Xem 1-20 trên 300 kết quả Using tcp
  • With some 200 million hosts generating traffic on the Internet, TCP/IP (transmission control protocol/Internet protocol) has become the protocol suite of choice to support the exchange of messages in commercial operations and residential activities. This hands-on resource provides professionals with a comprehensive picture of the Internet protocol stack and the role of TCP/IP in data communication. It serves as a detailed guide to the protocols, networks, codes, signals, and equipment that make it possible to communicate using TCP/IP.

    pdf275p ken333 06-07-2012 59 18   Download

  • TCP/IP model development: The late-60s The Defense Advance Research Projects Agency (DARPA) originally developed Transmission Control Protocol/Internet Protocol (TCP/IP) to interconnect various defense department computer networks. The Internet, an International Wide Area Network, uses TCP/IP to connect networks across the world.

    pdf15p dmptit 02-11-2010 113 15   Download

  • This book describes the TCP/IP protocol suite, but from a different perspective than other texts on TCP/IP. Instead of just describing the protocols and what they do, we'll use a popular diagnostic tool to watch the protocols in action. Seeing how the protocols operate in varying circumstances provides a greater understanding of how they work and why certain design decisions were made. It also provides a look into the implementation of the protocols, without having to wade through thousands of lines of source code....

    pdf590p nanginfor 17-10-2009 331 107   Download

  • The TCP/IP protocol suite has become the de facto standard for computer communications in today's networked world. The ubiquitous implementation of a specific networking standard has led to an incredible dependence on the applications enabled by it. Today, we use the TCP/IP protocols and the Internet not only for entertainment and information, but to conduct our business by performing transactions, buying and selling products, and delivering services to customers.

    pdf1004p chelsea2501 14-11-2009 158 70   Download

  • As you might imagine, Teach Yourself TCP/IP in 14 Days provides a rapid introduction to the TCP/IP protocols and to a few commonly used applications that are built on top of them. The discussion is very lucid and emphasizes the fundamental concepts behind a given protocol; it does a good job of not letting the mass of details obscure the reasoning. Each section ends with a quiz and series of questions (and answers), so you can test your knowledge of each topic. The book also includes useful sections on sample installations and a nice discussion of sockets. As an added...

    pdf487p nguyen5 24-11-2009 145 55   Download

  • Today people use computers to make phone calls, watch TV, send instant messages to their friends, play games with other people, and buy most anything you can think of—from songs to automobiles. The ability of programs to communicate over the Internet makes all this possible. It’s hard to say how many individual computers are now reachable over the Internet, but we can safely say that it is growing rapidly; it won’t be long before the number is in the billions. Moreover, new applications are being developed every day.

    pdf196p trandung45 17-03-2013 19 13   Download

  • Introduction to TCP/IP Networking Network Model TCP/IP Terms Host Names Internet Addresses Subnet Addresses Internet Addresses to host name mapping Quiz# 1 Routing TCP/IP Daemons TCP/IP Information files TCP/IP Local Information files ifconfig mkhosts route Quiz# 2 TCP installed links Internet Services Common internet services error messages Trouble shooting commands ping netstat Trouble shooting Techniques Introduction to TCP/IP .

    pdf37p possibletb 29-11-2012 42 12   Download

  • The primary duties of the transport layer, Layer 4 of the OSI model, are to transport and regulate the flow of information from the source to the destination, reliably and accurately. End-to-end control and reliability are provided by sliding windows, sequencing numbers, and acknowledgments To understand reliability and flow control, think of someone who studies a foreign language for one year and then they visit the country where that language is used.

    ppt40p trinhvang 18-01-2013 32 9   Download

  • n just 24 lessons of one hour or less, you will uncover the inner workings of TCP/IP. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of TCP/IP from the ground up. Practical discussions provide an inside look at TCP/IP components and protocols. Step-by-step instructions walk you through many common tasks. Q&As at the end of each hour help you test your knowledge.

    pdf545p stingdau_123 19-01-2013 24 8   Download

  • The PortNumber value entry under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\TerminalServe r\WinStations\RDP-Tcp\PortNumber 2.

    pdf7p kisiheo 26-07-2010 38 6   Download

  • Explain the purpose and use of seed metrics in route redistribution. Describe how to redistribute routes into RIP, OSPF, EIGRP, and IS-IS. Explain how to verify route redistribution. Explain how to control routing updates using the passive-interface default command and route maps. Describe new DHCP commands.

    pdf83p danhson1409 02-12-2010 47 6   Download

  • Applications Using IP No discussion of TCP/IP would be complete without a look at the applications that use IP.

    pdf3p chutieuchuathieulam 23-07-2010 64 5   Download

  • Objectives: Identify TCP Header Fields and Operation Using a Wireshark FTP Session Capture, Identify UDP Header Fields and Operation Using a Wireshark TFTP Session Capture.

    doc14p kinhadthu 14-08-2015 15 5   Download

  • Objectives: Prepare Wireshark to Capture Packets Part 2: Capture, Locate, and Examine Packets. Background/Scenario: In this lab, you will use Wireshark to capture and examine packets generated between the PC browser using the HyperText Transfer Protocol (HTTP) and a web server.

    doc6p kinhadthu 14-08-2015 13 4   Download

  • When you finish this chapter, you should: Be able to explain process-to-process communication, know the format of a UDP user datagram, be able to calculate a UDP checksum, understand the operation of UDP, know when it is appropriate to use UDP, understand the modules in a UDP package.

    ppt30p tangtuy09 26-04-2016 3 2   Download

  • This chapter is an introduction to the application layer. In the next eight chapters we introduce common client-server applications used in the Internet. In this chapter, we give a general picture of how a client-server program is designed and give some simple codes of their implementation. The area of network programming is a very vast and complicated one; it cannot be covered in one chapter. We need to give a bird’s-eye view of this discipline to make the contents of the next eight chapters easier to understand.

    ppt20p tangtuy09 26-04-2016 12 2   Download

  • The Hypertext Transfer Protocol (HTTP) is a protocol used mainly to access data on the World Wide Web. HTTP functions like a combination of FTP and SMTP. This chapter provides knowledge of Hypertext Transfer Protocol (HTTP): HTTP transaction, request message, response message, header, examples, some other features.

    ppt25p tangtuy09 26-04-2016 7 2   Download

  • Mobile communication has received a lot of attention in the last decade. The interest in mobile communication on the Internet means that the IP protocol, originally designed for stationary devices, must be enhanced to allow the use of mobile computers, computers that move from one network to another.

    ppt26p tangtuy09 26-04-2016 10 2   Download

  • Real-time Transport Protocol (RTP) is the protocol designed to handle real-time traffic on the Internet. RTP does not have a delivery mechanism (multicasting, port numbers, and so on); it must be used with UDP. RTP stands between UDP and the application program. The main contributions of RTP are timestamping, sequencing, and mixing facilities. This chapter provides knowledge of RTP and RTCP.

    ppt29p tangtuy09 26-04-2016 10 2   Download

  • Biggest problem is figuring out who a piece of mail is really from Must use a higher level mechanism for trust or privacy Most SMTP clients use sendmail which has been a constant source of security problems for years

    ppt15p muathu_102 28-01-2013 18 1   Download

Đồng bộ tài khoản