Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1136

TCP/IP

What is TCP/IP?

TCP/IPThe four-layer Internet Protocol Suite that defines how packets are addressed, routed, fragmented, and reliably delivered between hosts across interconnected networks.


TCP/IP is the family of protocols that underpins the modern Internet, originally specified by DARPA and codified in numerous IETF RFCs. It is organized into four layers: link, internet (IP, RFC 791 for IPv4 and RFC 8200 for IPv6), transport (TCP, UDP), and application (HTTP, DNS, SMTP). IP provides best-effort addressing and routing, while TCP layers reliability, ordering, and congestion control on top. The model is connectionless at the network layer, which lets routers forward independently and survive link failures. From a security perspective, TCP/IP itself offers no confidentiality or authentication, so protections such as TLS, IPsec, and firewalls are added at upper or adjacent layers.

Examples

  1. 01

    A browser opens an HTTPS connection: DNS resolves a hostname, IP routes packets, TCP carries the bytes, TLS encrypts them.

  2. 02

    A traceroute uses IP TTL expiry and ICMP responses to map the path between two hosts.

Frequently asked questions

What is TCP/IP?

The four-layer Internet Protocol Suite that defines how packets are addressed, routed, fragmented, and reliably delivered between hosts across interconnected networks. It belongs to the Network Security category of cybersecurity.

What does TCP/IP mean?

The four-layer Internet Protocol Suite that defines how packets are addressed, routed, fragmented, and reliably delivered between hosts across interconnected networks.

How does TCP/IP work?

TCP/IP is the family of protocols that underpins the modern Internet, originally specified by DARPA and codified in numerous IETF RFCs. It is organized into four layers: link, internet (IP, RFC 791 for IPv4 and RFC 8200 for IPv6), transport (TCP, UDP), and application (HTTP, DNS, SMTP). IP provides best-effort addressing and routing, while TCP layers reliability, ordering, and congestion control on top. The model is connectionless at the network layer, which lets routers forward independently and survive link failures. From a security perspective, TCP/IP itself offers no confidentiality or authentication, so protections such as TLS, IPsec, and firewalls are added at upper or adjacent layers.

How do you defend against TCP/IP?

Defences for TCP/IP typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for TCP/IP?

Common alternative names include: Internet Protocol Suite, DoD model.

Related terms

See also