You are on page 1of 13

Micro Project

Computer Engineering(I Scheme

Curriculum)

Maharashtra State
Board of Technical Education, Mumbai
(Autonomous) (ISO-9001-2008) (ISO/IEC 27001:2013)
Part – A
TRANSMISSION CONTROL
PROTOCOL (TCP)

• Aims/Benefits of the Micro-Project

To understand about transmission control protocol

Course Outcomes Addressed

Configure Different TCP/IP Services


Understand Basic of TCP/IP Utilities
Understand Networking Commands
Action Plan

Sr. Details of activity Planned Planned Name of responsible team


no. start date finish date members
1 Decided the name of
micro project 12/03/2023 15/03/2023 Aishwarya, Indira, tanvi

2
Searching of information 20/03/2023 23/03/2023 Tanvi

3
Prepare a softcopy of report 15/04/2023 17/04/2023 Aishwarya, Indira

4 Report writing
24/04/2023 27/04/2023 Aishwarya, Indira, tanvi
Resources Required

Sr. Name of Specification Qty R


no. resource/material e
m
a
r
k
s
1 Internet sources www.wikipedia .com 1 -

2 Word Microsoft word 2010 1 -

• Skill Developed / Learning outcome of this Micro-Project


a. Follow safety practices.

b. Practice good housekeeping.

c. Demonstrate working as a leader/a team member.

d. Follow ethical practices.

Names of Team Members with Roll Nos.


1. Indira Paradkar -2215
2. Aishwarya More -2220
3. Tanvi Dhuri -2249
Part – B

TRANSMISSION CONTROL
PROTOCOL

Index

• Rationale
• Introduction
• Working
• Packet format
1.Establish connection
2.Send packets of data
3.Close the connection
• Advantages
• Disadvantages
• Characteristics
• Conclusion
• References
Rationale

Data communication is the electronic transfer of data from one location to another. A
good data communication system will enable the information system to deliver information
effectively. That is why data communication is crucial in the business world, especially for
managers. A data communication system can also improve the flexibility of data collection and
transmission.

Introduction:

Transmission Control Protocol (TCP) is a communications standard that enables application programs
and computing devices to exchange messages over a network. It is designed to send packets across the
internet and ensure the successful delivery of data and messages over networks.TCP is one of the basic
standards that define the rules of the internet and is included within the standards defined by the Internet
Engineering Task Force (IETF). It is one of the most commonly used protocols within digital network
communications and ensures end-to-end data delivery.

TCP organizes data so that it can be transmitted between a server and a client. It guarantees the integrity
of the data being communicated over a network. Before it transmits data, TCP establishes a connection
between a source and its destination, which it ensures remains live until communication begins. It then
breaks large amounts of data into smaller packets, while ensuring data integrity is in place throughout
the process.
Working
The Transmission Control Protocol (TCP) is a transport protocol that is used on top of IP to ensure
reliable transmission of packets.
TCP includes mechanisms to solve many of the problems that arise from packet-based messaging, such
as lost packets, out of order packets, duplicate packets, and corrupted packets.
Since TCP is the protocol used most commonly on top of IP, the Internet protocol stack is sometimes
referred to as TCP/IP.

Packet format
When sending packets using TCP/IP, the data portion of each IP packet is formatted as a TCP segment.

Each TCP segment contains a header and data. The TCP header contains many more fields than the
UDP header and can range in size from
20
2020 to
60
6060 bytes, depending on the size of the options field.
The TCP header shares some fields with the UDP header: source port number, destination port number,
and checksum. To remember how those are used.

Let’s step through the process of transmitting a packet with TCP/IP.

Step 1: establish connection


When two computers want to send data to each other over TCP, they first need to establish a connection
using a three-way handshake.

The first computer sends a packet with the SYN bit set to 1(SYN = “synchronize?”). The second
computer sends back a packet with the ACK bit set to 1 ACK = “acknowledge!”) plus the SYN bit set to
1 .The first computer replies back with an ACK.
The SYN and ACK bits are both part of the TCP header:
In fact, the three packets involved in the three-way handshake do not typically include any data. Once
the computers are done with the handshake, they’re ready to receive packets containing actual data.In
fact, the three packets involved in the three-way handshake do not typically include any data. Once the
computers are done with the handshake, they’re ready to receive packets containing actual dataIn fact,
the three packets involved in the three-way handshake do not typically include any data. Once the
computers are done with the handshake, they're ready to receive packets containing actual dataIn fact,
the three packets involved in the three-way handshake do not typically include any data. Once the
computers are done with the handshake, they're ready to receive packets containing actual datagvb

In fact, the three packets involved in the three-way handshake do not typically include any data. Once
the computers are done with the handshake, they're ready to receive packets containing actual data
Step 2: sends packets of data

When a packet of data is sent over TCP, the recipient must always acknowledge what they received.

The first computer sends a packet with data and a sequence number. The second computer
acknowledges it by setting the ACK bit and increasing the acknowledgement number by the length of
the received data.

The sequence and acknowledgement numbers are part of the TCP header:

Those two numbers help the computers to keep track of which data was successfully received, which
data was lost, and which data was accidentally sent twice.
Step 3: close the connection
Either computer can close the connection when they no longer want to send or receive data.
A computer initiates closing the connection by sending a packet with the FIN bit set to 1 (FIN = finish).
The other computer replies with an ACK and another FIN. After one more ACK from the initiating
computer, the connection is closed.
Advantages

1. It helps you to establish/set up a connection between different types of computers.

2. It operates independently of the operating system.

3. It supports many routing-protocols.

4. It enables the internetworking between the organizations.

5. TCP/IP model has a highly scalable client-server architecture.

6. It can be operated independently. Supports a number of routing protocols. It can be used to


establish a connection between two computers.

Disadvantages

1. TCP/IP is a complicated model to set up and manage.

2. The shallow/overhead of TCP/IP is higher-than IPX (Internetwork Packet Exchange). In this,


model the transport layer does not guarantee delivery of packets

3. Replacing protocol in TCP/IP is not easy. It has no clear separation from its services, interfaces,
and protocols,
Characteristics

1. Support for a flexible TCP/IP architecture Adding more system to a network is easy.

2. In TCP/IP, the network remains intact until the source, and destination machines were
functioning properly.

3. TCP is a connection-oriented protocol.

4. TCP offers reliability and ensures that data which arrives out of sequence should put back into
order.

5. TCP allows you to implement flow control, so sender never overpowers a receiver with data.
Conclusion

TCP organizes data so that it can be transmitted between a server and a client. It guarantees the integrity
of the data being communicated over a network. Before it transmits data, TCP establishes a connection
between a source and its destination, which it ensures remains live until communication begins.

References

https://www.fortinet.com

https://www.khanacademy.org

https://www.scribd.com/home

You might also like