然新的运输层协议也有可能试用这种方式。)
ICMP是IP协议的附属协议。IP层用它来与其他主机或路由器交换错误报文和其他重要信息。尽管ICMP主要被IP使用,但应用程序也有可能访问它。我们将分析两个流行的诊断工具,Ping和Traceroute,它们都使用了ICMP。
IGMP是Internet组管理协议。它用来把一个UDP数据报多播到多个主机。ARP(地址解析协议)和RARP(逆地址解析协议)是某些网络接口(如以太网和令牌环网)使用的特殊协议,用来转换IP层和网络接口层使用的地址。 疑难解答
TCP/IP网络问题通常是由计算机的TCP/IP属性中三个主要条目的错误配置导致的。了解 TCP/IP 配置中的错误如何影响网络操作后,您可以解决许多常见 TCP/IP 问题。
错误的子网掩码:如果网络将默认掩码外的其他子网掩码用于其地址类,而客户端仍使用该地址类的默认子网掩码进行配置,则可以与远程网络进行通信但无法与某些附近网络进行通信。例如,如果创建四个子网(例如在子网配置示例中),但是在TCP/IP配置中使用错误的子网掩码255.255.255.0,则主机将无法确定某些计算机是否在与它们自己的子网不同的子网中。当发生此情况时,发送到作为相同C类地址一部分的不同物理网络中的主机的数据包将不会发送到默认网关来进行传送。此问题的常见症状是计算机可以与其本地网络中的主机以及所有远程网络进行通信,但无法与位置在附近并具有相同的A、B 或C类地址的网络进行通信。要解决此问题,只需在该主机的TCP/IP配置中输入正确的子网掩码。
错误的IP 址:如果将那些IP地址在本地网络的不同子网中的计算机放在一起,则它们无法进行通信。它们会尝试通过路由器相互发送数据包,而该路由器却无法正确转发这些数据包。此问题的症状是计算机可以与远程网络中的主机进行通信,但是无法与其本地网络中的某些或全部计算机通信。要解决此问题,请确保同一物理网络中的所有计算机具有同一IP子网中的IP地址。如果一个网段中的IP地址已用完,还可使用一些解决方案进行处理,但已超出本文范围。
错误的默认网关:使用错误的默认网关配置的计算机能够与其自己网段中的主机进行通信,但是无法与某些或全部远程网络中的主机进行通信。如果一个物理网络有多个路由器,且将错误的路由器配置为默认网关,则主机能够与某些远程网络进行通信,但是无法与其他远程网络进行通信。如果组织中有一个路由器连接到内部TCP/IP网络,另一个路由器连接到Internet,则此问题很常见。 参考
TCP/IP 中的两个常用参考是:
Richard Stevens, Addison Wesley. TCP/IP Illustrated, Volume 1:The Protocols[M]. 1994.
Douglas E. Comer, Prentice Hall. Internetworking with TCP/IP, Volume 1:Principles, Protocols, and Architecture[M]. 1995.
极力建议负责 TCP/IP 网络的系统管理员至少使用其中一个参考。 术语表
广播地址 -- 主机部分全部为一的IP地址。 主机 -- TCP/IP 网络中的计算机或其他设备。
Internet -- 连接在一起并共享公共范围的IP地址的全球网络集合。 InterNIC -- 负责管理 Internet 中的IP地址的机构。
IP -- 用于在TCP/IP网络或Internet上发送网络数据包的网络协议。 IP 地址 -- TCP/IP网络或Internet主机的唯一32位地址。
网络 -- 在本文中,“网络”一词有两种含义。一种含义是指单一物理网段上的计算机组,另一种含义是指系统管理员分配的IP网络地址范围。
网络地址 -- 主机部分全部为零的 IP 地址。 八位组 -- 一个8位数字,4个八位组构成一个32位IP地址。它们的范围是 00000000-11111111,对应于十进制值 0- 255。
数据包 -- 通过TCP/IP网络或广域网传输的数据单位。 RFC(Request for Comment,征求意见文件)-- 用于定义Internet标准的文档。
路由器 -- 在不同IP网络间传输网络通信的设备。
子网掩码 -- 一个32位数字,用于区分IP地址的网络部分和主机部分。 子网 -- 通过将较大的网络分成相等的部分而创建的较小网络。 TCP/IP -- 通常在Internet和大型网络中广泛使用的协议、标准和实用工具的集合。
广域网 (WAN) -- 大型网络,它是路由器分隔的较小网络的集合。例如,Internet 就是一个非常大的广域网。
附件:2.外文原文
TCP/IP INTRODUCTION
When you configure the TCP/IP protocol on a Microsoft Windows computer, an IP address, subnet mask, and usually a default gateway are required in the TCP/IP configuration settings.
To configure TCP/IP correctly, it is necessary to understand how TCP/IP networks are addressed and divided into networks and subnetworks. This article is intended as a general introduction to the concepts of IP networks and subnetting. A glossary is included at the end of article. MORE INFORMATION
The success of TCP/IP as the network protocol of the Internet is largely because of its ability to connect together networks of different sizes and systems of different types. These networks are arbitrarily defined into three main classes (along with a few others) that have predefined sizes, each of which can be divided into smaller subnetworks by system administrators. A subnet mask is used to divide an IP address into two parts. One part identifies the host (computer), the other part identifies the network to which it belongs. To better understand how IP addresses and subnet masks work, look at an IP (Internet Protocol) address and see how it is organized. TCP services
Although the TCP and UDP are using the same network layer (IP), TCP has provided to the application layer and UDP completely different services.
TCP provides a connection-oriented, reliable stream of bytes services.
For the use of TCP connection means that two of the application (usually a client and a server) in the mutual exchange of data must be before the establishment of a TCP connection. This process is very similar with the call, first dial-up ring, waiting for the other side pick said, \
In a TCP connection, only two parties to communicate with each other. Broadcast and Multicast can not be used for TCP.
TCP adoption of the following ways to provide reliability: Application data Beifengecheng suited to TCP that sent most of the block. This is completely different from UDP, the application of the data on the length will remain the same. TCP from the information passed to the IP unit known as the text of the report or paragraph (segment) TCP on how to determine the length of the text.
When the TCP send a paragraph later, it started a timer, wait for the end purpose of this newspaper that on receipt of the text. If not received a confirmation in time, will be re-issued the text of the report. In Chapter 21 we will understand TCP protocol in the overtime and adaptive re-strategy.
When the TCP received from the other side of the TCP connection data, it will send a confirmation. This confirmation is not sent immediately, usually a fraction of a second will be postponed.
TCP will maintain its first data and the testing and. This is an end-to-end testing and to detect the transmission of data in the course of any changes. If you receive the test of the errors and, TCP will be discarded this message, and do not acknowledge receipt of this message (hope that both the originator of the overtime).
Since the TCP packet of data as reported to transmit IP, and IP data on the disorder may be reached, TCP packet of the disorder may also be reached. If necessary, TCP will receive the data re-order, will receive the data to the correct sequence to the application layer.
Since the IP data will be reported duplication, TCP the receiving end must be disposed of duplication of data.
TCP also provides flow control. TCP connection of each side have a fixed-size buffer space. TCP receiver allows only the other side of the buffer zone to send the receiver to accept the data. This will prevent the rapid host a result of slower host a buffer overflow.
Two applications through TCP connection exchange of 8 bit bytes a stream of bytes. TCP is not inserted in the record-byte identifier. We see this as byte-service (byte stream service). If the application is one of the first 10-byte, 20-byte, 50 bytes longer, connected to the other party will not be able to understand each side sent a number of bytes. Receiver can receive four times this 80-byte, each receiving 20 bytes. Will be banished to the end byte TCP connection, the same stream of bytes will appear in the other end of TCP connection.
In addition, TCP byte flow of the content not to make any explanation. TCP do not know bytes of data transmission flow is binary data, or ASCII characters, EBCDIC character or other types of data. The flow of bytes explained by the TCP connection the two sides to explain the application layer.
This stream of bytes of the Unix operating system and the handling of the document's approach is very similar. Unix kernel of an application read or write the content not to make any explanation, but to the application procedures. The core of Unix, it can not distinguish between a binary file with a text file.
TCP is the Internet in Transport Layer protocol, shook hands with the use of three agreements establish a connection. When the initiative to connect a SYN request and wait for the other side to answer SYN, ACK. This connection method can prevent a wrong connection, TCP flow control the use of the agreement is the size of variable sliding window protocol. The first handshake: establish a connection, the client sent SYN packet (SEQ = x) to the server and access SYN_SEND state, waiting for the
server to confirm. Second handshake: Server received SYN packet, customers must confirm the SYN (ACK = x +1), while its own package also send a SYN (SEQ = y), that is, SYN + ACK packet, then enter the server SYN_RECV state. Third handshake: client server received the SYN + ACK packet, send confirmation to the server package ACK (ACK = y +1), this package sent completed, the client and server-Established state, complete the three shook hands. IP addresses: Networks and hosts
An IP address is a 32-bit number that uniquely identifies a host (computer or other device, such as a printer or router) on a TCP/IP network.
IP addresses are normally expressed in dotted-decimal format, with four numbers separated by periods, such as 192.168.123.132. To understand how subnet masks are used to distinguish between hosts, networks, and subnetworks, examine an IP address in binary notation.
For example, the dotted-decimal IP address 192.168.123.132 is (in binary notation) the 32 bit number 110000000101000111101110000100. This number may be hard to make sense of, so divide it into four parts of eight binary digits.
These eight bit sections are known as octets. The example IP address, then, becomes 11000000.10101000.01111011.10000100. This number only makes a little more sense, so for most uses, convert the binary address into dotted-decimal format (192.168.123.132). The decimal numbers separated by periods are the octets converted from binary to decimal notation.
For a TCP/IP wide area network (WAN) to work efficiently as a collection of networks, the routers that pass packets of data between networks do not know the exact location of a host for which a packet of information is destined. Routers only know what network the host is a member of and use information stored in their route table to determine how to get the packet to the destination host's network. After the packet is delivered to the destination's network, the packet is delivered to the appropriate host.
For this process to work, an IP address has two parts. The first part of an IP address is used as a network address, the last part as a host address. If you take the example 192.168.123.132 and divide it into these two parts you get the following: 192.168.123. Network .132 Host -or- 192.168.123.0 - network address.0.0.0.132 - host address. Subnet mask
The second item, which is required for TCP/IP to work, is the subnet mask. The subnet mask is used by the TCP/IP protocol to determine whether a host is on the local subnet or on a remote network.
In TCP/IP, the parts of the IP address that are used as the network and host
百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说综合文库计算机(外文翻译)--tcp—-ip介绍(译文+英文)—-毕业论文设计(2)在线全文阅读。
相关推荐: