Transport layer , Computer Networking

Transport Layer

In computer networking it the transport  layer is where  sessions are  exchanged between  hosts. This layer resides  between  the application layer and  network layer the transport layer is  a central  piece of the layered architecture. It has  the critical  role  of providing  communication services directly  to the application processes running on  different hosts. A transport  layer protocol  provides  logical  communication  between  application  processes running  on different hosts. Figure  illustrates the relationship  of the network transport  and application  layers  and the notation of logical  communication. Transport  layer  protocols  are implemented in the  end systems  but not  in network  routers. On the sending side  the  transport  layer converts the messages receives from  a sending application process into  smaller chunks  and adding a transport layer header to each chunk to create the transport  layer  segment. The  transport  layer then passes the segment to the  network  layer at  sending  end system where the segment is encapsulate d within  a network  layer packet  a datagram  and sent to the destination . it  is important to note that network routes act  only on the network  layer segment encapsulated with the datagram. On  the receiving side  the  network  layer extracts the transport layer segment from the  datagram  and passes the  segment up to the  transport layer the transport layer then processes the  received  segment making available the data in  the segment  making available the data  in the  segment  to the receiving application. The network  layer doesn't  generally guarantee that packets of data will arrive in the same order that they  were sent but often  this is a  desirable  feature  so the transport layer  is provided with the simplest  way of  doing this is to  give  each packet  a number and allow  the receiver to recorder the packet . the  transport   layer provides some other  services   like byte  orientation flow  control  reliable data and ports.

The  byte  orientation  services provides  rather  than dealing  with things  on a packet by packet  basis. The transport  layer may  add be ability  to view communication just  as a stream of bytes. This is nice  to deal  with than  random  packet  sizes  however it  rarely  matches  the communication  model  which will  normally  be a  sequence of message of use defined sizes.

The  amount  of memory  on a  computer limited and without  flow  control  a larger computer  might flood a computer  with so much  information  that it can't hold  it all before  dealing with it. Nowadays this is not a big  issue as memory  is cheap while bandwidth  is comparatively  expensive but in earlier time it was more important.

Reliable  data packets may be lost in routers switches bridges and hosts due to  network congestion when  the packet  queers are filled and the network  nodes  have to  delete  packets. Packets  may be lost of corrupted in Ethernet due to interference and  noise since  Ethernet doesn't  retransmit corrupted packets. Packets may be delivered in the wrong  order by an  underlying network some  transport layer protocol for e, g, TCP can fix all these  problems  by means  of error  detection code  for e, g,  checks acknowledgment message, automatic  repeat request  and segment  numbering of course  error  free is impossible  but it  possible to substantially reduce the numbers  of undeleted  error.

Ports  are essentially  ways to address multiple entities in the same  location. For e ,g,  the first line of a postal address is a kind  of port  and distinguishes between  different  occupants of the same house. computer applications will listen to each  use for  information on their  own ports i ,e one can  use more  than one  network  based applications at the same  time.

Transport  layer  lies just  above the network  layer in  protocol  stack whereas a transport layer protocol provides logical  communication  between  running  on different  hosts  a network  layer  provides  logical  communication  between  hosts.

More than one transport  layer  protocols  may be available to network  applications. For  example  the internet  has two  protocols  transmission  control protocol  and user datagram  protocol  each of there  protocols provides  a different  set of  transport layer  services  to the  invoking application.

The ultimate goal  of the  transport  layer is  provide  efficient  reliable and cost  effective  services  to its  users  normally  processes in the application layer. To  achieve this goal  the transport  layer  make use of the  services  provided  by the  network layer.

Posted Date: 3/9/2013 4:38:03 AM | Location : United States

Related Discussions:- Transport layer , Assignment Help, Ask Question on Transport layer , Get Answer, Expert's Help, Transport layer Discussions

Write discussion on Transport layer
Your posts are moderated
Related Questions
Types of VTs There are  several  option for  payload are actually mapped into the VT.  Locked mode VTs  bypass the pointers with a fixed  byte oriented mapping of limited flexi

Domain Name A domain name is a way to recognize and locate computers connected to the Internet.  This is a text name of a computer in network or Internet. Domain names are chan

What is routing region? When hierarchical routing is used, the routers are separated into what we call regions, with each router knowing all the details about how to route pack

Q. What is Transmission Media? - Actually situated below the physical layer - Directly controlled through the physical layer - Data should be converted into electromagnet

Consider the site-to-site VPN scenario shown in Figure 2. Let's deploy the AH protocol on the two VPN routers so that no desktop on the two sites need to do any AH operations. Assu

Token Passing - Token Ring (IEEE 802.5) Needs that station take turns sending data Token passing coordinates process Token is a especially formatted three-byte fr

Question 1: a. What is xDSL and enumerate the benefit of such a technology? b. Name some of the typical applications of xDSL and the different types and standards of xDSL.

Shared Programming Using Library Routines The most well-liked of them is the use of combo function called fork() and join(). Fork() function is used to make a new child proces

Q. Example on Multiplicative Decrease? w = 1 for (each new ACK received) w = w+1 until (loss detected or w >= ssthresh) Not so slow - Exponential increase

1.  A computer system has a two-level memory cache hierarchy. The L1 cache has a zero hit penalty, a miss penalty of 5 ns and a hit rate of 95 percent. The L2 cache has a miss pena