Beruflich Dokumente
Kultur Dokumente
Windows Sockets
Applications
NetBIOS
Applications
Sockets
NetBIOS
NetBIOS over TCP/IP
TCP
ICMP IGMP
LAN Technologies:
Ethernet, Token Ring,
FDDI
TDI
Transport
UDP
IP
Application
Internet
ARP
WAN Technologies:
Serial Lines, Frame Relay,
ATM
Network
Ethernet
Token ring
ARCnet
FDDI
ARP Cache
131.107.7.7 08004. . .
ARP Cache
131.107.7.7 08004. . .
131.107.7.28 08004. . .
2
ARP
Broadcast
4
IP Address = 131.107.7.28
Hardware Address = 08004. . .
IP Address = 131.107.7.29
Hardware Address = 08007. . .
ARP Cache
131.107.7.7 08009. . .
131.107.7.1 08006. . .
ARP Cache
131.107.3.7 08004. . .
ARP Cache
ARP
Broadcast for
Router A
131.107.3.1
08005...
131.107.7.1
08006...
3
B
A Router
5
ARP
for Router B
IP Address = 131.107.3.24
Hardware Address = 08004. . .
IP Address = 131.107.7.29
Hardware Address = 08009. . .
IP on the Router
Decrements the TTL
Fragments Large Packets Into Smaller Packets
Creates a New Header for Each New Packet
Flag
Fragment ID
Fragment offset
Calculates a New Checksum
Obtains the Hardware Address of the Next Router
Forwards the Packet
Application
TFTP
Server
FTP
Server
TCP Ports
20,21
UDP Port
69
Web
Server
TCP Port
80
Web
Browser
TCP Port
1210
0 . . . 65536
TCP
Transport
UDP
Internet
IP
Network
Reliable Delivery
Sequence numbers
Acknowledgments (ACKs)
Byte-Stream Communications
Uses Port Numbers as Endpoints to
Communicate
TCP/IP Utilities
FTP
TFTP
RCP
Telnet
RSH
REXEC
LPR
LPQ
LPD
PING
IPCONFIG
NSLOOKUP
HOSTNAME
NETSTAT
NBTSTAT
ROUTE
TRACERT
ARP
Finger
LPD
LPR
LPQ
Function
Run commands on UNIX host
Run commands on UNIX host
Terminal emulation
Bidirectional file transfer
Bidirectional file transfer over TCP
Bidirectional file transfer over UDP
Accesses documents stored on a
World Wide Web server.
Services LPR requests and submits
print jobs to a printer device
Prints to TCP/IP-based network
interface printers on UNIX hosts
Checks print queue status
Security
Password protection
No password protection
User and password authentication
No user authentication
User and password authentication
No user authentication
User and password authentication