What is Internet TCP/IP Stack?
TCP/IP, or Transmission Control Protocol/Internet Protocol, is a set of rules that helps different devices on the internet talk to each other. It was created by the 'Department of Defense (DoD), This is a part of the United States government responsible for military operations' in the 1960s.
TCP is a set of communication protocols that supports network communication.
The TCP model is subdivided into five layers, each containing specific protocols.
Layers of TCP Model
1. Physical Layer:
The physical layer is the first layer in the network communication model. It is responsible for turning data into signals that can be sent over different types of media (wires, fiber optics, radio waves). This is where actual communication happens between devices.
Signals are generated depending on the type of media used to connect two devices.
Key Points:
1. Translating Message Bits into Signals:
- The physical layer converts data (bits) into signals that can be transmitted. These signals vary based on the medium used.
2. Types of Signals:
- Electrical Signals: Used for copper cables.
- Light Signals: Used for optical fibers.
- Radio Waves: Used for wireless transmission through air or vacuum.
3. Characteristics Specified by the Physical Layer:
Topology: The layout or structure of how devices are connected in the network.
- Bus Topology: All devices are connected to a single central cable. (Think of a single cable running through your house, and all your devices are plugged into this one cable. If the cable breaks, the whole network stops working.)
- Star Topology: All devices are connected to a central hub. (Imagine a central point, like a hub or switch, in the middle of your house, and all your devices are connected to this hub with individual cables. If one cable breaks, only that device is affected.)
- Hybrid Topology: A combination of different topologies. (This is a mix of different topologies. For example, you might have a star layout in one part of your house and a bus layout in another part. It combines the features of multiple layouts.)
- Mesh Topology: Devices are interconnected, creating multiple paths for data. (Picture a web where each device is connected to multiple other devices. This creates many paths for data to travel. If one path fails, there are other paths available, making it very reliable.)
- Ring Topology: Devices are connected in a circular fashion. (Think of a circle where each device is connected to two other devices, forming a ring. Data travels around the circle until it reaches its destination. If one device fails, the whole network can be disrupted, unless there's a way to reroute the data.)
3. Line Configuration:
- Point-to-Point: Direct connection between two devices.
- Multipoint: Multiple devices share the same connection medium.
4. Transmission Mode:
- Simplex: Communication is one-way only.
- Half-Duplex: Communication is two-way, but not at the same time (like a walkie-talkie).
- Full-Duplex: Communication is two-way simultaneously (like a phone call).
In simple terms, the physical layer handles how data is physically sent over different media and defines the structure and form of the network.
2. Data Link Layer (DLL)
The Data Link Layer (DLL) is divided into two parts:
MAC (Media Access Control)
The MAC layer is responsible for data encapsulation(Framing) of IP packets from the network layer into frames. Framing means DLL adds a header(which contains the MAC address of source and destination) and a trailer(which contains error-checking data) at the beginning and end of IP packets.
LLC (Logical Link Control)
LLC deals with flow control and error control.
In Simple Terms, The MAC layer puts data into "envelopes" (frames) with addresses and error-checking info and the LLC layer ensures data is sent at the right speed and checks for errors to ensure accurate communication.
领英推荐
3. Network Layer
The network layer is responsible for handling data transfer between devices across different networks. Here’s how it works:
- IP Address (Logical Address): A unique identifier given to each device on a global scale, like a unique mailing address for a house.
- The network layer attaches IP addresses to data segments to form IP packets, which helps in identifying where the data should go.
2. Finding the Best Path:
The network layer determines the best possible path for the data to travel from the sender to the receiver, similar to finding the best route on a map.
Common Protocols in the Network Layer:
Role:
2. ARP (Address Resolution Protocol):
Role: Finds the MAC (physical) address associated with a given IP address. Think of it like looking up a person's home address based on their name.
3. ICMP (Internet Control Message Protocol):
Role: Responsible for reporting errors. If something goes wrong in the transmission, ICMP sends messages to report the issue.
In Simple Terms, The network layer adds IP addresses to data, finds the best route for delivery, and uses protocols to manage data transfer and report errors. IP finds the best path and splits data if needed but doesn't ensure delivery. ARP helps find physical addresses using IP addresses. ICMP reports any errors that occur during data transmission.
4. Transport Layer
The transport layer manages the delivery of data between devices, ensuring it arrives correctly and efficiently. It handles flow control (controlling the rate at which data is transferred), end-to-end connectivity, and error-free data transmission.
Key Functions:
Protocols Used in the Transport Layer:
2. UDP (User Datagram Protocol):
In Simple Terms, The transport layer makes sure data gets from one device to another correctly and efficiently. TCP is like a careful delivery service that sets up a route, breaks a big package into smaller parts, checks if every part arrives safely, and puts them back together at the destination. UDP is like a quick delivery service that sends packages without setting up a route or checking if they all arrive, making it faster but less reliable.
5. Application Layer
The application layer is the topmost layer in the network model. It combines three layers from the OSI model: session, presentation, and application. This layer allows users to interact with software applications to access network resources.
Key Functions:
Protocols Used in the Application Layer:
In Simple Terms, The application layer is where you, the user, interact with network services through applications like web browsers, email clients, and file transfer tools.
Subscribe to this newsletter, and start your journey to learn system design in this easy-peasy way. See you in next article. Till then, Good bye.
Follow Nikki M. here.
Senior Consultant- Cyber security
8 个月Useful tips
assistant marketing coordinator
8 个月Hi, I'd really appreciate it if you could share or donate to this GoFundMe campaign.*Together to build our future again: Supporting our project* Read more here https://gofund.me/e9224cda Forward this message to your contacts to help this campaign reach its target! instagram for more details: sundusaqer
Network Engineer
8 个月Thanks for sharing