Computer Science

Transmission Control Protocol (TCP/IP)

Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of communication protocols used for connecting network devices on the internet. TCP ensures that data packets are delivered reliably and in the correct order, while IP is responsible for addressing and routing packets to their destination. Together, TCP/IP forms the foundation of internet communication, enabling seamless data transmission across diverse networks.

Written by Perlego with AI-assistance

10 Key excerpts on "Transmission Control Protocol (TCP/IP)"

  • Book cover image for: Components & Elements of Internet Protocol and Suite
    ________________________ WORLD TECHNOLOGIES ________________________ Chapter 2 Transmission Control Protocol The Transmission Control Protocol ( TCP ) is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol (IP), and therefore the entire suite is commonly referred to as TCP/IP . TCP provides the service of exchanging data directly between two network hosts, whereas IP handles addressing and routing message across one or more networks. In particular, TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol that major Internet applications rely on, applications such as the World Wide Web, e-mail, and file transfer. Other applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP) which provides a datagram service that emphasizes reduced latency over reliability. Historical origin In May, 1974, the Institute of Electrical and Electronic Engineers (IEEE) published a paper entitled A Protocol for Packet Network Interconnection. The paper's authors, Vinton G. Cerf and Bob Kahn, described an internetworking protocol for sharing resources using packet-switching among the nodes. A central control component of this model was the Transmission Control Program that incorporated both connection-oriented links and datagram services between hosts. The monolithic Transmission Control Program was later divided into a modular architecture consisting of the Transmission Control Protocol at the connection-oriented layer and the Internet Protocol at the internetworking (datagram) layer. The model became known informally as TCP/IP , although formally it was henceforth called the Internet Protocol Suite . Network function TCP provides a communication service at an intermediate level between an application program and the Internet Protocol (IP).
  • Book cover image for: Advanced Internet Protocols, Services, and Applications
    • Eiji Oki, Roberto Rojas-Cessa, Mallikarjun Tatipamula, Christian Vogt(Authors)
    • 2012(Publication Date)
    • Wiley
      (Publisher)
    Chapter 1 Transmission Control Protocol/Internet Protocol Overview
    This first chapter provides an overview of Transmission Control Protocol (TCP)/Internet Protocol (IP), which is an Internet protocol stack to perform communications between two computers, or hosts, through the Internet. It is a collection of different protocols. A protocol is a set of rules that controls the way data is transmitted between hosts.
    1.1 Fundamental Architecture
    Figure 1.1 shows the Open Systems Interconnection (OSI) reference model and the Internet protocol stack. The International Standardization Organization (ISO) specifies a guideline called the OSI reference model. It is an abstract description for layered communications and computer network protocol design. It consists of seven layers, which are, from the bottom, physical, data link, network, transport, session, presentation, and application, as shown in
    Figure 1.1a
    . The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. At the physical layer, data is recognized, or handled, as bits. At the data link layer, data is handled as frames. At the network layer, data is recognized as packets. In the transport layer, data is handled as segments or datagrams. In the remaining upper layers, users' information is recognized. 3
    Figure 1.1 Layer model.
    The Internet protocol stack is shown in
    Figure 1.1b
    , where we can see to which layer in the OSI reference model each protocol corresponds. For example, the Internet protocol corresponds to the network layer. TCP corresponds to the transport layer. The Internet protocol stack that includes several protocols, as shown in
    Figure 1.1b
    , is referred to as TCP/IP .
    TCP/IP is being standardized by the Internet Engineering Task Force (IETF). It is widely used as the de facto
  • Book cover image for: Network Tutorial
    eBook - PDF

    Network Tutorial

    A Complete Introduction to Networks Includes Glossary of Networking Terms

    • Steve Steinke(Author)
    • 2003(Publication Date)
    • CRC Press
      (Publisher)
    SECTION IV Network and Transport Layer Protocols Taylor & Francis Taylor & Francis Group http:/taylorandfrancis.com The TCP!IP Protocol Suite Just about everyone in the networking industry talks about interoperability; the U.S. Department of Defense (DOD), in the guise of the ARPANET (Advanced Research Projects Agency Network) project, actually did something about it when it created the Transmission Control Protocol/Internet Protocol (TCP/IP) family of networking protocols. TCP/IP is the DOD's answer to connecting its rapidly proliferating-and widely dissimi-lar-computers and networks into a loosely associated wide area network (now called the Internet). TCP/IP is the DOD's vehicle for providing distributed computing capabilities across a large area. TCP/IP might also be called the less talented but still much in demand ugly stepsister to the International Standards Organization's (ISO) Open System Interconnection ( OSI) proto-cols. Though the OSI protocols were designed to dominate the computer environment, TCP /IP remains the central piece in the complex interoperability puzzle. A PLENITUDE OF PROTOCOLS As its two-part name implies, TCP/IP encompasses more than one protocol. It includes a range of protocols that provide distinct services and capabilities necessary for communica-tion between and control of otherwise incompatible computers and networks. In addition to the Transmission Control Protocol (TCP) and Internet Protocol (IP), these include the File Transfer Protocol (FTP), the Simple Mail Transfer Protocol (SMTP), the Internet Control Mes-sage Protocol (ICMP), and the Simple Network Management Protocol (SNMP). Other protocols within the TCP/IP family are the Address Resolution Protocol (ARP), the Reverse Address Resolution Protocol (RARP), the Exterior Gateway Protocol (EGP), and the User Datagram Protocol (UDP). IP, TCP, FTP, SMTP, and Telnet were part of the original DOD military standard, TCP /IP protocol suite promulgated in the late 1970s.
  • Book cover image for: Cryptography and Network Security
    • Marcelo Sampaio de Alencar(Author)
    • 2022(Publication Date)
    • River Publishers
      (Publisher)
    8 The TCP/IP Protocol
    “If you think cryptography will solve your problem, either you don’t understand cryptography, or you don’t understand your problem.” Peter G. Neumann

    8.1 TCP/IP Protocol History

    In 1975, the Defense Advanced Research Projects Agency (DARPA), which originated as the ARPA, started to develop the TCP/IP protocol stack. In 1979, a committee was formed to lead the development of these protocols. This committee was called Internet Control and Configuration Board (ICCB).
    DARPA has assigned the rights to the TCP/IP protocol code to the University of California for it to be distributed in UNIX version, in 1983, and requested that all computers connected to ARPANET use the TCP/IP protocols. Protocols spread quickly over the network.
    Over the years, it has been realized that information can travel on communications networks in two different ways:
    • Packet Switching – Where a line on the network can be shared by multiple information packages from different sources. Internet traffic is based on packet switching.
    • Circuit switching – In which there is an exclusive line between the source and the destination. The transmission of information is done as a telephone call, in which a circuit is established between the parties throughout the communication.

    8.2 Internet Coordination

    The Internet is an articulated set of computer networks, which uses the TCP/IP protocol to packet communication, and contains many servers that generally operate with operating systems UNIX and Linux. The Internet is coordinated by some entities, which take care of the organization of the network, distribution of IP addresses, creation of protocols, documentation, intermediation with government institutions, and the implementation of new technologies. The main bodies are:
  • Book cover image for: CompTIA Network+ Study Guide
    No longer available |Learn more
    • Todd Lammle(Author)
    • 2021(Publication Date)
    • Sybex
      (Publisher)
    ✓ ■ IP protocol types ✓ ■ Internet Control Message Protocol (ICMP) ✓ ■ TCP ✓ ■ UDP ✓ ■ Generic Routing Encapsulation (GRE) ✓ ■ Internet Protocol Security (IPSec) ✓ ■ Authentication Header (AH)/Encapsulating Security Payload (ESP) The Transmission Control Protocol/Internet Protocol (TCP/ IP) suite was created by the Department of Defense (DoD) to ensure and preserve data integrity as well as to maintain com-munications in the event of catastrophic war. So it follows that if designed and implemented correctly, a TCP/IP network can truly be a solid, dependable, and resilient network solution. In this chapter, I’ll cover the protocols of TCP/IP. I’ll begin by covering the DoD’s version of TCP/IP and then compare this version and its protocols with the OSI reference model discussed in Chapter 2, “The Open Systems Inter-connection Specifications.” After going over the various protocols found at each layer of the DoD model, I’ll finish the chapter by adding more detail to the explanation of data encapsulation that I started in Chapter 2. To find Todd Lammle CompTIA videos and practice questions, please see www.lammle.com . Introducing TCP/IP Because TCP/IP is so central to working with the Internet and intranets, it’s essential for you to understand it in detail. I’ll begin by giving you some background on TCP/IP and how it came about and then move on to describe the important technical goals defined by the original designers. After that, you’ll find out how TCP/IP compares to a theoretical model— the Open Systems Interconnection (OSI) model. A Brief History of TCP/IP The very first Request for Comments (RFC) was published in April 1969, which paved the way for today’s Internet and its protocols. Each of these protocols is specified in the multi-tude of RFCs, which are observed, maintained, sanctioned, filed, and stored by the Internet Engineering Task Force (IETF).
  • Book cover image for: Cisco Networking Essentials
    • Troy McMillan(Author)
    • 2015(Publication Date)
    • Sybex
      (Publisher)
    protocol defines how the information that is transmitted from one computer to another is structured. Some protocols are special function protocols, and some are networking protocols. The function of a protocol is largely determined by the layer of the TCP/IP model at which it operates.
    Networking protocols provide transport services to the special purpose protocols. They also define the rules of communication between devices. In this respect, networking protocols are like languages. The devices must share at least one common language. TCP/IP is a networking protocol and is composed of a set of subprotocols that form what is called the
    TCP/IP suite
    .
    The protocols in the TCP/IP suite are as follows:
    • Transport Control Protocol (TCP)
    • User Datagram Protocol (UDP)
    • Internet Protocol (IP)
    • Address Resolution Protocol (ARP)
    • Internet Control Message Protocol (ICMP)
    • Internet Group Management Protocol (IGMP)
    These protocols are discussed further in the sections of this chapter that discuss their relevance with the layers.
    Encapsulation is discussed in the section “Describing the TCP/IP Encapsulation Process” later in this chapter.
    As you can see in Figure 3.1 , besides the six protocols of the TCP/IP suite, other protocols and services can also be mapped to this model. Although not shown in this figure, devices can also be mapped to the model. More details about the figure follow later in this section, so use it as a guide throughout the discussion of the processes of encapsulation and de-encapsulation.
    Figure 3.1
    TCP/IP model
    The four layers of the TCP/IP model are as follows:
    1. The Application Layer The Application layer is the user applications' interface to the networking process that is facilitated by TCP/IP. When a user attempts to access anything, the computer has to decide whether the object is located locally on the hard drive or is somewhere out on the network. If the computer determines that the network is required, the Application layer begins the process of creating the package (or series of packages, in most cases) that will be used to request the object or information from the remote device, or alternatively to transfer requested information to another device. As you will learn later in this chapter, the name used to describe this package will change as it is transferred from one layer to another.
      The information that is contained in the package that will be handed down to the Transport layer includes the data itself (for example, a web page or a document) and all other information required to establish the session between the source and destination service or application and to manage the format or presentation of the data. In doing this, the Transport layer on the source device uses port numbers to identify protocols and services. These port numbers are used to communicate this information to the Transport layer on the destination device. When routers make decisions about the handling of packets based on port numbers, it is said that they are operating at the Transport layer because the routers are using information that is placed in the packet at that layer.
  • Book cover image for: Computer Network Simulation Using NS2
    • Ajit Kumar Nayak, Satyananda Champati Rai, Rajib Mall(Authors)
    • 2016(Publication Date)
    • CRC Press
      (Publisher)
    The transport layer protocol at the receiver strips the information added by the transport layer protocol at the sender, reconstructs the message, and sends it to the applica-tion layer. Note that the basic data units that different protocol layers deal with are different. For example, the application layer deals with messages, the trans-port layer deals with segments, the internet layer with packets, and the data link layer with frames. The terminology used to refer to the unit of data trans-fer at the different layers is shown in Figure 2.1 . Over the last two decades, the Internet has seen almost exponential growth and now Internet applications have become ubiquitous. Internet-based applications are developed predominantly by using the client-server paradigm. In a typical Internet-based application, the application consists of a server part and a client part. The server is an application providing cer-tain services and a client typically runs on a web browser and are primarily the requester of services. TCP has now become the de facto transport layer protocol for client-server communications. 2.2 Terminology In the following, we briefly discuss a few of the protocols and the terminol-ogy associated with the TCP/IP protocol suite. TCP (Transmission Control Protocol): On the sending side, TCP is respon-sible for breaking a message into small parts. It adds sequence numbers and certain other information which after these become known as segments. TCP passes the segments to the lower layer protocol for transmission over the net-work. At the receiver’s end, TCP assembles the segments when they arrive and reconstructs the message. TCP is a reliable protocol. When a packet is lost or corrupted during transmission, TCP detects it and requests the sender to 40 COMPUTER NETWORK SIMULATION USING NS2 retransmit. Thus retransmission is used as the primary mechanism by TCP for reliable data delivery to the destination.
  • Book cover image for: Guide to TCP/IP
    eBook - PDF

    Guide to TCP/IP

    IPv6 and IPv4

    • James Pyles, Jeffrey Carrell, Ed Tittel, , James Pyles, Jeffrey Carrell, Ed Tittel(Authors)
    • 2016(Publication Date)
    chapter 1 Introducing TCP/IP After reading this chapter and completing the exercises, you will be able to: Describe TCP/IP ’ s origins and history ● Explain the process by which TCP/IP standards and other documents, called Requests for Comments (RFCs), are created, debated, and formalized (where appropriate) ● Describe the “ huge difference ” between IPv4 and IPv6 and explain why a switch to IPv6 is both necessary and inevitable ● Describe the Open Systems Interconnection network reference model, often used to characterize network protocols and services, and how it relates to TCP/IP ’ s own internal networking model ● Define the terms involved and explain how TCP/IP protocols, sockets, and ports are identified ● Describe data encapsulation and how it relates to the four layers of the TCP/IP protocol stack ● Describe and apply the basic practices and principles that underlie network protocol analysis 1 Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-300 This chapter introduces the background and history of the collection of networking protocols known as TCP/IP , which is an abbreviation for Transmission Control Protocol/Internet Protocol . Two of the most important protocols in the overall collection known as TCP/IP give their names to this protocol collection — namely, the Transmission Control Protocol (TCP) , which handles reliable delivery for messages of arbitrary size, and the Internet Protocol (IP) , which manages the routing of network transmissions from sender to receiver, among other capabilities. In addition, this chapter covers TCP/IP ’ s networking model, its various ways of identifying specific protocols and services, how TCP/IP standards are defined and managed, and which elements of the TCP/IP collection are most noteworthy. It also includes coverage of the origi-nal version of TCP/IP, sometimes called IPv4, and the newer versions, known as IPv6.
  • Book cover image for: Practical Industrial Data Networks
    eBook - PDF

    Practical Industrial Data Networks

    Design, Installation and Troubleshooting

    • Steve Mackay, Edwin Wright, Deon Reynders, John Park(Authors)
    • 2004(Publication Date)
    • Newnes
      (Publisher)
    TCP/IP overview 259 16.1.1 The Internet layer This layer is primarily responsible for the routing of packets from one host to another. Each packet contains the address information needed for its routing through the internet-work to the destination host. The dominant protocol at this level is the Internet protocol (IP). There are, however, several other additional protocols required at this level such as: • Address resolution protocol (ARP), RFC 826. This is used for the translation of an IP address to a hardware (MAC) address, such as required by Ethernet. • Reverse address resolution protocol (RARP), RFC 903. This is the complement of ARP and translates a hardware address to an IP address. • Internet control message protocol (ICMP), RFC 792. This is a protocol used for exchanging control or error messages between routers or hosts. 16.1.2 The host-to-host layer This layer is primarily responsible for data integrity between the sender host and receiver host regardless of the path or distance used to convey the message. It has two protocols associated with it, namely: • User data protocol (UDP), a connectionless (unreliable) protocol used for higher layer port addressing with minimal protocol overhead (RFC 768). • Transmission control protocol (TCP), a connection-oriented protocol that offers a very reliable method of transferring a stream of data in byte format between applications (RFC 793). 16.1.3 The process/application layer This layer provides the user or application programs with interfaces to the TCP/IP stack. These include (but are not limited to) file transfer protocol (FTP), trivial file transfer protocol (TFTP), simple mail transfer protocol (SMTP), telecommunications network (TELNET), post office protocol (POP3), remote procedure calls (RPC), remote login (RLOGIN), hypertext transfer protocol (HTTP) and network time protocol (NTP). Users can also develop their own application layer protocols.
  • Book cover image for: Networking Explained
    • Michael Gallo, William M. Hancock PhD CISSP CISM, William M. Hancock, PhD, CISSP, CISM(Authors)
    • 2001(Publication Date)
    • Digital Press
      (Publisher)
    The four layers shown here correspond to TCP/IP’s four layers as shown in Figure 2.16. A data mes-sage is first created on the sending machine at TCP/IP’s application layer. It is then passed to the transport layer where it is encapsulated with either a UDP or TCP header. If the application pro-tocol is connectionless, then a UDP header is prepended and the new data structure is called a packet. If the application is connection-oriented, then a TCP header is prepended and the new data structure is called a segment. This transport layer header includes the source and destina-tion port numbers corresponding to the application protocol. The transport layer data structure is then passed to the network layer where an IP header is prepended. The IP header includes the source and destination network addresses. This new data structure is now called a datagram. Finally, the datagram is passed to TCP/IP’s network interface layer where a frame header is prepended. Included with this header are the source and destination hardware addresses. The resulting data frame is then passed to the physical layer for transmission. On the receiving machine, each layer’s header is stripped off as the data structure works its way up the layers. 106 Networking Explained, Second Edition transmission by furnishing end-to-end error detection and correction, guaranteeing that data are transferred across a network accurately and in the proper sequence, retransmitting any data not received by the destination node, and guaranteeing against data duplication between sending and receiving nodes. Application protocols that generally use TCP include TELNET, File Transfer Protocol (FTP), Simple Mail Transport Protocol (SMTP), and Post Office Protocol (POP). The format and contents of the TCP header are shown in Figure 3.15. You will note that when compared to UDP’s header (see Figure 3.14), TCP’s header contains similar information carried by UDP.
Index pages curate the most relevant extracts from our library of academic textbooks. They’ve been created using an in-house natural language model (NLM), each adding context and meaning to key research topics.