Week 3- Written Assignment
Shiva shanker chennoju
BA 632 Information Systems Security
Professor Dr. Jimmie Flores
Transmission Control Protocol (TCP):
Transmission Control Protocol and Internet Protocol are two distinct computer network protocols. A protocol is an agreed-upon set of procedures and rules. When two computers follow the same protocols the same set of rules they can understand each other and exchange data. Transmission Control Protocol and Internet Protocol are so commonly used together, however, that Transmission Control Protocol and Internet Protocol has become standard terminology for referring to this suite of protocols.
Transmission Control Protocol divides a message or file into packets that are transmitted through the internet and then re-assembled when they reach their destination. Internet Protocol is responsible for the address of each packet so it is sent into the correct destination.
Advantages of (TCP) :
A network is just a bunch of computers with wires running between them. Properly implemented, a network is a system that provides its clients with unique capabilities, above and beyond what the individual machines and their software applications can provide.
Most of the benefits of networking can be divided into two generic categories connectivity and sharing, and Hardware sharing, Internet Access, Internet Access Sharing, Data Security and Management, Performance Enhancement and Balancing. networks allow computers, and
1)A network is when two or more computers are connected together and are able to share data and communication.
It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other resources of the World Wide Web (WWW).
But how does it work? The internet, based on the concept of “packet switching”, involves the travelling of small packets of data over one or more networks (Frenzel, 2013). This can be compared to “electronic postcards”, meaning that “a computer generates a piece of data and flings it into the net, just like the postal system, except 100 million times faster” (Cerf, 2013). This concept allows one computer to speak to many different computers around the network by sending out these “electronic postcards”. However, before these networks can work seamlessly together, they must use a common protocol, or set of rules for transmitting and receiving these packets of data. There are several protocols currently in use, including the OSI Model, the TCP/IP Model, UDP, HTTP, and FDP (Mitchell, 2014), but the most commonly used is Transmission Control Protocol/Internet Protocol (TCP/IP) (Gilmer, 2011). Even as early as 1977, TCP/IP was being used by other networks to link to ARPANET (Kozierok,
TCP/IP is a protocol which transfers data across a network. It allows two different computers to communicate well even if they use different codes. Putting both computers into a new common code language which both computers
A LAN is a ‘Local Area Network’. It is a small network of computers most often
Transmission Control Protocol/Internet Protocol (TCP/IP) are the basic communication protocols, which were designed to provide low level support for internetworking. This term is generally also used to refer to a more generalised collection of protocols developed by the internet community and U.S. Department of Defence.
The internet layer is built up of four core protocols: IP, IGMP, ICMP and ARP. Internet protocol (IP) is responsible for routing, IP addressing and breakdown/reassembly of data packets, address resolution protocol (ARP) is responsible for mapping an IP address to a device on the local network, internet control message protocol (ICMP) provides diagnostic information and error reports on lost packets, internet group management protocol (IGMP) controls who receives IP datagrams in a single transmission. The transport layer is built up of two core protocols: TCP and UDP. Transmission control protocol (TCP) sequences and acknowledges packets sent and their recovery when lost in transmission allowing the computer to make and maintain network conversations where applications exchange data, defined as a connection-oriented protocol meaning the connection is maintained until the programs has finished exchanging data. User datagram protocol (UDP) This is used to transfer small amounts of data when the use of error correction isn’t needed increasing the speed of the transmission, common in multi-player video games as the user will not need to receive packets of past events in the game so the error correction featured in (TCP) would be
When dealing with emails, you have a IMAP, a POP3 or a SMTP, protocols. First, we have a IMAP, which is similar to a POP3 because they are both used to read mails from a remote server. The IMAP is considered more advanced than a POP3. Then you have a SMTP, which is only used for sending emails. For example, if you plan to set up an email server such as hMailServer, you must know what each protocol is used for. Each protocol is considered to be a specific set of communication rules between computers. Now, we will take a closer look at each protocol specifically.
TCP stands as transmission control protocol .It is a connection-oriented protocol. TCP enables a connections between two hosts to exchange streams of data. TCP also give guarantee about the delivery of data and also give guarantees that the packet is sent in the same order in which they are assigned.
There are two types of Internet Protocol (IP) traffic, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Some of the features that UDP possesses that are not provided by TCP/IP. First, UDP is a connectionless protocol (No handshake), which means packets sent from one node to another without making sure whether any packet may be lost during the transfer. TCP, on the other hand, makes sure to establish a connection in order to send the packets from one node to another without losing any packets. It is also known as handshake process, where nodes synchronize (SYN),
The transport layer: This layer determines how the packets are transported such as the order and what to do if there are errors. The purpose of this layer is to make sure the data be transported correctly. Besides, due to the limitation of physic (maximum IP packet size is 65535bits), the speed of transportation is limited. As a result, this layer needs break big data in to small packets. This can also collect small data into a big packet to reduce unnecessary transmission, which can improve the transmitting speed. Example protocols are TCP, UDP, SCTP.
Over the next 10 years, we will see a change in technology, and the Internet. Things will continue to progress, and fundamental changes will easily be defined. Technologies have revolutionized how people spread and consume information; these changes will redefine who we are as consumers, merchants, and individuals. With the expansion of computers and the Internet connectivity, people are able to share more of their lives with family and friends. Technology has offered the world so many different services, which include emailing, instant messaging, search engines, blogs, and Wikipedia. These services have changed the way we communicate with others, our knowledge, and the way we conduct business. With the increasing usage of the Internet, developers continue to find ways to improve technology and the way we utilize the Internet. Technology has a wide range of different aspects and concepts, which includes protocols. There has to be rules, and objectives in any and everything we do, and protocols governs communications, errors, detections, messages, and speed. There are three technology concepts behind the Internet, and they are packet switching, Transmission Control Protocol/Internet Protocol (TCP/IP) communications
The two TCP/IP transport layer protocols (TCP and UDP), are very crucial for the smooth operation of network services for both the computer applications and application layer protocols such as HTTP, FTP, SMTP and Telnet. These two transport layer protocols TCP and UDP execute these services via the employment of IP. They use IP in the efficient routing of packets to their respective destination networks (Steinke,2001).The TCP is further noted by Steinke (2001) to be responsible for the provision of a reliable and yet connection-oriented byte-stream packet delivery while its counterpart UDP is noted to be responsible for the provision of a connectionless but rather unreliable packet delivery. In this paper we explain the work of the two TCP/IP transport layer protocols (TCP and UDP). In addition, describe how TCP and UDP manage key functions such as reliability, port addressing, and segmentation.
A computer network is a network that consist of two or more computers that are able to share information between them or their users. There are a large variety of different networks and the advantages or disadvantages are strongly related to the type of network we choose.
Well-known communications protocols are Ethernet, a hardware and Link standard that is ubiquitous in local area networks, and the Internet Protocol Suite, which defines a set of protocols for internetworking, i.e. for data communication between multiple networks, as well as host-to-host data transfer, and application-specific data transmission formats.