Solved

tcp/ip

Posted on 2004-05-01
8
388 Views
Last Modified: 2013-11-29
identify and briefly disscuss the advantages and disadvantages of using TCP/IP?
0
Comment
Question by:snazzyBone
8 Comments
 
LVL 37

Expert Comment

by:bbao
ID: 10966757
hi, are you a student? is it your assignment? :)
0
 
LVL 4

Expert Comment

by:zinno
ID: 10967157
its abvious, he is not a student :P

TCP/IP is not a 7 layers OSI model
limited IP range (number of connections)
provides low security because its easy to spoof
bad range assignement

advantages widthly used for networks around the world

0
 
LVL 2

Accepted Solution

by:
dungsusu earned 20 total points
ID: 10967275
The Transmission Control Protocol (TCP) and the Internet Protocol (IP) together form the basis for TCP/IP, a low-level driver that lets computers talk to each other using a network of almost any size. The Internet is connected using TCP/IP as its foundation.

Hi,
The brief information below is for you to understand about TCP/IP in brief, pls do not hesitate to contact me if you need further:

TCP/IP was proposed in 1973. Nine years later, in 1983, a standardized version of the protocol was developed and adopted for wide-area use. In 1983, it also became mandatory that all connections to ARPAnet, the Department of Defense’s predecessor to today’s Internet, be made with TCP/IP.

TCP/IP was developed to solve several problems in moving data from point A to point B. The most important requirement was to guarantee delivery of data on a network that might be under attack from a foreign power. Because the Department of Defense (DoD) developed the Internet, this requirement was paramount and fairly predictable. If an enemy were to attack the military’s computer systems and networks, data must continue to flow, secure and unhampered. The other established requirements were that data be moved efficiently and that its arrival be verified — yet the sending machine might not have any of the same operating characteristics as the receiving machine. TCP and IP both perform unique and vital functions that solve all the problems in moving data between machines over networks.

regs
dungsusu
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 
LVL 2

Expert Comment

by:dungsusu
ID: 10967312
About advantages and disadvantages you mentioned, some experts said that:

TCP/IP is an ever-evolving family of protocols. With the explosion of the Internet, we are seeing some of the limitations of this protocol suite. One problem in particular is that we will soon run out of usable IP addresses under the current specification, with so many new connections to the Internet being built and installed every day. Another major issue is security. Both of these serious problems are being addressed by various consortia that are quickly finding the answers. Let’s look at one of the foremost proposed solutions because it is likely to become a integral part of the protocol suite in the very near future.

The current version of the IP protocol is version 4, or IPv4, and the next generation, IPv6 or IPng (IP next generation), is set to become formally adopted. IPng was recommended by the IPng Area Directors of the Internet Engineering Task Force (IETF) at the Toronto IETF meeting held on July 25, 1994, as documented in RFC 1752, "The Recommendation for the IP Next Generation Protocol." (Request for Comments (RFCs) are a standard way to propose and debate the merits of any significant change or modification to a standard involving TCP/IP and the Internet in an open forum.) IPng was approved by the Internet Engineering Steering Group and made a Proposed Standard on November 17, 1994. The core set of IPng protocols was made an official IETF Proposed Standard on September 18, 1995.

Hope these information help you alot
dungsusu
0
 
LVL 37

Expert Comment

by:bbao
ID: 10968408
advantages: it is simple and open, so it has been widely used and supported.
disadvantages: it is simple and open, so too many vulnerabilities found in TCP/IP protocols and upper applications, especially for those traditional applications.
0
 
LVL 11

Expert Comment

by:gothicbloody
ID: 10968698
try this :d
www.protocols.com
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I had an issue with InstallShield not being able to use Computer Browser service on Windows Server 2012. Here is the solution I found.
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question