The Transmission Control Protocol/Internet Protocol (TCP/IP)

Great Essays
Transmission Control Protocol/Internet Protocol (TCP/IP) are a suite of protocols designed for large-scale internetworks that span LAN and WAN environments. TCP/IP are communication protocols that are used to handle traffic on the internet and other networks. The two most important protocols are the Transmission Control Protocol (TCP) and the Internet Protocol (IP). These are today the standard networking protocols and were created from a synthesis of a number of earlier developments in the 1960’s and 1970’s. TCP/IP protocols were developed in the early 1970’s by scientists Vint Cerf and Bob Kahn. They developed the TCP/IP protocols as part of Defense Advanced Research Projects Agency (DARFA) which was part of a research network that had …show more content…
First, Jon Postel, who was one of the foremost people in the development of the early internet and TCP/IP, published a series of comments on the state of TCP. Postel’s comments led to the creation of TCP/IP architecture, and the splitting of TCP into TCP at the transport layer and IP at the network layer. Then in November, 1977, a three-network TCP/IP test was conducted between sites in the US, UK, and Norway. (CITE) 1978 saw version 3 of TCP as the process of dividing TCP into two parts began. Then in 1980 the first formal standard versions (version 4) of IP and TCP were created to be used in modern networks. In 1981 the Internet Protocol (IP) was introduced and described how to implement and addressing standard and route packets between interconnected networks. BY 1982 the US Department of Defense declared TCP/IP as the standard for all military computer networking. (CITE). Then in January 1983, ARPAnet started to require the use of TCP and IP protocols as a standard for all network traffic and essential communication. It was at this point that the protocols began to be known as the TCP/IP protocol …show more content…
The protocols also include provisions that permit it to function on most lower-level forms of technology, such as LANs, wireless LANs and WANs of various sorts. This enables people to mix and match a variety of different underlying networks and connect them all using TCP/IP.
• Scalability: The TCP/IP protocols have proven to be extremely scalable over the years. As the internet has grown from a few servers to millions of hosts, the core of TCP/IP is nearly the same as it was about 25 years ago. The only changes having been made are the ones required to support the growth of the internet and are done as a part of the TCP/IP development process.
• The Open Standards and Development Process: The standards used by TCP/IP are not exclusive, but freely available to the public. Also the process used to create the TCP/IP standards are freely available to the public. TCP/IP standards and protocols were developed and have been modified using the unique, democratic “RFC” process. This process allows anyone interested in TCP/IP protocols to provide input in regards to their development and helps ensure that the protocol suite is accepted worldwide.

Related Documents

  • Great Essays

    Nt2580 Unit 6 Lab 1

    • 1713 Words
    • 7 Pages

    OMIS 660 Business Computing Environment and Network Lab - 1 REPORT TCP: Transmission Control Protocol SUMMARY: The idea of TCP congestion control is for each sender to determine the available capacity in the network so that it knows how many packets can be safely transmitted. The congestion window is a state variable for each connection which is used by the sender to limit how much data a sender can transmit into the network before receiving an acknowledgement. This report consist of the simulation of different model of TCP transmission which demonstrates the congestion control using the variation of dynamic window size implemented by TCP (Transmission Control Protocol). Various models are considered where packet drop rates are varied for demonstration of different situations from…

    • 1713 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Kerberos authentication protocol that establishes a trusted connection between hosts in the untrusted network. The key function of this protocol is that it allows a single sign-on in a distributed network. It's best features lays in the fact that the password does not get shared over the network between nodes. In addition, it uses KDC - key distribution center which keeps the access maintained.…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    3. IP Transit IP Transit, also known as Internet Transit, is what allows traffic from a network to cross or "transit" to a provider network. This type of service is generally used to connect one of the smaller internet service providers to the rest of the internet. 4. Dark Fibre Dark Fibre, also known as, unlit fibre, is an unused optical fibre that's commonly used in fibre-optic communication.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    For this section of the report I will explain the management tools and technologies used for communicating through network to network, I will also give example on how these tools are used especially in business. Operating systems are simple software which will enable the user to be able to access function to the computer itself, the process is an input and output process where the user will input a function, e.g. through keyboard, and the output will be shown through the monitor. There are many different types of operating systems and depending on your hardware (computer), you can have a different operating systems, in different electronic devices, from computers to mobile phones and tablets. Here are the most common computer operating system:…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Decent Essays

    NT1330 Unit 1 Essay

    • 486 Words
    • 2 Pages

    So the previous section was discussing the findability Layer which enables humans and applications to search and find the smart thing's services they need, however in this section the main concern is to know more the next layer which is sharing layer. This layer’s main concern is to keep human and machine updated with the new information so the main concern was making this communication secure and free from hacks so researchers tried to use already existing protocols like HTTP that is already provides authentication mechanisms for securely sharing resources by which it allows clients to provide their user names and passwords in order to make HTTP request on a server and it is followed with SSL/TLS in order to make sure that the user names and…

    • 486 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Final Exam Paper

    • 1307 Words
    • 6 Pages

    2.3 What is Protocol? Protocol is defined as a set of Rules which governs the communication to a network Between the Layers. In Order to establish a communication in a network Successfully, These are the Following Example: File Transfer Protocol, Simple Mail Transfer Protocol. 2.4…

    • 1307 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    KSSL Case Study

    • 777 Words
    • 4 Pages

    Because of the global impact of such attacks, routing security is a critical issue for the whole Internet infrastructure. Attacks on routing protocols can cause legitimate traffic to flow over unsecure paths and create various types of security exposure for higher layer protocols ranging from eavesdropping to denial of service. Several routing protocols are used to exchange network topology and routing table information between routers. Commonly used intra-domain routing protocols are the Routing Information Protocol (RIP) and the Open Shortest Path First (OSPF). The Border Gateway Protocol (BGP) is the current inter-domain protocol used between the core routers on the Internet.…

    • 777 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Within this assignment I will discuss the factors that influence website performance. This is from user side factors and server side factors. I will explain how the side effects of the website will disturb the website performance. Starting the with download speed part of the factors which influence the website performance. The user will be able to determine the download speed by the internet connection.…

    • 1440 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The Importance Of Firewall

    • 1169 Words
    • 5 Pages

    For example: One computer in Canada and second one in New Zealand TCP/IP is also defining that how can data format and also give IP address to that data. It is also decide route of data means it’s also work with the help of router give path to data one computer to other computer. 1.11 DHCP (Dynamic Host Configuration Protocol) : Whenever we want to configure a network we have to assign IP address to all computers in our network. If we are creating small network it is easy to assign an IP address manually but if we want to develop a large network we can assign IP address with the help of DHCP server.…

    • 1169 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Search Engine Essay

    • 700 Words
    • 3 Pages

    After that in 1996, the company which is called Netscape; was created Internet browser. It was used as the…

    • 700 Words
    • 3 Pages
    Improved Essays