0% found this document useful (0 votes)
115 views4 pages

Ipv6 Increases The Size of The Ip Address From 32 To 128 Bits. This Ensures That The World Won'T Run Out of Ip Addresses

The document discusses several internet protocols including the Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Address Resolution Protocol (ARP), Dynamic Host Configuration Protocol (DHCP), network address translation (NAT), tunneling protocols, and virtual private networks (VPNs). It provides information on what each protocol is used for, its packet format, functions, and how it enables communication across networks.

Uploaded by

Kiervin Landar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views4 pages

Ipv6 Increases The Size of The Ip Address From 32 To 128 Bits. This Ensures That The World Won'T Run Out of Ip Addresses

The document discusses several internet protocols including the Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Address Resolution Protocol (ARP), Dynamic Host Configuration Protocol (DHCP), network address translation (NAT), tunneling protocols, and virtual private networks (VPNs). It provides information on what each protocol is used for, its packet format, functions, and how it enables communication across networks.

Uploaded by

Kiervin Landar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Landar, Kiervin V.

BT502
Internet Protocol ( https://en.wikipedia.org/wiki/Internet_Protocol )
- The Internet Protocol (IP) is the network layer communications protocol in
the Internet protocol suite for relaying datagrams across network boundaries.
Its routing function enables internetworking, and essentially establishes the Internet.
IP has the task of delivering packets from the source host to the destination host
solely based on the IP addresses in the packet headers. For this purpose, IP defines
packet structures that encapsulate the data to be delivered. It also defines
addressing methods that are used to label the datagram with source and destination
information.

IPv4 Datagram Format ( https://electronicspost.com/ipv4-datagram-format/ )

IPv4 datagram is a variable-length packet


composed of the header (20 bytes) and
data (up to 65,536 bytes). Version: It
defines the version number of IP which is 4
for this version. Its length is 4 bits.

IPv6 Datagram Format (


https://electronicspost.com/ipv6-datagram-format/ )

IPv6 increases the size of the IP


address from 32 to 128 bits. This
ensures that the world won’t run
out of IP addresses.

Transmission Control Protocol


(https://en.wikipedia.org/wiki/Transmission_Control_Protocol )

- The Transmission Control Protocol (TCP) is one of the main protocols of the Internet


protocol suite. It originated in the initial network implementation in which it
complemented the Internet Protocol (IP). Therefore, the entire suite is commonly
referred to as TCP/IP. TCP provides reliable, ordered, and error-checked delivery of
a stream of octets (bytes) between applications running on hosts communicating via
an IP network. Major internet applications such as the World Wide
Web, email, remote administration, and file transfer rely on TCP, which is part of
the Transport Layer of the TCP/IP suite. SSL/TLS often runs on top of TCP.
What are the 6 functions TCP performs?
(http://www.tcpipguide.com/free/t_TCPFunctionsWhatTCPDoes.htm )

 Addressing/Multiplexing
 Connection Establishment, Management and Termination
 Data Handling and Packaging
 Data Transfer
 Providing Reliability and Transmission Quality Services
 Providing Flow Control and Congestion Avoidance Features

Transmission Control Protocol Datagram Format


(https://en.wikipedia.org/wiki/Transmission_Control_Protocol )

Internet Control Message Protocol


(https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol )

- The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet


protocol suite. It is used by network devices, including routers, to send error
messages and operational information indicating success or failure when
communicating with another IP address, for example, when an error is indicated
when a requested service is not available or that a host or router could not be
reached. ICMP differs from transport protocols such as TCP and UDP in that it is not
typically used to exchange data between systems, nor is it regularly employed by
end-user network applications (with the exception of some diagnostic tools
like ping and traceroute).

User Datagram Protocol ( https://www.educba.com/user-datagram-protocol/ )


User Datagram Protocol is a connectionless, unreliable
transport protocol that lies between the application and
transport layers. It does not add anything to IP services
except for providing a process-to-process communication
instead of the host-to-host evidence. User Datagram Protocol
transfers data in packet format, which has 8 bytes of the
header that includes parameters like source port number, destination port number, total length,
checksum each of 16 bits. 

Address Resolution Protocol ( https://en.wikipedia.org/wiki/Address_Resolution_Protocol )


- The Address Resolution Protocol (ARP) is a communication protocol used for
discovering the link layer address, such as a MAC address, associated with a
given internet layer address, typically an IPv4 address. This mapping is a critical
function in the Internet protocol suite. ARP was defined in 1982 by RFC 826,
[1] which is Internet Standard STD 37.

ARP has been implemented with many combinations of network and data link layer
technologies, such as IPv4, Chaos net, DEC net and Xerox PARC Universal
Packet (PUP) using IEEE 802 standards, FDDI, X.25, Frame
Relay and Asynchronous Transfer Mode (ATM).

Dynamic Host Configuration Protocol


(https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol )
- The Dynamic Host Configuration Protocol (DHCP) is a network management
protocol used on Internet Protocol (IP) networks for automatically assigning IP
addresses and other communication parameters to devices connected to the
network using a client–server architecture.

The technology eliminates the need for individually configuring network devices
manually, and consists of two network components, a centrally installed network
DHCP server and client instances of the protocol stack on each computer or device.
When connected to the network, and periodically thereafter, a client requests a set of
parameters from the DHCP server using the DHCP protocol.

Network address translation ( https://en.wikipedia.org/wiki/Network_address_translation )

- Network address translation (NAT) is a method of mapping an IP address space into


another by modifying network address information in the IP header of packets while
they are in transit across a traffic routing device. The technique was originally used
to avoid the need to assign a new address to every host when a network was moved,
or when the upstream Internet service provider was replaced, but could not route the
networks address space. It has become a popular and essential tool in conserving
global address space in the face of IPv4 address exhaustion. One Internet-
routable IP address of a NAT gateway can be used for an entire private network.

Tunneling Protocols (https://en.wikipedia.org/wiki/Tunneling_protocol )


- In computer networks, a tunneling protocol is a communications protocol that allows
for the movement of data from one network to another. It involves allowing private
network communications to be sent across a public network (such as the Internet)
through a process called encapsulation.

Because tunneling involves repackaging the traffic data into a different form, perhaps


with encryption as standard, it can hide the nature of the traffic that is run through a
tunnel.
The tunneling protocol works by using the data portion of a packet (the payload) to
carry the packets that actually provide the service. Tunneling uses a layered protocol
model such as those of the OSI or TCP/IP protocol suite, but usually violates the
layering when using the payload to carry a service not normally provided by the
network. Typically, the delivery protocol operates at an equal or higher level in the
layered model than the payload protocol.

Virtual Private Network ( https://en.wikipedia.org/wiki/Virtual_private_network )


- A virtual private network (VPN) extends a private network across a public network
and enables users to send and receive data across shared or public networks as if
their computing devices were directly connected to the private network. The benefits
of a VPN include increases in functionality, security, and management of the private
network. It provides access to resources inaccessible on the public network and is
typically used for telecommuting workers. Encryption is common, although not an
inherent part of a VPN connection.

A VPN is created by establishing a virtual point-to-point connection through the use


of dedicated circuits or with tunneling protocols over existing networks. A VPN
available from the public Internet can provide some of the benefits of a wide area
network (WAN). From a user perspective, the resources available within the private
network can be accessed remotely.

You might also like