0% found this document useful (0 votes)
23 views12 pages

FINALTransmission Control ProtocolInternet

Uploaded by

biswasparijat42
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views12 pages

FINALTransmission Control ProtocolInternet

Uploaded by

biswasparijat42
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

INFORMATION SECURITY

BCAD501H
GROUP: F
MEMBERS NAME:
NAME ROLL
1. RICKTA SHAW – 22601221187
2. SAYONIKA GHOSH – 22601221073
3. SUVECHYA DAS – 22601221189
4. PRINCE BISWAS – 22601221058
5. AYUSH CHAKRABORTY – 22601221037
 TOPIC: TCP/IP MODEL WITH PROPER DIAGRAM
TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of
networking protocols that enable communication and data exchange
between devices over the Internet or local networks. This model is a
part of the network domain designed specifically for overseeing
efficient and error-free transmission of data.

•The TCP/IP model was developed before to the OSI model.


•The TCP/IP model is not exactly similar to the OSI model.
•TCP/IP is a hierarchical protocol made up of interactive modules, and
each of them provides specific functionality.
 TCP/IP Layers

Application Layer Transport Layer


The layer that deals with applications like web browsers, email The layer responsible for providing reliable or unreliable
clients, and FTP clients. delivery of data.

Internet Layer Network Access Layer


The layer that deals with routing and delivering data between The physical layer that deals with the sending and receiving of
networks. data through various hardware components.
 FEATURES OF TCP
 The TCP/IP model is among one of the most important
network concepts that contributed to the working of
ARPANET.

 TCP provides end-to-end communication.

 The layers in the model provide maintenance of


communication channels, flow control, and reliability check
format, among other applications in the form of protocols.

 TCP provides flow control and quality of service.

 TCP operates in Client/Server point-to-point mode


A message that flows between two
computers
across the layers of the TCP/IP protocol
stack
Application Layer Application Layer

Transport Layer Transport Layer

Internet Layer Internet Layer

Network Access Layer Network Access Layer

Internet
Application Layer
•An application layer is the topmost layer in the TCP/IP model.
•It is responsible for handling high-level protocols, issues of representation.

•This layer allows the user to interact with the application.


•When one application layer protocol wants to communicate with another
application layer, it forwards its data to the transport layer.

• Some of the protocols used in this layer are:


• HTTP: Hypertext transfer protocol is used for accessing the information
available on the internet.

• SMTP: Simple mail transfer protocol, assigned the task of handling e-


mail-related steps and issues.
• FTP: This is the standard protocol that oversees the transfer of files over
the network channel.
Transport Layer
•The transport layer is responsible for error-free, end-to-end delivery of data
from the source host to the destination host.

•This layer builds on the message which are received from the application
layer. It helps ensure that data units are delivered error-free and helps you to
control the reliability of a link through flow control, error control, and
segmentation or de-segmentation.

• The protocols used in this layer are:


• TCP: is responsible for the proper transmission of segments over the
communication channel. It also establishes a network connection between the
source and destination system.

• UDP: User Datagram Protocol is responsible for identifying errors, and


other tasks during the transmission of information
Internet Layer
•The Internet layer is responsible for logical transmission of data packets over the internet
•It routes each of the data packets independently from the source to the destination, using the optimal route.

•It reassembles the out-of-order packets when they reach the destination.
•It handles the error in the transmission of data packets and fragmentation of
data packets

The main protocol in this layer is Internet Protocol (IP) and it is supported by the
protocols ICMP, IGMP, RARP, and ARP. Some of the protocols applied in this layer
are:
IP: This protocol assigns your device with a unique address; the IP address is also
responsible for routing the data over the communication channel.

ARP: This protocol refers to the Address Resolution Protocol that is responsible for finding
the physical address using the IP address.
Network Access Layer
A network access layer is the lowest layer of the TCP/IP model.
It is the combination of the Physical layer and Data Link layer,
defined in the OSI model.

• It defines how the data should be sent physically through the


network.
• This layer is mainly responsible for the transmission of data between
two devices on the same network.

• The functions carried out by this layer are encapsulating the


IP datagram into frames transmitted by the network and
mapping of IP addresses into physical addresses.

Some protocol that is supported by this layer −Ethernet, Frame


Relay, Token Ring, ATM
 Advantages of the TCP/IP model

1 Flexibility: 2 Security: 3 scalability


•It helps you to establish/set up a • The various protocols in the model • TCP/IP model has a highly
connection between different types of provide robust security measures. scalable client-server
computers.
architecture.
•It operates independently of the • It supports many routing protocols.
operating system. • It can be operated
• Supports a number of routing independently
•It can be used to establish a protocols.
connection between two computers.
 Disadvantages of the TCP/IP model

1 Complexity: 2 Vulnerability 3 Performance:

The model is quite complex Because of its complexity, it is Performance can be degraded
and requires a certain degree of vulnerable to attack. due to network congestion and
expertise to configure and latency.
maintain.
THE END THANK YOU FOR GIVING
US THIS OPPORTUNITY

You might also like