Data compression and the transport services, Computer Network Security

Data compression and the transport services, The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effective. These services are processed in application layer. In order to attain the objective, the transport layer uses the services which are provided by its lower layer that is network layer. The services are accessed by the software or hardware called as transport entity, which is saved in a library package bound, an operating system kernel, a different user process or on network interface card.

Similar to the network service, transport service is also alienated into two types that is connection-oriented transport service and the connectionless transport service. Although, the functionalities of these layers are mostly similar, both of them use separate services because code of transport layer is executed on the user’s machine and the code of network layer is executed on the routers operated by the carrier.

Due to the existence of transport layer, the transport services are considered as highly-reliable services when compared with the underlying network service. The transport layer can even detect and compensate the loss of the packets during transmission.

Posted Date: 7/20/2012 6:30:46 AM | Location : United States







Related Discussions:- Data compression and the transport services, Assignment Help, Ask Question on Data compression and the transport services, Get Answer, Expert's Help, Data compression and the transport services Discussions

Write discussion on Data compression and the transport services
Your posts are moderated
Related Questions
Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

QUESTION A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provide

IPV6 NEXT HEADER It is given in the figure below:

KASONet Pinging System: Project Title:                                                           "KASONet Pinging System"   Brief Overview of Project: The o

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t