๋ณธ๋ฌธ ๋ฐ”๋กœ๊ฐ€๊ธฐ
โœ’๏ธ INTERLUDE/2023 Autonomous Driving & Network Study

[2์ฃผ์ฐจ] CAN ํ†ต์‹ ์˜ ์ดํ•ด: CAN Protocol ๋ฐ ํ†ต์‹  ์‹œ์Šคํ…œ & CAN Dos Attack

by A Lim Han 2023. 4. 5.

# CAN ํ†ต์‹ ์˜ ์ดํ•ด: CAN Protocol ๋ฐ ํ†ต์‹  ์‹œ์Šคํ…œ & CAN Dos Attack

 

 

# CAN๊ณผ CAN ํ†ต์‹ 

- CAN (Controller Area Network)

: ์ฐจ๋Ÿ‰ ๋ฐ ์‚ฐ์—…์šฉ ์ œ์–ด ์‹œ์Šคํ…œ์—์„œ ์‚ฌ์šฉ๋˜๋Š” ํ†ต์‹  ํ”„๋กœํ† ์ฝœ๋กœ, ๊ฐ ๋ชจ๋“ˆ ๊ฐ„ ๋ฐ์ดํ„ฐ ํ†ต์‹ ์— ์ด์šฉ๋œ๋‹ค. CAN ํ”„๋กœํ† ์ฝœ์„ ์ด์šฉํ•œ ํ†ต์‹ ์€ ๋ฐ์ดํ„ฐ ์ „์†ก์„ ์œ„ํ•ด ์ด 2๊ฐœ์˜ ์ „์†ก์„ (CAN-Tx & CAN-Rx)์œผ๋กœ ์ง„ํ–‰๋˜๋Š”๋ฐ, ์ด๋กœ ์ธํ•ด ๋†’์€ ์‹ ๋ขฐ์„ฑ๊ณผ ์•ˆ์ „์„ฑ์„ ๋ณด์žฅํ•  ์ˆ˜ ์žˆ๋‹ค.

 

+ ์ฐธ๊ณ  ์ž๋ฃŒ

: https://www.engineersgarage.com/can-protocol-understanding-the-controller-area-network-protocol/

 

CAN protocol: Understanding the controller area network

Controller Area Network or CAN protocol is a method of communication between various electronic devices like engine management systems, active suspension, ABS, gear control, lighting control, air conditioning, airbags, central locking etc embedded in an a

www.engineersgarage.com

 

 

 

 

# CAN Protocol์˜ ์ƒ์„ธ์™€ ํŠน์ง•

- CAN Protocol์˜ ํŠน์ง•

๊ณ ์† ํ†ต์‹  ๋น ๋ฅธ ๋ฐ์ดํ„ฐ ์ „์†ก ์ง€์›
์˜ค๋ฅ˜ ๋ณต๊ตฌ ๋ฐ ๊ฒ€์ถœ ๊ธฐ๋Šฅ ์ง€์› ๋ฐ์ดํ„ฐ ์ „์†ก ์ค‘ ์˜ค๋ฅ˜ ๋ฐœ์ƒ ์‹œ ์˜ค๋ฅ˜ ์‹๋ณ„ ๋ฐ ์ˆ˜์ • ๊ธฐ๋Šฅ ์ง€์›
๋ฉ€ํ‹ฐ ๋งˆ์Šคํ„ฐ ํ†ต์‹  ๋‹ค์ˆ˜์˜ ๋””๋ฐ”์ด์Šค์˜ ๋™์‹œ ๋ฐ์ดํ„ฐ ์ „์†ก ์ง€์›
์ ์€ ์ „๋ ฅ ์†Œ๋น„ ๋ฐฐํ„ฐ๋ฆฌ ์ˆ˜๋ช… ์—ฐ์žฅ ๋ฐ ์ €์ „๋ ฅ ์†Œ๋น„ ์ง€์›
์šฐ์„  ์ˆœ์œ„ ๊ธฐ๋ฐ˜ ํ†ต์‹  ๋ฉ”์‹œ์ง€ ์šฐ์„ ์ˆœ์œ„ ๊ธฐ๋ฐ˜์˜ ํ†ต์‹  ์ฒ˜๋ฆฌ ์ง€์›
์‹ ๋ขฐ์ ์ด๊ณ  ์•ˆ์ •์ ์ธ ํ†ต์‹  ์—ฌ๋Ÿฌ ๋ฐฉ๋ฉด์—์„œ ๋†’์€ ์‹ ๋ขฐ์„ฑ ๊ฐ€์ง„ ํ†ต์‹  ์ง€์›

 

+ ์ฐธ๊ณ  ์ž๋ฃŒ

: https://scienceon.kisti.re.kr/commons/util/originalView.do?cn=CFKO200634741466208&oCn=NPAP08116964&dbt=CFKO&journal=NPRO00290005 

 

์›๋ฌธ๋ณด๊ธฐ - ScienceON

 

scienceon.kisti.re.kr

 

 

 

- CAN Protocol์˜ ๊ตฌ์„ฑ

CAN ๋ฉ”์„ธ์ง€์˜ ๊ตฌ์„ฑ๋„

 

 CAN ํ”„๋กœํ† ์ฝœ์€ ํ‘œ์ค€ํ™”๋œ ํŠน์„ฑ ์ž„ํ”ผ๋˜์Šค๋ฅผ ๊ฐ€์ง€๊ณ  ์žˆ๋Š” ์Œ์„  ์ผ€์ด๋ธ”์„ ํ†ตํ•ด ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•˜๋Š”๋ฐ, ์ด๋กœ ์ธํ•ด ๊ฐ์ข… ์™ธ๋ถ€ ๋…ธ์ด์ฆˆ์— ๊ฐ•ํ•œ ์‰ด๋“œ๋กœ ๋ณดํ˜ธ๋ฐ›์„ ์ˆ˜ ์žˆ๋‹ค. ๋˜ CAN ํ†ต์‹  ํ”„๋กœํ† ์ฝœ์—์„œ๋Š” ํ”„๋ ˆ์ž„์ด ๋ฐ์ดํ„ฐ์˜ ์ „์†ก ๋‹จ์œ„์ด๋‹ค. ํ•˜๋‚˜์˜ ํ”„๋ ˆ์ž„์€ ์ด 6๊ฐ€์ง€ ์š”์†Œ๋กœ ๊ตฌ์„ฑ๋˜๋Š”๋ฐ, ๊ทธ ๋ชฉ๋ก์€ ์•„๋ž˜์™€ ๊ฐ™๋‹ค.

SOF Identifier Control Field
EOF Data Field CRC

 

 ์œ„์—์„œ ์–ธ๊ธ‰๋˜์—ˆ๋“ฏ์ด, CAN ํ†ต์‹  ํ”„๋กœํ† ์ฝœ์—์„œ๋Š” ๋ฉ”์‹œ์ง€๋ฅผ ์‹๋ณ„ํ•˜๋Š” ์šฉ๋„๋กœ ์‹๋ณ„์ž๋ฅผ ์ด์šฉํ•œ๋‹ค. ์ด ์‹๋ณ„์ž(Identifier)์€ 11 ๋˜๋Š” 29๋น„ํŠธ์˜ ๊ธธ์ด๋ฅผ ๊ฐ€์ง€๊ณ  ์žˆ๋‹ค. ์‹๋ณ„์ž๋Š” ๊ฐ€์ง€๋Š” ๋น„ํŠธ์˜ ๊ธธ์ด๋ฏธ๋‹ค ๋‹ค๋ฅธ ์ด๋ฆ„์„ ๊ฐ€์ง€๋Š”๋ฐ, 11๋น„ํŠธ ์‹๋ณ„์ž๋Š” SID, 29๋น„ํŠธ ์‹๋ณ„์ž๋Š” Extended CAN( = EID )๋ผ๋Š” ๋ช…์นญ์œผ๋กœ ๋ถˆ๋ฆฐ๋‹ค. ๋˜ ์˜ค๋ฅ˜ ๊ฒ€์ถœ ๋ฐ ๋ณต๊ตฌ ๊ธฐ๋Šฅ์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด CAN ํ†ต์‹ ์€ CRC ์ฒ˜๋ฆฌ ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•œ๋‹ค. CRC๋Š” Cyclic Redundancy Check์˜ ์•ฝ์ž๋กœ, ๋ฐ์ดํ„ฐ ์ „์†ก ์ค‘ ์˜ค๋ฅ˜ ๋ฐœ์ƒ ์‹œ ํ”„๋ ˆ์ž„ ์žฌ์ „์†ก ๋ฐ ๋ฐ์ดํ„ฐ์˜ ์‹ ๋ขฐ์„ฑ์„ ๋ณด์žฅํ•˜๊ธฐ ์œ„ํ•œ ๊ธฐ๋ฒ•์ด๋‹ค.

 

+ ์ฐธ๊ณ  ์ž๋ฃŒ

: http://www.fescaro.com/kr/insight/blog.php#content

 

๊ธฐ์ˆ ๋ธ”๋กœ๊ทธ - INSIGHT - ํŽ˜์Šค์นด๋กœ(FESCARO) - ์ž๋™์ฐจ ์†Œํ”„ํŠธ์›จ์–ด ์ „๋ฌธ๊ธฐ์—…(์ž๋™์ฐจ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ, ์ œ์–ด๊ธฐ,

ํŽ˜์Šค์นด๋กœ๋Š” ์ž์œจ์ฃผํ–‰์ฐจ, ์ „๊ธฐ์ฐจ, ์ปค๋„ฅํ‹ฐ๋“œ์นด ๋“ฑ ๋ฏธ๋ž˜์ฐจ์˜ ๋ชจ๋“  SW์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์ž๋™์ฐจ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ๋ถ€ํ„ฐ ๊ฒŒ์ดํŠธ์›จ์ด ์ œ์–ด๊ธฐ, V2X, SDV๊นŒ์ง€ ๋‹ค๊ฐ€์˜ค๋Š” ๋ฏธ๋ž˜์ฐจ ์‚ฐ์—…์˜ ํ˜์‹ ์„ ์ฃผ๋„ํ•ฉ๋‹ˆ๋‹ค.

www.fescaro.com

 

 

 

- CAN Protocol์˜ ๊ทœ๊ฒฉ๊ณผ ๋ฒ„์ „

: CAN ํ”„๋กœํ† ์ฝœ์€ ISO ๊ทœ๊ฒฉ์— ๋”ฐ๋ผ ์ด 2๊ฐ€์ง€๋กœ ๋ถ„๋ฅ˜๋˜๋Š”๋ฐ, ์ด๋“ค์€ ๊ฐ๊ฐ ํ†ต์‹  ์†๋„์—์„œ ํฐ ์ฐจ์ด๋ฅผ ๋ณด์ธ๋‹ค. ISO 11898์˜ ๊ฒฝ์šฐ ์•ฝ 1Mbps ์ด์ƒ์˜ ์†๋„๋ฅผ ๋‚ผ ์ˆ˜ ์žˆ๊ณ , ISO 11519์˜ ๊ฒฝ์šฐ๋Š” ๊ณ ์ž‘ 125kbps์˜ ํ†ต์‹  ์†๋„๋ฐ–์— ์ง€์›ํ•˜์ง€ ๋ชปํ•œ๋‹ค.

 

 ISO ๊ทœ๊ฒฉ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ์œ„์—์„œ ์–ธ๊ธ‰๋˜์—ˆ๋˜ ์‹๋ณ„์ž์˜ ๊ธธ์ด์— ๋”ฐ๋ผ์„œ๋„ ๊ทœ๊ฒฉ๊ณผ ๋ฒ„์ „์„ ๋‚˜๋ˆŒ ์ˆ˜ ์žˆ๋‹ค. ํ‘œ์ค€ CAN์˜ ๊ฒฝ์šฐ๋Š” 2.0A ๋ฒ„์ „์œผ๋กœ 11๋น„ํŠธ์˜ ์‹๋ณ„์ž์™€ ๊ด€๋ จ๋˜์–ด ์žˆ๋‹ค. ๋ฐ˜๋Œ€๋กœ ํ™•์žฅ CAN์˜ ๊ฒฝ์šฐ๋Š” 2.0B ๋ฒ„์ „์œผ๋กœ, 29๋น„ํŠธ์˜ ์‹๋ณ„์ž์™€ ์—ฐ๊ด€์ด ์žˆ๋‹ค.

 

+ ์ฐธ๊ณ  ์ž๋ฃŒ

https://www.kvaser.com/can-protocol-tutorial/

 

Controller Area Network (CAN BUS) Protocol

What is canbus? Take our free video course to learn about the can bus system, decoding, wiring diagram, analyzer, and the SAE vehicle bus J1939.

www.kvaser.com

 

 

 

 

# CAN ํ†ต์‹ ๊ณผ ๋ฉ”์‹œ์ง€ ์ถฉ๋Œ

: CAN ํ†ต์‹ ์—์„œ๋Š” ๋ฉ”์‹œ์ง€์˜ CAN ID๊ฐ€ ์ž‘์„์ˆ˜๋ก ๋” ๋†’์€ ์šฐ์„  ์ˆœ์œ„๋ฅผ ๊ฐ€์ง€๋ฉฐ, ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•˜๊ธฐ ์ „ ์‚ฌ์šฉํ•  ๋ฒ„์Šค์˜ ์‚ฌ์šฉ ์—ฌ๋ถ€๋ฅผ ๋จผ์ € ๊ฒ€ํ† ํ•œ๋‹ค. ์ด๋•Œ ํ•„์š”ํ•œ ๋ฒ„์Šค๊ฐ€ ์ด๋ฏธ ๋‹ค๋ฅธ ์š”์†Œ์— ์˜ํ•ด ์‚ฌ์šฉ๋˜๊ณ  ์žˆ๋Š” ๊ฒฝ์šฐ์—๋Š” ๋ฉ”์„ธ์ง€ ๊ฐ„์˜ ์ถฉ๋Œ์„ ํ”ผํ•˜๊ธฐ ์œ„ํ•ด ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•˜์ง€ ์•Š๋Š”๋‹ค. ๋งŒ์ผ ๋ฉ”์‹œ์ง€์˜ ์ถฉ๋Œ์ด ๋ถˆ๊ฐ€ํ”ผํ•˜๊ฒŒ ๋ฐœ์ƒํ•˜์˜€๋‹ค๋ฉด, ๋‘ ๋ฉ”์„ธ์ง€์˜ ์šฐ์„ ์ˆœ์œ„๋ฅผ ํŒ๋ณ„ํ•˜์—ฌ ๋” ์ ์€ CAN ID๊ฐ’์„ ๊ฐ€์ง„ ๋ฉ”์‹œ์ง€๋งŒ ์ „์†กํ•œ๋‹ค.

 

+ ์ฐธ๊ณ  ์ž๋ฃŒ

: https://copperhilltech.com/blog/controller-area-network-can-bus-bus-arbitration/

 

Controller Area Network (CAN Bus) - Bus Arbitration

The following is an excerpt from  A Comprehensible Controller Area Network by Wilfried Voss. Since a serial communication system such as CAN is based on a two-wire connection between nodes in the network, i.e. all nodes are sharing the same physical commu

copperhilltech.com

 

 

 

 

# CAN Dos Attack๊ณผ ํ†ต์‹  ์ทจ์•ฝ์ 

: CAN ํ†ต์‹ ์—์„œ์˜ DoS ๊ณต๊ฒฉ์€ ๋Œ€๋ถ€๋ถ„ CAN ๋ฒ„์Šค๋ฅผ ํฌํ•จํ•จ ๋ฌผ๋ฆฌ์ ์ธ ์ ‘๊ทผ์„ ์š”๊ตฌํ•˜๋Š”๋ฐ, ์ด๋Ÿฌํ•œ ์ ์„ ์•…์šฉํ•  ์ˆ˜ ์žˆ๋‹ค. CAN ๋ฒ„์Šค์— ๋Œ€ํ•ด ๋งŽ์€ ์ˆ˜์˜ ์•…์„ฑ ๋ฐ์ดํ„ฐ๋ฅผ ์‚ฝ์ž…ํ•˜๊ฑฐ๋‚˜, ํ•˜๋‚˜ ์ด์ƒ์˜ ๋…ธ๋“œ์—์„œ ํ†ต์‹ ์—์„œ์˜ ํ•œ๊ณ„์น˜ ์ด์ƒ์˜ ๊ณผ๋‹คํ•œ ๋ฐ์ดํ„ฐ ํ”„๋ ˆ์ž„์„ ์ƒ์„ฑํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ์˜ ๊ณต๊ฒฉ์ด ๊ฐ€๋Šฅํ•˜๋‹ค.

 

+ ์ฐธ๊ณ  ์ž๋ฃŒ

: https://www.ncsc.gov.uk/collection/denial-service-dos-guidance-collection

 

Denial of Service (DoS) guidance

Guidance to help organisations understand and mitigate DoS attacks.

www.ncsc.gov.uk

 

: https://www.cisa.gov/news-events/news/understanding-denial-service-attacks

 

Understanding Denial-of-Service Attacks | CISA

Denial-of-service attacks don’t just affect websites—individual home users can be victims too. Denial-of-service attacks can be difficult to distinguish from common network activity, but there are some indications that an attack is in progress.

www.cisa.gov

 

 

 

 

# CAN ํ†ต์‹ ๊ณผ TCP/IP

 

 TCP๋Š” Transmission Control Protocol์˜ ์•ฝ์ž๋กœ, ๋„คํŠธ์›Œํฌ ์ƒ์—์„œ ๋ฐ์ดํ„ฐ๋“ค์„ ์•ˆ์ •์ ์œผ๋กœ ์ „์†กํ•˜๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉํ•˜๋Š” ์ธํ„ฐ๋„ท ํ”„๋กœํ† ์ฝœ ์Šค์œ„ํŠธ(IP suite) ์ค‘ ํ•˜๋‚˜์ด๋‹ค. TCP๋Š” ์ „์†ก ๊ณ„์ธต, ์ฆ‰ Transport Layer์—์„œ ์ž‘๋™ํ•œ๋‹ค๋Š” ํŠน์ง•์ด ์žˆ๋‹ค. ์ผ๋ฐ˜์ ์œผ๋กœ IP ํ”„๋กœํ† ์ฝœ๊ณผ ํ•จ๊ป˜ ์‚ฌ์šฉ๋˜๋ฉฐ, ์›น ๋ธŒ๋ผ์šฐ์ € ๋ฐ ์›น ์„œ๋ฒ„ ์‚ฌ์ด์˜ ๋ฐ์ดํ„ฐ ์ „์†ก์ด๋‚˜ ์ด๋ฉ”์ผ ์ „์†ก ๋“ฑ ๋‹ค์–‘ํ•œ ์ธํ„ฐ๋„ท ์„œ๋น„์Šค์—์„œ ์ด์šฉ๋˜๊ณ  ์žˆ๋‹ค.

 

 IP์˜ ๊ฒฝ์šฐ Internet Protocol์˜ ์•ฝ์ž๋กœ ์ด ๋˜ํ•œ ์ธํ„ฐ๋„ท ํ”„๋กœํ† ์ฝœ ์Šค์œ„ํŠธ ์ค‘ ํ•˜๋‚˜์ด๋‹ค. TCP์™€ ์œ ์‚ฌํ•˜๊ฒŒ ์ธํ„ฐ๋„ท ์ƒ์—์„œ ๋ฐ์ดํ„ฐ ํŒจํ‚ท์„ ์ „์†กํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋˜๋Š” ํ”„๋กœํ† ์ฝœ์ด๋‹ค. IP๋Š” ๋ฐ์ดํ„ฐ ํŒจํ‚ท์˜ ๊ฒฝ๋กœ๋ฅผ ๊ฒฐ์ •ํ•˜๊ณ , ํŒจํ‚ท์ด ๋ฌด์‚ฌํžˆ ๋ชฉ์ ์ง€๊นŒ์ง€ ๋„๋‹ฌํ•  ์ˆ˜ ์žˆ๋„๋ก ์ค‘๊ฐ„ ์ง€์ ์—์„œ ๋ผ์šฐํŒ…์„ ์ˆ˜ํ–‰ํ•œ๋‹ค. IP๋Š” ์ธํ„ฐ๋„ท ๊ณ„์ธต(Internet Layer)์—์„œ ์ž‘๋™ํ•˜๋ฉฐ, ์ƒ์œ„ ๊ณ„์ธต์—์„œ๋Š” TCP, UDP(User Datagram Protocol) ๋“ฑ์˜ ํ”„๋กœํ† ์ฝœ๋“ค์ด ์ด์šฉ๋œ๋‹ค.

 

 IP, TCP์™€ CAN์€ ๋งค์šฐ ์œ ์‚ฌํ•˜์ง€๋งŒ ๊ฐ๊ธฐ ์ฐจ์ด์ ์ด ์กด์žฌํ•œ๋‹ค. ์ฃผ๋œ ์ฐจ์ด์ ์€ ์šฉ๋„์™€ ํ”„๋กœํ† ์ฝœ์˜ ์ข…๋ฅ˜, ์—๋ฆฌ ์ฒ˜๋ฆฌ ๋ฐ ํŒจํ‚ท ์ „์†ก ๋ฐฉ์‹๊ณผ ์—ฐ๊ด€์ด ๊นŠ๋‹ค. ๊ฐ ์š”์†Œ๋“ค์˜ ๊ณตํ†ต์ ๊ณผ ์ฐจ์ด์ ์€ ์•„๋ž˜ ํ‘œ์™€ ๊ฐ™๋‹ค.

  TCP IP CAN
์‚ฌ์šฉ ๋ถ„์•ผ ๋ฐ ์˜ˆ์‹œ ์›น ๋ธŒ๋ผ์šฐ์ € ๋ฐ ์ด๋ฉ”์ผ ์ธํ„ฐ๋„ท ๋ฐ์ดํ„ฐ ์ „์†ก ์ฐจ๋Ÿ‰ ๋‚ด๋ถ€ ํ†ต์‹  ๋ฐ ๋กœ๋ด‡ ์ œ์–ด
์ „์†ก ์†๋„ ๋Š๋ฆผ ๋น ๋ฆ„ ๋น ๋ฆ„
์—๋Ÿฌ ์ฒ˜๋ฆฌ ์—๋Ÿฌ ๊ฒ€์ถœ ๋ฐ ์žฌ์ „์†ก ์ง€์› ์—๋Ÿฌ ๊ฒ€์ถœ ์—๋Ÿฌ ๊ฒ€์ถœ ๋ฐ ์žฌ์ „์†ก
ํŒจํ‚ท ์ „์†ก ๋ฐฉ์‹ ์—ฐ๊ฒฐํ˜• ๋น„์—ฐ๊ฒฐํ˜• ๋น„์—ฐ๊ฒฐํ˜•
ํ”„๋กœํ† ์ฝœ ์ž‘๋™ ๊ณ„์ธต ์ „์†ก ๊ณ„์ธต ์ธํ„ฐ๋„ท ๊ณ„์ธต ๋ฐ์ดํ„ฐ ๋งํฌ ๊ณ„์ธต
์šฉ๋„ ๋ฐ์ดํ„ฐ์˜ ์•ˆ์ „์  ์ „์†ก ์ง€์› ๋ฐ์ดํ„ฐ ํŒจํ‚ท ๋ผ์šฐํŒ… ์ฐจ๋Ÿ‰ ๋‚ด๋ถ€ ํ†ต

 

+ ์ฐธ๊ณ  ์ž๋ฃŒ

: https://www.techtarget.com/searchnetworking/definition/TCP

 

What is Transmission Control Protocol (TCP)? Definition from SearchNetworking

Explore how Transmission Control Protocol (TCP) works and how it compares to UDP, the OSI model and other protocols.

www.techtarget.com

 

: https://www.fortinet.com/resources/cyberglossary/tcp-ip

 

What is TCP/IP in Networking? | Fortinet

What is Transmission Control Protocol? Learn the meaning of Transmission Control Protocol and how TCP models enable applications and devices. โœ“ Click here!

www.fortinet.com

 

: https://www.hostinger.com/tutorials/tcp-protocol

 

TCP Protocol: Understanding What Transmission Control Protocol Is and How It Works

The TCP protocol is used on top of the IP to ensure reliable packet transmission. Learn what TCP protocol is and how it works in this article.

www.hostinger.com