IBM CTI 2572 manual That other network nodes can access, Transmission Control Protocol TCP

Page 35
IP

UDP headers are contained in IP

 

 

 

 

 

 

 

 

 

 

IP

 

UDP

 

 

 

 

 

datagrams. Data is directed to a

 

 

 

 

DATA

 

HEADER

 

HEADER

 

 

 

 

 

 

 

 

 

 

particular process by the use of a

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

port number. In essence, a port is a

 

 

 

 

 

 

 

 

 

 

message queue for the destination

 

 

 

 

 

 

 

 

 

 

 

 

SOURCE

DESTINATION

 

 

 

 

 

 

 

application. Certain port numbers

 

 

LENGTH

CHECKSUM

DATA

 

 

PORT

PORT

 

 

 

 

 

 

 

 

 

 

 

 

may be universally assigned and are

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

called well known ports. Echo,

 

 

 

 

 

UDP

 

 

 

 

 

 

 

 

 

Time, Nameserver, and SNMP

 

(Simple Network Management

 

Protocol) use well known ports.

 

The 2572 uses well known ports so

Figure 13 UDP Datagram

that other network nodes can access

 

2572 services. In other

 

applications, the port number may be negotiated by the application software.

The UDP protocol adds to IP only the ability to distinguish among multiple destinations within a given host. Therefore, like IP, it provides unreliable conectionless delivery service. The application program must segment data into packets and must perform any error detection and recovery services that may be required.

5.5 Transmission Control Protocol (TCP)

Like UDP, TCP uses the concept of a port number to identify a process within a host computer. Unlike UDP, TCP provides a reliable connection-orientedservice. TCP is usually used where large amounts of data are being transferred (such as file transfer).

As compared to UDP, TCP adds the following functionality:

1)Stream Orientation

Using UDP, the application program places a packet of data in a single datagram. Using TCP, applications send byte streams of data which TCP software may segment into several IP datagrams. Thus, TCP hides the packetizing of data from the application program. TCP buffers the data sent from the application and attempts to build packets of optimum size.

2)Connection-Oriented Communications

Using UDP, an application program simply launches a datagram to the desired destination. With TCP, a virtual connection is established between applications before data is actually transferred. Should the connection fail (e.g. network hardware problem),

CTI 2572 Technical Overview Manual

25

Image 35
Contents Ethernet TCP/IP Adapter Module Technical Overview Page Document Disclaimer Statement Page Preface Page Table of Contents Page 802.3 Frame w/ Snap Header 10Base5 Thick Coax TopologyPage Description IntroductionSerial Redirect Server ModeClient Mode 2572 FunctionsMaster/Slave vs. Local Area Networks Local Area Network OverviewToken Ring Topology Ieee 802.5 Token-RingEthernet Topology Coax Ethernet and IeeeFuture Technologies Ieee 802.4 Token BusSummary Page ISO Reference Model Ethernet OverviewEthernet Topologies and Media Physical Layer 10BaseT Unshielded Twisted Pair UTP Bridges Foirl Fiber OpticEthernet Version 2 and Ieee 802.3 Packet Mixed MediaEthernet Protocol Data Link Layer Ethernet Version 2 standard defines the packet as follows Requirement for Higher Level Protocols Ethernet AddressesPage Connectionless Protocols Network ProtocolsConnectionless vs. Connection Oriented Protocols Common LAN Protocols Connection-Oriented ProtocolsIPX/SPX Page TCP/IP Components TCP/IP OverviewIP Address Internet ProtocolSubnet Address Mask User Datagram Protocol UDP Address Resolution Protocol ARPInternet Control Message Protocol Icmp Connection-Oriented Communications That other network nodes can accessTransmission Control Protocol TCP Stream OrientationTCP Segment Reliable Data Transfer2572 TCP/IP Support Berkeley SocketsPage Non Intelligent Terminal Protocol PLC Command InterfaceTask Codes