Tcp connections - transport layer, Computer Networking

TCP Connections

TCP  is an end to end point to point  transport  used in internet. being a point  to point  protocols  means that  there is always  s single  sender  a single  receiver for a  TCP session. Being  an end to end protocols  on the other  hand  means that the TCP  session  should  cover al parameters and transportation involved form the  source host to  the destination host. The  latter is an  important  features of the TCP  and should  never e  forgotten during  the analysis  any TCP/ IP network or a protocol  design.

TCP is a pipelined protocols. This means that the TCP  packed  data units  which are  commonly  named TCP segments  are logically  enclosed  in a pipe  and thus they  will be  successively transported within  the end to end  TCP  connections. This  is one of  the reliability  features of the TCP  so that  all TCP segments will be delivered to the  receiver host in the means  that even  if the segment are delivered in a different order TCP will  make  them in order before passing them  to the higher layer protocols that is the  application  layer  figure  show  the logical  pipelining in TCP.

The are buffers at both  sides of a TCP  connections. The  TCP connection however is not seen  by the network elements  such as  routers as they  work at layer below  the transport  layer. These network  elements  just see  the datagram's  that is  the IP layer  packets.

TCP  provides  a means  of full  duplex  data transfer. Therefore  a bidirectional  data flow  is available  in the same TCP connection. TCP puts  a maximum  segment size ( MSS)  on its  data. This MSS  is usually  less than  1500 bytes  but in  practical  network  even smaller  MSS  is used  around 500bytes.

TCP is a connection oriented  protocols. This means  that before  any data transfer  could  be started  a connection must be  established  through  a process called  three way during  this process.

TCP  utilizes a  complete  flow control  flow  control  mechanism . by  this methods TCP not  only  entries that the  sender  host  does not overwhelm the  receiver host sending  too much  data  too fast but  also  ensures a fair  bandwidth  share among, all TCP  sessions  concurrently  used.

Posted Date: 3/12/2013 11:17:27 PM | Location : United States







Related Discussions:- Tcp connections - transport layer, Assignment Help, Ask Question on Tcp connections - transport layer, Get Answer, Expert's Help, Tcp connections - transport layer Discussions

Write discussion on Tcp connections - transport layer
Your posts are moderated
Related Questions
Question 1 Contract Net Protocol is the best known and most widely used cooperation protocol Explain how contract net works Discuss the benefits and limitations of con

Facts about  Fiber Optic Cables 1. Outer insulating jacket is made  of Teflon or PVC. 2. Kevler fiber  helps  to strengthen  the cable and prevent breakage. 3. A plas

A socket is an abstraction that shows an endpoint of communication. Most applications that consciously use TCP and UDP do so by making a socket of the appropriate type and then per

What is Bit Stuffing? Bit stuffing is the process of adding one extra 0 whenever five consecutive is follow a 0 in the data, so that the receiver does not mistake the pattern 0

What are the concerns of the Physical Layer? Physical layer coordinates the functions needed to transmit a bit stream over a physical medium. a. Physical characteristics of in

What is Frequency borrowing In the simplest case, frequencies are taken from adjacent cells by congested cells. The frequencies can also be assigned to cells dynamically.

When a switch is said to be congested? It is possible that a switch receives packets faster than the shared link can accommodate and keeps in its memory, for an extended period

Q. Illustrate Go Back - N protocol? Go Back - N - Sender window size - Receiver window size = 1 - Why the names go back- N? - When the frame is spoilt the sende

Switches operate at layer 2. They enhance bandwidth by decreasing the number of devices sharing the media. They isolate collisions. Like a bridge they forward traffic based upon la

These two command show the cisco IOS filename a) show ver b) show flash