Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

TCP 3-Way Handshake

Posted on by

TCP is the primary transport layer protocol that is used to transport data between systems when communicating over a network. TCP is a connection oriented protocol that provides reliability, flow control, congestion control and multiplexing.

TCP establishes a connection between the systems when they want to send data with a 3-way handshake. The client starts the TCP by sending a SYN (Sync) packet to the server. The server responds back with SYN/ACK (Sync/Acknowledgement) to the client. Then the client sends back the ACK (Acknowledgement) to the server. This 3-way handshake establishes the connection between the client and server after which they start sending data between each other.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme