Xem mẫu
- Networks and Telecommunications: Design and Operation, Second Edition.
Martin P. Clark
Copyright © 1991, 1997 John Wiley & Sons Ltd
ISBNs: 0-471-97346-7 (Hardback); 0-470-84158-3 (Electronic)
22
Electronic Mail, Znternet and
Electronic Message Services
The ability to connect two computers together and, with relative ease, to send information from
one to the other, is bringing a revolution in the way in which business and life as a whole is
conducted. Today it is possible to run your bank account from home, book your holiday, send
electronic messages to your work colleagues or friends, and look up to see what is on at the
theatre in London orNew York City.Alternatively companies may make their orders to and pay
their bills from their suppliersby computer program and‘electronic data interchange’. A number
of
technologies enabled revolution:
have this videotext,
electronic electronic
mail, data
interchange (EDI) and Internet. We review the telecommunication aspects of these technologies
in this chapter.
22.1 VIDEOTEXT
Videotext was the first type of device specially designed to allow telephone network
customers to use a cheap device to access information from a large public database. The
original technology and standards, including special terminals and modem techniques
allowing asymmetric transmission (a high bitrate channel for information download to
the customer with a low speed control channel for his ordering of different pages of
information) have now been overtaken by modern personal computer based technology,
but the appearance of the worldwide Internet has stimulated recent rapid growth for
the long established videotext service providers (British Telecom’s Prestel, Deutsche
Telekom’s Bildschirmtext, BtX or Datex-J, and France Telecom’s Minitel).
The idea of videotext is that, using a low cost terminal in the form of a small tele-
vision, a customer can make a phonecall to a public central database, where he could
access all sorts of pages of information which he could then have displayed on his
screen. Thus, for example, he might access tomorrow’s weather forecast, current flight
arrival information, information about financial markets, about holiday offers, about
dating services or, via an extended connection to the railway company or his bank,
might even order a train ticket or pay his bills.
399
- 400 ELECTRONIC
INTERNET
MAIL, AND ELECTRONIC
MESSAGE
SERVICES
Videotextinitsoriginal form in theUnitedKingdom(as Prestel) was quickly
accepted by the travel industry, which used it widely as a means for holiday companies
to advise travel agents of available itineraries and to book tickets on behalf of clients.
It came at a time of revolutionary computerization of the airline industry in particular,
when simultaneously the airlines were cooperating to establish and operate common
and inter-linked computer ticket and booking systems.
In France, videotext became the standard method for telephone directory enquiries.
The Minitel terminals were given away free by France Telecom. They justified doing
this initially by the cost savings brought about by fewer telephone enquiries to human
operators, but nowadays they also make money from the telephone calls which cus-
tomers are making to the other information services which have subsequently sprung
up. Some services, including the pink pages of dating services, are world renowned.
In Germany, the Deutsche Telekom’s(formerlyDeutscheBundespost’s) T-Online
service (the new name for the modern version of Bildschirmtext, Btx or Datex-J) had
been a commercial non-runner for years. Suddenly, however, during 1995 demand for
connections started to increase rapidly. The reason was the cheap availability of access
to the Internet using standard personal computers. It is the Internet which has become
the world’s electronic noticeboard. We discuss it later in this chapter.
22.2 ELECTRONIC MAIL (E-MAIL)
Electronic mail (e-mail) is a reliable means of message communication between human
users equipped with computer terminals or personal computers. Large tracts of text, and
diagramstoo,can bequicklydeliveredacrossgreatgeographicaldistances, and if
necessary printed to ahigh quality paper format using local computer printing resources.
To send an e-mail, a user simply callsup the electronic mail software on his terminal.
This prompts him for the name of the user that he wishes to send his message to, and
for the names of any individuals to whom the message is to be copied. Having filled in
this information, it prompts him to type the main text of the message. If he wishes, the
sender can add further electronic attachments (say a document previously created using
his word processor, his spreadsheet program or presentation software).
Once the e-mail is ready for sending, the sender simply clicks his mouse on the ‘send’
button. At this point, may be asked to set a priority rating for the message, decide
he to
whether confirmation of receipt is required, and (optionally) to set an exact time and
datefor delivery (if not to beimmediate;thisfeature can be usedasareminder
function, for example by sending time-delayed messages to himself). The delivery into
the electronic mailboxes of the intended recipients is almost immediate.
Should any of the recipientsbe at their computer terminalsat the time of the message
receipt in their mailbox, then they may be advised of its arrival (say by a beeping noise
and a short message or icon displayed at the bottom of their computer screen). They
havethe option to readthe message immediately or later, depending on how they
regard its priority. Those recipients who are not concurrently using their terminalswill
be advised of the message next time they log on. As messages are read, confirmation is
returned tothe sender (if required).Eachrecipienthasthechoicetoreplytothe
message, forward it, file it, print it out, amend it or delete it.
- ELECTRONIC MAIL (E-MAIL) 401
Electronic mail systems are usually constructed in aclientlserver configuration. The
client is the human user and his personal computer, workstation or other computer
terminal.The client preparesandreadselectronic messages. The client software
prepares the e-mail for submission to the server or post ojice. The post ojice has a
distribution function forelectronic mail similar to the function of the postal service for
letter mail (Figure 22.1).
The client software for electronic mail usually runs on a personal computer, and
normally has software interfaces to othersoftware such as word processing software,
PC
spreadsheet software and presentation software, so enabling easy attachment of such
software to e-mail messages. Thus, for example the Microsoft package of software
Office
includes Microsoft Word, Excel, Powerpoint and Microsoft Mail software. Together
theseallowapersonalcomputeruser topreparevarioustypes of differenttext,
spreadsheet and presentation documents and submit them to an electronic mail post
office as e-mail messages.
The post office function which forms the core of electronic mail usuallyresides on a
server, often nowadays connected to the individual PCsmeans of aLAN (local area
by
network), though other types of X.25 packet network or dial-up connection are also
possible. The postoffice is a combination of software and hardware, capable storingof
e-mail messages, sorting them and transmitting them. The post office function works
both on a store-and-forward and store-and-retrieve fashion. At the sending end, the
user submits his message to the post office (post office A of Figure 22.1). This post
office temporarilystorestheentire messagewhileitexamines theaddress of the
intended destination and establishes a communication means to the post office (post
office B) serving the destination user. The communication means may take any number
ofdifferent forms (X.25, telephone connection, internet connection etc.). Once the
lower layer connection is established between origin and destination post office, or
between originpost office andintermediate(transit)post office, thehigherlayer
protocol (i.e. OS1 layer 7 protocol for electronic mail (e.g. ITU-T X.400, SMTP or
equivalent)) takes over, to ensure the appropriate relay entiremessage to the next
of the
post office. In each post office along the way, the message is stored and forwarded in
this way.
- 402 ELECTRONIC
INTERNET
MAIL, AND ELECTRONIC
MESSAGE
SERVICES
Finally, at the destination post office, the message is stored in the electronic mailbox
of the destination user until that user retrieves it. Thisis done when he logs into his own
electronic mailbox account to read or send messages.
ITU-T, in its X.400-series of recommendations, specifies a message handling system
(MHS) for use as anOS1 layer 7 protocol in supportof electronic mail. Thisis described
in detail in Chapter 23. MHS defines P1 and P3-interfaces for relay and submission/
delivery respectively. In reality, however, the P1-interface has proved to be the more
important of these two, since this is the interface which allows electronic mail servers
(post offices) to inter-communicate with one another. Thus the electronic mail systems
of different companies, and maybe supplied by different software manufacturers are
able to transfer e-mails between themselves. This is the X.400-interface talked of by
electronic mailsoftwaresuppliers.TheP3-interface is only needed when aremote
electronic mail user (client) wishes to submit or receive electronic mail messages directly
from a post office operated by a public X.400-based electronic mail service provider.
As, however, most electronic mail systems and post offices are based on corporately
operated sytems, it is usual for client and post o@ce (server) software to be provided by
the same supplier (e.g. Microsoft mail or Ccmail). In this case, it is not necessary for
the software manufacturer to use the P3-interface, and instead a proprietary interfaceis
employed.
An alternativeto the of the
use X.400 interfaces for inter-post-office interfaces is the use
of the Internet. The Internet interface looks likely to become the predominant interface. E-
mail based on the Internet is already firmly established in North America, and is fast
supplanting X.400 where this already exists (mainly in Europe).
In addition to the X.400 and Internet-based electronic mail systems, a number of
other proprietary systems have emerged. One of the first was introduced by Compu-
serve, one of the world market leadersin on-line services. Compuserve createdthe
capability for companies and private individuals, from their personal computers, to
access database information and send messages between one another. Its success has
been largely based on being the first company to establish a worldwide user group for
electroniccommunication.Currentlyitappears to bere-positioning toencompass
Internettechnology. Microsoft, on the other hand, has chosen to build a Microsoft
mail capability into its Windows95 operating system software for personal computers.
This client capability can be used either in conjunction with a corporate post ofice, or
alternatively,may use the Microsoft Network (MSN), apublic post o@ce network
operated worldwide by MicrosoftCorporation.The initiative lays downatough
challenge for other X.400- and Internet-based electronic mail service providers.
22.3 ADDRESSING SCHEMES FOR ELECTRONICMAIL
Three main types of addressing scheme are used nowadays forelectronic mail. These are
e proprietaryaddressing schemes
e Internet-basedelectronicmailaddresses
e X.500 addresses (for the X.400 message handling system)
- THE ADVANTAGES AND DISADVANTAGES OF E-MAIL 403
Proprietary addressingschemes are normally employed within a corporation’s electronic
mail environment. The form of these addresses is often determined by the corporation
itself, within the bounds set by the software product on which the system is based.
Internet-based electronic mail addresses (correctly SMTP addresses) usually take a
numerical form, punctuated with dashes (-), dots ( . ) and @ signs (e.g. 12345.67890
@compuserve.com). More commonly nowadays, an alias address appears on business-
men’s visiting cards, e.g. Martin.Clark@serviceprovider.corporation. This form allows
for easy recognition and memory of the address.
X.500 addresses are less common, but form the basis of the ITU and I S 0 directory
service and are used in X.400 electronic mail networks. We describe theX.500 address-
ing scheme in Chapter 28.
22.4 THE ADVANTAGES AND DISADVANTAGES OF E-MAIL
E-mail messages are delivered quickly. Broadcasting of messages is also quickly and
easily achieved. Editing of text and returning or forwarding the amended version can be
achieved with minimal re-typing. Messages can be filed and quickly retrieved later.
Messages can be posted for exactly timed delivery, and can be prioritized according
to the urgency with which they need to be dealt with. Furthermore, users are able to
check their electronic mailboxes even when they are away from their normal offices,
either by using somebody else’s terminal or perhaps by dialling in to the post office
using a portable laptop computer from a hotel room.
The Internet, in particular, has done a lotto release the full power of electronic mail,
of
by enabling a large worldwide community computer users to inter-communicate elec-
tronically, thus destroying the previous communication boundaries between companies
and overcoming all the barriers of geography and time zones.
Companies have
who successfully introducedelectronic have
mail observed a
beneficial change in the whole culture how they do business. Questions and responses
of
have been much quicker and more direct, messages have been much shorter and less
formal; have typed
they been by the managers ratherthan by theirsecretaries.
Workgroups composed of members in widespread locations have evolved, and it is
possible to draw together new teams for previously impossible tasks.
22.5 EDI: CORPORATE COMMUNICATION WITH CUSTOMERS
ANDSUPPLIERS VIA E-MAIL
Where electronic
mail is used as basis
the of formal
communications between
companies for orders, payments and confirmations, it is termed instead electronic data
interchange (EDZ). EDI between companies has become an important wayof doing
business. Many manufacturers and retailers demand that their suppliers accept orders
for goods electronically. This gives the scope for more frequent ordering(in the case of
so
supermarkets, for example, daily based on yesterday’s sales) and maintain their shelf
stocks (and value of stocks) at a minimum level. This is just-in-time (JZT) provision.
- 404 ELECTRONIC
MAIL, INTERNET AND ELECTRONIC
MESSAGE
SERVICES
Not onlythebuyerbenefits,butalsothesupplier can ensure that products on the
shelves with his name on are fresher and closer to their best. Even more important for
the supplier, EDI allows him to bill for the goods more quickly.
The most important standards defining theformat and content messages for elec-
of of
tronic data interchange (EDI) are those published by the United Nations as EDIFACT
(electronic data interchange for administration, commerce and transport), but there also
are a number of regional, national and industry-specific standards (e.g. Odette used by
the automobile industry).
EDI products are available in ready-packaged software solutions for integration into
a company’s existing computer and electronic mail set-up. Specialized service providers
have also appeared in several countries concentrating on the communication needs of
companies within a specific industry segment. In this way, a community of interest may
be established forcommunicationbetweencustomersandsuppliers(forexample,
within the retailing industry or the car manufacturing industry).
Setting up a network and software for EDI is actually quite straightforward. What is
much harder, and what the company therefore needs to be prepared for, is the adjust-
ment of its culture and practices to an entirely new way of business, one requiringmuch
quicker reaction to customer demands.
22.6 INTERNET
The Internet emerged from a United States governmentand military initiative to enable
the interconnection of different, mainly UNIX-based computer systems for intercom-
munication. As UNIX was proclaimed to be the first ‘portable’ operating system for
computers,enablingsoftwaredevelopedonaparticularmanufacturer’scomputer
hardware to be easily ported (i.e. transferred for operation) to another manufacturer’s
hardware,itwasnaturalalso to developmeansfor easy transfer of data between
systems. This led to TCPjlP (transport control protocollinternet protocol).
TCP/IP was quickly adopted by the academic community in the United States, and
soonafterwards by academicsworldwide,because it allowed forrapidsharing of
scientific information and the electronic mail communication necessary for its rapid
discussion and analysis, both within and between university campuses. A worldwide
community of inter-linked computers rapidly emerged. Finally, businesses recognized
as
the potential of the Internet as a large interconnected groupelectronic mail usersand
of
noticeboard readers, theybegan to exploit it communication marketing
for and
purposes. Though the Internet does not have the rigid structure, network management
and security controls of other public telecommunication network services, it has a very
persuasive appeal; there are already plenty of people to communicate with. This has
driventheexplosivegrowthinnumbers of registered Internet users and pages of
information.
In its original form, the Internet and the internet protocol (IP) provided a means for
interconnecting computer servers (typically UNIX computers) together. The internet
addressing scheme allowed individual workstations, personal computers or software
or on
applications running on either the server anyof the workstations to direct and send
information to other applications on other servers or distant LANs. Being a unique
- TCP/IP PROTOCOL 405
address, the Internet address allowed an end user to be identified, no matter how many
transit servers, routers or networks would have to be traversed along the way (Figure
22.2). The single network address of the destination port in the destination network does
not suffice, because the intermediate networks are unable torecognize this address.
A suite of new protocols arrived withInternet. Among others, these included S M T P
(simple mail transport protocol), TFTP (trivial $le transfer protocol) and FTP ($le
transfer protocol), which together form the basis the Internet electronic mail service.
of
As the popularity of Internet has grown, so have the number of servers and routers
makingupthenetwork.New Internet service providershaveprovidedfordial-up
access tothe servers fromprivateindividualsusingtheirPCs athome,and new
information providers have provided more Internet pages of information. The Netscape
browser, a computer software allowing users to ‘surf theInternet and World Wide Web
( W W W ) , by seeking information from any of the connected servers by means of a
menu-driven screen software which drives a hypertext search and browse capability.
However, the reason for the rapid growth of the Internet also provides a major
challenge for the next stage of its development. The factor enabling rapid growth was
the possibility to add further servers and routers to the network at almost any point
in the network without considering a master plan. The number of Connected devices
could therefore rapidly increase, as the routers (Chapter 19) are always able tofind the
desired destination somehow. The problem is the lack of control (and even lack of
knowledge) of the path taken. Thetraffic flo& in the network as a whole are therefore
largely unmanaged unmanageable.
and The onlysolution to slow response or
congestion can be to add more capacity. Whether this capacity is added at the most
appropriate point is a matter of chance.
Messages within the Internet may go undelivered without trace for any number of
reasons, and there is no record of whether electronic copies of information have been
retained by any of the intermediate parties. Much attention is currently being focussed
by the computer industry on solving the security and network management difficulties
of the Internet, to stimulate a further surge in demand.
22.7 TCP/IP
PROTOCOL STACK
Figure 22.3 illustrates the various protocols going to make the TCPIIP stack.At the
up
heart are the Internet protocol (IP), which is equivalent to an OS1 layer 3 network
- 406 ELECTRONIC
INTERNET
MAIL, AND ELECTRONIC
MESSAGE
SERVICES
OS1 layer
7 x- TELNET SMTP FTP NFS RPC TFTP
windows (File (Simple (Simple file (Network (Remote (Tr
6 transfer mail network transfer procedure file server)
protocol) transfer managem call) protocol)
5 protocol ent
protocol)
4 TCP UDP
ICMP 3 ARP Gateway protocols
IP EGP BGP
2 (PPP) SLIP SNAP
1 network
LLC (e.g.
Ethernet LAN) Serialetc.
Frame
line
physical
Relay
I
ARP = Address resolution protocol
BGP = Border gateway protocol
EGP = Edge gateway protocol
ICMP = Internet control message protocol
IP = lnternet protocol
LLC = Logical link control (for LANs)
PPP = Point-to-point protocol
RARP = Reverse address resolution protocol
SLIP = Serial line internet protocol
TCP = Transmission control protocol
UDP = User datagram protocol
Figure 22.3 TCP/IP protocol stack and associated applications
protocol, and the transport control protocol ( T C P ) an approximate equivalent of OS1
layer 4. Also very importantfor somecommonmultivendorcomputer-networked
applications is the UDP (user datagram protocol).
The Internet protocol is a network layer-like protocol, typically running across an
ethernet LAN or between LANs via a router network (say comprising inter-router con-
nections running on framerelay). The benefit, however, of IP over OS1 layer 3 protocols
is that Internet addresses are widely used in, andareunique across, all computer
networksworldwide.This gives thepotentialforasoftwareapplicationora user
connectedanywhereintheworld tothe Internet to access any other computer or
software application.
The transport control protocol ( T C P ) is usually used in conjunction with IP and
ICMP (internet control message protocol) to guarantee reliable transmission. On an
end-to-endbasis, TCP ensurescorrectsequencing of arrivingframes of data, and
requests retransmissions when necessary. ICMP is an addition to the basic IP allowing
network problems to be reported back to a communicating device. Thus ICMP is able
to report the inability todeliver a message and the cause, or the need for fragmentation.
An alternative to TCP is UDP (user datagram protocol),a simpler protocol which does
not perform retransmissions. Instead this job is left to the application if necessary.
The address resolution protocol ( A R P ) is used in association with the IP to translate
IP addresses into physical hardware addresses. Thus, for example, ARP is capable of
determining the appropriate ethernet LAN address (LLC). This address corresponds to
- ICATIONS COMMON 407
a given IP address. RARP performs the reverse function. When, for example, a diskless
computer workstation boots, it obtains its hardware address from the network interface
card to which it is attached. It does not, however, know its IP address, this is resolved
by RARP.
The gateway protocols (BGP, border gateway protocol and EGP, exterior gateway
protocol) are used to connect together different sub-networks of the Internet. They
provide for inter-network routing information and communication exchange.
S N A P (sub network access protocol) is an extended version of the LAN logical link
control (Chapter 19) which enables the internet protocol (IP) be carried over LANs.
to
SLIP (serial line internet protocol) or its successor, PPP (point-to-point protocol) are
equivalent to OS1 layer 2 protocols. They enable transportof IP packets across a simple
serial communications line (such as a telephone connection or leaseline). The protocol
does not include an addressfield. The main function is simply to ensure the delineation
of packets.
Other well known routing protocols of the TCP/IP suite(e.g. RIP,OSPF)are
discussed in Chapter 28.
22.8 COMMON APPLICATIONS USING TCP/IP
A number of the most common applications used in association with TCP/IP are also
shown in Figure 22.3. These are
X-windows
TELNET
FTP (file transfer protocol)
SMTP (simple mail transfer protocol)
SNMP (simple network management protocol)
TFTP (trivial file transfer protocol)
RPC (remote procedure call)
NFS (network file server)
We discuss each of these briefly in turn.
X-windows
This is awindows-basedcomputeroperatingsystemintended to allowcomputer
workstationusersanywherewithinanetwork of computerssupplied by multiple
vendors to access software applications running on remote hardware platforms.
TELNET
This is a simple TCP/IP-related application that enables a remote log-on from one com-
puter to an application running on another; you like, a simple version of X-windows.
if
Thus a user of of personal computer using Windows95 software has the option to
- 408 ELECTRONIC
INTERNET
MAIL, AND ELECTRONIC
MESSAGE
SERVICES
commence a T E L N E T log-on, enabling him to conduct a session on a remote UNIX
computer server. It is the simplest form of TCP/IP connection. As such, it is worth
mentioning at this point the widely used PING (Packet Internet Groper) technique for
confirming the availability of a IP connection. A PING is an IP-message that contains
the address of its source and the destination. On receipt by the destination terminal a
confirmatory PING is returned. The procedure confirms not only that the network
connection is available but also that the destination device is ‘alive’.
FTP (file transfer protocol)
This is asimple but efficient protocol to transfer data files fromonecomputerto
another. Although nowadaysit is also possible to include data files (e.g. Microsoft word
data orMicrosoft Powerpoint presentation) asan attachment to an e-mail message, this
can be a very slow and cumbersomemeans of transferring large files. Drawing files from
a remote computer can be effected much more quickly using a remote log-on and then
the FTP.
S M T P (simple mail transfer protocol)
SMTP has become the basis of the now world-renowned Internet electronic mail system
(withtheaddresses that run president@whitehouse.gov). It providesfortransfer of
mail messages between mail servers running on the Internet.
S N M P (simple network management protocol)
SNMP hasbecome the de facto standard method of transporting network management
information around computer and router networks. discuss it in a little more depth
We
in Chapter 27.
TFTP (trivialJile transfer protocol)
This is intendedto be asimpleprotocol, and it is particularly well suited forthe
downloading of software to and initiation of a remote device.
RPC (remote procedure call)
This provides for a software routine or other application to called and executed on a
be
remote computer or server.
NFS (networkJile server)
This application makes files on remote servers and other computers appear toreside on
the local user’s workstation. It enables him to read and process the data as if it were
residing in his own machine.
22.9 THE INTERNET PROTOCOL (IP)
Figure 22.4 illustrates the fields comprised in an IP frame (or datagram). The version
indicates the format of the IP header, specifically which version of the protocolis in use.
(For example,the 1993 versionwasversion 4). The internetheaderlength (ZHL)
- TOCOL THE INTERNET (IP) 409
Version of service Internet header
Total length Type
length (IHL)
Identification Flags I Fragment
Offset
Protocol
Live to Time I
Checksum
Header
Source Address
Destination Address
Options I Padding
Figure 22.4 Format of an Internet Protocol Datagram
indicates the length of the header in 4 byte (i.e. 32 bit) words. The typeof service
indicates how the datagram (as defined in Chapter 18) will be switched and otherwise
treated during its transit through the network. The length indicates the total length
total
of the IP datagram, including both header and data.
The Jags are three bits indicating whether fragmentation of the datagram is allowed
or not. Thefragment offset indicates the position of the associated datagram fragment
intheoverall message. The timeto live is theremaining time that the datagram is
allowed to exist within the Internet. When time is up, the datagram is destroyed. This
ensures that messages lost in theInternet (e.g. datagrams with invalid addresses) are not
left around toclog up the network. The protocol indication determines whether TCP or
UDP protocol is used at the next higherlayer, and thereforedetermines to which
protocol agent the datagram should be delivered.
The header checksum is akin to a cyclic redundancy check (CRC)or frame check
sequence (FCS) as already discussed inearlierchapters (e.g. Chapter 9). It is only
applied to the I P header and is recomputed each time the header is amended during
passage through the network.
The source and destination addresses are both of 32 bits. As we shall see later in
Chapter 29, it is normal to write these addresses as four decimal numbers separated by
dots, e.g. 123.231.312.123. Each of the four decimal values mayonlyhavea value
between 0 and 255 (i.e. one of 28 combinations).
A number of options may also be included in the header. Examples are
0 security (a mechanism intended to provide for secure communication)
0 loose source and record route (the source provides information to aid the routing
across the network)
0 strict source and record route (the source is able to give information to steer the
route taken by the datagram across the network)
0 record route (a record of the route taken through the network)
0 timestamp (the time and date when the datagram was handled by a router)
The padding merely fills up the header to make it an exact number of 32 bit words.
- 410 ELECTRONIC
INTERNET
MAIL, AND ELECTRONIC
MESSAGE
SERVICES
Message Type l
Checksum
Parameters
Original I h e a d e r
P and data
Figure 22.5 Internet control message protocol (ICMP) datagram format
22.10THE INTERNET CONTROLMESSAGEPROTOCOL(ICMP)
ICMPcan beusedinconjunctionwith IPtoprovideamore reliable means of
information transfer. This allows more network status information tobe transferred to
the end computers to react in the case of non-delivery or corruption of messages. The
format of the ICMP amended IP datagram is showninFigure 5, and the various
message types and codes are shown in Tables 22.1 and 22.2.
22.11 TRANSMISSIONCONTROLPROTOCOL(TCP)
The transmission control protocol ( T C P ) governs the format of the user data carried
within an IP datagram. A TCP segment is structured as shown in Figure 22.6.
22.12
ONLINE DATABASE SERVICES
Stimulated by the huge population of personal computers now in use in businesses and
even in privatehomes,a new Online industryhasemergedto sell informationon-
demand in form
the of raw data, news and current affairs,
business andtrade
Table 22.1 ICMPmessagetypes
Message
type Message
0 Echo reply
3 Destination unreachable
4 Source quench
5 Redirect
8 Echo request
11 Time exceeded for a datagram
12 Parameter problem on a datagram
13 Timestamp request
14 Timestamp reply
17 Address mask request
18 Address mask reply
- ONLINE DATABASE 411
Table 22.2 ICMPcodesandmeanings
Code Meaning
0 Network
unreachable
1 unreachable
Host
unreachable
Protocol
2
3 unreachable
Port
4 Fragmentation
needed
5 Source
failed
route
6 Destination
network
unknown
7 Destination
host unknown
8 isolated
Source
host
9 Communication prohibited
with
destination
network
10 Communication prohibiteddestination
with host
(com-
puter)
11 Network
unreachable type
service
for
12 Host
unreachable type
service
for
Function
Source port identifies upper layer application
Destination port identifies upper layer application
Sequence number sequence numberof this frame within complete message
Acknowledgement number signals positionof data previously acknowledged
Data offset signals where data field begins
Reserved (set to zero)
Urgent indicates whether the urgent pointer in use
is
1- Acknowledgement
Reset
indicates whether the acknowledgement number is in
use
field
I indicates whether the connection needs to be reset
Synchronizer
J used ot synchronize sequence numbers
indicates sender has no more data to send
indicates how much data the receiver can accept before
acknowledgement
Checksum
Urgent
pointer
ODtions
II
error detection function
if used, indicates that urgent data follows
1- Padding ensures header length is integral multiple 32 bits
of
user datafield - information transferring between applications
Figure 22.6 Structure of a TCP segment
information,softwareprogrammes,graphicimages,videos or libraryinformation.
Huge new global businesses have been created to provide for information and content
trade. Perhaps the best-known ofthese companies are Compuserve, Microsoft Network
( M S N ) , America Online and Europe Online.
nguon tai.lieu . vn