Tcp- reliable transport service, Computer Network Security

TCP-RELIABLE TRANSPORT SERVICE

INTRODUCTION:

 TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP when sending data to another system. It gives reliable data delivery function to applications.

TRANSMISSION CONTROL PROTOCOL:

 Reliability is the major responsibility of the Transport layer. In TCP/IP, TCP gives reliable transport service. Most Internet programs use TCP as no other protocol has proved to do better.

SERVICE PROVIDED BY TCP:

 Following are the services given by TCP:

  • Connection-oriented service
  • Point-to-point
  • Complete reliability
  • Full-duplex communication
  • Stream interface
  • Reliable connection startup
  • Graceful connection shutdown

 

END-TO-END SERVICE AND DATAGRAMS:

 Applications may request a connection. TCP connections are known Virtual Connections. They are prepared by software only. Internet does not give software or hardware support for the connections. TCP software modules on two computers give an illusion of a connection.

 TCP uses IP to take on messages. TCP message is attached in IP datagram and transmit to the destination. On the receiver host, IP passes the texts to TCP. It is given in the figure below.

 

 

 

153_TCP.png

 

 

ACHIEVING RELIABILITY:

 The main problems in the reliable delivery are:

  • Unreliable delivery by the underlying interaction system.
  • System reboot.

 

Posted Date: 8/1/2012 9:54:06 AM | Location : United States







Related Discussions:- Tcp- reliable transport service, Assignment Help, Ask Question on Tcp- reliable transport service, Get Answer, Expert's Help, Tcp- reliable transport service Discussions

Write discussion on Tcp- reliable transport service
Your posts are moderated
Related Questions
Question: Quality management standards are seen as a major pillar supporting the drive for continuous quality improvement through TQM. (a) What do you meant by the term ‘Qua

Listing Assets in Order of Importance Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated usin

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardwa

How can I get help for Linux automotion configuration (Network, virtualization, security and Firewal etc) with bash scrip. What is the charge for.

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

CarALouer provides rental of cars to its customer on a regional basis i.e. a car is attached to a regional home-base which also houses a regional office of the company. Each regi