TCP:IP Model - GeeksforGeeks
TCP:IP Model - GeeksforGeeks
Data Structures Algorithms Interview Preparation Topic-wise Practice C++ Java Python Competitive Programming Machine Learning Web Development Puzzles Project Ideas GFG
Table of Contents
Ad
The OSI Model we just looked at is just a reference/logical model. It was designed to
dcs-is-edi.com/Trainin... Visit Site
Types of Network Topology
describe the functions of the communication system by dividing the communication
procedure into smaller and simpler components. But when we talk about the TCP/IP
Types of area networks – LAN, MAN
and WAN model, it was designed and developed by Department of Defense (DoD) in 1960s and is
based on standard protocols. It stands for Transmission Control Protocol/Internet
Introduction of Mobile Ad hoc Network Protocol. The TCP/IP model is a concise version of the OSI model. It contains four layers,
(MANET)
unlike seven layers in the OSI model. The layers are:
Types of MANET in Computer Network 1. Process/Application Layer
2. Host-to-Host/Transport Layer
Redundant Link problems in Computer
3. Internet Layer United States Navy
Network
4. Network Access/Link Layer United States Navy SPONSORED
Complete Interview
Preparation
View Details
System Design-Live
Classes for Working
Professionals
Difference between TCP/IP and OSI Model: View Details
The first layer is the Process layer on the behalf of the sender and Network Access layer
on the behalf of the receiver. During this article, we will be talking on the behalf of the
receiver.
Your bills get paid
1. Network Access Layer –
This layer corresponds to the combination of Data Link Layer and Physical Layer of the
OSI model. It looks out for hardware addressing and the protocols present in this layer
allows for the physical transmission of data.
We just talked about ARP being a protocol of Internet layer, but there is a conflict about
declaring it as a protocol of Internet Layer or Network access layer. It is described as
residing in layer 3, being encapsulated by layer 2 protocols.
2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the protocols which
are responsible for logical transmission of data over the entire network. The main
protocols residing at this layer are : M O ST V I S I T E D I N GAT E C S
1. IP – stands for Internet Protocol and it is responsible for delivering packets from the
ACID Properties in DBMS
source host to the destination host by looking at the IP addresses in the packet
headers. IP has 2 versions:
Program for Decimal to Binary
IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But IPv6
Conversion
is growing as the number of IPv4 addresses are limited in number when compared to
the number of users.
Types of Operating Systems
2. ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP
datagrams and is responsible for providing hosts with information about network
Functions of Operating System
problems.
3. ARP – stands for Address Resolution Protocol. Its job is to find the hardware address Caesar Cipher in Cryptography
of a host from a known IP address. ARP has several types: Reverse ARP, Proxy ARP,
Gratuitous ARP and Inverse ARP.
3. Host-to-Host Layer –
This layer is analogous to the transport layer of the OSI model. It is responsible for end-
to-end communication and error-free delivery of data. It shields the upper-layer
applications from the complexities of data. The two main protocols present in this layer
are :
4. Application Layer –
This layer performs the functions of top three layers of the OSI model: Application,
Presentation and Session Layer. It is responsible for node-to-node communication
and controls user-interface specifications. Some of the protocols present in this layer
are: HTTP, HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X
Window, LPD. Have a look at Protocols in Application Layer for some information
about these protocols. Protocols other than those present in the linked article are :
1. HTTP and HTTPS – HTTP stands for Hypertext transfer protocol. It is used by the
World Wide Web to manage communications between web browsers and servers.
HTTPS stands for HTTP-Secure. It is a combination of HTTP with SSL(Secure
Socket Layer). It is efficient in cases where the browser need to fill out forms, sign
in, authenticate and carry out bank transactions.
2. SSH – SSH stands for Secure Shell. It is a terminal emulations software similar to
Telnet. The reason SSH is more preferred is because of its ability to maintain the
encrypted connection. It sets up a secure session over a TCP/IP connection.
3. NTP – NTP stands for Network Time Protocol. It is used to synchronize the clocks
on our computer to one standard time source. It is very useful in situations like
bank transactions. Assume the following situation without the presence of NTP.
Suppose you carry out a transaction, where your computer reads the time at 2:30
PM while the server records it at 2:28 PM. The server can crash very badly if it’s
out of sync.
This article is contributed by Achiv Chauhan and Palak Jain. If you like
GeeksforGeeks and would like to contribute, you can also write an article using
contribute.geeksforgeeks.org or mail your article to [email protected].
See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please write comments if you find anything incorrect, or you want to share more
information about the topic discussed above.
Like 196
Previous Next
R ECO M M E N D E D A RT I C L E S Page : 1 2 3
Article Contributed By :
GeeksforGeeks
Writing code in comment? Please use ide.geeksforgeeks.org, generate link and share the link here.
Load Comments