The Transmission Control Protocol/Internet Protocol (TCP/IP)

Great Essays
Transmission Control Protocol/Internet Protocol (TCP/IP) are a suite of protocols designed for large-scale internetworks that span LAN and WAN environments. TCP/IP are communication protocols that are used to handle traffic on the internet and other networks. The two most important protocols are the Transmission Control Protocol (TCP) and the Internet Protocol (IP). These are today the standard networking protocols and were created from a synthesis of a number of earlier developments in the 1960’s and 1970’s. TCP/IP protocols were developed in the early 1970’s by scientists Vint Cerf and Bob Kahn. They developed the TCP/IP protocols as part of Defense Advanced Research Projects Agency (DARFA) which was part of a research network that had …show more content…
First, Jon Postel, who was one of the foremost people in the development of the early internet and TCP/IP, published a series of comments on the state of TCP. Postel’s comments led to the creation of TCP/IP architecture, and the splitting of TCP into TCP at the transport layer and IP at the network layer. Then in November, 1977, a three-network TCP/IP test was conducted between sites in the US, UK, and Norway. (CITE) 1978 saw version 3 of TCP as the process of dividing TCP into two parts began. Then in 1980 the first formal standard versions (version 4) of IP and TCP were created to be used in modern networks. In 1981 the Internet Protocol (IP) was introduced and described how to implement and addressing standard and route packets between interconnected networks. BY 1982 the US Department of Defense declared TCP/IP as the standard for all military computer networking. (CITE). Then in January 1983, ARPAnet started to require the use of TCP and IP protocols as a standard for all network traffic and essential communication. It was at this point that the protocols began to be known as the TCP/IP protocol …show more content…
The protocols also include provisions that permit it to function on most lower-level forms of technology, such as LANs, wireless LANs and WANs of various sorts. This enables people to mix and match a variety of different underlying networks and connect them all using TCP/IP.
• Scalability: The TCP/IP protocols have proven to be extremely scalable over the years. As the internet has grown from a few servers to millions of hosts, the core of TCP/IP is nearly the same as it was about 25 years ago. The only changes having been made are the ones required to support the growth of the internet and are done as a part of the TCP/IP development process.
• The Open Standards and Development Process: The standards used by TCP/IP are not exclusive, but freely available to the public. Also the process used to create the TCP/IP standards are freely available to the public. TCP/IP standards and protocols were developed and have been modified using the unique, democratic “RFC” process. This process allows anyone interested in TCP/IP protocols to provide input in regards to their development and helps ensure that the protocol suite is accepted worldwide.

Related Documents

  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    3. IP Transit IP Transit, also known as Internet Transit, is what allows traffic from a network to cross or "transit" to a provider network. This type of service is generally used to connect one of the smaller internet service providers to the rest of the internet. 4. Dark Fibre Dark Fibre, also known as, unlit fibre, is an unused optical fibre that's commonly used in fibre-optic communication.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 1 Exercise 1

    • 551 Words
    • 3 Pages

    In this section the fast-recovery algorithm that makes TCP NewReno[1] perform better than the Reno[3], is described. During congestion avoidance if the sender receives triple duplicate ACKs, then it performs fast-retransmission and enters into fast-recovery. In fast-retransmit the sender retransmits the lost segment,sets the threshold value for slow-start as ssthresh = cwnd/2, and sets congestion window, cwnd = ssthresh+3 segments. In fast-recovery, the sender increases its congestion window by one segment for each subsequent duplicate ACK received that indicates a segment is reaching the destination. It can transmit new segments if permitted by its congestion window.…

    • 551 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt2580 Unit 6 Lab 1

    • 1713 Words
    • 7 Pages

    OMIS 660 Business Computing Environment and Network Lab - 1 REPORT TCP: Transmission Control Protocol SUMMARY: The idea of TCP congestion control is for each sender to determine the available capacity in the network so that it knows how many packets can be safely transmitted. The congestion window is a state variable for each connection which is used by the sender to limit how much data a sender can transmit into the network before receiving an acknowledgement. This report consist of the simulation of different model of TCP transmission which demonstrates the congestion control using the variation of dynamic window size implemented by TCP (Transmission Control Protocol). Various models are considered where packet drop rates are varied for demonstration of different situations from…

    • 1713 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Kerberos authentication protocol that establishes a trusted connection between hosts in the untrusted network. The key function of this protocol is that it allows a single sign-on in a distributed network. It's best features lays in the fact that the password does not get shared over the network between nodes. In addition, it uses KDC - key distribution center which keeps the access maintained.…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    TCP/IP Transmission control Protocol/Internet protocol used to connect host computers on internet. First internet ARPANET was developed when US Department of research projects agency (ARPA) in the end of 1970s needed a system to share the resources of their big mainframe systems. In start ARPANET used Network Control Protocol but in 1974 TCP protocol was introduced and all pervious protocols were replaced with TCP Protocol. TCP/IP was the leader in protocols used as a communication protocol on the internet. TCP/IP is still being used as a communication protocol in network operating systems (Abbate, 1994).…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    NT1330 Unit 1 Essay

    • 486 Words
    • 2 Pages

    So the previous section was discussing the findability Layer which enables humans and applications to search and find the smart thing's services they need, however in this section the main concern is to know more the next layer which is sharing layer. This layer’s main concern is to keep human and machine updated with the new information so the main concern was making this communication secure and free from hacks so researchers tried to use already existing protocols like HTTP that is already provides authentication mechanisms for securely sharing resources by which it allows clients to provide their user names and passwords in order to make HTTP request on a server and it is followed with SSL/TLS in order to make sure that the user names and…

    • 486 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    KSSL Case Study

    • 777 Words
    • 4 Pages

    Because of the global impact of such attacks, routing security is a critical issue for the whole Internet infrastructure. Attacks on routing protocols can cause legitimate traffic to flow over unsecure paths and create various types of security exposure for higher layer protocols ranging from eavesdropping to denial of service. Several routing protocols are used to exchange network topology and routing table information between routers. Commonly used intra-domain routing protocols are the Routing Information Protocol (RIP) and the Open Shortest Path First (OSPF). The Border Gateway Protocol (BGP) is the current inter-domain protocol used between the core routers on the Internet.…

    • 777 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Search Engine Essay

    • 700 Words
    • 3 Pages

    Both Archie and Gopher were used file transfer protocol (FTP) to work. In 1993, the field of search engines was changed because the first essential of the search engine was created by Oscar Nierstrasz at the University of Geneva in Switzerland. That search engine was called W3 catalog. Also, in 1993, the Department of Computer Science at the University of Stirling in Scotland released JumpStation that combined between three essential elements of the web search engine(crawling, indexing and searching). In 1994, Yahoo was one of the most common web crawling around the globe.…

    • 700 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Within this assignment I will discuss the factors that influence website performance. This is from user side factors and server side factors. I will explain how the side effects of the website will disturb the website performance. Starting the with download speed part of the factors which influence the website performance. The user will be able to determine the download speed by the internet connection.…

    • 1440 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The Internet in the way most people recognize it was formed around the beginning of the 1990s when scientist Tim Berners-Lee developed the World Wide Web. It has changed how we shop, how we are entertained, how we receive the news and how we get information. (Thomas, 2016). The Internet moves data from one place to another very…

    • 923 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The Importance Of Firewall

    • 1169 Words
    • 5 Pages

    For example: One computer in Canada and second one in New Zealand TCP/IP is also defining that how can data format and also give IP address to that data. It is also decide route of data means it’s also work with the help of router give path to data one computer to other computer. 1.11 DHCP (Dynamic Host Configuration Protocol) : Whenever we want to configure a network we have to assign IP address to all computers in our network. If we are creating small network it is easy to assign an IP address manually but if we want to develop a large network we can assign IP address with the help of DHCP server.…

    • 1169 Words
    • 5 Pages
    Great Essays