Network Technology Requirements1 TCP/IP Protocols and IP Addressing Capella University IT-FP2250 Intro to Network Technology August 26, 2021
Network Technology Requirements2 TCP/IP and UDP protocols TCP, or Transmission Control Protocol, is a communication standard governing data transfer across the internet(Fortinet, 2021) . It is part of the TCP/IP protocol and was first introduced in a paper written in 1974 titled "Protocol Packet Network Communication" (ExtraHop, n.d.). TCP works by establishing a connection between sender and receiver. It breaks the data being sent into small pieces referred to as packets. The packets are sent to the destination in the same order as they were sent(Fortinet, 2021) . Without TCP, the data can become unorganized or even lost in transmission (ExtraHop, n.d.). TCP also contains a flow control mechanism that ensures the receiver will not become overwhelmed with the sent data (Ooi Chuin Nee, 1998). IP, or internet protocol, is the second half of TCP/IP and is a method for sending data. It defines how applications exchange data packets and are the primary protocol for formatting rules (Fortinet, 2021). It obtains the address to where the data is to be sent(Farrier, 2021) . Unlike TCP, IP does not correct issues or errors that can happen during transmission. Instead, it will eliminate the data and send an Internet Control Mission Protocol (ICMP) error message (Ooi Chuin Nee, 1998). Together, TCP/IP is the default method of data communication developed by the Department of Defense. It is done through a 3-way handshake between sender and receiver to establish a connection. This handshake ensures that the data can be sent in both directions (Fortinet, 2021).
Network Technology Requirements3 TCP/IP is divided into four layers. The data link layer defines how data should be sent. It is a combination of the data link and physical layer of the OSI model. The internet layer is responsible for sending the packets. The transport layer provides reliable connections. Finally, the application layer is the user interaction level. It is the programs that need to use TCP/IP (Fortinet, 2021) . User Datagram Protocol, UDP works on top of IP and is a lightweight data transfer protocol(Fox, n.d.) . It is seen in the transport layer of the OSI model and works with higher-level protocols such as TFTP, RTSP, and SNMP(Rosencrance et al., 2020) . It provides a way to detect corrupt data in packets, but it does not correct them. It is formatted into an 8-byte header with a variable size body of data. Bytes 1 to 4 is used to store port numbers for both the source and destination. Bytes 5 and 6 are for the length of the segment. 7 and 8 contain a checksum mechanism that checks the data for corruption(Fox, n.d.).
Want to read all 11 pages?
Previewing 4 of 11 pages Upload your study docs or become a member.
Want to read all 11 pages?
Previewing 4 of 11 pages Upload your study docs or become a member.
End of preview
Want to read all 11 pages? Upload your study docs or become a member.