You are on page 1of 5

OVERVIEW OF TCP/IP PROCOTOLS IN

MOBILE DATA COMMUNICATIONS


Student ID Number – 2152923
School of Engineering, University of Portsmouth, United Kingdom.

Abstract: Nowadays TCP/IP that used for packets.


sending the data form one to other deice and
sending the information such as game
streaming, live sale, HTTP, SMTP, video
uploading platform, etc. In this paper, it reviews
of TCP/IP including of its application, working
principle and data packet system.

Keywords: TCP/IP

I. INTRODUCTION Figure 1. Transmission control protocols of TCP/IP

Nowadays TCP/IP protocols are widely used for the iii. Difference between TCP and IP
networking process. The protocol suite, which was
created prior to the development of wireless Transmission Control Protocol is referred to as
communications and used largely for wired TCP. It exists in the transport layer and is a
network communications in which TCP delivers connection-oriented, dependable protocol. The
data across an IP network, is now commonly internet protocol is referred to as IP. It sends the
referred to as TCP/IP. TCP is a connection-oriented packets to the network's devices and is a
protocol that creates virtual connections between connectionless network layer protocol. TCP
networking devices over a physical network via Protocol stands for Transmission Control Protocol
request-reply messages. and it is a connection oriented and reliable
protocol. IP protocol stand for Internet protocol
and it defines the addresses that are necessary in
order to send the data from the source to the
II. WHAT IS TCP/IP destination. Computers on a network can have a
distinct address thanks to IP addresses. The
One of the foundational standards established by address can be used as a connection identifier to
the Internet Engineering Task Force (IETF) and other computers because it is unique. Each IP
designated as the rules for the internet is TCP datagram contains the message data and header.
(IETF). Before being transmitted between a server Data is grouped into packets, also known as
and a client, the data is structured by TCP. It datagrams. Because the IP protocol uses the end-to-
ensures the accuracy of data transmitted through a end concept in its architecture, the system is seen
network. TCP is one of the most often used as being unreliable at all specific network
protocols in digital network communications and component or transmission medium.
offers end-to-end data delivery. The IP is used to
transmit data across the internet from one device to iv. Application and working principle of
another. Each device has an IP address, which TCP/IP
provides unique identification and permits data
exchange with other internet-connected devices. IP A data communication protocol called TCP/IP
is the main protocol used within the TCP/IP makes it possible for computers and other devices
internet layer. Its main goal is to send data packets to send and receive data. TCP/IP, sometimes
from the source device or application to the referred to as the Internet Protocol and
destination using structures and techniques that Transmission Control Protocol, allows devices
include tags such address information inside data connected to the internet to communicate across
ENG659d2 Coursework Page 1 of 5
networks. TCP/IP, a data communication protocol, extended periods of time.
enables the sending and receiving of data by
computers and other devices. Devices linked to the
internet can communicate with one another across
networks thanks to TCP/IP, also known as the
Internet Protocol and Transmission Control
Protocol. Whether it is a message, a picture, or a
file, all data delivered over the internet using the
TCP/IP architecture is divided into packets using a
four-layer process. On the receiving end, the data is
reconstructed by first going through these layers in
one order and then the other. The TCP/IP paradigm
works because every stage of the process is Figure 3. TCP/IP network
standardized. Efficiency is a must for rapid internet
service, because without standards, communication vi. Data Packet System in TCP/IP
would break down and cause delays. Because it is
the industry standard, the TCP/IP paradigm is one TCP is a vehicle convention that is utilized on top of
of the best ways to transport data across the IP to guarantee dependable transmission of parcels.
internet. TCP incorporates instruments to take care of much
issues that emerge from bundle-based informing,
like lost parcels, mixed up bundles, copy bundles,
and ruined bundles. Since TCP is the convention
utilized generally ordinarily on top of IP, the
Internet convention stack is in some cases alluded
to as TCP/IP. TCP/IP has detecting lost packet
while it is timeout. A timer is started once a packet
is sent, and it is then placed in a queue for
Figure 2. Working process of TCP/IP retransmission. If a packet was not actually lost but
instead took a very long time to arrive or be
recognized, the resend could result in the recipient
v. Feature of TCP/IP getting duplicate packets. The duplicate packets can
be discarded by the recipient. It's preferable to have
A communications architecture called TCP/IP,
data than not to have it at all. TCP/IP also have
which is used to network computers and
handing out of order packet.
communicate across the Internet. The provision of
services like file transfer, email, and remote logon
across a huge number of client and server systems
was the foundation of its success. A small
vii. Layers of TCP/IP
department's computers could use TCP/IP and
other protocols on a single LAN. A department can
Each layer of the TCP/IP server design is
be routed via the IP component to the company
characterized as per a specific reason that it is
network, regional networks, and finally the
expected to complete. The information is sent
worldwide Internet. Due to its high resilience,
helpfully between these four TCP/IP layers as it
TCP/IP may easily bounce back from node or phone
moves starting with one layer then onto the next.
line failures. Large networks are built with less
management due to automatic recovery, which can  Physical section
result in issues being unnoticed and unfixed for
 Data-Link section
 Internet section
 Transport section
 Application section
Physical section – It is the TCP/IP model's base
layer. It deals with data that is represented by bits.
In the network, this layer primarily manages host-

ENG659d2 Coursework Page 2 of 5


to-host communication. The mode can be simplex,
half-duplex, or full-duplex, and the media can be
wired or remote. In this layer, no particular
protocols are employed. Different networks have
different physical layer capabilities.

Data-Link section - The second layer of the TCP/IP


layer is the Data-Link Layer. It works with
information that is introduced in information
outlines. It basically does information outlining,
which includes adding header data to the
information bundles to communicate the
information parcels to the planned objections
effectively. Delivering frames inside the same
network is made easier by the data-link layer. Figure 4. The Five Layers of TCP/IP model

Internet section - The Network layer of the OSI viii. Advantage and disadvantage of TCP/IP
model and the Internet layer of the TCP/IP model
are comparative in numerous ways. Datagrams and Advantages Disadvantages
packets of data are dealt with by it. The primary 1. TCP can assist 1. TCP/IP is a
function of this layer is to logically address data with setting up an confounded model
packets by adding their IP (Internet Protocol) association to set up and make
addresses. Using the routers in this layer, data between contrast due.
packets can be transmitted from one network to sorts of PCs and
another versatile.
2. It works freely of 2. The
Transport section - The fourth layer in the TCP/IP the working shallow/above of
model is the Transport layer. It stirs with framework. TCP/IP is higher
information that is split into parts. It primarily than IPX (Internet
segments the data that is received from the top Packet Exchange)
layers. It is responsible for information 3. It supports many 3. In this, model the
transportation and laying out network between the routing-protocols. vehicle layer
application layer and lower layers. Start to finish doesn't ensure
correspondence and blunder free information move conveyance of
are made conceivable by this layer. parcels.
4 It empower the 4. Replacing
Application - The best three levels of the OSI model internetworking protocol in TCP/IP
(the Application, Physical, and Session Layers) are between the is not easy.
like the TCP/IP model's Application layer. It deals associations.
with how the entire data message is communicated. 5. TCP/IP model 5. It has not
The application layer acts as an interface between has a highly satisfactory
the applications and the network services. It mainly scalable client- detachment from
provides services to the end-users to work over the server architecture. its administrations.
network. Points of
interaction and
conventions.
6. It very well may 6. It isn't
be worked freely. conventional in
nature. Thus, it
neglects to address
any convention
stack other than
the TCP/IP suite.
For instance, it
can't depict the
Bluetooth
association.

ENG659d2 Coursework Page 3 of 5


7. Support a 7. It does not
number of routing clearly separate the
protocols. concepts of
services, interfaces,
and protocols.
8. It can be used to 8 It is not
establish a optimized for small
connection networks like LAN
between two (local area
computer or network) and PAN
mobile. (personal area
network).
9 An industry-
standard model can
be actually sent in
viable systems
administration
issues.
10. It appoints an
IP address to every
PC on the
organization, in
this manner
making every
gadget to be
recognizable over
the organization. It
doles out each site
a name of space. It
gives name and
address goal
administrations.
Table 1. Advantages and Disadvantages of TCP/IP

IX. CONCLUSION

Nowadays, most of the future data of mobile


communication and computer network systems are
used TCP/IP protocols By utilizing the TCP/IP, we
can know how parcels are framed provides you
with a superior comprehension of how they can be
created or changed to accomplish a particular
reason. We can better grasp what can happen to
packets as they move from source to destination if
we are aware of how packets are transferred and
delivered.

X. REFERENCES

ENG659d2 Coursework Page 4 of 5


ENG659d2 Coursework Page 5 of 5

You might also like