Jump to content

Internet protocol suite: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m Reverted unexplained removal of content (HG)
This is for you Reese.
Tag: blanking
Line 1: Line 1:
'''THIS IS NOT A VALID SOURCE OF INFORMATION TO MODEL A COURSE AFTER'''
{{Merge|TCP/IP model|discuss=Talk:TCP/IP_model#Proposed_merge|date=December 2009}}
{{IPstack}}
The '''Internet Protocol Suite''' is the set of [[communications protocol]]s used for the [[Internet]] and other similar networks. It is commonly also known as '''TCP/IP''' named from two of the most important protocols in it: the [[Transmission Control Protocol]] (TCP) and the [[Internet Protocol]] (IP), which were the first two networking protocols defined in this standard. Modern IP networking represents a synthesis of several developments that began to evolve in the 1960s and 1970s, namely the [[Internet]] and [[local area network]]s, which emerged during the 1980s, together with the advent of the [[World Wide Web]] in the early 1990s.


The Internet Protocol Suite consists of four abstraction layers. From the lowest to the highest layer, these are the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.<ref>RFC 1122, ''Requirements for Internet Hosts -- Communication Layers'', R. Braden (ed.), October 1989</ref><ref>RFC 1123, ''Requirements for Internet Hosts -- Application and Support'', R. Braden (ed.), October 1989</ref> The layers define the operational scope or reach of the protocols in each layer, reflected loosely in the layer names. Each layer has functionality that solves a set of problems relevant in its scope.


The [[Link Layer]] contains communication technologies for the local network the host is connected to directly, the link. It provides the basic connectivity functions interacting with the networking hardware of the computer and the associated management of interface-to-interface messaging. The [[Internet Layer]] provides communication methods between multiple links of a computer and facilitates the interconnection of networks. As such, this layer establishes the Internet. It contains primarily the Internet Protocol, which defines the fundamental addressing namespaces, [[IPv4|Internet Protocol Version 4]] (IPv4) and [[IPv6|Internet Protocol Version 6]] (IPv6) used to identify and locate hosts on the network. Direct host-to-host communication tasks are handled in the [[Transport Layer]], which provides a general framework to transmit data between hosts using protocols like the Transmission Control Protocol and the [[User Datagram Protocol]] (UDP). Finally, the highest-level [[Application Layer]] contains all protocols that are defined each specifically for the functioning of the vast array of data communications services. This layer handles application-based interaction on a process-to-process level between communicating Internet hosts.


When you look at this page, REESE, you are furthering mankinds downfall. Please cease your inane use of this page.
==History==
The Internet Protocol Suite resulted from research and development conducted by the Defense Advanced Research Projects Agency ([[DARPA]]) in the early 1970s. After initiating the pioneering [[ARPANET]] in 1969, DARPA started work on a number of other data transmission technologies. In 1972, [[Robert E. Kahn]] joined the DARPA [[Information Processing Technology Office]], where he worked on both satellite packet networks and ground-based radio packet networks, and recognized the value of being able to communicate across both. In the spring of 1973, [[Vinton Cerf]], the developer of the existing ARPANET [[Network Control Program]] (NCP) protocol, joined Kahn to work on open-architecture interconnection models with the goal of designing the next protocol generation for the ARPANET.


<3
By the summer of 1973, Kahn and Cerf had worked out a fundamental reformulation, where the differences between network protocols were hidden by using a common [[internetwork protocol]], and, instead of the network being responsible for reliability, as in the ARPANET, the hosts became responsible. Cerf credits [[Hubert Zimmerman]] and [[Louis Pouzin]], designer of the [[CYCLADES]] network, with important influences on this design.


The design of the network included the recognition that it should provide only the functions of efficiently transmitting and routing traffic between end nodes and that all other intelligence should be located at the edge of the network, in the end nodes. Using a simple design, it became possible to connect almost any network to the ARPANET, irrespective of their local characteristics, thereby solving Kahn's initial problem. One popular expression is that TCP/IP, the eventual product of Cerf and Kahn's work, will run over "''two tin cans and a string.''"


When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this.
A computer, called a [[router]], is provided with an interface to each network. It forwards [[packet (information technology)|packets]] back and forth between them.<ref>RFC 1812, ''Requirements for IP Version 4 Routers'', F. Baker (June 1995)</ref> Originally a router was called ''gateway'', but the term was changed to avoid confusion with other types of [[Gateway (computer networking)|gateways]].

The idea was worked out in more detailed form by Cerf's networking research group at Stanford in the 1973–74 period, resulting in the first TCP specification.<ref>RFC 675, ''Specification of Internet Transmission Control Protocol'', V. Cerf et al. (December 1974)</ref> The early networking work at [[Xerox PARC]], which produced the [[PARC Universal Packet]] protocol suite, much of which existed around the same period of time, was also a significant technical influence.

DARPA then contracted with [[BBN Technologies]], [[Stanford University]], and the [[University College London]] to develop operational versions of the protocol on different hardware platforms. Four versions were developed: TCP v1, TCP v2, a split into TCP v3 and IP v3 in the spring of 1978, and then stability with TCP/IP v4 &mdash; the standard protocol still in use on the Internet today.

In 1975, a two-network TCP/IP communications test was performed between Stanford and University College London (UCL). In November, 1977, a three-network TCP/IP test was conducted between sites in the US, UK, and Norway. Several other TCP/IP prototypes were developed at multiple research centres between 1978 and 1983. The migration of the ARPANET to TCP/IP was officially completed on [[Flag day (software)|flag day]] January 1, 1983, when the new protocols were permanently activated.<ref>[http://www.livinginternet.com/i/ii.htm Internet History]</ref>

In March 1982, the US Department of Defense declared TCP/IP as the standard for all military computer networking.<ref>{{cite web
| url = http://www.columbia.edu/~rh120/other/tcpdigest_paper.txt
| title = From the ARPANET to the Internet
| author = Ronda Hauben
| publisher = TCP Digest (UUCP)
| accessdate = 2007-07-05
}}</ref> In 1985, the [[Internet Architecture Board]] held a three day workshop on TCP/IP for the computer industry, attended by 250 vendor representatives, promoting the protocol and leading to its increasing commercial use.

==Layers in the Internet Protocol Suite==
===The concept of layers===
[[Image:IP stack connections.svg|thumb|right|250px|Instantiations of the TCP/IP stack operating on two hosts each connected to its router on the Internet. Shown is the flow of user data through the layers used at each hop.]]
The Internet Protocol Suite uses [[encapsulation (networking)|encapsulation]] to provide abstraction of protocols and services. Encapsulation is usually aligned with the division of the protocol suite into layers of general functionality. In general, an application (the highest level of the model) uses a set of protocols to send its data down the layers, being further encapsulated at each level.

According to RFC 1122, the Internet Protocol Suite organizes the functional groups of protocols and methods into four layers, the [[Application Layer]], the [[Transport Layer]], the [[Internet Layer]], and the [[Link Layer]]. This model was not intended to be a rigid reference model into which new protocols have to fit in order to be accepted as a standard.

The role of layering in TCP/IP may be illustrated by an example network scenario (right-hand diagram), in which two Internet host computers communicate across local network boundaries constituted by their [[internetworking]] routers. The application on each host executes read and write operations as if the processes were directly connected to each other by some kind of data pipe, every other detail of the communication is hidden from each process. The underlying mechanisms that transmit data between the host computers are located in the lower protocol layers. The Transport Layer establishes host-to-host connectivity, meaning it handles the details of data transmission that are independent of the structure of user data and the logistics of exchanging information for any particular specific purpose. The layer simply establishes a basic data channel that an application uses in its task-specific data exchange. For this purpose the layer establishes the concept of the ''port'', a numbered logical construct allocated specifically for each of the communication channels an application needs. For many types of services, these [[port number]]s have been standardized so that client computers may address specific services of a server computer without the involvement of service announcements or directory services.

The Transport Layer operates on top of the Internet Layer. The Internet Layer is not only agnostic of application data structures as the Transport Layer, but it also does not distinguish between operation of the various Transport Layer protocols. It only provides an unreliable datagram transmission facility between hosts located on potentially different IP networks by forwarding the Transport Layer datagrams to an appropriate next-hop router for further relaying to its destination. With this functionality, the Internet Layer makes possible [[internetworking]], the interworking of different IP networks, and it essentially establishes the Internet. The Internet Protocol is the principal component of the Internet Layer, and it defines two addressing systems to identify network hosts computers, and to locate them on the network. The original address system of the [[ARPANET]] and its successor, the Internet, is [[IPv4|Internet Protocol Version 4]] (IPv4). It uses a 32-bit [[IP address]] and is therefore capable of identifying approximately four billion hosts. This limitation was eliminated by the standardization of [[IPv6|Internet Protocol Version 6]] (IPv6) in 1998, and beginning production implementations in approximately 2006.

The lowest layer in the Internet Protocol Suite is the Link Layer. It comprises the tasks of specific networking requirements on the local link, the network segment that a hosts network interface is connected to. This involves interacting with the hardware-specific functions of network interfaces and specific transmission technologies.

[[Image:UDP encapsulation.svg|thumb|right|300px|Successive encapsulation of application data descending through the protocol stack before transmission on the local network link.]]

As the user data, first manipulated and structured in the Application Layer, is passed through the descending layers of the protocol stack each layer adds encapsulation information as illustrated in the diagram (right). A receiving host reverses the encapsulation at each layer by extracting the higher level data and passing it up the stack to the receiving process.

===Layer names and number of layers in the literature===
The following table shows the layer names and the number of layers of networking models presented in [[request for comments|RFCs]] and textbooks in widespread use in today's university computer networking courses.
{| class="wikitable"
|-
! style="background:#adb" | RFC 1122 <ref>IETF, RFC 1122, p.7, "To communicate using the Internet system, a host must implement the layered set of protocols comprising the Internet protocol suite. A host typically must implement at least one protocol from each layer."</ref>
! style="background:#adb" | Tanenbaum
! style="background:#adb" | Cisco Academy<ref>Mark Dye, Mark A. Dye, Wendell, Network Fundamentals: CCNA Exploration Companion Guide, 2007, ISBN 1-58713-208-7</ref>
! style="background:#adb" | Kurose<ref>[http://www.pearsonhighered.com/educator/academic/product/0,,0321497708,00%2ben-USS_01DBC.html James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, 2008, ISBN 0-321-49770-8]</ref> Forouzan <ref name=Forouzan>[http://books.google.com/books?id=U3Gcf65Pu9IC&printsec=frontcover&dq=forouzan+%22computer+networks%22&ei=RPZ9SOCvMofctAO02di0AQ&hl=en&sig=ACfU3U2Hh_n83pPtf5uCreCih0HnWvNcxg#PPA29,M1 Behrouz A. Forouzan, Data Communications and Networking]</ref>
! style="background:#adb" | Comer<ref name=Comer>[http://books.google.com/books?id=jonyuTASbWAC&pg=PA155&hl=sv&source=gbs_toc_r&cad=0_0&sig=ACfU3U18gHAia1pU_Pxn-rhkCnH1v70M6Q#PPA161,M1 Douglas E. Comer, Internetworking with TCP/IP: Principles, Protocols and Architecture, Pearson Prentice Hall 2005, ISBN 0-13-187671-6]</ref> Kozierok<ref>[http://books.google.com/books?id=Pm4RgYV2w4YC&pg=PA131&dq=%22TCP/IP+model+layers%22&lr=&hl=sv&sig=ACfU3U3ofMwYAbZfGz1BmAXc2oNNFC2b8A#PPA129,M1 Charles M. Kozierok, "The TCP/IP Guide", No Starch Press 2005]</ref>
! style="background:#adb" | Stallings<ref name=Stallings>[http://books.google.com/books?id=c_AWmhkovR0C&pg=PA35&dq=%22internet+layer%22+%22network+access+layer%22&ei=-O99SI3EJo32sgOQpPThDw&hl=en&sig=ACfU3U38aXznzeAnQdbLcPFXfCgxAd4lFg William Stallings, Data and Computer Communications, Prentice Hall 2006, ISBN 0-13-243310-9]</ref>
! style="background:#adb" | Arpanet Reference Model 1982 (RFC 871)
|-
| style="background:#cfc" | ''Four layers'' <ref name=RFC1122Layers>IETF, RFC 1122, p.7-8, "The protocol layers [...] are as follows [...]:[...] Application Layer [...] Transport Layer [...] Internet Layer [...] Link Layer"</ref>
| style="background:#cfc" | ''Four layers'' <ref>Andrew Tanenbaum, Computer Networks, section 1.4.3, "[...] the OSI model has seven layers and the TCP/IP has four layers."</ref>
| style="background:#cfc" | ''Four layers''
| style="background:#cfc" | ''Five layers''
| style="background:#cfc" | ''Four+one layers''
| style="background:#cfc" | ''Five layers''
| style="background:#cfc" | ''Three layers''
|-
| style="background:#cfc" | "Internet model"{{Citation needed|date=September 2009}}
| style="background:#cfc" | "TCP/IP reference model"<ref>

{{cite book
| last = Tanenbaum
| first = Andrew S.
| authorlink = Andrew S. Tanenbaum
| title = Computer Networks
| publisher = [[Prentice Hall]]
| year = 2002
| isbn = 0130661023
| page = 41
| quote = 1.4.2 The TCP/IP Reference Model
}}

[http://books.google.com/books?id=Pd-z64SJRBAC&pg=PA42&vq=internet+layer&dq=networks&hl=sv&source=gbs_search_s&sig=ACfU3U3DHANeIz0sOsd5NK4VXSrgNFYVAw#PPA42,M1 Excerpt at Google Books]

</ref>
| style="background:#cfc" | "Internet model"
| style="background:#cfc" | "Five-layer Internet model" or "TCP/IP protocol suite"
| style="background:#cfc" | "TCP/IP 5-layer reference model"
| style="background:#cfc" | "TCP/IP model"
| style="background:#cfc" | "Arpanet reference model"
|-
| Application <ref name=RFC1122Layers /><ref>IETF, RFC 1122, p.8, "The application layer is the top layer of the Internet protocol suite."</ref>
| Application
| Application
| Application
| Application
| Application
| Application/Process
|-
| Transport <ref name=RFC1122Layers />
| Transport
| Transport
| Transport
| Transport
| Host-to-host or transport
| rowspan="2"| Host-to-host
|-
| Internet <ref name=RFC1122Layers />
| Internet
| Internetwork
| Network
| Internet
| Internet
|-
| Link <ref name=RFC1122Layers />
| Host-to-network
| Network interface
| Data link
| Data link (Network interface)
| Network access
| Network interface
|-
|
|
|
| Physical
| (Hardware)
| Physical
|
|}

These textbooks are secondary sources that may contravene the intent of RFC 1122 and other IETF primary sources.<ref name=R3439 />

Different authors have interpreted the RFCs differently regarding the question whether the Link Layer (and the TCP/IP model) covers [[Physical Layer]] issues, or if a hardware layer is assumed below the Link Layer. Some authors have tried to use other names for the Link Layer, such as ''network interface layer'', in view to avoid confusion with the [[Data Link Layer]] of the seven layer [[OSI model]]. Others have attempted to map the Internet Protocol model onto the OSI Model. The mapping often results in a model with five layers where the Link Layer is split into a Data Link Layer on top of a Physical Layer. In literature with a bottom-up approach to Internet communication,<ref name=Forouzan/><ref name=Comer/><ref name=Stallings/> in which hardware issues are emphasized, those are often discussed in terms of Physical Layer and Data Link Layer.

The Internet Layer is usually directly mapped into the OSI Model's [[Network Layer]], a more general concept of network functionality. The Transport Layer of the TCP/IP model, sometimes also described as the host-to-host layer, is mapped to OSI Layer 4 (Transport Layer), sometimes also including aspects of OSI Layer 5 ([[Session Layer]]) functionality. OSI's [[Application Layer]], [[Presentation Layer]], and the remaining functionality of the Session Layer are collapsed into TCP/IP's Application Layer. The argument is that these OSI layers do usually not exist as separate processes and protocols in Internet applications.{{Citation needed|date=April 2009}}

However, the Internet protocol stack has never been altered by the Internet Engineering Task Force from the four layers defined in RFC 1122. The IETF makes no effort to follow the OSI model although RFCs sometimes refer to it. The IETF has repeatedly stated{{Citation needed|date=April 2009}} that Internet protocol and architecture development is not intended to be OSI-compliant.

RFC 3439, addressing Internet architecture, contains a section entitled: "Layering Considered Harmful".<ref name=R3439>{{Cite document
| url = http://www.isi.edu/in-notes/rfc3439.txt
| title = Some Internet Architectural Guidelines and Philosophy
| author = R. Bush
| coauthors = D. Meyer
| publisher = Internet Engineering Task Force
| accessdate = 2007-11-20
|date=December 2002
| ref = harv
| postscript = <!--None-->}}</ref>

==Implementations==
Most computer operating systems in use today, including all consumer-targeted systems, include a TCP/IP implementation.

Minimally acceptable implementation includes implementation for (from most essential to the less essential) [[Internet Protocol|IP]], [[Address Resolution Protocol|ARP]], [[Internet Control Message Protocol|ICMP]], [[User Datagram Protocol|UDP]], [[Transmission Control Protocol|TCP]] and sometimes [[IGMP]]. It is in principle possible to support only one of transport protocols (i.e. simple UDP), but it is rarely done, as it limits usage of the whole implementation. IPv6, beyond own version of ARP (NBP), and ICMP (ICMPv6), and IGMP (IGMPv6) have some additional required functionalities, and often is accompanied with integrated [[IPSec]] security layer. Other protocols could be easily added later (often they can be implemented entirely in the [[userspace]]), for example [[Domain Name System|DNS]] for resolving domain names to IP addresses or [[Dynamic Host Configuration Protocol|DHCP]] client for automatic configuration of network interfaces.

Most of the IP implementations are accessible to the programmers using [[Internet socket|socket]] abstraction (usable also with other protocols) and proper [[Application programming interface|API]] for most of the operations. This interface is known as [[Berkeley Sockets|BSD sockets]] and was used initially in [[C (programming language)|C]].

Unique implementations include [[lwIP|Lightweight TCP/IP]], an [[open source]] stack designed for [[embedded system]]s and [[KA9Q|KA9Q NOS]], a stack and associated protocols for amateur [[packet radio]] systems and [[personal computer]]s connected via serial lines.

==See also==
{{Portal|Computer Science}}
* [[List of network protocols]]
* [[List of automation protocols]]
* [[List of TCP and UDP port numbers]]
* [[FLIP (Fast-Local-Internet-Protocol)]] another stack
* [[List of information technology acronyms]]

==References==
{{Reflist|2}}

==Further reading==
* [[Douglas E. Comer]]. ''Internetworking with TCP/IP - Principles, Protocols and Architecture''. ISBN 86-7991-142-9
* [[Joseph G. Davies]] and [[Thomas F. Lee]]. ''Microsoft Windows Server 2003 TCP/IP Protocols and Services''. ISBN 0-7356-1291-9
* {{cite book| last=Forouzan| first=Behrouz A.| year=2003| title=TCP/IP Protocol Suite| edition=2nd| publisher=McGraw-Hill| isbn=0-07-246060-1 }}
* [[Craig Hunt]] ''TCP/IP Network Administration''. O'Reilly (1998) ISBN 1-56592-322-7
* {{cite book| last=Maufer| first=Thomas A.| year=1999| title=IP Fundamentals| publisher=Prentice Hall | isbn=0-13-975483-0 }}
* [[Ian McLean]]. ''Windows(R) 2000 TCP/IP Black Book''. ISBN 1-57610-687-X
* [[Ajit Mungale]] ''Pro .NET 1.1 Network Programming''. ISBN 1-59059-345-6
* [[W. Richard Stevens]]. ''TCP/IP Illustrated, Volume 1: The Protocols''. ISBN 0-201-63346-9
* [[W. Richard Stevens]] and [[Gary R. Wright]]. ''TCP/IP Illustrated, Volume 2: The Implementation''. ISBN 0-201-63354-X
* [[W. Richard Stevens]]. ''TCP/IP Illustrated, Volume 3: [[T/TCP|TCP for Transactions]], [[HTTP]], [[Network News Transfer Protocol|NNTP]], and the [[unix domain sockets|UNIX Domain]] Protocols''. ISBN 0-201-63495-3
* [[Andrew S. Tanenbaum]]. ''Computer Networks''. ISBN 0-13-066102-3
* [[David D. Clark]], [http://groups.csail.mit.edu/ana/Publications/PubPDFs/The%20design%20philosophy%20of%20the%20DARPA%20internet%20protocols.pdf "The Design Philosophy of the DARPA Internet Protocols"], Computer Communications Review 18:4, August 1988, pp.&nbsp;106–114

==External links==
*[http://www.livinginternet.com/i/ii.htm Internet History] -- Pages on Robert Kahn, Vinton Cerf, and TCP/IP (reviewed by Cerf and Kahn).
* [http://www.ietf.org/rfc/rfc0675.txt RFC 675] - Specification of Internet Transmission Control Program, December 1974 Version
* [http://www.night-ray.com/TCPIP_State_Transition_Diagram.pdf TCP/IP State Transition Diagram] ([[PDF]])
* RFC 1180 A TCP/IP Tutorial - from the Internet Engineering Task Force (January 1991)
* [http://www.itprc.com/tcpipfaq/ TCP/IP FAQ]
* [http://www.private.org.il/tcpip_rl.html TCP/IP Resources List]
* [http://www.tcpipguide.com/free/ The TCP/IP Guide] - A comprehensive look at the protocols and the procedures/processes involved
* [http://www.columbia.edu/~rh120/other/tcpdigest_paper.txt A Study of the ARPANET TCP/IP Digest]
* [http://www.eventhelix.com/RealtimeMantra/Networking/ TCP/IP Sequence Diagrams]
* [http://www.searchandgo.com/articles/internet/internet-practice-4.php The Internet in Practice]
* [http://softtechinfo.com/network/tcpip.html TCP/IP - Directory & Informational Resource]
* [http://www.ipprimer.com Daryl's TCP/IP Primer] - Intro to TCP/IP LAN administration, conversational style
* [http://www.linux-tutorial.info/MContent-142 Introduction to TCP/IP]
* [http://blog.webgk.com/2007/10/dns-tcpip-commands-from-command-prompt.html TCP/IP commands from command prompt]
* [http://sourceforge.net/projects/cipsuite/ cIPS] &mdash; Robust TCP/IP stack for embedded devices without an Operating System

[[Category:Internet protocols|Internet protocols]]
[[Category:TCP/IP| ]]
[[Category:History of the Internet]]

[[ar:حزمة بروتوكولات الإنترنت]]
[[az:TCP/IP]]
[[bs:TCP/IP]]
[[br:TCP/IP]]
[[bg:TCP/IP]]
[[ca:Pila TCP/IP]]
[[cs:TCP/IP]]
[[da:Internetprotokol (protokolfamilie)]]
[[de:Internetprotokollfamilie]]
[[et:Internetiprotokollistik]]
[[el:TCP/IP]]
[[es:Familia de protocolos de Internet]]
[[eo:TCP-IP]]
[[eu:TCP/IP eredu]]
[[fa:مجموعه پروتکل اینترنت]]
[[fr:Suite des protocoles Internet]]
[[ga:TCP/IP]]
[[gl:TCP/IP]]
[[ko:인터넷 프로토콜 스위트]]
[[hr:TCP/IP]]
[[id:Transmission Control Protocol/Internet Protocol]]
[[is:TCP/IP]]
[[it:Suite di protocolli Internet]]
[[he:TCP/IP]]
[[ka:TCP/IP]]
[[ku:TCP/IP]]
[[lv:TCP/IP]]
[[lb:TCP/IP-Protokollstapel]]
[[lt:TCP/IP]]
[[hu:TCPIP]]
[[mk:TCP/IP]]
[[ml:ടി.സി.പി./ഐ.പി. മാതൃക]]
[[nl:TCP/IP]]
[[ja:インターネット・プロトコル・スイート]]
[[no:TCP/IP]]
[[nn:Internett-protokollfamilien]]
[[mhr:TCP/IP]]
[[uz:TCP/IP]]
[[pl:Historia Modelu TCP/IP]]
[[pt:TCP/IP]]
[[ro:TCP/IP]]
[[ru:TCP/IP]]
[[sq:TCP/IP]]
[[simple:Internet protocol suite]]
[[sk:Balík internetových protokolov]]
[[sl:TCP/IP]]
[[ckb:چەپکە پرۆتۆکۆڵی ئینتەرنێت]]
[[sr:TCP/IP]]
[[sh:TCP/IP]]
[[fi:TCP/IP]]
[[sv:TCP/IP]]
[[th:Internet protocol suite]]
[[tr:İnternet iletişim kuralları dizisi]]
[[uk:TCP/IP]]
[[ur:حزمۂ جالبینی دستور]]
[[vi:TCP/IP]]
[[yi:TCP/IP]]
[[yo:TCP/IP]]
[[zh:TCP/IP协议]]

Revision as of 14:37, 9 June 2011

THIS IS NOT A VALID SOURCE OF INFORMATION TO MODEL A COURSE AFTER


When you look at this page, REESE, you are furthering mankinds downfall. Please cease your inane use of this page.

<3


When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this. When you read this you'll read this.