TCP MP
TCP MP
TCP MP
o TCP :
o Full Duplex communication
o Process – to- Process communication
o Connection - oriented service
o Stream – oriented protocol ( Stream of Byte)
o Segmentation (Datagram in IP Layer )
o Utilizes buffers at both ends (Flow & error Control )
o Reliable (ACKs)
o TCP seeks to deliver a byte Stream from end - to –end , in order ,
reliable
TCP Features
1] Numbering System
Byte number
TCP number all the data byte that are transmitted in a connection
Numbering does necessarily starts from 0
TCP generate a random number between 0 & 2 32-1 for numbering first byte
2] Sequence number
Byte are grouped into “Segments ”
Sequence number for each segment is the number of the first Byte carried in that
segment
Connection Establishment
1. The Transport layer chops the message received from the Application
layer into segments and tags or numbers them to make a sequence.
And then forwards it to the IP layer for further processing.
2. The Transport layer ensures that data is delivered correctly in
sequence to the correct destination host by doing error detection
3. It is responsible for providing end-to-end communication services for
applications.
4. . It is also responsible for providing reliability by doing flow control
and error control
Layer 4: Application Layer
The TCP/IP specifications described a lot of applications that were at the top of
the protocol stack. Some of them were TELNET, FTP, SMTP, DNS etc.
1. TELNET is a two-way communication protocol which allows connecting to a
remote machine and run applications on it.
2. FTP (File Transfer Protocol) is a protocol, that allows File transfer amongst
computer users connected over a network. It is reliable, simple and efficient
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to
transport electronic mail between a source and destination, directed via a route. 4.
DNS (Domain Name Server) resolves an IP address into a textual address for
Hosts connected over a network.
The advantages of TCP/IP mode
Now that we've discussed some of the major components of networks and TCP/IP,
you have the necessary background to examine the more critical issues of security in
a converged environment. Knowing how networks are built gives you a better
understanding of what physical or logical vulnerabilities are introduced by choosing
one particular network design over another