Overview of Transport Protocols

Protocol is an agreed-upon format for transmitting data between two devices i.e. it is a course of action or regulations used by networked computers to communicate with each other.
The protocol determines the following:
The type of error checking to be used
Data compression method if any
How the sending device will indicate that it has finished sending a message
How the receiving device will indicate that it has received a message
A Protocol Stack collection of protocols and the order in which they work together.
In order for flawless communication to take place both the protocols must be common.
Different protocols have different ways to operate however all of them require that certain chain of actions take place when computers communicate.
In today's world there are numerous protocols used and each of these have their own advantages and disadvantages.
More often than not certain organizations or vendors create their own protocols so particular tasks can be accomplished.
Collection of protocols are called 'a protocol suite'.
It is fairly common that several protocols are designed to work together.
The most widely used protocol suites used are.
TCP/IP
Transmission Control Protocol/Internet Protocol.
IPX/SPX
Internetwork Packet Exchange/Sequenced Packet Exchange.
NetBEUI
NetBIOS (Network Basic Input Output System) Extended User Interface.
TCP/IP
TCP/IP is the actual communication standard used by the Internet.
It was developed by the U.S department of Defense in the 70's.
This network was developed by the military so it could serve as a contingent network incase a nuclear war broke out.
The network was however given to government agencies and universities for free.
Researchers and students at the respected universities incorporated the suite into the UNIX network operating systems on their computers.
They then developed higher-level protocols for FTP (File transfer protocol) SMTP (Simple Mail Transfer Protocol) and even browsing of documents in HTTP (Hyper Text Transfer Protocol).
These applications use the 'sockets' application-programming interface (API)
TCP/IP protocol suite is being used on LANs and WANs primarily because of its vigorous nature and the increasing need to use Internet technologies.
All network software vendors now include TCP/IP within their products.
Like Linux no one owns TCP/IP and anyone can contribute towards its development.
The two part of TCP/IP are:
IP
IP's responsibility is in moving data packet from node to node.
Each of the packets is forwarded on a four-byte destination address (the IP number).
TCP
TCP's responsibility is in verifying the correct delivery of data from client to server.
It is possible that data can be lost in the intermediate network.
So TCP adds support to detect errors or lost data.
In case the data is lost it triggers retransmission until the data is correctly and completely received

Configuring TCP/IP
All TCP/IP devices must be provided with the following information.
IP Address
IP addresses are used to identify each device from one and another
The format of an IP address is 4 decimal numbers separated by periods
Example of an IP address is 202.44.122.311
An IP address identifies both the network to which the device is attached and also its identity on the network
IP addresses are mandatory for all devices
Subnet Mask
The Subnet mask is used in accordance with the IP address
It is used to determine if another device is located on a local or remote network
A subnet mask is also mandatory for all devices
Default Gateway
The default gateway is the IP address of the router to which data packets designed for remote networks should be sent
The default gateway although not necessary would limit the device to communicate only within the local network
DNS (Domain Name System) Server
One or more IP addresses may be entered to identify DNS servers
These servers provide resolution of TCP/IP host names to their IP address
They are absolutely crucial for locating resources on the Internet
WINS (Windows Internet Naming Service) Server
Microsoft NT network requires WINS server addresses to be entered
This enables it to resolve server names to their IP addresses

DHCP (Dynamic Host Configuration protocol) server may be used to automatically allocate IP addresses and other settings.
This protocol allows network administrators to manage centrally and automate the assignment of IP (Internet Protocol) configurations on a computer network.
If you are using TCP/IP protocols each computer system should have a unique IP address in order to communicate with each other.
If there's no DHCP the IP address has to be entered manually.
DHCP allows a network administrator to supervise and distribute IP addresses from a central point.

No comments: