Data compression and the transport services, Computer Network Security

Data compression and the transport services, The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effective. These services are processed in application layer. In order to attain the objective, the transport layer uses the services which are provided by its lower layer that is network layer. The services are accessed by the software or hardware called as transport entity, which is saved in a library package bound, an operating system kernel, a different user process or on network interface card.

Similar to the network service, transport service is also alienated into two types that is connection-oriented transport service and the connectionless transport service. Although, the functionalities of these layers are mostly similar, both of them use separate services because code of transport layer is executed on the user’s machine and the code of network layer is executed on the routers operated by the carrier.

Due to the existence of transport layer, the transport services are considered as highly-reliable services when compared with the underlying network service. The transport layer can even detect and compensate the loss of the packets during transmission.

Posted Date: 7/20/2012 6:30:46 AM | Location : United States







Related Discussions:- Data compression and the transport services, Assignment Help, Ask Question on Data compression and the transport services, Get Answer, Expert's Help, Data compression and the transport services Discussions

Write discussion on Data compression and the transport services
Your posts are moderated
Related Questions
COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

Network diagram for a mediacal care

QUESTION (a) What do you understand by a VLAN? Provide one advantage of using a VLAN. (b) What is a trunk port in a VLAN? (c) A VLAN will be created using one or more

crack the secret message and explain how the code works. The clue is that it has something to do with the computer keyboard. J-Q-H-6 Q-E-F-Q-H-D-3-W 8-H 5-Y-3 7-W-3 9-R--D-9-J

briefly expslain type of e-commerce

The method used to check errors is checksum . In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the

how to access tomcat by internet

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec