Tcp- reliable transport service, Computer Network Security

TCP-RELIABLE TRANSPORT SERVICE

INTRODUCTION:

 TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP when sending data to another system. It gives reliable data delivery function to applications.

TRANSMISSION CONTROL PROTOCOL:

 Reliability is the major responsibility of the Transport layer. In TCP/IP, TCP gives reliable transport service. Most Internet programs use TCP as no other protocol has proved to do better.

SERVICE PROVIDED BY TCP:

 Following are the services given by TCP:

  • Connection-oriented service
  • Point-to-point
  • Complete reliability
  • Full-duplex communication
  • Stream interface
  • Reliable connection startup
  • Graceful connection shutdown

 

END-TO-END SERVICE AND DATAGRAMS:

 Applications may request a connection. TCP connections are known Virtual Connections. They are prepared by software only. Internet does not give software or hardware support for the connections. TCP software modules on two computers give an illusion of a connection.

 TCP uses IP to take on messages. TCP message is attached in IP datagram and transmit to the destination. On the receiver host, IP passes the texts to TCP. It is given in the figure below.

 

 

 

153_TCP.png

 

 

ACHIEVING RELIABILITY:

 The main problems in the reliable delivery are:

  • Unreliable delivery by the underlying interaction system.
  • System reboot.

 

Posted Date: 8/1/2012 9:54:06 AM | Location : United States







Related Discussions:- Tcp- reliable transport service, Assignment Help, Ask Question on Tcp- reliable transport service, Get Answer, Expert's Help, Tcp- reliable transport service Discussions

Write discussion on Tcp- reliable transport service
Your posts are moderated
Related Questions
CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

A Network is described as a system for connecting computers using a single transmission technology. The computers can interact with each other in a network. They can receive an

IDS RESPONSE BEHAVIOR Once IDS detects an anomalous network situation, it has a number of options. IDS responses to external stimulation can be classified as active or passive.

Netfilter Firewall Netfilter is the popular name for the packet filtering system installed by default in the Linux kernel. The filtering system can be used as a very effective

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

Discuss the risks of having a single root user

REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev