What is TCP/IP
The Transmission Control Protocol and the Internet Protocol manage the sending and receiving
of messages as packets over the Internet. The two protocols together provide a service to
applications that use the Internet: communication through a network.
The World Wide Web is a network application that uses the services of TCP and IP to communicate over the Internet. When a web browser requests a page from a web server, the TCP/IP services provide a virtual connection -- a virtual circuit—between the two communicating systems. Remember that packet-switched networks don't operate like telephone networks that create an actual circuit dedicated to a particular call. Once a connection is established and acknowledged, the two systems can communicate by sending messages. These messages can be large, such as the binary representation of an image, and TCP may fragment the data into a series of IP datagrams. An IP datagram is equivalent to the couriers' envelope in that it holds the fragment of the message along with the destination address and several other fields that manage its transmission through the network. Each node in the network runs IP software, and IP moves the datagrams through the network, one node at a time. When an IP node receives a datagram, it inspects the address and other header fields, looks up a table of routing information, and sends it on to the next node. Often these nodes are dedicated routers—systems that form interconnections between networks—but the nodes can also include the computer systems on which the applications are running. IP datagrams are totally independent of each other as far as IP is concerned: the IP software just moves them from node to node through a network. The size of a datagram is primarily determined by the largest size message that can be sent by any part of the network. TCP software performs the function of gluing the fragments together at the destination using the fragment identifier field in the IP datagram header. Because IP datagrams are transmitted through the network independently, there is no guarantee they will arrive at the destination in order, and TCP stores the fragments in a buffer until all preceding fragments are received. IP doesn't guarantee that datagrams are delivered. If an IP node receives a corrupt datagram, it throws it away. Datagrams may be missing from the stream the TCP software receives because a datagram was corrupt and not passed on from the IP software or was delayed in the network. TCP buffers the fragments to allow the out-of-order datagrams to arrive. If a missing datagram fails to arrive, TCP eventually requests that it be resent. This can cause datagrams to be received twice; however TCP recognizes and discards the duplicate datagram when it arrives. |
Home »
Networking
» What is TCP/IP
What is TCP/IP
PMA10:25
Categories: Networking
Related Posts:
Securing FTP-How Securing FTP You can make your FTP uploads and downloads more secure in one of two ways: through Secure File Transfer Protocol SFTP or Transport Layer Security TLS. SFTPSFTP is a more secure way of uploading and downlo… Read More
E-Mail Security When an e-mail message is sent between two distant sites, it will generally transit dozens of machines on the way. Any of these can read and record the message for future use. In practice, privacy is nonexistent, despite w… Read More
TCP/IP Network Addresses-hosting This kind of address is still in wide use and is what people commonly refer to as an IP address. Part of an IP address is used for the network address, and the other part is used to identify a particular interface on … Read More
RSVP Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network. RSVP is a signalling protocol for the internet. RSVP st… Read More
Session Hijacking-Protection Session hijacking isn't new to computer security. The term is most commonly used to describe the process of a TCP connection taken over by a sequence prediction attack. In such an attack, the attacker gains control of … Read More
Network Security Configuration Installed your Linux system, you should keep some basic security measures to protect your system Firewalls, intrusion protection, encryption, data integrity, and authentication are ways of protecting against such attack… Read More
$_ENV and $_SERVER ? PHP sets several variables for you containing information about the server, the environment, and your visitor's request. These are stored in the superglobal arrays $_ENV and $_SERVER, but their availability depends on whe… Read More
Network Topologies - Basic In the seemingly never-ending competition to maximize theamount of data that can be pushed through a piece of wire, numerous network topologies have been tried and tested. Initially,companies offered wholesale solutions… Read More
Interview Questions-Networking Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 … Read More
What Is IP Filtering? IP filtering is simply a mechanism that decides which types of IP packets will be processed normally and which will be dropped or rejected. By dropped we mean that the packet is deleted and completely ignored, as if it h… Read More
Useful Linux web sites Linux Features It allows many users to access a computer system at the same time. It supports the creation, modification, and destruction of programs, processes, and files. It provides a directory hierarchy t… Read More
Digital Signatures The authenticity of many legal, financial, and other documents is determined by the presence or absence of an authorized handwritten signature. And photocopies do not count. For computerized message systems to replace the… Read More
What is TCP/IP Best seo practices How to promoting webpages Top seo tips top 10 e-commerce tips Additional seo tips Advanced seo tips Mobile seo tips What is TCP/IP The Transmission Control Protocol and the Internet … Read More
Network Security For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did no… Read More