In information technology, a protocol is a special set of rules or instructions that end points in a telecommunication connection use when they communicate. In the context of data communication between two points, a network protocol can also be referred as a formal set of rules, conventions and data structure that governs over how computers and other network devices exchange information over a network. From that, we can understand that a protocol is a standard procedure and format that two data communication devices must understand, accept and use to be able to talk to each other.
Based on what we have researched, we have chosen to use the TCP/IP protocol for the product that we proposed to enhance the network management and security issues. First of all, the history of TCP/IP has come a long way into existence. ( T. Lammle , 2005 ) mentioned that the Transmission Control Protocol / Internet Protocol ( TCP/IP ) suite was created by the Department of Defense ( DOD ) to ensure and preserve data integrity, as well as maintain communications in the event of catastrophic war. It was also found that if TCP / IP was designed and implemented properly, the network can be truly dependable and a resilient one.
From what we know about TCP/IP, it consist of two layers , which is the TCP and IP. Talking about TCP protocol, it is responsible for verifying the correct delivery of data from client to server. In the intermediate network, data can be lost. With this, TCP can adds support to detect errors or lost data to trigger retransmission until the data is correctly and completely received. On the other hand, IP protocol handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though we can see some of the packets from the same message are routed differently than the others, they will be reassembled at the destination.
On top of that, TCP/IP