Index:
UPDATED ✅ Do you want to know what a TCP protocol is and what it is used for when browsing the internet? ⭐ ENTER HERE ⭐ and Learn all about it ✅ EASY and FAST ✅
For the beginnings of the Internet, all the communication that existed was in a one way, that is, it was only known the sender of the information, not the receiver. All this was necessary to give way to change for enhance the experience of Username and do two-way communications. Accordingly, they developed the TCP protocol for the 70’s.
The TCPs or also known as Transmission Control protocolstheir main function is to inform of the data destination allowing the creation of secure connections.
According to all this, this type of protocol is used to safely establish a data exchange between sender and receiver. That is why here we are going to explain a little more all this operation.
What is Transmission Control Protocol (TCP) and what is it used for on the Internet?
TCP has become one of the protocols most important on the internetit was created for the years 1973 and 1974where its function is to help different programs within the same data network may be composed of different computers, where each of them uses this system to be able to create a connection with each other, which will allow them to share different data.
All this guarantees that each one of the data sent they will be received by the receiver without any type of errors and correctly, where it also includes a mechanism that will allow differentiating each of the applications within each computer. This is how this offers a very broad support to applications, such as web browsers, FTP clients, filesamong others.
Therefore, this tool allows applications to be able to communicate with each other as if they were all connected to each otherwhere each sends the data in a format what will be transmitted character by characterinstead of being transmitted by packets.
History of the TCP: How did it originate and who created this revolutionary system?
This whole system was created to the 70’sthat’s how exactly in 1973 and 1974 all this was created by Vint Cerf and Robert Kahn. However, this project began to be carried out in the 1960s, when different researchers were looking for a way to Share data securely and efficiently.
It’s like that for 1961, Leonard kleinrock enter what would be packet switching. But, despite the fact that this project works very well, it was something that in the long term could be expensive and difficult. All this led to the search for a new alternative with a most reliable protocol. It is there where Cerf and Kahn developed the TCP model.
This new model provided advantages with respect to those previously implemented, this is how he offered a less resource consumption and it could also be implemented to a much lower cost. Thanks to these aspects and many others it began to gain popularity and for the year 1983 would be integrated into version 4.2 of the UNIX operating system. This is how it ended up becoming the Internet standard.
What are the main functions and characteristics of the TCP protocol?
This pattern ended up becoming one of the most important tools of the networkit had a set of functions and features that allowed the successful completion of the sharing of information and applications between computers.
In this way, Here we present the main functions and characteristics of this model:
Functions
TCP he is considered like the intermediate layer between the Internet Protocol (IP) and the application. Where all this fundamentally requires that each of the communications be secure, especially since it is taken into account that the IP layer provides a very unreliable datagram service.
That is why this model implemented in the 70s adds key functions that allow communication between a sender and receiver in a safe, lossless and error-free way.
This is how it can be said that this model has been designed to handle end to end connectionsthey may exist from connections of point by pointwhich is why they are also known as virtual circuits.
In this way, here we present its main functions:
- It allows the orientation of the connectionis how two computers can establish a connection to exchange information without any error.
- It has a full duplex operation, where this model becomes a pair of vital circuits where each of them has a specific address. Only the two final synchronized systems will be the ones who can use this circuit.
- Offers a Delivery receipt, that is, the receiver sends an acknowledgment indicating that it has received the packages sent by the sender.
- Also note that the option check errorit is used to verify that the packages do not have bugs or problems.
- Offers a service of packet recovery where the receiver can request packet retransmission in the case that it is necessary, that is, if the package has not been notified as received.
- The recipient has the opportunity to drop some or all packets sent by the sender.
Characteristic
Regarding the characteristics of this system we can find the following:
- It gives the possibility that each of the data is formed in varied length segments so that they can be delivered to IP-protocol.
- Lets you place each of the segments in order when they come from the IP model.
- Offers a data flow monitoring and thus prevents the existence of a network saturation.
- You can start and end a communication reliable and secure.
- Allows different applications to circulate simultaneously under the same line.
How does transmission control protocol beat UDP?
Today it is considered that the transmission control protocol is higher than UPDtaking into account that the TCP is primarily based on secure communication and the integrity of every packet that travels over the Internet. While PDUis based on the transport used in IP networks.
In the case of UPD, is one that provides datagram rogue transport layer, this is because it barely adds the basic and necessary information for it to be given point to point communication. This system is mainly used by applications such as CPR or NFSbut it is mainly used in task of control and transmission of audio and video through the network.
Meanwhile he TCP, if you provide a reliable flow transport between applications, thus providing greater security in each of the shared information. He claims that none of the packets present errors or losses and in turn maintains the order in which each of these packets arrive. That is how the TCP segment allows an overload on each of its 20-byte packets, Meanwhile he 8 byte only UPD.
That is why it is considered that the UPD is more important when it comes to getting a reliable speedwhile TCP will ensure reception of the information to be shared.
How does TCP work in global web browsing?
This model consists of a very simple operation that is based on three phases. The first is she is about power establish a connection with the authorization of both parties. In this case, a procedural process called “Negotiation” in three steps.
Then begins to carry out what is information transferbeing here where each one of the parameters of the correct and safe exchange. Finally, it is carried out the connection between client and server.
In that segment each of the data is delivered in the same order as it is sent, thus avoiding any disorder in information or a separation of layers. In addition, it serves as a mechanism that allows differentiating each of the receiving or sending apps within the same team, for this the term or concept of “Port”.
What is a TCP port and what is its importance in the system?
The ports are mainly used to be able to identify each one of the sending or receiving system applications. where each of the sides of the Connection has an associated port number which ends up being assigned by the sending or receiving app.
It should be noted that these ports are classified into three different categories: well-known ports, those registered Y dynamic and private ports.
well known ports
These are assigned by the Internet Assigned Numbers Authorityand usually range from 0 to 1023. All of them are used by each of privileged processes. Where the apps that use these ports are executed as servers, and we can find the following: HTTP, FTP, SMTP, SSH.
registered ports
are frequently used by applications used temporarily when they connect with the servers, but they can also be due to some type of service that has been previously registered by a third party. These ranges are usually between 1024 and 49151.
Dynamic or private ports
In this case the range is between 49152 to 65535and can be used by user apps, but it’s usually the least common of the three. It is important to mention that these ports not have no meaning outside TCP connection in which they were used.
networks