Tcp- reliable transport service, Computer Network Security

TCP-RELIABLE TRANSPORT SERVICE

INTRODUCTION:

 TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP when sending data to another system. It gives reliable data delivery function to applications.

TRANSMISSION CONTROL PROTOCOL:

 Reliability is the major responsibility of the Transport layer. In TCP/IP, TCP gives reliable transport service. Most Internet programs use TCP as no other protocol has proved to do better.

SERVICE PROVIDED BY TCP:

 Following are the services given by TCP:

  • Connection-oriented service
  • Point-to-point
  • Complete reliability
  • Full-duplex communication
  • Stream interface
  • Reliable connection startup
  • Graceful connection shutdown

 

END-TO-END SERVICE AND DATAGRAMS:

 Applications may request a connection. TCP connections are known Virtual Connections. They are prepared by software only. Internet does not give software or hardware support for the connections. TCP software modules on two computers give an illusion of a connection.

 TCP uses IP to take on messages. TCP message is attached in IP datagram and transmit to the destination. On the receiver host, IP passes the texts to TCP. It is given in the figure below.

 

 

 

153_TCP.png

 

 

ACHIEVING RELIABILITY:

 The main problems in the reliable delivery are:

  • Unreliable delivery by the underlying interaction system.
  • System reboot.

 

Posted Date: 8/1/2012 9:54:06 AM | Location : United States







Related Discussions:- Tcp- reliable transport service, Assignment Help, Ask Question on Tcp- reliable transport service, Get Answer, Expert's Help, Tcp- reliable transport service Discussions

Write discussion on Tcp- reliable transport service
Your posts are moderated
Related Questions
What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Secure Socket Layer (SSL) accepts a combination of asymmetric and symmetric (public-key) encryption to accomplish integrity, confidentiality, authentication and non-repudiation for

Simplex data exchange Simplex communication defines to communication that happens in one direction only. Two definitions have made over time: a common definition, which is des

W h a t do you understand by the terms security, network security and information security? How network security and information security are connected? Security can be def

Documenting the Results of Risk Assessment The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The

IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

The Internet is known as the set of networks connected by routers that are configured to pass traffic among any machine attached to any network in the set. By internet several

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip