Explain transport layer of osi model, Computer Engineering

Assignment Help:

Explain Transport Layer of OSI Model.

The transport layer utilizes the services provided through the network layer, as best path selection and logical addressing, to give end-to-end communication in between source and destination.

  • The transport -layer data stream is a logical connection in between the endpoints of a network.
  • End-to-end control is given by sliding windows and reliability into sequencing numbers and acknowledgments.
  • The transport layer regulates information flow to make sure end-to-end connectivity in between host applications accurately and reliably.
  • The TCP/ IP protocol of Layer 4 that is transport layer has two protocols. They are UDP and TCP.

The transport layer admits data from the session layer and also segments the data for transport across the network. Usually, the transport layer is responsible for ensuring that the data is delivered error-free and in the appropriate sequence. Flow control usually occurs at the transport layer.


Related Discussions:- Explain transport layer of osi model

How aliases are used in DNS, How aliases are used in DNS? Explain. CNAM...

How aliases are used in DNS? Explain. CNAME entries are analogous to a symbolic link in a file system- the entry gives an alias for other DNS entry. Corporation of expertsmind

Explain the term - integrity, Explain the term - Integrity In most c...

Explain the term - Integrity In most cases, corporate data should remain unchanged by third parties, so the system should be capable of ensuring that only authorised personn

State the term organizational structure, State the term Organizational Stru...

State the term Organizational Structure. A business organization might be structured in many various ways, depending on the environment in that this operates. There are alwa

State the various security tools, State the various Security Tools Sec...

State the various Security Tools Securing an Intranet is not a simple task. Just as articles in a house are protected by use of various types of security systems such as lock

Develop a program which reads hexadecimal number, Q.  Develop a program, wh...

Q.  Develop a program, which reads Hexadecimal number from an input file & convert it into Octal, Binary, and Decimal. The O/P should be written to a file & displayed accordingly.

Temporary registers w and z, Why the temporary registers W and Z are named ...

Why the temporary registers W and Z are named so I mean we start from A,B,C,D,E then H and L coz H stands for higher bit nd L for lower bit of the address pointed by memory pointer

How can a shift register be used as a counter, What is a shift register? Ca...

What is a shift register? Can a shift register be used as a counter? If yes, explain how?     Ans: Shift Register: A register wherein data gets shifted towards left or right

Software architecture of microprocessor, The 68HC11 series is based on the ...

The 68HC11 series is based on the Motorola 6800/1 programming instruction set and hence is a fairly simple 8 bit microprocessor. The internal structure of the 6800/1 is shown below

How to join to mwseries from power builder 8.0, Using CICS Transaction Gate...

Using CICS Transaction Gateway we can join MQ Series with Power Builder 8.0

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd