【TCP Transmission Control Protocol】What is it? + Feature ▷ 2022

For the beginnings of the Internet, all the communication that existed was one way. one way, that is, it was only known the sender of the information, not the receiver. All this was necessary to give way to change to improve the experience of Username and do two-way communications. Accordingly, they developed the tcp protocol for the 70s.

TCPs or also known as Transmission Control protocolshave as main function to inform of the destination of the data allowing the creation of secure connections.

According to all this, this type of protocol is used to securely establish a data exchange between sender and receiver. That is why here we are going to explain a little more about all this operation.

What is Transmission Control Protocol (TCP) and what is it used for on the Internet?

TCP has become one of the protocols most important on the internetit was created for the years 1973 and 1974where its function is to help different programs within the same data network may be composed of different computers, where each of them uses this system to be able to create a connection with each other, which will allow them to share different data.

All this guarantees that each of the data sent will be received by the receiver without any type of errors and correctly, where it also includes a mechanism that will allow differentiation of each of the applications within each team. This is how this offers very broad support to applications, such as web browsers, FTP clients, filesamong others.

Therefore, this tool allows applications to communicate with each other as if they were all connected. connected to each otherwhere it sends each of the data in a format that will be transmitted character by characterinstead of being transmitted by packets.

TCP History: How did it originate and who created this revolutionary system?

This entire system was created to the 70sthis is how exactly in 1973 and 1974 all this was created by Vint Cerf and Robert Kahn. However, this project began to be carried out in the 60s, when different researchers were looking for a way to share data in a safe and efficient way.

It’s like that for 1961, Leonard Kleinrock introduces what would be the packet switching. But, despite the fact that this project works very well, it was something that in the long term could be expensive and difficult. All this led to the search for a new alternative with a most reliable protocol. It is there that Cerf and Kahn developed the TCP model.

See also  【Catfish Charlie】The CIA Spy Robotic Fish ▷ 2022

This new model provided some advantages with respect to those previously implemented, this is how he offered a lower consumption of resources and it could also be implemented to a much lower cost. Thanks to these aspects and many others, it began to gain popularity and to the year 1983 would be integrated into version 4.2 of the UNIX operating system. This is how it ended up becoming the Internet standard.

What are the main functions and characteristics of the TCP protocol?

This pattern ended up becoming one of the most important network toolsit had a set of functions and features that allowed the successful completion of the information sharing and applications between computers.

In this way, Here we present the main functions and characteristics of this model:

functions

tcp he is considered like the intermediary layer between the Internet Protocol (IP) and the application. Where all this primarily requires that each of the communications be secure, especially since it is taken into account that the IP layer provides a highly unreliable datagram service.

That is why this model implemented in the 70s adds key functions that allow communication between a sender and receiver in a secure way, without loss and free of errors.

This is how it can be said that this model has been designed to handle end-to-end connectionsthey can exist from connections of point by pointso they are also known as virtual circuits.

In this way, here we present its main functions:

  • It allows connection orientationthis is how two computers can establish a connection to exchange information without any error.
  • It has a full-duplex operation, where this model becomes a pair of vital circuits where each of them has a specific address. Only the two synchronized final systems will be the ones who can use this circuit.
  • offers a Delivery receipt, that is, the receiver sends an acknowledgment indicating that it has received the packages sent by the sender.
  • Also note that the option of Error Checkingit is used to verify that the packages do not have failures or problems.
  • It offers a service of packet recovery where the receiver can request packet retransmission if necessary, that is, if the package has not been notified as received.
  • The receiver has the opportunity to drop some or all packets sent by the sender.
See also  【Install Digital Certificate on iPhone】Step by Step Guide 2022

Characteristic

Regarding the characteristics of this system we can find the following:

  • It gives the possibility that each of the data is formed in segments of varied length so that they can be delivered to IP protocol.
  • Allows you to place each of the segments in order when they come from the IP model.
  • offers a data flow monitoring and thus prevents the existence of a network saturation.
  • You can start and end a communication reliable and safe.
  • Allows different applications to circulate simultaneously under the same line.

How is the transmission control protocol better than UDP?

Today it is considered that the transmission control protocol is superior to DUPtaking into account that the TCP is mainly based on the communication in a secure way and the integrity of each of the packets that travel through the Internet. While PDUis based on the transport used in IP networks.

In the case of UPD, is one that provides datagram unreliable transport level, This is because it only adds the basic and necessary information for it to take place. point to point communication. This system is mainly used by applications such as CPR or NFSbut it is mainly used in task of control and transmission of audio and video through the network.

Meanwhile he tcp, if you provide a reliable transport of flow between applications, thus providing greater security in each of the information shared. He ensures that none of the packages present errors or losses and, in turn, maintains the order in which each of these packets arrive. That is how the tcp segment allows an overload on each of its 20 byte packets, Meanwhile he 8-byte UPD only.

That is why it is considered that the DUP is more important when it comes to getting a reliable speedwhile the TCP will ensure the reception of the information to be shared.

How does TCP work in world wide web browsing?

This model consists of a very simple operation that is based on three phases. The first one is she is about power establish a connection with the authorization of both parties. In this case, a procedural process called “Negotiation” in three steps.

See also  【 SHADOW in WORD 】What is it? + Advantages ▷ 2022

Then it begins to carry out what is the transfer of informationbeing here where each one of the parameters of the correct and safe exchange. Finally, it is carried out the connection between client and server.

In that segment each of data is delivered in the same order as it is sent, thus avoiding any disorder in the information or a separation of layers. In addition, it serves as a mechanism that allows differentiating each of receiving or sending apps within the same team, for this the term or concept of “Port”.

What is a TCP port and what is its importance in the system?

The ports are used mainly to be able to identify each of the sending or receiving system applications. where each of the sides of the Connection has an associated port number which ends up being assigned by the sending or receiving app.

It should be noted that these ports are classified into three different categories: well-known ports, those registered Y dynamic and private ports.

well known ports

These are assigned by the Internet Assigned Numbers Authorityand usually range from 0 to 1023. All of them are used by each of privileged processes. Where the apps that use these ports are executed as servers, and we can find the following: HTTP, FTP, SMTP, SSH.

registered ports

They are frequently employees by applications used temporarily when they connect with the servers, but they can also be due to some kind of service that has been previously registered by a third party. These ranges are usually between 1024 and 49151.

Dynamic or private ports

In this case, the range is between 49152 to 65535and can be used by user apps, but it is usually the least common of the three. It is important to mention that these ports not have no meaning out of tcp connection in which they were used.

Loading Facebook Comments ...
Loading Disqus Comments ...