Tcp- reliable transport service, Computer Network Security

TCP-RELIABLE TRANSPORT SERVICE

INTRODUCTION:

 TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP when sending data to another system. It gives reliable data delivery function to applications.

TRANSMISSION CONTROL PROTOCOL:

 Reliability is the major responsibility of the Transport layer. In TCP/IP, TCP gives reliable transport service. Most Internet programs use TCP as no other protocol has proved to do better.

SERVICE PROVIDED BY TCP:

 Following are the services given by TCP:

  • Connection-oriented service
  • Point-to-point
  • Complete reliability
  • Full-duplex communication
  • Stream interface
  • Reliable connection startup
  • Graceful connection shutdown

 

END-TO-END SERVICE AND DATAGRAMS:

 Applications may request a connection. TCP connections are known Virtual Connections. They are prepared by software only. Internet does not give software or hardware support for the connections. TCP software modules on two computers give an illusion of a connection.

 TCP uses IP to take on messages. TCP message is attached in IP datagram and transmit to the destination. On the receiver host, IP passes the texts to TCP. It is given in the figure below.

 

 

 

153_TCP.png

 

 

ACHIEVING RELIABILITY:

 The main problems in the reliable delivery are:

  • Unreliable delivery by the underlying interaction system.
  • System reboot.

 

Posted Date: 8/1/2012 9:54:06 AM | Location : United States






Your posts are moderated
Related Questions
Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

Question (a) Draw a typical hybrid star-ring topology paying attention to how the clients and switching hubs are connected. (b) State 3 main differences between a router

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

attacks on crytography