Connection-oriented protocol, Computer Networking

Assignment Help:

TCP is connection-oriented. Connection-oriented is a kind of connection established between the source & destination machines before any data is sent that means a connection is established & maintained until such time as the message or messages to be exchanged through the application programs at each end have been exchanged. The connections provided through TCP are called Virtual Connections. It means that there is no physical connection among the computers directly.

TCP is used along the Internet Protocol to send data in the form of message units among computers over the Internet. Whereas IP takes care of handling the real delivery of the data, TCP takes care of having track of the individual units of data (called Packet) which a message is divided into for efficient routing by the Internet. TCP provides for reliable, connection-oriented data transmission channel among two programs. Reliable means that data sent is definite to reach its destination in the order sent or an error will be returned to the sender.

For instance, while an HTML file is sent to someone from Web server, the Transmission Control Protocol (TCP) program layer in that server divides the file in one or more packets, numbers the packets, and after that forwards them individually. Though each of packets has the similar destination IP address, it might get differently routed through the network. At the other end (the client program in our computer), TCP reassembles the particular packets and waits till they have arrived to forward them as a single file.

TCP is responsible for making sure that a message is divided in the packets that IP manages and for reassembling the packets back into the complete message at the other end. In Open Systems Interconnection (OSI) communication model, TCP is in layer four, the Transport Layer.


Related Discussions:- Connection-oriented protocol

Relevance and protection regarding dns attacks, Relevance and Protection re...

Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o

Networking, Discuss the interdependence of networking hardware and software...

Discuss the interdependence of networking hardware and software. Is it possible to have one without the other?

Data structures for parallel algorithms, To execute any algorithm, selectio...

To execute any algorithm, selection of a proper data structure is very crucial. A particular operation may be executed with a data structure in a smaller time but it may have a ver

Describe network infrastructure design, Question : a) Explain why perv...

Question : a) Explain why pervasive computing can be termed as a "technology that disappears". b) List and briefly explain four main components of a MOTE used in Wireless

Building a http server, IMPORTANT: The web server should be able to serve H...

IMPORTANT: The web server should be able to serve HTTP files only. You will not need to implement the directory listing and CGI-bin. Purpose The objective is to implement a H

Receipt of acknowledgment - transport layer, Receipt of Acknowledgment ...

Receipt of Acknowledgment In our GBN  protocols  an acknowledgment for  packet with sequence number will be taken to be accumulative acknowledgment  indicating that all  packe

Calculate link utilisation - exchanging packets, a)  Assume that the time r...

a)  Assume that the time required to transmit one packet (i.e. the packet length divided by link data rate) is 10ms and the Round Trip Time (from Source to Destination and back) is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd