Functions and significance of tcp header’s fields, Computer Networking

Assignment Help:

Describe the functions and significances of all fields (such as Source Port and Destination Port) of a TCP header.

Functions and significance of tcp header's fields

FIELDS

TCP Source Port

The TCP Source port has the port number; from this port packets are sent. This port is dynamically assigned by the stack of TCP.

TCP Destination Port

The TCP Destination port has a port number and from this port number packets are routed.TCP stack is responsible for routing data to destination point.

Sequence Number     

The sequence number is used for initializing the session in TCP.

Acknowledgment Number

The Acknowledgement Number is number assigned for session initialization.

Data Offset

The Data offset is meant for ending the header of TCP packet and from that point data starts and that data ends is equal to the 32 bit words.

Reserved

This field is responsible for handling future requirements.

Control Bits

702_tcp-control-bits.png

URG (Urgent)

The Urgent pointer in the TCP Header field is of great significance. The urgent pointer points to the data of the packet where urgent data has been saved.

ACK(Acknowledge)

The Acknowledgement is a bit which have a lot of importance. The acknowledgement is used to acknowledge the earlier sent packets. 

Push Function

The push function is used to destroy data through the TCP layer.

Reset

In Reset connection is again reset if there had been any error or any kind of interruption.

Synchronize

In this, system generates some synchronized sequence number and assigns it to sessions and this sequence number is used during the establishment of session.

Finish

If there is no data there to send from the sender then the session will be finished.

           770_TCP-header.png

The length of TCP header is of 32 bit

Window

The window is meant for providing a way of each side of communication that provides a way of checking the flow of packets to the destination point and also be sure that all packets have been received properly by the receiver before sending any new packet to the receiver.Checksum

The Checksum provides a way for checking and verifying that TCP packet that includes header and data should not corrupt in its journey across the network.

Urgent Pointer

This field has a Pointer into the data of the packet to indicate where urgent information is located.

OPTIONS

The options include the additional information about the TCP processing capabilities used during connection between Source and Destination.

Padding

The padding is used to extend the length of the TCP Header its initial bit set to 0.It makes sure that every packet should be send properly.

Data fields

Data fields are used for urgent data.


Related Discussions:- Functions and significance of tcp header’s fields

What are the two types of transmission technologies, What are the two types...

What are the two types of Transmission technologies, basis on which computer networks can be categorized? Broadly there are two types of transmission technology: 1. Broadc

Additional bandwidth does each scheme require, Recalling two FEC schemes fo...

Recalling two FEC schemes for internet phone described. Suppose the first scheme generates a redundant chunk for every four original chunks. Suppose the second scheme uses a low-ra

Find out the amplitude of the voltage, Questions: A signal of amplitude...

Questions: A signal of amplitude 10 mV is fed to the amplifier in the figure. What is the amplitude of the voltage at the output from the amplifier?

Explain the architecture and usage of isdn, Computer Networks 1. Write ...

Computer Networks 1. Write about different network structures in use. 2. Explain the architecture and usage of ISDN. 3. Describe the concept of framing in Data Link Layer

Application layer - fundamentals of networks, Application Layer The ap...

Application Layer The application layer provides  an  interface between  application  entities and the  users computer. This layer offers services to a variety of aspects of d

Explain ibms sna architecture, Explain IBM's SNA Architecture SNA is a ...

Explain IBM's SNA Architecture SNA is a computer networking architecture that was formed by IBM to give a network structure for IBM mainframe, midrange, and personal computer s

Subtle point, It is possible for a datagram to generate ICMP errors after i...

It is possible for a datagram to generate ICMP errors after it has been fragmented. For example, suppose that each of two fragments cannot be delivered. Seemingly, this would mean

command saves the configuration stored in ram to nvram, Which command save...

Which command saves the configuration stored in RAM to NVRAM Ans) copy running-config startup-config is the command which saves the configuration stored in RAM to NVRAM

Explain torus interconnection networks, Torus: The mesh network with wrap ...

Torus: The mesh network with wrap around connections is termed as Tours Network. Figure: Torus network

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd