Hi Ridge,
I would like to take a stab at answering your questions while avoiding writing a book in the process.
The questions you are asking go down below where you generally work with TCP/IP in the LabVIEW environment. When you are using a PC on a local area network (that may, or may not be connected to the internet) there are a number delivery mechanisms available for moving messages about between machines and the application running on them.
I will try to give you a layman's tour through some of what is going on to move this information around by starting at the bottom and touching on just enough to answer some of your questions.
About 20 years ago the OSI 7-layer model came out describing how people should organize their communications schemes such that many different applications from different vendors would play nice together. This 7-layer model broke the whole process down starting at the TOP which I believe they called the application interface layer down to the bottom which talked about the physical layer, things like wires and transcievers and the like.
Looking back I would have to say that the 7-layer model has worked rather well as far as it has been adhered to. Getting back,
The physical layer also talks about how data will be put on the wire and taken off. Examples of physical layers are things like
Ethernet
Token-Ring
etc.
In the case of ethernet you have any number of computers virtually all sharing the same wire to do the talking. No two can talk at the same time otherwise they would step on each other. This is called a collision. The whole thing works sort of like a party line with a buch of people taking turns having different conversations. Same thing happens on ethernet. Seperate device take turns saying what they have to say and then letting others talk.
To make it fair for all there is a limit of how long your message can be. This keeps one device (person) from tying up the line. If I remeber correctly that was somthing like 4096 bytes or there abouts.
So how does allow larger transferes? That is where the 7-layer model kicks in. In the next higher level, above ethernet and token ring and the like, are the transfer protocols. The transfer protocols are responcible for moving data using the physical layer. Examples of transfer are TCP, UDP, DECnet, LAT, etc.
As in the case of TCP (Transfer Control Protocol ?) they have they trem Protocol buied in them. They all utilize the physical layer to provide what ever service they provide using a set of rules to interact with a conterpart on another part of the physical layer. (boy was that a bad sentence).
Returning to the earlier anology of th ephone conversation. You could have many conversations taking place in different languages as long as the listener and the talker where speaking the same language. same way over ethernet. One talker could speak TCP (english) as long as there was a listner listening for TCP (english) and intermitantly another talker could be talking UDP (spanish) to a different listner listening in UDP (spanish). TCP is just the protocol, or set of rules that are used to interact.
To take the next step up we have to introduce another complication to our party-line analogy. Let say Bill and Bob want to talk english while Sue and Sally want to talk english?
New problem, new rule.
Whenever talking, all conversations must consist of the following format.
Talker,Listner,message.
Eaves droping would sound like,
Bob Bill How are you?
Sue Sally The tangent of the circle would tell us that.
etc
This new rule is analogous to the IP part of TCP/IP. When you are asking for an IP address you are looking for a name that you can use when you are talking. You could use the IP you where born with (static IP), or you could pick up an alias and use it to do some random talking if you want.
WHo decides? The network admisitrator. On my network at home, I set up all of the IP addresses. At work, I have to request one if I need one.
One of the things a network administrator can do is set things up so that there is one machine on the network that gives out aliases to anyone that asks. This is a dynamic IP address. In this case, any to two individuals could talk using aliases, by contacting the the name server and finding out what is the current alias of any other machines.
I have carried on here for quite a while so I wil call it here. I just wanted to explain what is going on below LbVIEW.
Ben
(Legal disclaimer:
I was just talk of the top of my head here. I know TCP/IP are technically two levels tied together, and what ever happened to layers 4-6 anyway?)