09.12.2012 Views

SUSE LINUX Documentation - Index of

SUSE LINUX Documentation - Index of

SUSE LINUX Documentation - Index of

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table 18.1 Several Protocols in the TCP/IP Protocol Family<br />

Protocol<br />

TCP<br />

UDP<br />

ICMP<br />

IGMP<br />

318 Reference<br />

Description<br />

Transmission Control Protocol: A connection-oriented secure protocol.<br />

The data to transmit is first sent by the application as a stream <strong>of</strong> data<br />

then converted by the operating system to the appropriate format. The<br />

data arrives at the respective application on the destination host in the<br />

original data stream format in which it was initially sent. TCP determines<br />

whether any data has been lost during the transmission and that<br />

there is no mix-up. TCP is implemented wherever the data sequence<br />

matters.<br />

User Datagram Protocol: A connectionless, insecure protocol. The data<br />

to transmit is sent in the form <strong>of</strong> packets generated by the application.<br />

The order in which the data arrives at the recipient is not guaranteed<br />

and data loss is a possibility. UDP is suitable for record-oriented applications.<br />

It features a smaller latency period than TCP.<br />

Internet Control Message Protocol: Essentially, this is not a protocol<br />

for the end user, but a special control protocol that issues error reports<br />

and can control the behavior <strong>of</strong> machines participating in TCP/IP data<br />

transfer. In addition, it provides a special echo mode that can be viewed<br />

using the program ping.<br />

Internet Group Management Protocol: This protocol controls machine<br />

behavior when implementing IP multicast.<br />

As shown in Figure 18.1, “Simplified Layer Model for TCP/IP” (page 319), data exchange<br />

takes place in different layers. The actual network layer is the insecure data<br />

transfer via IP (Internet protocol). On top <strong>of</strong> IP, TCP (transmission control protocol)<br />

guarantees, to a certain extent, security <strong>of</strong> the data transfer. The IP layer is supported<br />

by the underlying hardware-dependent protocol, such as ethernet.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!