• Complain

Claudia Alves - TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step

Here you can read online Claudia Alves - TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Independently published, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step
  • Author:
  • Publisher:
    Independently published
  • Genre:
  • Year:
    2021
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

The acronym TCP/IP stands for Transmission Control Protocol/Internet Protocol and refers to a family of network protocols which are the basis for communication and data exchange over the internet as well as on private IP networks. The development of TCP/IP already began in the 1970s and traces back to the work of DARPA. Whilst the protocol family used to compete with alternative protocols such as AppleTalk by Apple, IPX/SPX by Novell or NetBEUI by Microsoft, TCP/IP has now established itself as a universal and worldwide popular protocol. It is platform-independent and available for devices with all operating systems imaginable. The reasons for the success of the protocol family are the victory of the Internet as well as its flexibility and versatility.

Claudia Alves: author's other books


Who wrote TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step? Find out the surname, the name of the author of the book and a list of all author's works by series.

TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Introduction

The Transmission Control Protocol (TCP) is designed to be used as a reliable protocol for communication between host computers in communication computer networks with packet switching, as well as in systems that combine such networks.

This document describes the functions that the transmission management protocol should perform, the program that implements the protocol, and its interface with programs or users who need its services.

1.1 Motivation

Computer communications systems are playing an increasingly important role in military, government and civilian applications. This document primarily highlights the requirements for computer communications in the military field, and especially for sustainability in the face of insufficient communication reliability and overload capabilities.

At a time when strategic and tactical networks of computer communications are emerging and disappearing, it is important to provide the means to combine them, as well as standard protocols of communication between processes that would support a wide range of applications. Anticipating the need for such standards, the Office of the Defence Secretariat for Research and Development presented the Transmission Control Protocol (TCP) protocol described here, based on the standardization of the DoD protocol of communication between processes.

TCP is a direct connectivity reliability protocol designed for a multi-layered hierarchy of protocols that support firewall applications. The TCP protocol ensures the reliability of communications between pairs of processes on host computers included in various computer communication networks, which are combined into a single system.

With regard to the reliability of lower-than-TCP protocols, very modest requests have been made. TCP suggests that it may get a simple, potentially unreliable service for its datagrams from lower-level protocols. In principle, the TCP protocol should be operational on a large set of communication systems, from cable connections to networks with switching packages or electrical circuits.

The TCP protocol is based on concepts first described by the authors Cerf and Kahn in TCP occupies a multi-level protocol architecture niche directly above the Internet protocol, which allows the TCP protocol to send and receive segments of variable-length information enclosed in the Internet datagram shell. The Internet datagram provides tools to address the sender and recipient of TCP segments on various networks. The Internet Protocol also performs any fragmentation and assembly of TCP segments required for transmission and delivery through multiple networks and intermediate gateways. The Internet Protocol also processes information about priority, security classification, and delineation of TCP segments. So this information can be transmitted directly through multiple networks.

Protocol levels

Upper level

TCP

Internet

Communications network

Fig. 1

Most of this document is written in connection with the implementations of the TCP protocol, which, together with higher-level protocols, are present on the host computer. Some computer systems will be integrated into the network through the main computers containing TCP and Internet levels protocols, as well as specific network software.

The TCP specification describes its interface with higher-level protocols, which were feasible even in the case of the main computer, if the appropriate protocol of communication between the host computer and the main computer is implemented.

1.2 Target

The TCP protocol is required to provide a reliable service for inter-process communications in a multi-network system. The TCP protocol should be a general protocol for communication between host computers in multiple networks.

1.3 About this document

This document provides a description of the behavior expected of any implementation of the TCP protocol, as well as its interactions with both higher-level protocols and TCP protocols on other computers. The rest of this chapter gives a very brief overview of the protocol and its interfaces. Chapter 2 summarizes the ideological basis for the TCP protocol. Chapter 3 provides both a detailed description of the behavior required of the TCP protocol when different events appear (arrival of new segments, user request, errors, etc.) and descriptions of the details of TCP segment formats.

1.4 Interfaces

The TCP protocol interacts on the one hand with the user or application program, and on the other - with a lower-level protocol, such as the Internet protocol.

We explain the interface between the application process and the TCP protocol with acceptable detail. This interface consists of a set of calls that are similar to the operating system calls provided to the file management application process. For example, in this case, there are calls to open and close connections, to send and receive data on established connections. It is also expected that the TCP protocol will be able to interact asynchronously with applications. While TCP protocol developers are given considerable freedom to create interfaces that correspond to the properties of a particular operating system, any acceptable implementation requires some mandatory minimum interface functions between the TCP protocol and the user.

The interface between the TCP protocol and the lower-level protocols is much less given, except that there must be some mechanism by which the two levels can asynchronically communicate with each other. It is generally believed that the lower-level protocol sets this interface. The TCP protocol is designed to work with a very diverse environment of connected computer networks. This document assumes that the lower-level protocol is

1.5 Action

As mentioned earlier, the primary goal of the TCP protocol is to provide a reliable, secure service for logical chains or connections between pairs of processes. To provide such a service based on less reliable Internet communications, the system must have the capacity to work in the following areas:

  • basic data transfer
  • Reliability
  • Thread management
  • Channel separation
  • Working with connections
  • Priority and safety

The main actions of the TCP protocol in each of these areas are described in the following paragraphs.

Basic data transmission
TCP protocol is able to transmit continuous streams of octets between its customers in both directions, packing a certain number of octets into segments for transmission through Internet systems.

Sometimes users need to make sure that all the data they send to TCP has already been sent. Push is defined for this purpose. To make sure that the data sent to the TCP protocol is indeed transferred, the sender indicates that it should be pushed to the recipient.

Pushing results in TCP protocol programs immediately sending and, accordingly, obtaining the remaining data. Properly pushed can be invisible to the recipient, and the push function itself may not have a record boundary marker.

The
TCP Protocol should have protection against data destruction, This is achieved by assigning the next number to each transmitted octet, as well as the confirmation requirement (ACK) from the TCP program that receives the data.

Damages are recorded by adding a control amount to each transferable segment, checking it when receiving and then eliminating defective segments.

As long as TCP protocol programs continue to function correctly and the Internet system does not fall completely into components, forwarding errors will not affect the correct receipt of the data. The TCP protocol protects against Internet communications errors.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step»

Look at similar books to TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step»

Discussion, reviews of the book TCP / IP Protocol, for beginners: The Ultimate Beginners Guide to Learn TCP / IP protocol Step by Step and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.