Explain transport layer of osi model, Computer Engineering

Assignment Help:

Explain Transport Layer of OSI Model.

The transport layer utilizes the services provided through the network layer, as best path selection and logical addressing, to give end-to-end communication in between source and destination.

  • The transport -layer data stream is a logical connection in between the endpoints of a network.
  • End-to-end control is given by sliding windows and reliability into sequencing numbers and acknowledgments.
  • The transport layer regulates information flow to make sure end-to-end connectivity in between host applications accurately and reliably.
  • The TCP/ IP protocol of Layer 4 that is transport layer has two protocols. They are UDP and TCP.

The transport layer admits data from the session layer and also segments the data for transport across the network. Usually, the transport layer is responsible for ensuring that the data is delivered error-free and in the appropriate sequence. Flow control usually occurs at the transport layer.


Related Discussions:- Explain transport layer of osi model

Draw and illustrate the block diagram of DMA controller, Draw and illustrat...

Draw and illustrate the block diagram of DMA controller. Also discuss the various modes in which DMAC works. Direct memory access (DMA) is a process in that an external device

Print a prompt, When your shell is waiting for input from the user, it shou...

When your shell is waiting for input from the user, it should first print a prompt. The prompt should consist of the current working directory followed by the _>_ character. Here i

Explain with the help of examples fifo algorithms, Explain with the help of...

Explain with the help of examples FIFO algorithms? FIFO policy: This policy easy removes pages in the order they arrived into the main memory. By using this policy we easily

Advantages on electronic payment system, Advantages on electronic payment s...

Advantages on electronic payment system It gives good security schemes.  Four necessary security requirements for safe e-payments are Authentication, Encryption, Integrity,

What do you mean by prototype, Q. What do you mean by Prototype? A prot...

Q. What do you mean by Prototype? A prototyping approach lay emphasis on the construction model of a system. Designing and building a scaled-down though functional version of a

Versions of small computer systems interface, Q. Versions of small computer...

Q. Versions of small computer systems interface? SCSI-1 calls for a cable with 8 data wires plus one for parity. SCSI-2 allows use of multiple cables to support 16- or

3D rotation, Magnify a triangle with vertices A = (0,0), B = (3,3) and C = ...

Magnify a triangle with vertices A = (0,0), B = (3,3) and C = (6,4) to twice its size in such a way that A remains in its original position.

Define the term intranet, Define the term Intranet. Intranet: An...

Define the term Intranet. Intranet: An Intranet is a type of information system that facilitates communication within the organizations among widely dispersed department

Predicate logic - artificial intelligence, Translate the following sentence...

Translate the following sentences into predicate logic, using Russell's theory of definite descriptions to represent the article the. a. The wizzard of Oz fell. b. Everyone a

What is meant by a field, What is meant by a field The consecutive nonw...

What is meant by a field The consecutive nonwhite space characters that define a data item collectively define a field. It is possible  to limit the number of such characters b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd