Skip to main content

Tcp model

NETWORK TECH WORLD
Tcp Model 
The Transmission Control Protocol (TCP) is a transport layer protocol that is used to establish and maintain a connection between two computers in a network. It is a reliable, stream-oriented protocol that ensures that data is delivered in the correct order and without any errors.

The TCP model is a simple, four-layer model that explains how TCP works:

Application layer: This is the top layer of the model and is responsible for providing the interface between the application and the network. It is responsible for translating the messages sent by the application into a format that can be transmitted over the network.

Transport layer: The transport layer is responsible for providing end-to-end communication between the two computers. It ensures that the data is delivered reliably and in the correct order, and it also provides flow control and error checking.

Network layer: The network layer is responsible for routing the data across the network. It determines the best path for the data to take and ensures that it reaches its destination.

Link layer: The link layer is the lowest layer of the model and is responsible for transmitting the data over the physical link between the two computers. It is responsible for framing the data and adding any necessary headers or trailers.

Overall, the TCP model provides a simple and reliable way for computers to communicate over a network. It ensures that data is delivered accurately and in the correct order, and it is used by many different applications and protocols.

Comments

Popular posts from this blog

What is network

NETWORK TECH WORLD What is network  A network is a group of devices, such as computers, servers, and printers, that are connected together and able to communicate with each other. Networks can be classified based on their size and scope, such as a local area network (LAN), which is a network that is confined to a small area, such as a single building or campus, or a wide area network (WAN), which is a network that spans a large geographical area, such as a city or a country. Networks can also be classified based on their communication protocols, such as the Internet, which is a global network that uses the Internet Protocol (IP) to connect devices around the world.

VPNs And Security

VPNs And Security VPNs and You On today’s Internet, security is a major concern. From wanting to protect financial transactions to simply wishing to browse without every site you visit being scrutinized, there are a lot of reasons to wish for privacy and protection. One of the simplest, yet all-around strongest ways in which to protect your Internet habits is through the use of a VPN. They usually have a monthly subscription fee associated with them but if security is important to you, then there’s no cheaper way to secure your Internet connection. On top of that, there are various options, with quick installs, or even more complicated, option-laden pieces of software which allow for more customizability in what your specific needs may be. A VPN is defined as a virtual private network. This effective creates a private network across a public space like the Internet. These connections are secured and encrypted, thus allowing for safer browsing experiences. Not o...

Network Devices

NETWORK TECH WORLD A network device is a hardware device that helps to connect a computer or other devices to a network. There are several types of network devices, including: Routers: These devices route data packets between different networks. Switches: These devices allow multiple devices on a network to communicate with each other by forwarding data packets to the intended recipient. Hubs: These devices are similar to switches, but they do not filter the data packets based on the destination. Instead, they broadcast the data packets to all devices connected to the hub. Bridges: These devices connect two different networks and allow data packets to be transmitted between them. Modems: These devices allow computers to connect to the internet by converting data into a format that can be transmitted over a phone line or cable connection. Firewalls: These devices protect a network by blocking unauthorized access and monitoring traffic for any malicious activity. These are just a few exa...