1 00:00:00,640 --> 00:00:02,200 What is TCP IP? 2 00:00:04,320 --> 00:00:11,390 I'm glad you asked because it was first developed in the U.S. as a military project called ARPANET Advanced 3 00:00:11,390 --> 00:00:14,090 Research Projects Agency Network. 4 00:00:14,940 --> 00:00:21,810 So this project was developed by the military for military purposes, was then used by universities. 5 00:00:22,630 --> 00:00:28,720 And subsequently, networks developed independently from all over the U.S. and those were named NSFNET 6 00:00:29,170 --> 00:00:35,080 under a single backbone and then spread across the world beyond the original national dimension. 7 00:00:36,010 --> 00:00:41,230 So actually, that flash point or the birth of the Internet coincides with this date. 8 00:00:43,140 --> 00:00:48,690 So that's where we get the protocols that will govern that network, they regulate the flow of data 9 00:00:48,690 --> 00:00:49,770 between computers. 10 00:00:50,690 --> 00:00:57,250 So then TCP IP represents two separate protocols that operate on the third and the fourth layer of the 11 00:00:57,260 --> 00:01:04,070 Ossi model for data transfer over the Internet, and consequently they're called Transmission Control 12 00:01:04,070 --> 00:01:08,690 Protocol TCP, IP and Internet Protocol, or IP. 13 00:01:10,330 --> 00:01:12,400 So why TCP IP? 14 00:01:15,130 --> 00:01:17,260 So it's all manufacturer, independent. 15 00:01:18,810 --> 00:01:21,900 They connect different scale of computers. 16 00:01:24,880 --> 00:01:28,800 It can be used to exchange data between different operating systems. 17 00:01:30,520 --> 00:01:36,190 They recognize and they were induced by many companies as the first protocol. 18 00:01:37,300 --> 00:01:39,130 Of course, they're widely used over the Internet. 19 00:01:40,690 --> 00:01:42,250 It's a roadable protocol. 20 00:01:43,540 --> 00:01:45,820 They have a common addressing scheme. 21 00:01:47,460 --> 00:01:52,380 And the DCP IP operation model is shown here. 22 00:01:55,060 --> 00:01:56,080 Application layer. 23 00:01:58,250 --> 00:02:03,770 This layer contains the application that sends the data and the protocol that this application uses. 24 00:02:05,090 --> 00:02:08,180 So this is a layer that the user interacts with. 25 00:02:09,500 --> 00:02:13,820 So here in contain the various protocols for the user to use. 26 00:02:15,590 --> 00:02:21,590 So these protocols correspond to the application that are activated by the user. 27 00:02:22,900 --> 00:02:29,980 So, for example, the HTTP protocol is activated when the user wants to open a webpage, if the user 28 00:02:29,980 --> 00:02:34,570 wants to send an email and the SMTP protocol will be activated. 29 00:02:36,840 --> 00:02:37,830 Transmission layer. 30 00:02:39,420 --> 00:02:42,390 TCP and UDP protocols work in this layer. 31 00:02:43,500 --> 00:02:46,260 A transport layer has the following properties. 32 00:02:47,420 --> 00:02:52,780 Session multiplexing so multiple machines can be connected at the same time. 33 00:02:54,150 --> 00:03:01,880 Data fragmentation of data can be divided into segments, the data to be sent can be divided into pieces. 34 00:03:03,460 --> 00:03:04,310 Flow control. 35 00:03:05,390 --> 00:03:09,620 Connection can be put on hold for many reasons during data transmission. 36 00:03:11,640 --> 00:03:18,120 Data can be resumed when conditions are appropriate, and that's how flow control works pretty much. 37 00:03:19,830 --> 00:03:26,610 There is a connection oriented feature, so it means that before the data gets transferred, the relevant 38 00:03:26,610 --> 00:03:28,710 parties must establish a connection. 39 00:03:29,010 --> 00:03:32,250 Data transmission will not start until the connection is established. 40 00:03:33,610 --> 00:03:34,510 The network layer. 41 00:03:35,660 --> 00:03:41,420 So data is transferred to the network card, and in this layer, the data is converted into electrical 42 00:03:41,420 --> 00:03:45,350 signals, whether it's a wireless card or an Ethernet card. 43 00:03:47,370 --> 00:03:48,360 And the physical layer. 44 00:03:49,430 --> 00:03:55,580 So that's the layer where the data is transmitted by a physical cable, whether it's fiber or copper. 45 00:03:57,790 --> 00:04:01,900 For example, when you open a Web page, the following operations will be performed. 46 00:04:03,230 --> 00:04:09,800 On a server where the Web page is located, the output of the Web page in HDMI format is created. 47 00:04:11,030 --> 00:04:14,600 And the command to send this data via HTTP protocol. 48 00:04:16,190 --> 00:04:18,170 This is done in labor for. 49 00:04:19,310 --> 00:04:23,060 The application layer data is sent to layer three from here. 50 00:04:24,540 --> 00:04:29,700 And the transport layer, the data port information, data size and information will be added. 51 00:04:31,430 --> 00:04:38,180 And in the network layer, the IP address of the server, computer and the final size of the data sides 52 00:04:38,180 --> 00:04:40,430 are added to the data package. 53 00:04:42,110 --> 00:04:48,080 Then in the physical layer, the physical address information and the final data size are added. 54 00:04:49,810 --> 00:04:53,730 Then the package exit the server and reaches your computer. 55 00:04:55,130 --> 00:04:59,300 And of course, when it reaches your computer, your operations are repeated in reverse. 56 00:04:59,950 --> 00:05:06,800 So it handles the physical layer, then the network layer, then the transport layer and then the application 57 00:05:06,800 --> 00:05:07,040 layer. 58 00:05:08,610 --> 00:05:14,370 And then finally, it sends the remaining package to your Web browser, and that's when the page opens. 59 00:05:17,190 --> 00:05:19,110 Ekpe i.p Flagg's. 60 00:05:20,590 --> 00:05:23,080 So in communicating with TCP IP. 61 00:05:24,620 --> 00:05:28,130 Some flags are used to check the security of the connection. 62 00:05:29,380 --> 00:05:32,560 So these flags will start the communication with the other party. 63 00:05:33,500 --> 00:05:40,760 My communication ends when the data flow is finished and it is confirmed that it is a suitable environment 64 00:05:40,760 --> 00:05:41,840 for data transfer. 65 00:05:43,180 --> 00:05:45,760 So there are six TCP IP flags. 66 00:05:46,950 --> 00:05:54,000 And these are sin, which is a flag that initiates a connection request with a new sequence, no. 67 00:05:57,160 --> 00:06:03,670 The acknowledged flag specifies that the data transfer request is confirmed along with the expected 68 00:06:03,670 --> 00:06:04,510 sequence number. 69 00:06:05,520 --> 00:06:11,960 Push the flag indicating that the system accepts the connection request and sends the Bufford information. 70 00:06:13,630 --> 00:06:20,260 ERGEG is the flag that specifies that the packet carrying the flag is transmitted as quickly as possible. 71 00:06:21,650 --> 00:06:29,030 Finn is a flag that indicates it, no more information can be sent and the connection should be terminated. 72 00:06:30,250 --> 00:06:34,990 And reset is a flag that resets the connection. 73 00:06:37,380 --> 00:06:38,580 Reweigh handshake. 74 00:06:39,550 --> 00:06:48,070 So before TCP IP data transfers will start, the parties must verify each other and this method is called 75 00:06:48,430 --> 00:06:49,690 the three way handshake. 76 00:06:50,520 --> 00:06:57,570 So it works as follows two computers and these are Little Homestay and Husby, and I suppose we want 77 00:06:57,570 --> 00:07:03,340 to transfer data from host to host B. So step one host sends this in packet. 78 00:07:04,080 --> 00:07:07,680 So in this package, the Syn shelf is set to one. 79 00:07:08,760 --> 00:07:12,270 And also included in the package is the sequence, no information. 80 00:07:13,440 --> 00:07:21,720 Step two was to be receives a package from José and prepares a package descent, so in this package, 81 00:07:21,720 --> 00:07:24,300 the senanayake flags are set to one. 82 00:07:25,660 --> 00:07:32,530 It also adds host bees sequence number, as well as the acknowledgement number to host a. 83 00:07:33,970 --> 00:07:35,110 And in step three. 84 00:07:36,460 --> 00:07:44,170 Ohio State receives the packet from Jospeh and says the ACC flagged one, sending it to those B by adding 85 00:07:44,170 --> 00:07:45,370 the acknowledgement No. 86 00:07:46,320 --> 00:07:49,110 And that completes the three way handshake. 87 00:07:51,620 --> 00:07:52,880 What is UDP? 88 00:07:54,620 --> 00:08:02,240 UDP is a user diagram protocol, and it's one of the two transport layer protocols of E.S.P IP protocol 89 00:08:02,240 --> 00:08:02,660 suite. 90 00:08:03,390 --> 00:08:12,020 So since data without making a connection UDP is an unreliable transfer protocol, it's used in real 91 00:08:12,020 --> 00:08:17,330 time data transfers such as audio and video transmission and wide area networks or wens. 92 00:08:17,690 --> 00:08:24,590 It minimizes data transmission time by not performing UDP connections, set up operations, flow control 93 00:08:24,590 --> 00:08:26,490 and retransmission operations. 94 00:08:26,990 --> 00:08:30,490 So an UDP and TCP use the same communication path. 95 00:08:30,950 --> 00:08:39,560 The quality of service of real time data transfer with UDP decreases due to the high data traffic generated 96 00:08:39,560 --> 00:08:40,800 by TCP. 97 00:08:41,570 --> 00:08:47,780 Some of the protocols that use UDP or DNS, DFT and S&P protocols. 98 00:08:48,380 --> 00:08:56,630 Application programmers prefer UDP over TCP because UDP does not occupy much bandwidth on the network.