Tcp connections - transport layer, Computer Networking

Assignment Help:

TCP Connections

TCP  is an end to end point to point  transport  used in internet. being a point  to point  protocols  means that  there is always  s single  sender  a single  receiver for a  TCP session. Being  an end to end protocols  on the other  hand  means that the TCP  session  should  cover al parameters and transportation involved form the  source host to  the destination host. The  latter is an  important  features of the TCP  and should  never e  forgotten during  the analysis  any TCP/ IP network or a protocol  design.

TCP is a pipelined protocols. This means that the TCP  packed  data units  which are  commonly  named TCP segments  are logically  enclosed  in a pipe  and thus they  will be  successively transported within  the end to end  TCP  connections. This  is one of  the reliability  features of the TCP  so that  all TCP segments will be delivered to the  receiver host in the means  that even  if the segment are delivered in a different order TCP will  make  them in order before passing them  to the higher layer protocols that is the  application  layer  figure  show  the logical  pipelining in TCP.

The are buffers at both  sides of a TCP  connections. The  TCP connection however is not seen  by the network elements  such as  routers as they  work at layer below  the transport  layer. These network  elements  just see  the datagram's  that is  the IP layer  packets.

TCP  provides  a means  of full  duplex  data transfer. Therefore  a bidirectional  data flow  is available  in the same TCP connection. TCP puts  a maximum  segment size ( MSS)  on its  data. This MSS  is usually  less than  1500 bytes  but in  practical  network  even smaller  MSS  is used  around 500bytes.

TCP is a connection oriented  protocols. This means  that before  any data transfer  could  be started  a connection must be  established  through  a process called  three way during  this process.

TCP  utilizes a  complete  flow control  flow  control  mechanism . by  this methods TCP not  only  entries that the  sender  host  does not overwhelm the  receiver host sending  too much  data  too fast but  also  ensures a fair  bandwidth  share among, all TCP  sessions  concurrently  used.


Related Discussions:- Tcp connections - transport layer

Facts about fiber optic cables - Computer Network, Facts about  Fiber Opti...

Facts about  Fiber Optic Cables 1. Outer insulating jacket is made  of Teflon or PVC. 2. Kevler fiber  helps  to strengthen  the cable and prevent breakage. 3. A plas

Sorting using combinational circuit, Now, let us suppose a famous sequence ...

Now, let us suppose a famous sequence called as bitonic sequence and sort out the elements using a combinational circuit consisting of a set of comparators. The property of bitonic

Determine the term - backend lan, Determine the term - Backend LAN Back...

Determine the term - Backend LAN Backend networks are used to interconnect large systems like mainframes, supercomputers, and mass storage devices. The key needs here is for bu

Determine the computing infrastructure, Determine the computing infrastruct...

Determine the computing infrastructure One solution for the protection of the computing infrastructure is to use digital certificate-based solutions. Users can be given access

Key components of inter-vlan routing , As configuring of VLANs helps in con...

As configuring of VLANs helps in controlling the size of broadcast domains. There are some key components of inter-VLAN routing such as VLAN capable switch Router Ro

Determine the specification of fddi, FDDI has four specifications: 1. M...

FDDI has four specifications: 1. Media Access Control it defines how the medium is accessed 2. Physical Layer Protocol it defines data encoding/decoding procedures 3. Phy

What is mesh topology, What is mesh topology Mesh topology is a setup w...

What is mesh topology Mesh topology is a setup wherein every device is linked directly to each other device on the network. Consequently, it needs that each device has at least

In formation sharing at regular intervals, In formation  sharing at  regu...

In formation  sharing at  regular intervals For example  every 30 seconds each router sends its information  about the  whole  network  to its  neighbours. This sharing  occurs

Computing shortest path in a graph, While calculating shortest path, first ...

While calculating shortest path, first we assume graph presentation of network at every node then we use Djikstra's algorithm to calculate shortest path from every node to other on

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd