- 1 Layered Network Models
- 2 The Layers of the TCP/IP 5-Layer Model
- 3 Network Protocols
- 4 Peer-to-Peer Communication
- 5 TCP/IP Protocols by Name and Function
- Summary
- Test Yourself
1.5 TCP/IP Protocols by Name and Function
In this chapter we already looked briefly at some TCP/IP protocols. It is, however, worth summarizing each protocol formally in terms of its name and the RFC that describes it. Some of these protocols will be explored in later chapters as indicated in Table 1.6.
The following list of RFCs and protocols is not definitive. Listed are the most useful RFCs, but not all RFCs that relate to the subject, as the list is extensive for the more complex protocols. The RFC column of the table lists the chapter of this book that covers the protocol where applicable. We work down the stack from the Application layer (5), again, taking the journey that application data takes.
The Application layer has literally hundreds of applications and many protocols that the applications at this layer use. They are listed in Table 1.6 by relevant RFC, protocol name, and a brief description.
Table 1.6 Application Layer Protocol Descriptions
RFC |
Protocol |
Description |
1034,1035 Chapter 11 |
DNS |
Domain Name Service is a text-based, distributed host-to-IP address (and IP address-to-host) mapping solution based on Berkeley Internet Name Domain (BIND) library routines. It also provides, through mail exchanger (MX) information, the IP addresses and names of servers that accept inbound e-mail for given domain names. |
959 |
ftp |
File Transfer Protocol transfers a file by copying a complete file from one system to another system. |
854,855 |
telnet |
This service provides a remote connection and login facility, which runs over any TCP/IP network. |
1258,1280 |
rlogin |
This service, offered by UNIX systems, enables users of one machine to connect to other UNIX systems across the Internet and to interact as though their terminals were connected directly to the machines. |
2131 Chapter 9 |
DHCP |
Dynamic Host Configuration Protocol automates the assignment of IP addresses in an organization's network. |
821 |
SMTP |
Simple Mail Transfer Protocol transfers electronic mail messages from one machine to another. |
1157 |
SNMP |
Simple Network Management Protocol is the language that allows for the monitoring and control of network entities. |
1939 |
POP3 |
Post Office Protocol lets users collect e-mail from a POP server over any TCP/IP network. The user's host runs a POP client application, and the server runs the POP server software, which gives the user authenticated access to his or her mailbox. |
2060 |
IMAP4 |
Internet Message Access Protocol, like POP, lets users collect e-mail from an IMAP server over a TCP/IP network. The user's host runs an IMAP client application, and the server runs the IMAP server software, which gives the user authenticated access to his or her mailbox. IMAP4 is more powerful and offers more features than POP3. |
1945,2068 |
HTTP |
HyperText Transfer Protocol is used by the World Wide Web to display text, pictures, sounds, and other multimedia information with a Web browser. |
Table 1.7 lists the important Transport layer protocols. Chapter 7 explores these in detail.
Table 1.7 Transport Layer (4) Protocol Descriptions
RFC |
Protocol |
Description |
793 Chapter 7 |
TCP |
Transmission Control Protocol is a connection-oriented protocol that provides the full-duplex, stream service on which many application protocols depend. It is encapsulated in IP. |
768 Chapter 7 |
UDP |
User Datagram Protocol provides a datagram delivery to application and is encapsulated in IP. |
Table 1.8 describes the protocols of the Internet layer. Chapter 4 covers ARP/RARP, and Chapters 5 and 13 cover IPv4 and IPv6, respectively.
Table 1.9 shows the Network layer protocols, with many technologies to choose from. Ethernet is by far the most important LAN technology to understand. Alternatives such as Token Ring and Token Bus exist, but they are far less important than Ethernet.
Table 1.8 Internet Layer (3) Protocol Descriptions
RFC |
Protocol |
Description |
826 Chapter 4 |
ARP |
Address Resolution Protocol defines the method used to map a 32-bit IP address to a 48-bit Ethernet address. |
903 Chapter 4 |
RARP |
Reverse Address Resolution Protocol is the reverse of ARP. It maps a 48-bit Ethernet address to a 32-bit IP address. |
791,950 919,922 Chapters 5 and 13 |
IP |
Internet Protocol determines the path a datagram must take, based on the destination host's IP address. |
792 Chapter 5 |
ICMP |
Internet Control Message Protocol communicates error messages and other controls within IP datagrams. |
Table 1.9 Network Layer (2) Protocol Descriptions
RFC |
Protocol |
Description |
1055 |
SLIP |
Serial Line IP encapsulates IP datagrams on serial lines. |
1661 826, 894 Chapter 3 |
PPP Ethernet |
Point-to-Point Protocol transmits datagrams over serial point-to-point links. Ethernet is a broadcast-based, contention-bus LAN technology. |
EXAM NOTES
Key Learning Points
The OSI/ISO 7-layer reference model is a generic network model.
The DoD 5-layer model is specifically for the TCP/IP protocol family.
TCP and UDP are transport protocols that provide a delivery service to the Application layer.
IP is an Internet layer protocol that offers a datagram-based routing service to the Transport and Application layers.