Unit 1 Lab 1 Tcp/ip Model Review Exercise

Net Abstractions and Open Protocols

On this page, you volition acquire well-nigh the communication standards used on the Internet and how they work together.

CSN-ane.B.iii, CSN-1.C.i

  • A protocol is set of rules that specify the behavior of a system.
  • An IP accost is a unique number assigned to each device on a calculator network.
  • A bundle is a small clamper of whatsoever kind of data (text, numbers, lists, etc.) and metadata (information about the information) that is passed through the Internet as a data stream.
  • Packet switching means that the Cyberspace sends short bursts of information, not long continuous strings.

There are billions of devices connected to the Internet and hundreds of dissimilar kinds of devices: laptops, tablets, phones, smart refrigerators, handheld credit menu readers, and then on. How do they all know how to find and talk to each other? Protocols (communication standards) ensure that the variety of devices interact with each other smoothly.

Every device on the Internet has a unique Internet Protocol (IP) accost (or more than one, if it'south a router), like a postal or email address. The Internet Protocol specifies how a router handles a asking for a different IP address. Each router knows the layout of its specific neighborhood of the Internet and knows which way to send each bulletin to get it a lilliputian fleck closer to where information technology's going. The fact that each router doesn't have to know the addresses of the complete Internet improves scalability.

When you stream data over the Internet, the stream is divided into packets that IP sends individually. This process is what makes the Internet a packet switching network.

The Cyberspace is adequately reliable, but every one time in a while a packet will be lost, and devices on the Cyberspace need to tolerate these faults. 1 way to tolerate faults is not to intendance (if you lose 1 frame of video, it doesn't affair). Another mode (called TCP for Manual Control Protocol) is to keep sending packets until they are acknowledged equally having been received correctly. For applications that employ TCP, it's TCP that divides the data into packets. Since packets can travel past different paths, they may arrive out of club; and despite the redundancy of the Internet, it's possible some won't arrive at all. TCP guarantees reliable information manual by keeping rails of which packets have been received successfully, resending any that have been lost or damaged, and specifying the order for reassembling the data on the other stop.

TCP/IP is a pair of protocols that provide two levels of brainchild:

  • IP (Net Protocol) lets your computer pretend it has a directly connexion to another estimator. The routers at every connection bespeak on the Cyberspace run IP, which transmits packets from one IP address to another.
  • TCP (Transmission Control Protocol) lets your computer pretend it has a reliable connectedness to the other estimator. The computers (including servers) at the two endpoints of a communication run TCP, which guarantees that packets arrive successfully.

Internet Abstraction Bureaucracy

CSN-1.C-iv

Example protocols for each layer:

Application layer: Browsers use HTTP (HyperText Transfer Protocol) to interpret HTML instructions for web folio formatting. DNS (Domain Name System) converts user-friendly host names (like edc.org or berkeley.edu) into IP addresses. Your email application may use SMTP (Simple Post Transfer Protocol) to send and IMAP (Internet Message Access Protocol) to read email.

Transport layer: TCP (Transmission Control Protocol) simulates a reliable, long-term connectedness between two computers by only displaying data once all packets have arrived. When speed is more important than accuracy, such as for real-time video streaming, people use UDP (User Datagram Protocol).

Internet layer : Every device on the Internet needs an IP accost then other devices can notice information technology. Routers use Internet layer protocols to detect and work around network congestion.

Network interface hardware: You may connect to the Internet with an Ethernet cable or perhaps a WiFi radio antenna inside the case of your calculator. Either connects computers to a local network router which then connects to an Internet service provider (ISP). Prison cell phones use a longer-range cellular connection to a phone carrier.

There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the procedure they back up. This bureaucracy of abstractions manages the complexity of the Net by hiding the details of lower levels of the system:

  • Application Layer Protocols (such as HTTP) are the highest level of abstraction because they manage how information is interpreted and displayed to users. These protocols give meaning to the bits sent by lower-level protocols; user and server computers must agree on what the $.25 mean, and application protocols offer this.
  • Transport Layer Protocols (such every bit TCP) manage the breakdown of a bulletin into packets to be transmitted past lower level protocols and too the reconstruction of the message from the packets upon arrival.
  • Internet Layer Protocols (such as IP) manage the pathways that the data packets travel across networks. These protocols provide an abstraction of the Internet every bit one big network even though the concrete reality on the lower level is one of many subnetworks.
  • Network Interface Hardware (using Link Layer Protocols such as WiFi) manage the connection between an Net device and its local network. These local protocols are the least abstract because they deal directly with your physical hardware.

These are all open standards: anyone can look up a protocol and code with it to make new hardware or software without anyone'southward permission. The Internet is probably the largest and nearly complicated artifact in human history, and it relies on cooperation. Despite some governments' attempts to censor the net, the large picture is i of strong cooperative spirit.

Why care virtually open standards?

  • Your T-Mobile jail cell phone tin talk to your friend's Verizon phone.
  • Yous tin can send email to someone in a land that's considered an enemy of your country (from the The states to Islamic republic of iran, for example).
  • An engineer at Microsoft can read a web page at Apple even though their companies are competitors.

Before the Net, at that place were several unlike network protocols that were secrets belonging to particular manufacturers. Then if y'all had a particular brand of calculator or router, it could talk only to other computers of the same brand.

  1. Talk with Your Partner Explain how each of these protocols is an abstraction. What details does each one hide?
    • HTTP (HyperText Transfer Protocol)—the protocol that your browser uses to admission an HTML web page
    • TCP (Transmission Control Protocol)—the protocol that assures reliable transmission of data
    • IP (Internet Protocol)—the hierarchical addressing protocol that manages routing of data betwixt computers
  2. Locate your descriptions of how people connect to the Internet (from folio one), how devices within a network are continued (from page two), how and why the Internet is mistake tolerant (from page two), and how TCP/IP works (from page 3). Combine your descriptions into a brusque paper on how the Internet works.
  1. Read Blown to $.25 pages 301-316.

lloydsaidence.blogspot.com

Source: https://bjc.edc.org/bjc-r/cur/programming/4-internet/1-reliable-communication/3-open-protocols.html?topic=nyc_bjc%2F4-internet.topic&course=bjc4nyc.html&novideo&noassignment

0 Response to "Unit 1 Lab 1 Tcp/ip Model Review Exercise"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel