Question

How does the TCP/IP protocol promote decentralisation of internet?

How does the TCP/IP protocol promote decentralisation of internet?

Homework Answers

Answer #1

To set the context, the Internet protocol suite is a set of communication protocols which govern how network devices communicate over the internet. It consists of 4 different layers. Though TCP and IP are actually 2 distinct protocols running on the Transport
layer and the Internet layer respectively, the term ‘TCP/IP’ generally refers to the entire internet protocol suite.

TCP (Transmission Control Protocol) defines how applications create communication channels across a network, and manages how messages are fragmented and reassembled during transmission and reception. IP (Internet Protocol) dictates how packets are addressed and routed in order
to make sure that they reach the correct destination. In tandem, TCP and IP are the foundational protocols of the entire suite of internet protocols.

The other 2 layers are the Data Link layer and the Application layer – the former manages the transmission of data bits through the hardware components of the network, and the latter defines the communication
protocols and interface methods used by the network host.

The ubiquitous TCP/IP Protocol

TCP/IP based internet communication has been the norm for over four decades now, but as new technologies are coming to the forefront, kinks are being observed in its armour. For example, IP addresses are often tied to physical addresses, and once hackers gain access to an individual’s identity, various means of social engineering can be employed to commit fraudulent acts. Even HTTP, the most abundantly used protocol for data transmission in the application layer, is unencrypted and extremely vulnerable to hacking. Moreover, when a network running TCP becomes
congested, the three-way handshake, acknowledgement and congestion control mechanisms (which are all integral to TCP) only lead to bandwidth wastage and further congestion.

Tachyon’s Architecture

Tachyon's architecture models aims at completely overhauling the existing TCP/IP model, and providing addition security and privacy features.

Tachyon's Architecture Overview

Tachyon Booster UDP (TBU)

In the Tachyon environment, TBU is the bottom layer protocol which
will replace the Internet, Transport and Application layers of the TCP/IP
model.

Tachyon claims that when used in conjunction with real-time Optimal routing, TBU can increase transmission speed by 2x to 10x in a centralized network, and achieve over 90% connection success rate in a complex network environment.

Internet Layer – Tachyon Protocol uses a combination of Point-to-Point
Protocol (PPP) and blockchain technology to facilitate the large-scale collaboration of Peer-to-Peer (P2P) networks. This eliminates the need of a central server, and offers anti-censorship through decentralization. To ensure robustness of the P2P networks, a Tachyon DHT based on Kademlia routing protocol is implemented.

Transport Layer – Tachyon uses UDP instead of TCP in the transport layer. UDP offers superior throughput and has less overhead compared to TCP, which improves transmission efficiency.

Application Layer – The application layer is redesigned to support the UDP in the transport layer. The optimizations include Forward Error Correction (FEC) to reduce packet loss, and bandwidth auto-scaling techniques to maximize the throughput efficiency.

Tachyon Security Protocol (TSP)

TSP is the security component of Tachyon’s ecosystem. Network
sniffing and Man-in-the-middle attack are arguably the biggest threats to P2P networks today.

And as an investor, for the first time, it is possible to buy a portion of these networks, which will power the future infrastructure of the internet. Investing directly in TCP/IP (packets), SMTP (email), HTTPS (encryption) or another low-level internet protocol in the early 1990s would be extremely valuable today.

If this sounds complicated, it’s because it is. To be sure, the blockchain space is still mostly in a phase of experimentation, but the first breakout apps will be explosive because they financially incentivize users to participate in the network. Imagine being able to actually make money when you contribute on social media.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
What is the “package”of data at each layer of the TCP/IP protocol stack called?
What is the “package”of data at each layer of the TCP/IP protocol stack called?
explain the importance of internet control management protocol (ICMP) in delivery of internet protocol (IP) best-effort...
explain the importance of internet control management protocol (ICMP) in delivery of internet protocol (IP) best-effort service and discuss the categories of icmp message.
Discuss whether a socket address is unique in the Internet (i.e., TCP/IP) or not.
Discuss whether a socket address is unique in the Internet (i.e., TCP/IP) or not.
Which address is used on the internet for employing the TCP/IP protocols? a) physical address and...
Which address is used on the internet for employing the TCP/IP protocols? a) physical address and logical address b) port address c) specific address d) all of the mentioned
9. Which TCP/IP protocol allows ISPs and corporate networks to support more hosts than they have...
9. Which TCP/IP protocol allows ISPs and corporate networks to support more hosts than they have available addresses? 10. Why can a single HTTP server handle thousands of requests per hour? 11. List three basic Telnet commands. 12. Which FTP command allows you to retrieve a file from within an FTP session?
What are the two basic communication paradigms used in the Internet? Give six characteristics of Internet...
What are the two basic communication paradigms used in the Internet? Give six characteristics of Internet stream communication. Give six characteristics of Internet message communication. If a sender uses the stream paradigm and always sends 1024 bytes at a time, what size blocks can the Internet deliver to a receiver If a sender wants to have copies of each data block being sent to three recipients, which paradigm should the sender choose? What are the four surprising aspects of the...
Draw logical connections between the two prevalent network layered models (OSI and TCP/IP) and understand how...
Draw logical connections between the two prevalent network layered models (OSI and TCP/IP) and understand how those layers related to specific network hardware and devices. Describe in 2 paragraphs (one for each model) the OSI and TCP/IP models demonstrating your understanding of each
List four alternate terms for "physical address". Name the TCP/IP model layers, and map them to...
List four alternate terms for "physical address". Name the TCP/IP model layers, and map them to the corresponding OSI model layers. At which TCP/IP model layer(s) do UDP and TCP reside? List five TCP/IP model application layer protocols.
Is there a protocol that is part of the Internet, but not the Web? Give an...
Is there a protocol that is part of the Internet, but not the Web? Give an example if so. Is there a protocol that is part of the Web, but not the Internet? Give an example if so.
What is your IP address before and after you connect to the internet How can you...
What is your IP address before and after you connect to the internet How can you get a dynamic IP address