Verified Document

TCP IP Protocol Term Paper

¶ … TCP/IP Protocol Suite For the average computer user, TCP/IP probably doesn't mean a whole lot, except maybe when it comes to "configuring" their computer so they can get online, but without the TCP/IP protocol, the activity experienced on the Internet up until this point would not be possible. This paper will examine some of the components of the TCP/IP protocol and explore their uses as they apply to relevant parts of the Internet.

TCP/IP is the acronym for Transmission Control Protocol/Internet Protocol, which was originally established by the Department of Defense in 1993 to connect defense department computers with other computer networks. This network grew to include government and educational institution computers and eventually it has grown to include the widespread use of commercial and private networks.1

Simply put, TCP/IP "allows cooperating computers to share resources across a network." 2 Developed by Department of Defense researchers, TCP/IP once revolved around that ARPAnet.2 Over the years, it has become an integral part of the network of networks assisting computer users with anything from sending a simple piece of electronic mail to processing a sensitive business transaction.

Taking a closer look, the TCP/IP protocol can be seen as a communications protocol with three layers. One layer is the Internet protocol (IP), which is responsible for moving data from computer to computer. Transmission Control Protocol/Internet Protocol (TCP) is a layer which verifies the delivery of data. Another layer of the TCP/IP protocol is referred to as sockets, which are packages of "subroutines that provide access to TCP/IP on most systems." 3

According to Jim Carr, in an article...

The IP part of the protocol is responsible for receiving, or accepting data and the TCP part ensures that the data is delivered "error-free, in the order it was sent, and without loss or duplication."4
TCP and IP actually represent a family of many protocols, with TCP/IP being the common term used when speaking of any one of those protocols. For instance, different protocols allow computers to do different things such as transferring files or sending or receiving mail. One of the most important services of TCP/IP is the ability to transfer files, commonly referred to as FTP, which allows a user on one computer to get files or a part of a file from another computer. Another popular service TCP/IP allows is the remote logon, which allows a user to access to a network system from a computer at a remote location. Probably the most popular, or at least one of the most common, uses provided by TCP/IP is electronic mail. Other services TCP/IP offers are data formatting, encryption, and the transmission of binary data over a communications network.5

The TCP/IP protocol model is known as the DARPA model and the architecture of that model are application, transport, Internet and network interface. Each layer of the DARPA model corresponds to one of the layers in the ISO/OSI model.

ISO/OSI is the standard model of connection, which has its own set of layers and functions that are worth mentioning. ISO/OSI layers include application, presentation, session, transport, network, data-link, and physical. In addition to the protocols already…

Sources used in this document:
Bibliography

Jim Carr. Network Magazine. The TCP/IP Protocol Suite November 1990. (9 December 2002). http://networkmagazine.com/article/printablearticle-doc_id=.NMG20000727S0022htm.(9 December 2002).

H. Gilbert. Introduction to TCP/IP. 1995. http://www.yale.edu/pclt/COMM/TCPIP.htm (December 2002).

Internet Guide. What is TCP/IP? 2002. http://Internet-guide.co.uk/tcp-ip.html (9 December 2002).

Introduction to TCP/IP. September 1998. http://msdnmicrosoft.com/library/en-us/dniph/html/tcpipintro.asp?fr.htm (9 December 2002).
Steven Newton. What is TCP? 2002. http://Internet-guide.co.uk/tcp-ip.html (9 December 2002).
TCP/IP Protocol Suite. http://protocols.com/pbook/tcpip.htm (9 December 2002).
Cite this Document:
Copy Bibliography Citation

Related Documents

IT Management Class Networking Protocols Are Powerful
Words: 1297 Length: 5 Document Type: Essay

IT Management Class Networking Protocols Are Powerful Catalysts of Collaboration Across Organizational Boundaries The foundation of the Internet is based on the Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocol that serves to arbitrate control of the many connections that comprise the Web, with design criterion specifically designed to avoid packet collisions and ensure the highest performance possible. The TCP/IP protocol is based on the Carrier Sense Multiple Access/Collision Detect (CSMA/CD), an approach to

History of Transmission Control Protocol TCP
Words: 670 Length: 2 Document Type: Essay

History of TCP/IP Transmission Control Protocol (TCP) and Internet Protocol (IP) are two of the leading protocols that were developed for the transmission of data between computers, servers and other devices. They were developed during the 1960s with the development of the Network Control Protocol, which would allow the existence of ARPANET, basically the first network. Vinton Cerf and Robert Kahn were the key players who proposed a set of key

Internet Protocols the Internet Is More Than
Words: 631 Length: 2 Document Type: Essay

Internet Protocols The internet is more than what it appears to many of its users. The World Wide Web is the standard and most popular method or protocol of acquiring information off the interconnectivity that the internet provides. The purpose of this essay is to define an internet protocols and give examples of several different types and the advantages and disadvantages they provide for myself and other users of this technology. HTTP

Personal Statement an Internet Protocol
Words: 818 Length: 3 Document Type: Term Paper

The address classes are the defined as a, B, C, D or E.This is however dependent on the initial bits. The total of number of addresses in IPv4 are 4 294-967-296. As for IPv6, the address is made up of 128 bit long pieces which are 16 bytes. The fundamental structure of IPv6 is 64 bits (network number) and 64 bits (host number). In most case the host portion

Voice Over IP VOIP Security
Words: 1789 Length: 4 Document Type: Term Paper

Voice over IP (VoIP) Security Voice over Internet Protocol or VoIP refers to making use of telephone services over that of the computer networks. During the first part of the process, the VoIP makes an analog signal which is evolved from the speaker's voice. It is then transferred to a digital signal and further transfers over that of an IP network and this is well inclusive of the Internet. Voice over

Protocol and Network Management
Words: 1176 Length: 3 Document Type: Essay

wartime communication, business operations, or protecting oneself from identity theft, secure communication via the Internet is a top priority. Every day, malicious users are creating and releasing new forms of malware that are increasingly difficult to detect and combat. Many of these hackers are motivated by a desire to steal private information -- a crime that can be devastating to any victim. Fortunately, many "good guys" are also working

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now