Networking is a very discourse thing now- a-days, without networking and the internet we can do nothing in our daily life. A computer network and the internet is a telecommunications network which allows computers or other devices to exchange data.TCP and IP is used by the computers for the communication establishment between two computers and hosts. Network and the Internet are data transmission system between two devices. In networking computer networks, networked computing devices share the data and the information’s regarding some project with each other with the help wireless medium or cable(Kurose and Ross, 2012). Nodes can include servers such as phones, pc’s and servers as well as networking hardware etc. Computer networks support a large number of applications and services such as access to the worldwide web, digital audio, digital video, printers, applications and fax machines, and use of instant messaging, email applications as well as many others. Computer networking may be measured a division of computer science or IT. It relies upon the practical and theoretical application of related fields. A network gives the permission sharing of networks and computer resources. A network grants sharing of data, files, and other types of information giving authorized users the ability to access the info stored on other computers on the network. Distributed computing in computer networking uses computing resources across a network to fulfil tasks. A computer network can be used by the computer hackers or intruders to enter inside of the server. A research conducted by the Verizon states that around 28% of a data breach are due to the hackers activity in which they generally get the information’s and data related to organizations. The organization which are working around and use server-based communication and storage system are needed to get protected. Another aspect of the security inside the organization is by creating a training manual for the employees of the organization. Hackers generally use spoofed mail to get the sensitive information’s from the employees of the organization.
Full form of IP is Internet Protocol. The IP is one of the main hosts in the communication between two computers. IP is used to create connection and also in the data transfer between two computers. It is Internet Protocol which is considered as a leading infrastructure protocol in the internet protocol suite for transferring data beyond boundaries. IP is used to create connection between two host computers as they become connected the data transfer can now happen. It’s chasing function empowers internetworking, and crucially authorizes the internet.
IP is used to connect two hosts and share the data pockets between them. Due to this IP explains small package structure that minimise the information need to reported. It also explains the methods which are needed to picture the datagram. The first version of IP is ipv4 which is the overlook protocol of the internet At present there is another version of the IP which is IPV6, its considered as secure and more structured. Ipv4 allows safeguards the information’s which are being shared between two hosts. More security over the network enables the host computers to communicate effectively and share the related information’s. The algorithm of Internet Protocol depends on the end-to-end precept (Comer, 2013).
Transmission control protocol is a Full form of TCP. The TCP is considered as the main components of the internet protocol suit. It is connection related protocol. It is designed to provide dependable end to end byte stream over an undependable intermediate network. It gives host to host connectivity for the transport . It gets by having both the sender and the receiver creates endpoints called sockets (Comer, 2013). A sample picture of TCP is given below
The IP is mainly used for the communication between two hosts largely used in the computer networks worldwide. It is usually known as TCP and IP because the Transmission control protocol and the Internet protocol were the first networking protocol when it was developed. IP indicates the address or name connected to the internet and TCP delivers it to the right place. IP is the network layer of OSI model and TCP is transport layer of OSI model. It is a large number of protocol that works in concert to allow the networked computer to communicate or connect.
Figure: TCP/IP Model
TCP/IP has five layers. They are as mentioned below:
Abstraction Layer: It is considered as the first layer of the TCP / IP layer. The application layer or Abstraction layer is supplied by the program that uses TCP/IP for the communications. It contains all protocols needed by the application software or Operating System to converse on network. Example of Application layers are given below:
Transport Layer: It is the second layer of TCP and IP model. It performs transmission of the data. It is mainly used for the delivery purpose of the information’s. The most used protocol of the TCP/IP protocol is Transport layer. It takes the data from the higher level and transfers it to the lower level. It puts segments in the order which can be used for the segmentation.
Data Layer: It is the third layer of TCP/IP model. It contains all the data which has to be delivered to the destination from the source. The data layer executes framing, physical addressing, and error detection. It can perform some types of flow control. It also executes some access control.
Physical Layer: It is the fourth or the second last layer of the TCP and IP model which mainly contains the functions related with the streaming from physical layer to destination. It converts data from high layers into 1’s to 0’s for the transmission.
Host to network Layer: It is the last layer of the TCP/IP protocol. It uses all possible link for delivering to the destination. The information and the data is delivered as a pocket from source to destination . Network layer requires logical address like IP address. It requires devices like a router to communicate to the other network for transferring data (Microsoft, 2016).
The application layer of the TCP and IP model is mainly responsible for the requesting whether the connection is made to the appropriate host or not.
Port numbers are restrained for the assignment by the internet service providers with assigned name and numbers which can be used for different applications. These can communicate using the communication protocol or the data protocol. Each application has designated port numbers (Boyle et al., 2014). For example HTTP has a port number of 80.
1. Telnet- Telnet’s port number is 23
2. HTTP- HTTP’s port number is 80
3. FTP- FTP’s port number is 20, 21
4. DNS- DNS’s port number is 53
5. DHCP- DHCP’s port number is 67, 68.
The Internet Layer is also called Internetwork Layer or Network layer. It is a connection protocol. It is responsible for moving packets. Purpose of the Internet Layer is given below:
1. It detects the error.
2. For diagnostic, we can use this layer.
3. It is also used for the movement of the information pockets.
IMCP stands for Internet Message Control Protocol. It is one of the main Protocol in the internet protocol suite. It is used for error detection message, for example, the requested page is not available. It is different from Transmission Control Protocol and User Datagram Protocol, as it is not used for transmission of the data between two nodes. We troubleshoot the problem by two methods they are PING and TRACEROUTE. By pinging the address we reach to the host destination if a reply comes from this host destination then it is connected if not then it has to be determined the error. Another one is trace route we have to go to the run and type ncpa.cpl after that there showing some connections, which connections we have to be checked right click to the connections and go to the option diagnostic then it is starting its process of detecting the error. Some pictures of error detection are given below:
Networking and the internet have taken a very important role in our daily life. Networking has some layers and all the layers are responsible for something very significant. OSI model TCP/IP model plays a vital role in networking system for transferring data, decoding data, error detection of the data and diagnostic the data as well. The main layer of the TCP and IP is the application layer which request from a host to make sure a connection. In this assignment, I have answered some questions related to the Networking.
Kurose, J.F. and Ross, K.W. (2012) Computer networking: A top-down approach. 6th edn. Boston: Addison-Wesley Educational Publishers.
Comer, D.E. (2013) Internetworking with TCP/IP volume One. 5th edn. Indianapolis, IN, United States: Addison-Wesley Educational Publishers.
Boyle, R.J., Panko, R.R., Boyle, Y.J. and Boyle, Y. (2014) Corporate computer security. 3rd edn. Boston: Prentice Hall.
Chwan-Hwa, J., Wu, Irwin, D.J. and Wu, C.-H.I. (2013) Introduction to computer networks and cybersecurity. Boca Raton, FL, United States: Taylor & Francis.
Microsoft (2016) The OSI Model’s Seven Layers Defined and Functions Explained. Available at : https://support.microsoft.com/en-us/kb/103884 (Accessed: 17 August 2016).