Data compression and the transport services, Computer Network Security

Data compression and the transport services, The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effective. These services are processed in application layer. In order to attain the objective, the transport layer uses the services which are provided by its lower layer that is network layer. The services are accessed by the software or hardware called as transport entity, which is saved in a library package bound, an operating system kernel, a different user process or on network interface card.

Similar to the network service, transport service is also alienated into two types that is connection-oriented transport service and the connectionless transport service. Although, the functionalities of these layers are mostly similar, both of them use separate services because code of transport layer is executed on the user’s machine and the code of network layer is executed on the routers operated by the carrier.

Due to the existence of transport layer, the transport services are considered as highly-reliable services when compared with the underlying network service. The transport layer can even detect and compensate the loss of the packets during transmission.

Posted Date: 7/20/2012 6:30:46 AM | Location : United States







Related Discussions:- Data compression and the transport services, Assignment Help, Ask Question on Data compression and the transport services, Get Answer, Expert's Help, Data compression and the transport services Discussions

Write discussion on Data compression and the transport services
Your posts are moderated
Related Questions
(a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certificate

ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution (ARP) is a network interface layer protocol. Protocol addresses are used in all upper layers. Address resolution s

POINT-TO-POINT: In Point-to-Point topology there are two kind of topologies. 1) STAR topology 2) TREE topology In star topology each and every computer is connect

FRAGMENTATION Fragmentation information is kept in different extension header.  Every fragment has base header and fragmentation header. Whole datagram including original hea

Question: (a) Explain the following security services: Confidentiality, Availability. (b) Which attack will be used to bypass even the best physical and logical security m

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Secure Socket Layer (SSL) accepts a combination of asymmetric and symmetric (public-key) encryption to accomplish integrity, confidentiality, authentication and non-repudiation for


SUCCESS OF IP:  IP has accommodated dramatic modification since real design. But basic rules are still appropriate today. There are many new kinds of hardware. SCALING:

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant