TCP IP Model (1) Final
TCP IP Model (1) Final
TCP IP Model (1) Final
What is TCP / IP ?
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used
to interconnect network devices on the internet. TCP/IP is also used as a communications protocol in a private
computer network .
TCP/IP specifies how data is exchanged over the internet by providing end-to-end communications that
identify how it should be broken into packets, addressed, transmitted, routed and received at the destination.
TCP/IP requires little central management and is designed to make networks reliable with the ability to recover
automatically from the failure of any device on the network.
History
The most popular network protocol in the world, TCP/IP protocol suite, was
designed in 1970s by two DARPA scientists — Vint Cerf and Bob Kahn,
persons most often called the fathers of the Internet.
In the spring of 1973, they started by conducting research on reliable data
communications across packet radio networks, factored in lessons learned from
the Networking Control Protocol, and then created the next generation
Transmission Control Protocol (TCP), the standard protocol used on the
Internet today.
Founders Of TCP/IP
Evolvement of
TCP/IP
TCP/IP became the standard Internet communications protocol that allow digital
computer to communicate over long distances.
The Internet is a packet-switched network, in which information is broken down into
small packets, sent individually over many different routes at the same time, and then
reassembled at the receiving end.
TCP is the component that collects and reassembles the packets of data, while IP is
responsible for making sure the packets are sent to the right destination.
TCP/IP was developed in the 1970s and adopted as the protocol standard
for ARPANET (the predecessor to the Internet) in 1983.
How does TCP / IP work?
TCP/IP uses the client-server model of communication in which a user or machine (a client)
is provided a service, like sending a webpage, by another computer (a server) in the
network.
Collectively, the TCP/IP suite of protocols is classified as stateless, which means each client
request is considered new because it is unrelated to previous requests. Being stateless frees
up network paths so they can be used continuously.
TCP / IP model vs. OSI model
TCP/IP and OSI are the most widely used communication networking protocols. The main difference is that OSI
is a conceptual model that is not practically used for communication. Rather, it defines how applications can
communicate over a network. TCP/IP, on the other hand, is widely used to establish links and network
interaction.
The TCP/IP protocols lay out standards on which the internet was created, while the OSI model provides
guidelines on how communication has to be done. Therefore, TCP/IP is a more practical model.
The TCP/IP and OSI models have similarities and differences. The main similarity is in the way they are
constructed as both use layers, although TCP/IP consists of just four layers, while the OSI model consists of the
following seven layers:
The following image depicts both models in graphic form. It also shows their
interrelation:
Similarities between TCP / IP and OSI
The similarities between the TCP/IP model and the OSI model include the following:
They are both logical models.
They define networking standards.
They divide the network communication process in layers.
They provide frameworks for creating and implementing networking standards and devices.
They enable one manufacturer to make devices and network components that can coexist
and work with the devices and components made by other manufacturers.
Why is TCP / IP important?
TCP/IP is nonproprietary and, as a result, is not controlled by any single company. Therefore,
the IP suite can be modified easily. It is compatible with all operating systems (OSes), so it
can communicate with any other system. The IP suite is also compatible with all types of
computer hardware and networks.
TCP/IP is highly scalable and, as a routable protocol, can determine the most efficient path
through the network. It is widely used in current internet architecture.
Layers of TCP / IP -
The TCP /IP model consists of only four layers. These are application, transport, internet, and
network.
• Network layer :
The network (or network interface layer, as it is also known is the bedrock of the TCP /IP model). This drives the
signals across the own) network. It transmits and receives bits over the network hardware such co-axial or twisted
pair copper cable. This exists over the physical layer as includes the following protocols:
Ethernet
Token-ring
Frame relay
FDDI
X.25
RS-232
v.35
Layers of TCP / IP -
• Internet layer :
The Internet layer is at the heart of the TCP /IP model. This packages the data into IP datagrams and performs
routing for these datagrams based on the source and destination information in the header. The protocols used at
this layer include the following:
Internet Protocol (IP) ·
Internet Control Message Protocol (ICMP).
Address Resolution Protocol ( ARP).
Reverse Address Resolution Protocol (RARP).
Layers of TCP / IP -
• Transport layer :
This layer manages the communication session between the host computers. During the data transportation
process, this defines the level of service and the connection status. The transport layer uses the following
protocols:
Transmission Control Protocol (TCP) .
User Datagram Protocol (UDP) .
Real-time Transport Protocol (RTP).
Layers of TCP / IP -
• Application layer :
The application layer combines the functions of the OSI application, presentation, and session layers. This layer
defines how the host programs interface with transport layer services as well as their related application
protocols. Some of the protocols in this layer are as follows:
Simple Mail Transfer Protocol (SMTP).
HTIP.
FTP.
Telnet.
Simple Network Management Protocol (SNMP).
DNS.
Trivial File Transfer Protocol (TFTP).
Uses of TCP / IP -
TCP/IP can be used to provide remote login over the network for interactive file transfer to
deliver email, to deliver webpages over the network and to remotely access a server host's
file system.
Most broadly, it is used to represent how information changes form as it travels over a
network from the concrete physical layer to the abstract application layer.
It details the basic protocols, or methods of communication, at each layer as information
passes through.
Advantages of TCP / IP -
The advantages of using the TCP/IP model include the following:
helps establish a connection between different types of computers;
works independently of the OS;
supports many routing protocols;
uses client-server architecture that is highly scalable;
can be operated independently;
supports several routing protocols; and
is lightweight and doesn't place unnecessary strain on a network or computer.
Disadvantages of TCP / IP -
The disadvantages of TCP/IP include the following:
is complicated to set up and manage;
transport layer does not guarantee delivery of packets;
is not easy to replace protocols in TCP/IP;
does not clearly separate the concepts of services, interfaces and protocols, so it is not
suitable for describing new technologies in new networks; and
is especially vulnerable to a synchronization attack, which is a type of denial-of-service
attack in which a bad actor uses TCP/IP.
IP ( Internet Protocol) -
Whenever we see a stranger that we want to speak to, it always helps if we speak the same
language. In computer world, the language of communication is called a protocol. IP is one of
the languages that multiple computers use to communicate with each other as a part of the
layered architecture model.
On top of the IP, there are TCP, UDP, and some others.
IPv4 has a 32-bit address length. IPv6 has a 128-bit address length.
It Supports Manual and DHCP address It supports Auto and renumbering address
configuration. configuration.
In IPv4 end to end, connection integrity is In IPv6 end to end, connection integrity is
Unachievable. Achievable.
Address space of IPv6 is quite large it can produce
It can generate 4.29×109 address space.
3.4×1038 address space.
In IPv4 Encryption and Authentication facility not In IPv6 Encryption and Authentication are provided.
provided.
IPv4 has a header of 20-60 bytes. IPv6 has header of 40 bytes fixed.
IPv4 can be converted to IPv6. Not all IPv6 can be converted to IPv4.
IPv4 consist of 4 fields which are separated by dot IPv6 consist of 8 fields, which are separated by colon
(.). (:).
Example of IPv6:
Example of IPv4: 66.94.29.13.
2001:0000:3238:DFE1:0063:0000:0000:FEFB.
How does it work?
It splits or breaks up the initial data (that is to be sent) into datagrams. Each datagram will have a header,
including the IP address and the port number of the destination.
Datagrams are then sent to selected gateways, that is, IP routers. These routers are connected to the local
network and to an IP service provider network at the same time.
These routers start the relay process, wherein datagrams are transferred from gateway to gateway until they
arrive at their final destination.
The following diagram illustrates this concept in a simple-to-understand manner:
Whenever two hosts communicate with each other using the Internet Protocol, there is no need for a
continuous connection. One host sends the data to another via a data packet Each packet header contains the
source destination addresses as well as the sequence number and is treated as an independent unit of data. The
TCP is responsible for reading the packet headers and putting the packets in the correct sequence so that the
message is readable.
Structure of IP Packet –
Let's take a look at the following structure of an IP packet:
The IP's functionality and limitations are defined by the fields at the beginning of the
packet. This is called the frame header.
The source and destination address fields have 32 bits allocated to encode their data
Various additional information, such as the total packet length in bytes, is encoded in 16
bytes in the remainder of the header.
Normally, the application layer sends the data that is to be transmitted to the transport layer.
The transport layer adds a header and sends it to the Internet layer. The Internet layer adds its own
header to this and sends it to the network layer for physical transmission in the form of an IP
datagram.
The network layer adds its own frame header and footer and then physically transmits it over the
network.
At the other end, when the datagram is received, this process is reversed and the different headers
are stripped as the data moves from layer to layer.
The following diagram represents how headers are added and removed as we move from layer to layer :-
Transmission Control Protocol (TCP) -
IP packets are a basic service that do not guarantee safe delivery. TCP remedies this by adding
the following elements:
Error detection
Safe data transmission
Assurance that data is received in the correct order.
Before sending the data, TCP requires the computers that are communicating to establish a
connection with each other:
Whereas IP is limited to sending 64-kb data streams, large data streams can be sent as one
big stream of data using TCP.
TCP does this by breaking up the data stream into separate data packets. Each packet is
numbered and its sequence number is stored in the header.
On arrival, these disparate packets are reassembled using sequence and sequence
acknowledgement numbers. TCP specifies the port numbers.
This improves the capabilities over IP. Every TCP /IP machine can communicate using
65,536 different ports or sockets.
All data in a TCP packet is accompanied by a header. The header contains information
related to the source port, destination port, sequence number, sequence acknowledgement
number, and some miscellaneous header data.
User Datagram Protocol (UDP) -
Similar to the TCP, the UDP is also built on top of the IP.
It has the same packet-size limit (64 kb) as IP; however, it allows specifying port
numbers. This provides 65,536 different ports, which is the same as TCP. Therefore, every
machine has two sets of 65,536 ports: one for TCP and the other for UDP.
The difference between the two is that UDP is a connection-less protocol, without any
error detection facility. It only provides support for data transmission from one end to
other without any verification. As it does not do any further verification, UDP is very fast.
This is its main feature and it is extremely useful in sending small and repetitive data at a
very high speed.
Some examples of this are audio and video streaming, games, time information that is
continuously streamed, and so on.
References -
https://www.techtarget.com/searchnetworking/definition/TCP-IP
https://www.geeksforgeeks.org/tcp-ip-model/
https://scos.training/history-of-tcp-ip/
https://techgrapher.com/ip-centre/what-are-the-functions-of-an-ip-centre/
Video Links -
https://www.youtube.com/watch?v=GfaHdjApnhU
https://www.youtube.com/watch?v=G54YqTAIS70
https://www.youtube.com/watch?v=jPUHSlo121E
THANK YOU.