Skip to main content

TCP/IP suite of protocols


The TCP/IP suite is a set of protocols used on computer networks today (most notably on the Internet). It provides an end-to-end connectivity by specifying how data should be packetized, addressed, transmitted, routed and received on a TCP/IP network. Th
is functionality is organized into four abstraction layers and each protocol in the suite resides in a particular layer.
The TCP/IP suite is named after its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP). Some of the protocols included in the TCP/IP suite are:
  • ARP (Address Resolution Protocol) – used to convert an IP address to a MAC address.
  • IP (Internet Protocol) – used to deliver packets from the source host to the destination host based on the IP addresses.
  • ICMP (Internet Control Message Protocol) – used to detects and reports network error conditions. Used in ping.
  • TCP (Transmission Control Protocol) – a connection-oriented protocol that enables reliable data transfer between two computers.
  • UDP (User Datagram Protocol) – a connectionless protocol for data transfer. Since a session is not created before the data transfer, there is no guarantee of data delivery.
  • FTP (File Transfer Protocol) – used for file transfers from one host to another.
  • Telnet (Telecommunications Network) – used to connect and issue commands on a remote computer.
  • DNS (Domain Name System) – used for host names to the IP address resolution.
  • HTTP (Hypertext Transfer Protocol) – used to transfer files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web.

The following table shows which protocols reside on which layer of the TCP/IP model:
tcp ip protocols layers

Comments

Popular posts from this blog

Cisco three-layer hierarchical model

Because networks can be extremely complicated, with multiple protocols and diverse technologies, Cisco has developed a layered hierarchical model for designing a reliable network infrastructure. This three-layer model helps you design, implement, and maintain a scalable

Access Control Lists (extended)

Access Control List  or  ACL  is a technic of controling network traffic. It is a list of rules with which traffic flow can be manipulated - permitted or denied. By default, traffic flow from the interface with the higher security level (for example "inside" interface) to interface with the lower security level (example "outside" interface) is allowed by default, but the flow of traffic from "outside" to the "inside" interface must be explicitly permited. 

Classes of IP addresses

TCP/IP defines five classes of IP addresses: class A, B, C, D, and E. Each class has a range of valid IP addresses. The value of the first octet determines the class. IP addresses