Is tcp connection-oriented?, Computer Engineering

Assignment Help:

Q. Is tcp Connection-oriented?

TCP is connection-oriented. This means a connection is established between source and destination machines before any data is sent it implies that a connection is established and maintained until such time as message or messages to be exchanged by application programs at each end have been exchanged. Connections provided by TCP are known as Virtual Connections. It means that there is not any physical direct connection between computers.

TCP is used along with Internet Protocol to send data in form of message units between computers over Internet. While IP takes care of handling actual delivery of the data, TCP takes care of keeping track of individual units of data (known as Packet) that a message is divided into for efficient routing through Internet. TCP provides for a reliable, connection-oriented data transmission channel between two programs. Reliable means that data sent is guaranteed to reach its destination in order sent or an error would be returned to sender.

For instance, when an HTML file is sent to someone from a Web server, Transmission Control Protocol (TCP) program layer in that server divides the file in one or more packets, numbers the packets after that forwards them individually. Though every packet has same destination IP address, it can get routed differently through network. At the other end (client program in our computer), TCP reassembles individual packets and waits till they have arrived to forward them as a single file.

TCP is responsible for making sure that a message is divided into the packets which IP manages and for reassembling packets back into complete message at the other end. In Open Systems Interconnection (OSI) communication model, TCP is in layer 4, Transport Layer.


Related Discussions:- Is tcp connection-oriented?

Application area of artificial intelligence, 1. The State of the Art: What ...

1. The State of the Art: What can AI do today? A concise answer is difficult because there are so many activities in so many subfields. Here we sample a few applications other

How authoring packages supports scripting language, How authoring packages ...

How authoring packages supports scripting language Many authoring packages support a scripting language to allow for even more sophisticated applications to be produced. Scrip

Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

Name the approaches used for generating the control signals, What are the t...

What are the two approaches used for generating the control signals in proper sequence? Hardwired control Micro programmed control

Limitation of software engineering, i want to get answer about this topic w...

i want to get answer about this topic what is software engineering and what is its limitation

Quantifiers and variables - propositional model, Quantifiers and Variables ...

Quantifiers and Variables - propositional model: There is one question is arrives that 'What do sentences containing variables mean?' In other way of words, how does a first-o

What is wireless transmission systems, What are wired and wireless transmis...

What are wired and wireless transmission systems? Transmission Systems: Modern type long distance transmission systems can be placed in three wide categories: 1. Radio Sy

Differentiate b/w pre-emptive and non-pre-emptive scheduling, Differentiate...

Differentiate between pre-emptive and non-pre-emptive scheduling. Pre-emptive scheduling : in its approach, center processing unit can be taken away from a process if there is a

Smli firewalls are different from the conventional, SMLI firewalls are diff...

SMLI firewalls are different from the conventional The SMLI firewalls are different from the conventional "stand in" proxies in a way that the stand-in proxies are used for th

Define memory allocation scheme in ''external'' fragmentation, The memory a...

The memory allocation scheme subject to “external” fragmentation is? Segmentation is the memory allocation scheme subject to “external” fragmentation.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd