This paper is participating in theNetwork protocols must be known and must be known”Essay campaign

Original link: www.ibm.com/docs/en/aix…

Copyright: IBM

When a computer communicates with another computer, certain rules or protocols ensure that data is transferred and received in an orderly manner between them. Throughout the world, TCP/IP is the most commonly used transmission control/network protocol. (However, many European countries still use the X2.5 protocol). There are also conventional ways to use TCP/IP, such as E-mail, file transfers between computers, and remote logins.

Mail users give instructions to message processing (MH) users, and mail sending servers use TCP/IP protocol to transmit and receive mail between systems. The basic networking tool (BNU) uses the TCP/IP protocol to transfer and receive files and instructions between systems.

TCP/IP is a protocol that specifies the communication standards between computers and a detail conventions for routing and interconnecting networks. It is widely used in networks. Institutions, colleges, universities and industries frequently use it to exchange information.

The TCP/IP protocol allows a large number of computers (called hosts) to communicate with each other on a network. Each network can connect to another network to communicate with hosts on that network. While there are many types of networking technologies, many of them operate using packet switching and streaming. However, TCP/IP has one important advantage: hardware independence.

The computer provides the facility for a computer system (Internet host) to connect to a network and communicate with other hosts. The TCP/IP protocol provides instructions and facilities that allow you to: – transfer files between systems – log in to a remote system – run instructions on a remote system – print files on a remote system – send e-mails to remote users – communicate with remote users – manage networks

“Look out! TCP/IP provides basic network management capabilities, and SNMP provides more network management instructions and functions.”

Chapter introduction

TCP/IP terms

It is useful to learn these networking terms related to the TCP/IP protocol.

Design your own TCP/IP protocol

TCP/IP is such a flexible networking tool that you can customize it to the needs of your organization. The details of these issues are discussed in other topics, and this series aims to introduce you to those details,

TCP/IP protocol installation

This section discusses network Transmission Control Protocol/network protocol (TCP/IP) installation.

TCP/IP configuration

When you have TCP/IP software installed on your system, you are ready to start configuring your system.

Identity authentication and secure remote instructions

By providing authentication methods for these in-use instructions, network communication is made more secure.

TCP/IP protocol customization

Customize TCP/IP by creating. Netrc files

Means of communicating with other systems and users

Here are some ways to communicate with other systems and users. The first is to communicate with remote hosts, and the second is to communicate with remote users.

The file transfer

While you can use mail to transfer relatively small files, there are more efficient ways to transfer large files.

Prints a file from a remote system

Occasionally, you may need to print a file from a remote host. The printing location depends on which remote printer is available to the remote host.

Display status information

You can use TCP/IP protocol instructions to identify network state, display user information, and resolve host or user information that needs to communicate with other hosts.

TCP/IP protocol

A protocol is a set of rules for information formats, a program that allows a machine and an application to exchange information. These rules must be followed by the communicating machine so that the receiving host can understand the information. The TCP/IP protocol set can be understood at the network layer.

TCP/IP local network adapter

A network adapter is a physical device connected to a network cable. It is responsible for receiving and transmitting data at the physical layer.

TCP/IP network interface

The TCP/IP network interface layer formats IP data packets into packets that can be understood by specific network technologies.

TCP/IP addressing

TCP/IP consists of a scheme that allows users and applications to identify specific networks or hosts with which they communicate.

TCP/IP domain name resolution

32-bit addresses provide an efficient way to identify source and destination packets transmitted over a network. Users prefer addresses that are easy to remember and semantic. Network Transmission Control Protocol/Network Protocol (TCP/IP) provides a domain name system that can support both flat and layered network organization.

Customize and configure LDAP(Lightweight Directory Access Protocol) Domain name Resolution System (IBM SecureWay)

The lightweightLightweight Directory Access Protocol is an open industry standard that specifies a way to obtain and update Directory information.

Configuring and customizing NIS_LDAP domain name resolution (RFC 2307 Schema)

Aix5.2 provides a new domain name resolution mechanism, NIS_LDAP.

TCP/IP Address and Parameter Assignment — Dynamic Host Configuration Protocol (DHCP)

Network Transmission Control Protocol/Network Protocol (TCP/IP) supports communication between machines with network addresses configured. Network administrators must be faced with network address assignment and parameter distribution for computers on the network. The usual process is that the administrator grants configuration rights to each user, allowing the user to configure his or her own machine. However, misconfiguration and misunderstanding can create service invocations that managers must deal with separately. The Dynamic host configuration protocol gives administrators a way to remove end-user configuration and maintain network configuration in a unified place.

Dynamic Host Configuration Protocol version 6

The Dynamic host configuration protocol provides a way to maintain network configuration in a unified place. This section describes IPV6 dynamic host configuration.

Preboot Execution Environment Proxy Dynamic Host Configuration Protocol daemon (PXE Proxy DHCP)

A PXE Proxy DHCP server responds to client requests by listening on the DHCP of the client. However, unlike A DHCP server, a PXE Proxy DHCP server does not manage network addresses; it responds only to clients that identify themselves as PXE clients.

Bootstrap the image negotiation layer daemon

The BINLD server is the third stage of PXE client communication.

TCP/IP daemon

Daemons are programs that run continuously in the background, performing functions required by other programs. Transmission Control Protocol/Network Protocol (TCP/IP) provides daemons that implement specific functions on the operating system.

TCP/IP routing

A route defines a path for sending packets over the Internet to an address on another network.

Mobile IPV6

Mobile IPV6 provides mobile support for IPV6. It allows you to keep the same network address all over the world, and when changing addresses, allows applications to use that address to maintain traffic and upper-layer contacts. It allows mobile support for both homogeneous and heterogeneous media.

Virtual IP address

Virtual IP addresses eliminate host independence from independent network interfaces.

Ethernet channel and IEEE 802.3AD link aggregation

Ethernet channel and IEEE 802.3AD link aggregation A network port aggregation technique that aggregates Ethernet channels into a single pseudo-channel device.

Fibre Channel Internet protocol

Starting with aix5.2, IP packets can be transmitted over physical fibre channel.

Ib Network Protocol (IPoIB), unlimited bandwidth

IP packets can be sent over an unlimited bandwidth interface, and this transmission is done using an unlimited bandwidth packet filled with IP packets using a network interface.

ISCSI software initiator and software target

The iSCSI software initiator enables AIX to obtain storage devices that use the TCP/IP protocol over Ethernet network adapters. The software target enables AIX to export local storage for other initiators using the iSCSI protocol to obtain.

Flow control transport protocol

Streaming Transmission Control Protocol (SCTP) is a connection-oriented protocol similar to TCP, but also provides information-oriented data transmission similar to UDP. The AIX operating system is compatible with RFC4960.

Path Max transfer unit lookup

For two hosts communicating over one path of multiple networks, if its packet size is larger than the minimum transport unit of any network on the path, it will be fragmented. Because packet fragmentation will reduce network performance, to avoid packet fragmentation, we need to find the maximum path transmission unit on this path, that is, the size of the packet should not be greater than the minimum maximum transmission unit of any network on this path.