Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

DR. HARI SINGH GAUR VISHWAVIDYALAYA SAGAR M.P.

A CENTRAL UNIVERSITY

DEPARTMENT OF COMPUTER APPLICATION

SESSION 2022-23

MCA 2ND SEM

CSA – CC – 2205
DATA COMMUNICATION & COMPUTER NETWORKS
ASSIGNMENT (MID 2)

SUBMITTED TO: SUBMITTED BY:

MR. KAMAL KANT SIR ANUBHUTI JAIN (Y22271006)


Transmission Control
Protocol in Computer
Networks
Transmission Control Protocol (TCP) is a fundamental
protocol in computer networking that ensures reliable data
transmission over a network connection. In this
presentation, we will discuss the various aspects of TCP in
detail.

By Anubhuti Jain
TCP/IP Protocol Suite
Overview
The TCP/IP protocol suite
is a collection of communication
protocols used to connect hosts on the
internet. It consists
of four layers:

The Network access, internet, transport,


and application layers.
Four Layers of TCP/IP model
Working of TCP
To make sure that each message reaches its target location intact, the
TCP/IP model breaks down the data into small bundles and afterward
reassembles the bundles into the original message on the opposite end.
Sending the information in little bundles of information makes it
simpler to maintain efficiency as opposed to sending everything in one
go.
After a particular message is broken down into bundles, these bundles
may travel along multiple routes if one route is jammed but the
destination remains the same.
Working of TCP
For example, When a user requests a web page on the
internet, somewhere in the world, the server processes that
request and sends back an HTML Page to that user. The
server makes use of a protocol called the HTTP Protocol.
The HTTP then requests the TCP layer to set the required
connection and send the HTML file.
Most Common TCP/IP Protocols

TCP HTTP SNMP


Hypertext Simple
(Transmission
Network
Control Transfer Management
Protocol) Protocol Protocol
SMTP
IP (Internet Simple mail
transfer
Protocol) protocol

DNS TELNET FTP


Domain FTP stands for
Terminal File Transfer
Name Network Protocol
System
Features of
TCP
Connection
-Oriented Congestion Full
protocol control Duplex

Segmentation Flow
and control
Reassembly:

Error
checking Reliable
and
recovery
Advantages of the
TCP/IP model
 It helps you to establish/set up a connection between different types of
computers.
 It operates independently of the operating system.
3
 It supports many routing-protocols.
 It enables the internetworking between the organizations.
 TCP/IP model has a highly scalable client-server architecture.
 It can be operated independently.
 Supports a number of routing protocols.
 It can be used to establish a connection between two computers.
Disadvantages of
the TCP/IP model

 TCP/IP is a complicated model to set up and manage.


 The shallow/overhead of TCP/IP is higher-than 3 IPX (Internetwork Packet
Exchange).
 In this, model the transport layer does not guarantee delivery of packets.
 Replacing protocol in TCP/IP is not easy.
 It has no clear separation from its services, interfaces, and protocols.
TCP Congestion Control
TCP congestion control algorithms
TCP uses various congestion control
algorithms to regulate data
transmission and avoid network
congestion, such as slow start,
congestion avoidance, and fast
recovery.

1 2 3

Causes and effects of network Impact of congestion control


congestion on network performance
Network congestion can occur when Congestion control can have a significant
network traffic exceeds its capacity, impact on network performance,
leading to slow data transmission rates improving reliability and reducing packet
and packet loss. loss, but it can also slow down throughput
and increase latency.
Conclusion
Summary of TCP in Future developments in TCP
computer networks technology
TCP is a key protocol for ensuring reliable As network technology continues to evolve,
data transmission over network TCP is constantly adapting to new
connections. It provides flow control, error requirements, such as improved
recovery, and congestion control performance, increased security, and
mechanisms to ensure data integrity. support for new communication paradigms,
like IoT and 5G networking.
Reference
 www.geeksforgeeks.org

 www.javatpoint.com

 Wikipedia

You might also like