Essayer OR - Gratuit
Internet Protocols Explained
Open Source For You
|July 2024
In the second part of this series of articles on internet protocols, we shall delve into the journey from unsecure protocols to secure protocols, with a focus on securing the transport and application layers in the OSI model.
-
The Transmission Control Protocol (TCP) is a transport protocol, as it dictates the way data is sent and received. Before transmitting data, TCP opens a connection with the recipient and ensures that all packets arrive in order once the transmission begins. It is via TCP that the recipient acknowledges receiving each packet that arrives. Missing packets are sent again if receipt is not acknowledged. Hence this is a reliable protocol, but not fast.
TCP and IP were originally designed to be used together, and these are often referred to as the TCP/IP suite. However, other transport protocols can be used with IP. The TCP header has a default size of 20 bytes. Up to 40 bytes of options can be added.
TCP flow Step 1: Establish the connection TCP needs a valid connection as a prerequisite. To establish a connection, it follows a three-way handshake method. ƒ First, the requesting client sends the server a SYN packet
• SYN: SYN stands for synchronise.
• SEQ: SEQ is a unique, random number that ensures full transmission in the correct order and without duplicates.
- Once the server has received the packet, it agrees to the connection by returning a SYN-ACK packet. The ACK includes the client’s sequence number plus 1. The client will send some random SEQ number.
• ACK: ACK stands for acknowledging its own sequence number to the client.
- Finally, the client acknowledges the receipt by sending its own ACK packet, which in this case contains the server’s sequence number plus 1. The client can now begin transferring data to the server.
Step 2: Transmit the packets
Cette histoire est tirée de l'édition July 2024 de Open Source For You.
Abonnez-vous à Magzter GOLD pour accéder à des milliers d'histoires premium sélectionnées et à plus de 9 000 magazines et journaux.
Déjà abonné ? Se connecter
PLUS D'HISTOIRES DE Open Source For You
Open Source For You
Top 10 Open Source Tools for System and IT Administrators
All reputed online services have committed system and IT administrators working behind the scenes. Here are ten open source tools they should be aware of, as these can help them monitor, automate, as well as manage complex infrastructure with relative ease.
6 mins
February 2026
Open Source For You
Google opens access to its Gemini Deep Research Agent
Google has opened access to its Gemini Deep Research Agent for the first time, allowing developers to integrate advanced autonomous research capabilities directly into their applications.
1 min
February 2026
Open Source For You
NVIDIA buys SchedMD, keeps Slurm open source and vendor neutral
NVIDIA has acquired AI software company SchedMD, signalling a deeper commitment to open source technologies as competition intensifies across the artificial intelligence ecosystem.
1 min
February 2026
Open Source For You
How Open Source Tools Power Modern IT Operations
Open source tools have not replaced enterprise IT platforms; they have become the connective layer that makes modern operations possible.
6 mins
February 2026
Open Source For You
Mandiant's Auralnspector enhances Salesforce security
Google-owned cybersecurity firm Mandiant has released AuraInspector, a free, open source command-line tool designed to identify dangerous access control misconfigurations in Salesforce environments, marking a significant move to democratise enterprise-grade security testing.
1 min
February 2026
Open Source For You
Google launches Universal Commerce Protocol to power agentic AI commerce
Google has introduced the Universal Commerce Protocol (UCP), a new open standard that enables AI agents to autonomously perform end-to-end commerce activities, spanning product discovery, purchasing, checkout, payments, and postpurchase experiences.
1 min
February 2026
Open Source For You
Zero Trust CI/CD: The Death of Static Secrets
In an era where data breach costs continue to hit record highs, shifting to a secretless CI/CD pipeline is the most effective step to safeguard digital infrastructure.
7 mins
February 2026
Open Source For You
Quantum Algorithms: The Future of Computing
Explore the essence of quantum algorithms, their groundbreaking applications, recent innovations, and the challenges that remain.
8 mins
February 2026
Open Source For You
Bringing Clarity to the Chaos in AI
AI feels powerful, yet most teams struggle because they cannot define what intelligence they really need. But there are ways to address this challenge.
5 mins
February 2026
Open Source For You
Top researchers return to OpenAI
OpenAI has welcomed back three high-profile researchers, Barret Zoph, Luke Metz, and Sam Schoenholz, following their brief tenure at former OpenAI CTO Mira Murati's AI startup, Thinking Machines.
1 min
February 2026
Listen
Translate
Change font size
