Data compression and the transport services, Computer Network Security

Data compression and the transport services, The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effective. These services are processed in application layer. In order to attain the objective, the transport layer uses the services which are provided by its lower layer that is network layer. The services are accessed by the software or hardware called as transport entity, which is saved in a library package bound, an operating system kernel, a different user process or on network interface card.

Similar to the network service, transport service is also alienated into two types that is connection-oriented transport service and the connectionless transport service. Although, the functionalities of these layers are mostly similar, both of them use separate services because code of transport layer is executed on the user’s machine and the code of network layer is executed on the routers operated by the carrier.

Due to the existence of transport layer, the transport services are considered as highly-reliable services when compared with the underlying network service. The transport layer can even detect and compensate the loss of the packets during transmission.

Posted Date: 7/20/2012 6:30:46 AM | Location : United States







Related Discussions:- Data compression and the transport services, Assignment Help, Ask Question on Data compression and the transport services, Get Answer, Expert's Help, Data compression and the transport services Discussions

Write discussion on Data compression and the transport services
Your posts are moderated
Related Questions
project on ensuring data securities on cloud computing

i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch

W h a t do you understand by the terms security, network security and information security? How network security and information security are connected? Security can be def

Repeater known as regenerator ; it is an electronic machine that performs only at physical layer. It gets the signal in the network before it becomes loss or weak, recreates the

Many applications are vulnerable to intrusion attacks and can provide misleading reports about misbehaving nodes. Some of the mechanisms under such a category include the Bayesian

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do