What will happen ,if Data sent without the Protocols?
We are discussing about the tcp protocol, Not using the protocol is Violating the protocol , one is intentional by malware injection or unintentionlly misconfiguration -for example a vulnerability which is presented by some library. You are already imparted with this intelligence that what a virus can perform? the various operations are listed below.
1- Password cracking
2-Trojan Horse
3-Malware injection
4-Identity Thieves
5- XSS Attack
6-Dedos and redos attack.
What is tcp(Transfer control Protocol)?
TCP is the transfer control protocol, it works on top of transmittion layer of OSI model.
TCP relates to the data transfer,TCP is a protocol and it's the basics of internet, and internet is governed by protocols, so you need to follow the rule.
The Fundamentals of tcp
1- TCP is a connection oriented protocol,it stablishes the connection between client and server and this connection etablishment makes tcp reliable and slow protocol, data transfer happen without data loss, but creating the connection between client and server requires time, this causes the Processing Delay and Transmission Delay.
2- Here we are discussing the 3 way handshake,client sends the syn request to the server and server sends the ack plus syn in return that he have obtained your request and sends the data, after retriving the data client sends the server a message(syn) that he got the email, so this is also called 3 way handshake.
Why this 3 way handshake is imp?
3 way handshake is a process that is established before data transfer that our connection is reliable and trustworthy, so there will be no data loss, because of tcp handshake.
Data transmition is similar to water tap, it
retrieves water at one tap and sends the
water from the another tap, this way our
data is transmitted in form of packets.
The client and server exchange the transfort layer information with each other before the messaging begin to flow,this is called handshaking and sending the messages 3 times is 3 way handshaking.
When we are sending data to source to destination, we include the ip address of source in packet's header to transfer data. This TCP protocol inhibits between network and application layer,so it's central.
Transport layer pick up messages from application layer and moves to the network layer .
How connection is closed?
when application finishes the sending messages then application needs to tear down.Client sends the finish (fin) and server ack ,then server sends the fin and client sends the ack that service is finished.




Top comments (0)