Tcp connections - transport layer, Computer Networking

Assignment Help:

TCP Connections

TCP  is an end to end point to point  transport  used in internet. being a point  to point  protocols  means that  there is always  s single  sender  a single  receiver for a  TCP session. Being  an end to end protocols  on the other  hand  means that the TCP  session  should  cover al parameters and transportation involved form the  source host to  the destination host. The  latter is an  important  features of the TCP  and should  never e  forgotten during  the analysis  any TCP/ IP network or a protocol  design.

TCP is a pipelined protocols. This means that the TCP  packed  data units  which are  commonly  named TCP segments  are logically  enclosed  in a pipe  and thus they  will be  successively transported within  the end to end  TCP  connections. This  is one of  the reliability  features of the TCP  so that  all TCP segments will be delivered to the  receiver host in the means  that even  if the segment are delivered in a different order TCP will  make  them in order before passing them  to the higher layer protocols that is the  application  layer  figure  show  the logical  pipelining in TCP.

The are buffers at both  sides of a TCP  connections. The  TCP connection however is not seen  by the network elements  such as  routers as they  work at layer below  the transport  layer. These network  elements  just see  the datagram's  that is  the IP layer  packets.

TCP  provides  a means  of full  duplex  data transfer. Therefore  a bidirectional  data flow  is available  in the same TCP connection. TCP puts  a maximum  segment size ( MSS)  on its  data. This MSS  is usually  less than  1500 bytes  but in  practical  network  even smaller  MSS  is used  around 500bytes.

TCP is a connection oriented  protocols. This means  that before  any data transfer  could  be started  a connection must be  established  through  a process called  three way during  this process.

TCP  utilizes a  complete  flow control  flow  control  mechanism . by  this methods TCP not  only  entries that the  sender  host  does not overwhelm the  receiver host sending  too much  data  too fast but  also  ensures a fair  bandwidth  share among, all TCP  sessions  concurrently  used.


Related Discussions:- Tcp connections - transport layer

Design network, where can i find some informations about the subject and th...

where can i find some informations about the subject and the assignment is called Clotilde manufacturing group

How is final different from finally and finalize, How is final different fr...

How is final different from finally and finalize ()? Final is a modifier which can be applied to a class or a method or a variable. final class can't be inherited, final method

Was the entire transaction completed, The following information was obtaine...

The following information was obtained from a host computer: 00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.25: S 2688560409:2688560409(0) win 16384 (DF) (ttl 46, id 2096

Show example on hedge fund, Q. Show example on Hedge Fund? Hedge Fund ...

Q. Show example on Hedge Fund? Hedge Fund have been playing a no-lose game In the easiest strategy a hedge fund borrows Hong Kong dollars (HKD) and then sells them in the

What is an object server in client server environment, With an object serve...

With an object server, the Client/Server application is written as a set of communicating objects. Client object commune with server objects using an Object Request Broker (ORB). T

Error correcting code - hamming code, Error Correcting Code - Hamming Code:...

Error Correcting Code - Hamming Code: Hamming code is the one of the error-correcting code named after its inventor. Because of the simplicity of the hamming code, it can dete

What is arcnet, What is ARCNet? The  Attached  Resource Computer Networ...

What is ARCNet? The  Attached  Resource Computer Network (ARCNet) standard was formed in 1977 at the Data Point Corporation by a scientist  -  John Murphy. ARCNet uses the toke

Transmission robustness and security, Transmission robustness and security ...

Transmission robustness and security Unless properly designed, a wireless LAN might be interference prone and simply eavesdropped. The design of a wireless LAN must allow relia

Message passing libraries mpi and pvm, In this part, we shall talk about ab...

In this part, we shall talk about about message passing libraries. In history, various message passing libraries have been available since the 1980s. These executions differed subs

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd