Tcp- reliable transport service, Computer Network Security



 TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP when sending data to another system. It gives reliable data delivery function to applications.


 Reliability is the major responsibility of the Transport layer. In TCP/IP, TCP gives reliable transport service. Most Internet programs use TCP as no other protocol has proved to do better.


 Following are the services given by TCP:

  • Connection-oriented service
  • Point-to-point
  • Complete reliability
  • Full-duplex communication
  • Stream interface
  • Reliable connection startup
  • Graceful connection shutdown



 Applications may request a connection. TCP connections are known Virtual Connections. They are prepared by software only. Internet does not give software or hardware support for the connections. TCP software modules on two computers give an illusion of a connection.

 TCP uses IP to take on messages. TCP message is attached in IP datagram and transmit to the destination. On the receiver host, IP passes the texts to TCP. It is given in the figure below.








 The main problems in the reliable delivery are:

  • Unreliable delivery by the underlying interaction system.
  • System reboot.


Posted Date: 8/1/2012 9:54:06 AM | Location : United States

Related Discussions:- Tcp- reliable transport service, Assignment Help, Ask Question on Tcp- reliable transport service, Get Answer, Expert's Help, Tcp- reliable transport service Discussions

Write discussion on Tcp- reliable transport service
Your posts are moderated
Related Questions
Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

Write Pseudocode for the password guessing algorithm: Consider the following authentication protocol: Client Transmission Host

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi