Verified Document

History Of Transmission Control Protocol TCP Essay

Related Topics:

History of TCP/IP

Transmission Control Protocol (TCP) and Internet Protocol (IP) are two of the leading protocols that were developed for the transmission of data between computers, servers and other devices. They were developed during the 1960s with the development of the Network Control Protocol, which would allow the existence of ARPANET, basically the first network. Vinton Cerf and Robert Kahn were the key players who proposed a set of key protocols and standards to allow these machines to transmit packets of information to each other (Studenting, n.d.), with the idea being that this would serve as the basis for conventions for interconnecting networks, and for routing traffic.

The initial design for TCP came with four objectives: network connectivity, distribution, error recovery and black box design. The latter term meant that no internal changes would be needed to a network for it to connect to other networks; in other words it would be standardized and work out of the box (History – Computer.com, n.d.).

The development of TCP allowed for the subsequent development of the Internet. The key component was that this was a standardized means for networks to communicate, so that any network being built should utilize this protocol....
The protocol managed things like routing, and how the computers would communicate with each other. With every network using the same standard, the Internet was now possible, though it would not be developed right away.
In 1983, it was mandated that all computers connected to ARPANET use TCP/IP (Studenting, n.d.), and this mandate basically set the stage for the dominance of these protocols. The reason was simply that the development of other competing protocols would make the development of a global network difficult. Everybody on ARPANET had to be able to talk to each other using the same protocols or otherwise, conceptually, the network would not work as intended. Originally, ARPANET was designed to work with a number of different protocols. Trying to use multiple different protocols created particular challenges and added needless complexity to ARPANET, which is why the idea came about to have a standardized set of protocols, which in turn would allow ARPANET to properly scale (Kozierok, 2005)

TCP has continued to evolve over time. By 1988, TCP was adapted to incorporate congestion avoidance mechanisms. By 1994, timeouts and delays were measured. 1997 saw further congestion avoidance mechanisms and recovery algorithms. 2002 saw the…

Cite this Document:
Copy Bibliography Citation

Related Documents

History and Effects of the Internet on Instruction in K-12 Schools...
Words: 1726 Length: 5 Document Type: Research Paper

Internet and K-12 Schools The history and effects of internet The History and Effects of the Internet on Instruction in K-12 Schools The History and Effects of the Internet on Instruction in K-12 Schools History of the Internet in K-12 Schools Interactive Websites and Games as Computer-Aided Instruction The History and Effects of the Internet on Instruction in K-12 Schools Creating and sustaining a literate nation capable of democracy, self-government and continuous improvement of quality of life

Diameter Vs. Radius Protocols Implications
Words: 2291 Length: 7 Document Type: Term Paper

As the RADIUS protocol is a connectionless protocol it is low-level in terms of its functionality and cannot support the more complex unmet needs of WLANs and ISPS today (Wirbel, 2004). Conversely, Diameter supports the Transmission Control Protocol (TCP) and the Stream Control Transmission Protocol (SCTP) have the functionality necessary to provide connection-oriented controls over flow control and arbitrating packets across the network. This is one the most significant

Light Does Not Turn on One Must
Words: 2365 Length: 7 Document Type: Essay

light does not turn on one must take several considerations in determining the cause of the situation. In order to figure out why the light is not turning on, analysis of the situation through the scientific method may be utilized. The first step is to pose the question of why the light does not turn on. Research must then be undertaken to determine the cause. In this instance, there

Cybercrime What's in a Name
Words: 2690 Length: 9 Document Type: Term Paper

In this scenario, "if a bad guy wants to take over an account, he'll have someone else speak in a different language in a different location, and that's all they do. Their expertise is calling financial institutions for social engineering" (Piazza 2006). According to Piazza (2006), cybercrime consists of any crime a person commits by using a computer or computer technology. He classifies various types of cybercrime into four

Branding and Promotion Wincor-Nixdorf Branding
Words: 2949 Length: 11 Document Type: Essay

The consolidation of the banking industry forced higher levels of trusted interbank trading and exchanges (Lin, Hu, Sung, 2005) fueled the rapid growth of multichannel banking, thin client technologies including AJAX, JAVA (J2EE) and XML, and led eventually to mobile devices including PDAs and smart phones being able to manage financial queries and transactions (Ho, Mallick, 2010). All of these technologies had taken on immediate and urgent priority by

How E-Commerce Began
Words: 657 Length: 2 Document Type: Term Paper

History Of E-Commerce Information Systems For most users of e-commerce, it is a relatively young practice. People who have more than just a superficial knowledge of the history of modern technology know that there were a number of leaps and bounds made in this area in the 1990s. Yet, the quiet history of e-commerce began not in the 1990s, but in the 1960s. In the early days of e-commerce, the parties able

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now