Function of tcp - ip transport layer, Computer Networking

Assignment Help:

Q. Function of TCP/IP Transport Layer ?

TCP/IP Transport Layer

- Defines two standard transport protocols UDP and TCP

- TCP equipment a dependable data-stream protocol

  • Connection oriented

- UDP implements an undependable data-stream

  • Connectionless

- TCP offers reliable data transmission

- UDP is helpful in many applications

  • e.g. Where data requirements to be broadcasted or multicasted

- Primary difference is that UDP doesn't necessarily provide reliable data transmission

- Several programs will use a separate TCP connection as well as a UDP connection

1031_Function of TCP - IP Transport Layer.png

- TCP is accountable for data recovery

  • By providing a series number with each packet that it sends
  • TCP needs acknowledgement (ACK) to ensure correct data is received

- Packet is able to be retransmitted if error detected

- Use of acknowledgement (ACK)

2217_Function of TCP - IP Transport Layer1.png

- Flow control with Window

  • by means of specifying an acceptable range of sequence numbers

610_Function of TCP - IP Transport Layer2.png

- UDP and TCP introduce the concept of ports

- Common ports as well as the services that run on them:

 FTP 21 and 20

 telnet 23

 SMTP 25

 http 80

 POP3 110

- By specifying ports as well as including port numbers with TCP/UDP data multiplexing is achieved

- Multiplexing permits multiple network connections to take place simultaneously

- The port numbers together with the source and destination addresses for the data determine a socket


Related Discussions:- Function of tcp - ip transport layer

Routing table - network layer and routing , Routing Table Each  router ...

Routing Table Each  router now  uses the  shortest path tree to construct its routing table . each  router  uses the same algorithm and the same link state  database its own sh

Why routine security audits are essential, Why Routine security audits are ...

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

Explain fat tree interconnection network, Fat tree: It is a customized ver...

Fat tree: It is a customized version of tree network. In this network bandwidth of edge (or connecting wire between nodes) increases in the direction of root. It's a more realisti

What is domain names, Q. What is Domain Names ? - Full domain name is a...

Q. What is Domain Names ? - Full domain name is a sequence of labels separated by dots (.) - Fully competent domain name (FQDN) contains the full name of a host cis.usouthal

Introduction-parallel algorithms, Introduction An algorithm is defined ...

Introduction An algorithm is defined as a series of computational steps required to accomplish an exact task. The algorithm works for a given input and will terminate in a well

Network ownership, NETWORK OWNERSHIP:   There are two types in this ...

NETWORK OWNERSHIP:   There are two types in this case: 1. Private Network 2. Public Network

What is the virtual path, Along any transmission path from a given source t...

Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is known as path.

What is sliding window protocols, Q. What is Sliding Window protocols? ...

Q. What is Sliding Window protocols? Alternatives: Sliding Window protocols - One task begins prior to the other one ends                                     (concept of

Little spider, #question.what can we do with a spider when it red?.

#question.what can we do with a spider when it red?.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd