📄 468-471.html
字号:
<HTML>
<HEAD>
<TITLE>Special Edition Using Linux, Fourth Edition:Understanding the TCP/IP Protocol Suite</TITLE>
<META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW">
<SCRIPT>
<!--
function displayWindow(url, width, height) {
var Win = window.open(url,"displayWindow",'width=' + width +
',height=' + height + ',resizable=1,scrollbars=yes');
}
//-->
</SCRIPT>
</HEAD>
-->
<!--ISBN=0789717468//-->
<!--TITLE=Special Edition Using Linux, Fourth Edition//-->
<!--AUTHOR=Jack Tackett//-->
<!--AUTHOR=Jr.//-->
<!--AUTHOR=Steve Burnett//-->
<!--PUBLISHER=Macmillan Computer Publishing//-->
<!--IMPRINT=Que//-->
<!--CHAPTER=23//-->
<!--PAGES=468-471//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="466-468.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="471-474.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading5"></A><FONT COLOR="#000077">The TCP/IP Protocol Stack</FONT></H3>
<P>The TCP/IP protocol stack represents a network architecture that’s similar to the ISO OSI networking model. Figure 23.1 shows the mapping of TCP/IP layers onto the ISO protocol stack.
</P>
<P><A NAME="Fig1"></A><A HREF="javascript:displayWindow('images/23-01.jpg',441,306 )"><IMG SRC="images/23-01t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/23-01.jpg',441,306)"><FONT COLOR="#000077"><B>FIG. 23.1</B></FONT></A> OSI and TCP/IP compared.</P>
<P>TCP/IP doesn’t make as fine distinctions between the top layers of the protocol stack as does OSI. The top three OSI layers are roughly equivalent to the Internet process protocols. Some examples of process protocols are Telnet, FTP, SMTP, NFS, SNMP, and DNS.
</P>
<P>The Transport layer of the OSI model is responsible for reliable data delivery. In the Internet protocol stack, this corresponds to the host-to-host protocols. Examples of these are TCP and UDP. TCP is used to translate variable-length messages from upper-layer protocols and provides the necessary acknowledgment and connection-oriented flow control between remote systems.</P>
<P>UDP is similar to TCP, except that it’s not connection-oriented and doesn’t acknowledge data receipt. UDP only receives messages and passes them along to the upper-level protocols. Because UDP doesn’t have any of the overhead related to TCP, it provides a much more efficient interface for such actions as remote disk services.</P>
<P>The Internet Protocol (IP) is responsible for connectionless communications between systems. It maps onto the OSI model as part of the Network layer, which is responsible for moving information around the network. This communication is accomplished by examining the Network layer address, which determines the systems and the path to send the message.</P>
<P>IP provides the same functionality as the Network layer and helps get the messages between systems, but it doesn’t guarantee the delivery of these messages. IP may also fragment the messages into chunks and then reassemble them at the destination. Each fragment may take a different network path between systems. If the fragments arrive out of order, IP reassembles the packets into the correct sequence at the destination.</P>
<H3><A NAME="Heading6"></A><FONT COLOR="#000077">IP Addresses</FONT></H3>
<P>The Internet Protocol requires that an address be assigned to every device on the network. This address, known as the <I>IP address</I>, is organized as a series of four octets. These octets each define a unique address, with part of the address representing a network (and optionally a subnetwork) and another part representing a particular node on the network.</P>
<P>Several addresses have special meanings on the Internet:</P>
<DL>
<DD><B>•</B> An address starting with a zero references the local node within its current network. For example, 0.0.0.23 references workstation 23 on the current network. Address 0.0.0.0 references the current workstation.
<DD><B>•</B> The loopback address, 127, is important in troubleshooting and network diagnoses. The network address 127.0.0.0 is the local loopback inside a workstation.
<DD><B>•</B> The ALL address is represented by turning on all bits, giving a value of 255. Therefore, 192.18.255.255 sends a message to all nodes on network 192.18; similarly, 255.255.255.255 sends a message to every node on the Internet. These addresses are important to use for multicast messages and service announcements.
</DL>
<BLOCKQUOTE>
<P><FONT SIZE="-1"><HR><B>CAUTION: </B>It’s important that when you assign node numbers to your workstations, you don’t use 0, 127, or 255, because these are reserved numbers and have special meanings.<HR></FONT>
</BLOCKQUOTE>
<H4 ALIGN="LEFT"><A NAME="Heading7"></A><FONT COLOR="#000077">IP Address Classes</FONT></H4>
<P>The IP addresses are assigned in ranges referred to as <I>classes</I>, depending on the application and the size of an organization. The three most common classes are A, B, and C. These three classes represent the number of locally assignable bits available for the local network. Table 23.4 shows the relationships among the different address classes, the available number of nodes, and the initial address settings.</P>
<TABLE WIDTH="100%"><CAPTION ALIGN=LEFT><B>Table 23.4</B> IP Address Classes
<TR>
<TH COLSPAN="4"><HR>
<TR>
<TH WIDTH="10%" ALIGN="LEFT">Class
<TH WIDTH="30%" ALIGN="LEFT">Available Nodes
<TH WIDTH="30%" ALIGN="LEFT">Initial Bits
<TH WIDTH="30%" ALIGN="LEFT">Starting Address
<TR>
<TD COLSPAN="4"><HR>
<TR>
<TD>A
<TD>2<SUP>24</SUP>=167,772
<TD>0xxx
<TD>0–127
<TR>
<TD>B
<TD>2<SUP>16</SUP>=65,536
<TD>10xx
<TD>128–191
<TR>
<TD>C
<TD>2<SUP>8</SUP>=256
<TD>110x
<TD>192–223
<TR>
<TD>D
<TD>
<TD>1110
<TD>224–239
<TR>
<TD>E
<TD>
<TD>1111
<TD>240–255
<TR>
<TD COLSPAN="4"><HR>
</TABLE>
<P>Class A addresses are used for very large networks or collections of related networks. Class B addresses are used for large networks having more than 256 nodes (but fewer than 65,536 nodes). Class C addresses are used by most organizations. It’s a better idea for an organization to get several class C addresses because the number of class B addresses is limited. Class D is reserved for multicast messages on the network, and class E is reserved for experimentation and development.
</P>
<P><FONT SIZE="+1"><B>Obtaining IP Addresses</B></FONT></P>
<P>The administration of Internet addresses is currently handled by the Network Information Center (NIC):
</P>
<DL>
<DD>Network Solutions
<DD>ATTN: InterNIC Registration Services
<DD>505 Huntmar Park Drive
<DD>Herndon, VA 22070
<DD>(703) 742-4777
</DL>
<BLOCKQUOTE>
<P><FONT SIZE="-1"><HR><B>ON THE WEB: </B>You also can reach the InterNIC on the Web at <A HREF="http://www.internic.net">http://www.internic.net</A><HR></FONT>
</BLOCKQUOTE>
<P>When you connect a computer or a network to the Internet, in most cases your Internet service provider will be able to arrange for your network IP address registration.
</P>
<P><FONT SIZE="+1"><B>Obtaining RFCs</B></FONT></P>
<P>In addition to assigning addresses, the NIC can provide other information of value. It’s a repository for all technical documentation related to the Internet. It has a collection of documents that describe all the associated protocols, routing methodologies, network management guidelines, and methods for using different networking technologies.
</P>
<P>As mentioned in Table 23.1, RFC stands for Request For Comments. You can obtain RFCs from the Internet by using the FTP protocol to connect to several different repositories. The RFC series is available on the Internet via anonymous FTP from various sites, such as <A HREF="ftp.internic.net">ftp.internic.net</A> in the /rfc directory, and can also be accessed via Telnet at <B>rs.internic.net.</B></P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="466-468.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="471-474.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
</td>
</tr>
</table>
<!-- begin footer information -->
</body></html>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -