Transport protocols - udp and tcp, Computer Networking

Assignment Help:

Most real-life applications are built on top of the UDP and TCP transport protocols. UDP, which stands for User Datagram Protocol, provides the capability of delivering individual messages from one computer to another. However, these messages might be lost or can arrive out of order.

Why would someone want to use such a protocol? One example application might be video streaming, in which we don't care that much if a packet was lost, and if the video has kept playing, we're not going to go back and show an old frame which has arrived late. While UDP has its place for some speci?c applications, by far the most used transport protocol is TCP (Transmission Control Protocol). TCP provides a connection with reliable, in-order delivery of a

731_Transport protocols - UDP and TCP.png

stream of bytes, so the application programmer doesn't have to worry very much about dropped packets, packets which arrive out of order, or the details of network message boundaries. Notice that maybe the most important feature provided by transport protocols is the possibility of performing process-to-process communication. This capability means that not only can we send messages from one machine to another, but from a speci?c process in the origin machine to a speci?c process in the destination machine. In addition to the IP addresses, we also use the port numbers, which are endpoint sub-addresses, visible to the application layer. If we think of IP addresses as analogous to "building numbers", we can interpret ports as analogous to "apartment numbers".


Related Discussions:- Transport protocols - udp and tcp

Differentiate between fast fading and slow fading, Differentiate between Fa...

Differentiate between Fast fading and Slow fading Fast fading refers to changes in signal strength among a transmitter and receiver as the distance among the two changes by a s

What is aspects of security, Q. What is Aspects of Security? - Securit...

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

Connection to packet switches, CONNECTION TO PACKET SWITCHES:  A packe...

CONNECTION TO PACKET SWITCHES:  A packet switch many join to devices and to other packet switches. But the speeds are different in both parts. There are typically high-speed j

What is medium access control of ethernet, What is Medium Access Control of...

What is Medium Access Control of Ethernet? The set of rules which make sure that each node in an Ethernet gets a fair amount of frame transmission opportunity, are known as the

Define the term socks- network security, Define the term Socks- Network sec...

Define the term Socks- Network security As it is well known, each type of network security protects data at a different layer of the OSI model. Built-in at each layer lies the

Network infrastructure upgrade, Network Infrastructure: This project will r...

Network Infrastructure: This project will require replacement of major networking components throughout the office. Virtualization will result in increased speed and reliability fo

Link-state routing, In link-state routing network topology is filled from...

In link-state routing network topology is filled from route calculation. Switches send link-state information about local joins. Every switch creates own routing tables. It needs

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd