate networks. It doesn't matter if one computer is a Cray and
the other a Macintosh. TCP/IP is a platform-independent standard that bridges
the gap between dissimilar computers, operating systems, and networks. It's the
protocol that drives the global Internet, and it is to the Internet that TCP/IP owes
much of its popularity.
Understanding TCP/IP is largely a matter of understanding a collection of
arcane protocols that TCP/IP hosts use to exchange information. Let's look at
some of those protocols and see what makes TCP/IP tick
.
6
33.. TTCCPP--IIPP BBAASSIICCSS
TCP/IP stands for Transmission Control Protocol/Internet Protocol. In
networking terms, a protocol is an agreed-upon standard that permits two
computers to exchange data. TCP/IP isn't just one protocol, but several. That's
why you'll often hear it referred to as a protocol suite, of which TCP and IP are
the two principal protocols.
The TCP/IP software that you install on a computer provides platform-
specific
implementations of TCP, IP, and other members of the TCP/IP family.
Typically, it also includes high-level application programs, such as FTP (File
Transfer Protocol), which permits users to perform network file transfers from
the command line.
7
3.1) ORIGIN OF TCP/IP
TCP/IP is an outgrowth of research funded by the U.S. government's
Advanced Research Projects Agency (ARPA) in the 1970s. It was developed so
that research networks around the world could be joined to form a virtual
network known as an internetwork.
The original Internet was formed by converting an existing
conglomeration of networks, known as ARPAnet, over to TCP/IP; that Internet
would eventually become the backbone of today's Internet.
8
3.2) TCP/IP AND INTRANETS
The reason TCP/IP is so important today is that it allows standalone
networks to be connected to the Internet or linked together to create private
intranets. The networks that comprise an intranet are physically connected by
devices called routers or IP routers. A router is a computer that transfers
packets of data from one network to another. On a TCP/IP intranet, information
travels in discrete units called IP packets or IP datagrams. TCP/IP software
makes each computer attached to the network a sibling t o all the others; in
essence, it hides the routers and underlying network architectures and makes
everything seem like one big network. Just as connections to an Ethernet
network are identified by 48-bit Ethernet IDs, connections to an intranet are
identified by 32-bit IP addresses, which we express as dotted decimal numbers
(for example, 128.10.2.3). Given a remote computer's IP address, a computer on
an intranet or the Internet can send data to the remote computer as if the two
were part of the same physical network.
9
3.3) BASIC FUNCTION OF TCP AND IP
TCP/IP provides a solution to the problem of how two computers
attached to the same intranet but belonging to different physical networks can
exchange data. The solution comes in several parts, with each member of the
TCP/IP protocol suite filling in one piece of the puzzle. The most fundamental
TCP/IP protocol, IP, transmits IP datagrams across an intranet and performs an
important function called routing--choosing the path that datagrams will follow
to get from A to B and using routers to "hop" networks.
TCP is a higher-level protocol that allows applications running on
different hosts to exchange data streams. TCP divides data streams into chunks
called TCP segments and transmits them using IP. In most cases, each TCP
segment is sent in a single IP datagram. If necessary, however, TCP will split
segments into multiple IP datagrams that are compatible with the physical data
frames that carry bits and bytes between hosts on a network. Because IP doesn't
guarantee that datagrams will be received in the same order in which they were
sent, TCP reassembles TCP segments at the other end to form an uninterrupted
data stream. FTP and telnet are two examples of popular TCP/IP applications
that rely on TCP.
10
3.4 USER DATAGRAM PROTOCOL
Another important member of the TCP/IP suite is the User Datagram
Protocol (UDP), which is similar to but more primitive than TCP. TCP is a
"reliable" protocol because it performs the error-checking and handshaking
necessary to verify that data makes it to its destination intact. UDP is an
"unreliable" protocol because it doesn't guarantee that datagrams will arrive in
the order in which they were sent or even that they will arrive at all. If reliability
is desired, it's up to the application to provide it.
Still, UDP has its place in the TCP/IP universe, and a number of
applications use it. The SNMP (Simple Network Management Protocol)
application provided with most implementations of TCP/IP is one example of a
UDP application.
11
3.5) OTHER IMPORTANT PROTOCOLS OF TCP/IP :
Other TCP/IP protocols play less visible but equally important roles in
the operation of TCP/IP networks. For example, the Address Resolution
Protocol (ARP) translates IP addresses into physical network addresses, such as
Ethernet IDs. A related protocol, the Reverse Address Resolution Protocol
(RARP), does the opposite, converting physical network addresses into IP
addresses.
The Internet Control Message Protocol (ICMP) is a support protocol that
uses IP to communicate control and error information regarding IP packet
transmissions. If a router is unable to forward an IP datagram, for example, it
uses ICMP to inform the sender that there's a problem. For a summary of some
of the other protocols that fall under the TCP/IP umbrella, see the sidebar
above.
12
4. 4. TCP/IP ARCHITECTURE
Network designers often use the seven-layer ISO/OSI (International
Standards Organization/Open Systems Interconnect) model when discussing
network architectures.
Each layer in the model corresponds to one level of network
functionality. At the bottom sits the physical layer, which represents the
physical medium through which data travels--in other words, the network
cabling. Above that is the data-link layer, whose services are provided by
network interface cards. The uppermost layer is the application layer, where
application programs that use network services run.
Figure 1 : An OSI Model
13
Figure 2 : Layer by layer representation
14
4.1) FLOWING OF DATA THROUGH EACH LAYER
As a unit of data flows downward from a network application to the
network interface card, it travels through a succession of TCP/IP modules. At
each step along the way, it is packaged with information required by the
equivalent TCP/IP module on the other end. By the time the data makes it to the
network card, it's a standard Ethernet frame, assuming the network is an
Ethernet network. The TCP/IP software on the receiving end recreates the
original data for the receiving application by grabbing the Ethernet frame and
passing it upward through the TCP/IP stack.
Figure 3 : An exchange using OSI Model
15
4.2) TRANSMISSION OF DATA IN REAL WORLD
NETWORK
To picture what role TCP/IP plays in real-world networks, consider what
happens when a Web browser uses HTTP (HyperText Transfer Protocol) to
retrieve a page of HTML data from a Web server attached to the Internet. The
browser uses a high-level software abstraction called a socket to form a virtual
connection to a server. To retrieve a Web page, it sends an HTTP GET
command to the server by writing the command to the socket. The socket
software in turn uses TCP to send the bits and bytes comprising the GET
command to the Web server. TCP segments the data and passes the individual
segments to the IP module, which transmits the segments in datagrams to the
Web server.
If the browser and the server are running on computers connected to
different physical networks (as is usually the case), the datagrams go from
network to network until they reach the one to which the server is physically
connected. Ultimately, the datagrams are delivered to their destination and
reassembled so that the Web server, which reads chunks of data by performing
reads on its socket, sees a continuous stream of data. To the browser and the
server, data written to the socket at one end shows up at the other end, as if by
magic. But underneath, all sorts of complex interactions have taken p lace to
create an illusion of seamless data transfer across networks.
And that's what TCP/IP is all about: turning lots of small networks into
one big one and providing the services that applications need to communicate
with each other over the resulting Internet.
16
5. GUIDE TO TCP/IP PROTOCOLS AND
ACRONYMS
1) ARP (Address Resolution Protocol): Converts 32-bit IP addresses into
physical network addresses--for example, 48-bit Ethernet addresses.
2) FTP (File Transfer Protocol): Permits files to be transferred from one
computer to another using a TCP connection. A related but less common
file-transfer protocol, Trivial File Transfer Protocol (TFTP), uses UDP
rather than TCP to transfer file data.
3) ICMP (Internet Control Message Protocol): Allows IP routers to send
error and control messages to other IP routers and hosts. ICMP messages
travel in the data fields of IP datagrams and are a required part of all IP
implementations.
4) IGMP (Internet Group Management Protocol): Permits IP datagrams
to be broadcast, or multicast, to computers that belong to multicast
groups.
5) IP (Internet Protocol): A low-level protocol that routes packets of data
across separate networks tied together by routers to form the Internet or
an intranet. Data travels in packets called IP datagrams.
6) RARP (Reverse Address Resolution Protocol): Converts physical
network addresses into IP addresses.
7) SMTP (Simple Mail Transfer Protocol): Specifies the format of
messages that an SMTP client on one computer can use to send electronic
mail to an SMTP server on another computer.
17
8)TCP (Transmission Control Protocol): A connection-oriented protocol
that transmits data in byte streams. Data is transmitted in packets called
TCP segments, which contain TCP headers and data. TCP is a "reliable"
protocol because it uses checksums to verify data integrity and
handshaking to make sure transmitted data is received intact.
9) UDP (User Datagram Protocol): A connectionless protocol that
transmits data in packets called UDP datagrams. UDP is an "unreliable"
protocol because the sender receives no information indicating whether a
datagram was actually received.
18
6. CONCLUSION
There's much more that could be said about TCP/IP, but here are
three key points:
 TCP/IP is a set of protocols that permit physical networks to be joined
together to form an internet. TCP/IP combines the individual networks to
form a virtual network in which individual hosts are identified not by
physical network addresses but by IP addresses.
 TCP/IP uses a multilayered architecture that clearly defines each
protocol's responsibilities. TCP and UDP provide high -level data
transmission services to network application programs, and both rely on
IP to transmit packets of data. IP is responsible for routing the packets to
their destination.
 Data moving between two applications running on Internet hosts travels
up and down the hosts' TCP/IP stacks. Information added by the TCP/IP
modules on the sending end is stripped off by the corresponding TCP/IP
modules on the receiving end and used to re -create the original data.
19
7. BIBLIOGRAPHY
1) Daniel C. Lynch and Marshall T. Rose, Internet System Handbook, Addison
Wesley, pp. 4-14.
2) Daniel C. Lynch and Marshall T. Rose, Internet System Handbook, Addison
Wesley, pp. 80-118.
3) W. Richard Stevens, TCP/IP Illustrated, Volume I: The Protocols, Addison
Wesley, pp. 224.
4) W. Richard Stevens, TCP/IP Illustrated, Volume I: The Protocols, Addison
Wesley, pp. 137-141.
5) www.wikipedia.com

Weitere ähnliche Inhalte

Was ist angesagt?

Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar pptSmriti Rastogi
 
Comparison and Contrast between OSI and TCP/IP Model
Comparison and Contrast between OSI and TCP/IP ModelComparison and Contrast between OSI and TCP/IP Model
Comparison and Contrast between OSI and TCP/IP ModelConferencias FIST
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram ProtocolPeter R. Egli
 
Web servers for the Internet of Things
Web servers for the Internet of ThingsWeb servers for the Internet of Things
Web servers for the Internet of ThingsAlexandru Radovici
 

Was ist angesagt? (20)

Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Packet tracer
Packet tracerPacket tracer
Packet tracer
 
Comparison and Contrast between OSI and TCP/IP Model
Comparison and Contrast between OSI and TCP/IP ModelComparison and Contrast between OSI and TCP/IP Model
Comparison and Contrast between OSI and TCP/IP Model
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
5. icmp
5. icmp5. icmp
5. icmp
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Classes of ip addresses
Classes of ip addressesClasses of ip addresses
Classes of ip addresses
 
Addressing
AddressingAddressing
Addressing
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Web servers for the Internet of Things
Web servers for the Internet of ThingsWeb servers for the Internet of Things
Web servers for the Internet of Things
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
ICMP
ICMPICMP
ICMP
 

Andere mochten auch

Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IPMannu Khani
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Web accessibility developers by Bao AN - eXo SEA
Web accessibility developers by Bao AN - eXo SEAWeb accessibility developers by Bao AN - eXo SEA
Web accessibility developers by Bao AN - eXo SEAThuy_Dang
 
Cumple2011
Cumple2011Cumple2011
Cumple2011maclein1
 
Drink The Water English
Drink The Water EnglishDrink The Water English
Drink The Water Englishpaolobro
 
Mcf presentation by Hai NGUYEN-Portal team
Mcf presentation by Hai NGUYEN-Portal teamMcf presentation by Hai NGUYEN-Portal team
Mcf presentation by Hai NGUYEN-Portal teamThuy_Dang
 
Berntsen -chicago_my_home_town_-_08-10-11
Berntsen  -chicago_my_home_town_-_08-10-11Berntsen  -chicago_my_home_town_-_08-10-11
Berntsen -chicago_my_home_town_-_08-10-11Rosanna Goode
 
Seasons Of Life
Seasons Of  LifeSeasons Of  Life
Seasons Of LifeAbhi Patel
 
Xss.e xopresentation from eXo SEA
Xss.e xopresentation from eXo SEAXss.e xopresentation from eXo SEA
Xss.e xopresentation from eXo SEAThuy_Dang
 
Cumpleaños
CumpleañosCumpleaños
Cumpleañosmaclein1
 
Catalog parts
Catalog partsCatalog parts
Catalog partsdesilvam
 
Deans workshop
Deans workshopDeans workshop
Deans workshopAlan Amory
 
Barber Library Website Usability Results, Fall 2012
Barber Library Website Usability Results, Fall 2012Barber Library Website Usability Results, Fall 2012
Barber Library Website Usability Results, Fall 2012desilvam
 

Andere mochten auch (20)

Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Config Guide Ip Sec
Config Guide Ip SecConfig Guide Ip Sec
Config Guide Ip Sec
 
Seminar
SeminarSeminar
Seminar
 
Web accessibility developers by Bao AN - eXo SEA
Web accessibility developers by Bao AN - eXo SEAWeb accessibility developers by Bao AN - eXo SEA
Web accessibility developers by Bao AN - eXo SEA
 
Cumple2011
Cumple2011Cumple2011
Cumple2011
 
Drink The Water English
Drink The Water EnglishDrink The Water English
Drink The Water English
 
Mcf presentation by Hai NGUYEN-Portal team
Mcf presentation by Hai NGUYEN-Portal teamMcf presentation by Hai NGUYEN-Portal team
Mcf presentation by Hai NGUYEN-Portal team
 
Berntsen -chicago_my_home_town_-_08-10-11
Berntsen  -chicago_my_home_town_-_08-10-11Berntsen  -chicago_my_home_town_-_08-10-11
Berntsen -chicago_my_home_town_-_08-10-11
 
Seasons Of Life
Seasons Of  LifeSeasons Of  Life
Seasons Of Life
 
Xss.e xopresentation from eXo SEA
Xss.e xopresentation from eXo SEAXss.e xopresentation from eXo SEA
Xss.e xopresentation from eXo SEA
 
Cumpleaños
CumpleañosCumpleaños
Cumpleaños
 
Catalog parts
Catalog partsCatalog parts
Catalog parts
 
Deans workshop
Deans workshopDeans workshop
Deans workshop
 
Jhonatanlopez
JhonatanlopezJhonatanlopez
Jhonatanlopez
 
Coisas antigas 1
Coisas antigas 1Coisas antigas 1
Coisas antigas 1
 
Barber Library Website Usability Results, Fall 2012
Barber Library Website Usability Results, Fall 2012Barber Library Website Usability Results, Fall 2012
Barber Library Website Usability Results, Fall 2012
 
20140426 wtm66
20140426 wtm6620140426 wtm66
20140426 wtm66
 
Jhonatanlopez
JhonatanlopezJhonatanlopez
Jhonatanlopez
 

Ähnlich wie 53426980 tcp-ip

Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfAbenetAsmellash
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
Lab 4 presentation slide
Lab 4 presentation slideLab 4 presentation slide
Lab 4 presentation slidestevensc27
 
"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Polandirenazd
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptxVivekTripathi684438
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptxmashiur
 
TCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationTCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationKANNANKR12
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internatKritika Purohit
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.pptmashiur
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IPToufiqueAhmed13
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
 

Ähnlich wie 53426980 tcp-ip (20)

Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
Lab 4 presentation slide
Lab 4 presentation slideLab 4 presentation slide
Lab 4 presentation slide
 
"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
 
Internet1
Internet1Internet1
Internet1
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
 
2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
TCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationTCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple Explanation
 
TCP/IP Protocal Suite
TCP/IP Protocal SuiteTCP/IP Protocal Suite
TCP/IP Protocal Suite
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internat
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
 

Kürzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

53426980 tcp-ip

  • 1. A Seminar Report On TCP-IP Submitted to The Rajasthan Technical University In partial fulfillment of the requirements of the Award of the Degree Of Bachelor Of Technology (Information Technology) KAUTILYA INSITUTE OF TECHNOLOGY AND ENGINEERING JAIPUR Submitted to: Submitted By: Mr. Chetan Kumar Ayush Bilala (Dept. Head) Roll No. 07EKTIT013 B-Tech 4th Year,8th Sem Department Of Information Technology Kautilya Institute Of Technology And Engineering Affiliated To Rajasthan Technical University, Kota 2010-2011
  • 2. 2 AACCKKNNOOWWLLEEDDGGMMEENNTT This seminar report could not have been prepared without the help and encouragement from various people. Hence for the same reason I would like to thank my faculties without whom this report would have been a difficult task. It was for support that I got proper guidelines preparing my presentation . I would also like to thank my everyone who helped me directly or indirectly. KRIPASHANKAR SHARMA (07EKTIT013)
  • 3. 3 CCOONNTTEENNTT 01. ABSTRACT««««««««««««««4 02. INTRODUCTION............................................ 5 03. TCP-IP BASICS««««.«««««««.. 6 03.1 Origin of TCP-IP 03.2 TCP-IP and Intranets 03.3 Basic Function of TCP-IP 03.4 User Datagram protocol 03.5 Other important protocols 04. TCP-IP ARCHITECTURE«..««««««12 04.1 Flowing of data through each layer 04.2 Transmission of data in real world n/w 05. ACRONYMS««..«««««««««««16 06. CONCLUSION««««««««««««...18 07. BIBLIOGRAPHY««.««««««««.....19
  • 4. 4 11.. AABBSSTTRRAACCTT One of the most important achievement of last decade is popularity of internet. Today internet has become part of our day to day life.TCP/IP in a broad sense can be explained as the concept on which internet works.The paper attempts to familiarize with some of the basic concepts of TCP/IP. It starts with a brief introduction of TCP/IP and provides the basics of it.It also gives a brief origin of TCP/IP and the basic function of these protocols.It also gives the structure of TCP/IP and explains how transmission of data takes place in real world network.It also gives description of some of the protocols that constitute TCP/IP.The conclusion summarizes the key points of TCP/IP.
  • 5. 5 22.. IINNTTRROODDUUCCTTIIOONN Most of us know of TCP/IP as the glue that binds the Internet. But not as many can offer a cogent description of what it is and how it works. So what is TCP/IP, really? TCP/IP is a means for networked computers to communicate with each other. It doesn't matter whether they are part of the same network or are attached to separate networks. It doesn't matter if one computer is a Cray and the other a Macintosh. TCP/IP is a platform-independent standard that bridges the gap between dissimilar computers, operating systems, and networks. It's the protocol that drives the global Internet, and it is to the Internet that TCP/IP owes much of its popularity. Understanding TCP/IP is largely a matter of understanding a collection of arcane protocols that TCP/IP hosts use to exchange information. Let's look at some of those protocols and see what makes TCP/IP tick .
  • 6. 6 33.. TTCCPP--IIPP BBAASSIICCSS TCP/IP stands for Transmission Control Protocol/Internet Protocol. In networking terms, a protocol is an agreed-upon standard that permits two computers to exchange data. TCP/IP isn't just one protocol, but several. That's why you'll often hear it referred to as a protocol suite, of which TCP and IP are the two principal protocols. The TCP/IP software that you install on a computer provides platform- specific implementations of TCP, IP, and other members of the TCP/IP family. Typically, it also includes high-level application programs, such as FTP (File Transfer Protocol), which permits users to perform network file transfers from the command line.
  • 7. 7 3.1) ORIGIN OF TCP/IP TCP/IP is an outgrowth of research funded by the U.S. government's Advanced Research Projects Agency (ARPA) in the 1970s. It was developed so that research networks around the world could be joined to form a virtual network known as an internetwork. The original Internet was formed by converting an existing conglomeration of networks, known as ARPAnet, over to TCP/IP; that Internet would eventually become the backbone of today's Internet.
  • 8. 8 3.2) TCP/IP AND INTRANETS The reason TCP/IP is so important today is that it allows standalone networks to be connected to the Internet or linked together to create private intranets. The networks that comprise an intranet are physically connected by devices called routers or IP routers. A router is a computer that transfers packets of data from one network to another. On a TCP/IP intranet, information travels in discrete units called IP packets or IP datagrams. TCP/IP software makes each computer attached to the network a sibling t o all the others; in essence, it hides the routers and underlying network architectures and makes everything seem like one big network. Just as connections to an Ethernet network are identified by 48-bit Ethernet IDs, connections to an intranet are identified by 32-bit IP addresses, which we express as dotted decimal numbers (for example, 128.10.2.3). Given a remote computer's IP address, a computer on an intranet or the Internet can send data to the remote computer as if the two were part of the same physical network.
  • 9. 9 3.3) BASIC FUNCTION OF TCP AND IP TCP/IP provides a solution to the problem of how two computers attached to the same intranet but belonging to different physical networks can exchange data. The solution comes in several parts, with each member of the TCP/IP protocol suite filling in one piece of the puzzle. The most fundamental TCP/IP protocol, IP, transmits IP datagrams across an intranet and performs an important function called routing--choosing the path that datagrams will follow to get from A to B and using routers to "hop" networks. TCP is a higher-level protocol that allows applications running on different hosts to exchange data streams. TCP divides data streams into chunks called TCP segments and transmits them using IP. In most cases, each TCP segment is sent in a single IP datagram. If necessary, however, TCP will split segments into multiple IP datagrams that are compatible with the physical data frames that carry bits and bytes between hosts on a network. Because IP doesn't guarantee that datagrams will be received in the same order in which they were sent, TCP reassembles TCP segments at the other end to form an uninterrupted data stream. FTP and telnet are two examples of popular TCP/IP applications that rely on TCP.
  • 10. 10 3.4 USER DATAGRAM PROTOCOL Another important member of the TCP/IP suite is the User Datagram Protocol (UDP), which is similar to but more primitive than TCP. TCP is a "reliable" protocol because it performs the error-checking and handshaking necessary to verify that data makes it to its destination intact. UDP is an "unreliable" protocol because it doesn't guarantee that datagrams will arrive in the order in which they were sent or even that they will arrive at all. If reliability is desired, it's up to the application to provide it. Still, UDP has its place in the TCP/IP universe, and a number of applications use it. The SNMP (Simple Network Management Protocol) application provided with most implementations of TCP/IP is one example of a UDP application.
  • 11. 11 3.5) OTHER IMPORTANT PROTOCOLS OF TCP/IP : Other TCP/IP protocols play less visible but equally important roles in the operation of TCP/IP networks. For example, the Address Resolution Protocol (ARP) translates IP addresses into physical network addresses, such as Ethernet IDs. A related protocol, the Reverse Address Resolution Protocol (RARP), does the opposite, converting physical network addresses into IP addresses. The Internet Control Message Protocol (ICMP) is a support protocol that uses IP to communicate control and error information regarding IP packet transmissions. If a router is unable to forward an IP datagram, for example, it uses ICMP to inform the sender that there's a problem. For a summary of some of the other protocols that fall under the TCP/IP umbrella, see the sidebar above.
  • 12. 12 4. 4. TCP/IP ARCHITECTURE Network designers often use the seven-layer ISO/OSI (International Standards Organization/Open Systems Interconnect) model when discussing network architectures. Each layer in the model corresponds to one level of network functionality. At the bottom sits the physical layer, which represents the physical medium through which data travels--in other words, the network cabling. Above that is the data-link layer, whose services are provided by network interface cards. The uppermost layer is the application layer, where application programs that use network services run. Figure 1 : An OSI Model
  • 13. 13 Figure 2 : Layer by layer representation
  • 14. 14 4.1) FLOWING OF DATA THROUGH EACH LAYER As a unit of data flows downward from a network application to the network interface card, it travels through a succession of TCP/IP modules. At each step along the way, it is packaged with information required by the equivalent TCP/IP module on the other end. By the time the data makes it to the network card, it's a standard Ethernet frame, assuming the network is an Ethernet network. The TCP/IP software on the receiving end recreates the original data for the receiving application by grabbing the Ethernet frame and passing it upward through the TCP/IP stack. Figure 3 : An exchange using OSI Model
  • 15. 15 4.2) TRANSMISSION OF DATA IN REAL WORLD NETWORK To picture what role TCP/IP plays in real-world networks, consider what happens when a Web browser uses HTTP (HyperText Transfer Protocol) to retrieve a page of HTML data from a Web server attached to the Internet. The browser uses a high-level software abstraction called a socket to form a virtual connection to a server. To retrieve a Web page, it sends an HTTP GET command to the server by writing the command to the socket. The socket software in turn uses TCP to send the bits and bytes comprising the GET command to the Web server. TCP segments the data and passes the individual segments to the IP module, which transmits the segments in datagrams to the Web server. If the browser and the server are running on computers connected to different physical networks (as is usually the case), the datagrams go from network to network until they reach the one to which the server is physically connected. Ultimately, the datagrams are delivered to their destination and reassembled so that the Web server, which reads chunks of data by performing reads on its socket, sees a continuous stream of data. To the browser and the server, data written to the socket at one end shows up at the other end, as if by magic. But underneath, all sorts of complex interactions have taken p lace to create an illusion of seamless data transfer across networks. And that's what TCP/IP is all about: turning lots of small networks into one big one and providing the services that applications need to communicate with each other over the resulting Internet.
  • 16. 16 5. GUIDE TO TCP/IP PROTOCOLS AND ACRONYMS 1) ARP (Address Resolution Protocol): Converts 32-bit IP addresses into physical network addresses--for example, 48-bit Ethernet addresses. 2) FTP (File Transfer Protocol): Permits files to be transferred from one computer to another using a TCP connection. A related but less common file-transfer protocol, Trivial File Transfer Protocol (TFTP), uses UDP rather than TCP to transfer file data. 3) ICMP (Internet Control Message Protocol): Allows IP routers to send error and control messages to other IP routers and hosts. ICMP messages travel in the data fields of IP datagrams and are a required part of all IP implementations. 4) IGMP (Internet Group Management Protocol): Permits IP datagrams to be broadcast, or multicast, to computers that belong to multicast groups. 5) IP (Internet Protocol): A low-level protocol that routes packets of data across separate networks tied together by routers to form the Internet or an intranet. Data travels in packets called IP datagrams. 6) RARP (Reverse Address Resolution Protocol): Converts physical network addresses into IP addresses. 7) SMTP (Simple Mail Transfer Protocol): Specifies the format of messages that an SMTP client on one computer can use to send electronic mail to an SMTP server on another computer.
  • 17. 17 8)TCP (Transmission Control Protocol): A connection-oriented protocol that transmits data in byte streams. Data is transmitted in packets called TCP segments, which contain TCP headers and data. TCP is a "reliable" protocol because it uses checksums to verify data integrity and handshaking to make sure transmitted data is received intact. 9) UDP (User Datagram Protocol): A connectionless protocol that transmits data in packets called UDP datagrams. UDP is an "unreliable" protocol because the sender receives no information indicating whether a datagram was actually received.
  • 18. 18 6. CONCLUSION There's much more that could be said about TCP/IP, but here are three key points: TCP/IP is a set of protocols that permit physical networks to be joined together to form an internet. TCP/IP combines the individual networks to form a virtual network in which individual hosts are identified not by physical network addresses but by IP addresses. TCP/IP uses a multilayered architecture that clearly defines each protocol's responsibilities. TCP and UDP provide high -level data transmission services to network application programs, and both rely on IP to transmit packets of data. IP is responsible for routing the packets to their destination. Data moving between two applications running on Internet hosts travels up and down the hosts' TCP/IP stacks. Information added by the TCP/IP modules on the sending end is stripped off by the corresponding TCP/IP modules on the receiving end and used to re -create the original data.
  • 19. 19 7. BIBLIOGRAPHY 1) Daniel C. Lynch and Marshall T. Rose, Internet System Handbook, Addison Wesley, pp. 4-14. 2) Daniel C. Lynch and Marshall T. Rose, Internet System Handbook, Addison Wesley, pp. 80-118. 3) W. Richard Stevens, TCP/IP Illustrated, Volume I: The Protocols, Addison Wesley, pp. 224. 4) W. Richard Stevens, TCP/IP Illustrated, Volume I: The Protocols, Addison Wesley, pp. 137-141. 5) www.wikipedia.com