Why TCP and IP are written all together as TCP/IP?
Answer Posted / guest
TCP/IP consists of dozens of different protocols, but only a
few are the âmainâ protocols that define the core operation
of the suite. Of these key protocols, two are usually
considered the most important. The Internet Protocol (IP) is
the primary OSI network layer (layer three) protocol that
provides addressing, datagram routing and other functions in
an internetwork. The Transmission Control Protocol (TCP) is
the primary transport layer (layer four) protocol, and is
responsible for connection establishment and management and
reliable data transport between software processes on
devices.IP and TCP are important because many of TCP/IP's
most critical functions are implemented at layers three and four
Due to the importance of these two protocols, their
abbreviations have come to represent the entire suite: âTCP/IPâ
| Is This Answer Correct ? | 64 Yes | 9 No |
Post New Answer View All Answers
What are the two types of transmission technology available
What is region
in linux what is the last ver to use of bootloader lilo,after lilo not use in linux and only use upper ver grub?
Explain FDDI
What is count to infinity problem ?
What was the reason for selecting a speed of 155.52 Mbps in the original ATM standard ?
what is buffering and flooding in NIC ?
Write two ways in which computer applications differ from network applications ?
What are the basic functions of the data link layer?
I have 2 networks. One is LAN & other is Tata Indicom Modem which is connected to USB. The problem is that When USB Modem is using, i am unable to use LAN. And when we use LAN, we cannot use USB Modem. kindly help me.
Subnet the class C network address 198.67.25.0 into eight subnets. Why are the âall onesâ and âall zeroesâ subnets not used ?
Write down the basic features of HDLC protocol? Could HDLC be used as a data link protocol for a LAN? Justify your answer.
Contrast link state and distance vector routing protocols, giving an example of each.
hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash
How do cryptography-based keys ensure the validity of data transferred across the network?