Data compression and the transport services, Computer Network Security

Data compression and the transport services, The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effective. These services are processed in application layer. In order to attain the objective, the transport layer uses the services which are provided by its lower layer that is network layer. The services are accessed by the software or hardware called as transport entity, which is saved in a library package bound, an operating system kernel, a different user process or on network interface card.

Similar to the network service, transport service is also alienated into two types that is connection-oriented transport service and the connectionless transport service. Although, the functionalities of these layers are mostly similar, both of them use separate services because code of transport layer is executed on the user’s machine and the code of network layer is executed on the routers operated by the carrier.

Due to the existence of transport layer, the transport services are considered as highly-reliable services when compared with the underlying network service. The transport layer can even detect and compensate the loss of the packets during transmission.

Posted Date: 7/20/2012 6:30:46 AM | Location : United States







Related Discussions:- Data compression and the transport services, Assignment Help, Ask Question on Data compression and the transport services, Get Answer, Expert's Help, Data compression and the transport services Discussions

Write discussion on Data compression and the transport services
Your posts are moderated
Related Questions
Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

What is information security Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to p

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam