Functions and significance of tcp header’s fields, Computer Networking

Assignment Help:

Describe the functions and significances of all fields (such as Source Port and Destination Port) of a TCP header.

Functions and significance of tcp header's fields

FIELDS

TCP Source Port

The TCP Source port has the port number; from this port packets are sent. This port is dynamically assigned by the stack of TCP.

TCP Destination Port

The TCP Destination port has a port number and from this port number packets are routed.TCP stack is responsible for routing data to destination point.

Sequence Number     

The sequence number is used for initializing the session in TCP.

Acknowledgment Number

The Acknowledgement Number is number assigned for session initialization.

Data Offset

The Data offset is meant for ending the header of TCP packet and from that point data starts and that data ends is equal to the 32 bit words.

Reserved

This field is responsible for handling future requirements.

Control Bits

702_tcp-control-bits.png

URG (Urgent)

The Urgent pointer in the TCP Header field is of great significance. The urgent pointer points to the data of the packet where urgent data has been saved.

ACK(Acknowledge)

The Acknowledgement is a bit which have a lot of importance. The acknowledgement is used to acknowledge the earlier sent packets. 

Push Function

The push function is used to destroy data through the TCP layer.

Reset

In Reset connection is again reset if there had been any error or any kind of interruption.

Synchronize

In this, system generates some synchronized sequence number and assigns it to sessions and this sequence number is used during the establishment of session.

Finish

If there is no data there to send from the sender then the session will be finished.

           770_TCP-header.png

The length of TCP header is of 32 bit

Window

The window is meant for providing a way of each side of communication that provides a way of checking the flow of packets to the destination point and also be sure that all packets have been received properly by the receiver before sending any new packet to the receiver.Checksum

The Checksum provides a way for checking and verifying that TCP packet that includes header and data should not corrupt in its journey across the network.

Urgent Pointer

This field has a Pointer into the data of the packet to indicate where urgent information is located.

OPTIONS

The options include the additional information about the TCP processing capabilities used during connection between Source and Destination.

Padding

The padding is used to extend the length of the TCP Header its initial bit set to 0.It makes sure that every packet should be send properly.

Data fields

Data fields are used for urgent data.


Related Discussions:- Functions and significance of tcp header’s fields

Different type of networking and internetworking device, What is the differ...

What is the different type of networking / internetworking devices? Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. I

Layers, what are the layers covered under end to end later connectivity?

what are the layers covered under end to end later connectivity?

Sketch the output waveform square wave that symmetrical, Question: The ...

Question: The input to the circuit in the figure is a square wave that is symmetrical about 0V. Sketch the output waveform.

Explain any three most important gsm identifiers, Question 1 A) Explain br...

Question 1 A) Explain briefly the advantages wireless communication systems                   B) What is a cellular network? Question 2 Explain fundamental architecture of

What is encapsulation and de-encapsulation, Process to send data is called ...

Process to send data is called as encapsulation and process to receive data is called De-encapsulation.

What is the protocol number for tcp, Transmission Control Protocol - TCP i...

Transmission Control Protocol - TCP is a connection oriented transport layer protocol with built unreliability. It considers a large block of data and breaks it down into segments

Application of internet control message protocol, The application for this ...

The application for this assignment is somewhat arti?cial. Normally, an application would not interact directly with IP. Instead, it would create a UDP or TCP socket and interact w

How to protect computer hardware by threats, How to protect computer Hardwa...

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.

How to configure a wireless mac filter - ccna, Configure a Wireless MAC Fil...

Configure a Wireless MAC Filter Step: Add a Mac filter. Navigate back to the web utility page of the router (http://172.17.30.1). Navigate to the Wireless section a

Difference between the communication and transmission, Communication is the...

Communication is the process of sending and receiving data by means of a data cable that is associated externally. Transmission means the transmitting of data from the source to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd