Transport protocols - udp and tcp, Computer Networking

Most real-life applications are built on top of the UDP and TCP transport protocols. UDP, which stands for User Datagram Protocol, provides the capability of delivering individual messages from one computer to another. However, these messages might be lost or can arrive out of order.

Why would someone want to use such a protocol? One example application might be video streaming, in which we don't care that much if a packet was lost, and if the video has kept playing, we're not going to go back and show an old frame which has arrived late. While UDP has its place for some speci?c applications, by far the most used transport protocol is TCP (Transmission Control Protocol). TCP provides a connection with reliable, in-order delivery of a

731_Transport protocols - UDP and TCP.png

stream of bytes, so the application programmer doesn't have to worry very much about dropped packets, packets which arrive out of order, or the details of network message boundaries. Notice that maybe the most important feature provided by transport protocols is the possibility of performing process-to-process communication. This capability means that not only can we send messages from one machine to another, but from a speci?c process in the origin machine to a speci?c process in the destination machine. In addition to the IP addresses, we also use the port numbers, which are endpoint sub-addresses, visible to the application layer. If we think of IP addresses as analogous to "building numbers", we can interpret ports as analogous to "apartment numbers".

Posted Date: 3/13/2013 6:19:25 AM | Location : United States







Related Discussions:- Transport protocols - udp and tcp, Assignment Help, Ask Question on Transport protocols - udp and tcp, Get Answer, Expert's Help, Transport protocols - udp and tcp Discussions

Write discussion on Transport protocols - udp and tcp
Your posts are moderated
Related Questions
Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The tr

Broadcast and Multicast : Broadcast and Multicast :In the broadcast interconnection network, at one time one node transfer the data and all other nodes get that data.  Broadca

Can you describe in a generic manner the packet of IPSec

Q. Applications of networks? End systems (hosts): - Run application programs - Example email, Web - At -edge of network Client/server model - Client host

Q. Show the Congestion avoidance in TCP? Slow Start (SS) & Additive Increase (AI) (AI=Congestion Avoidance) start with the congestion window (cwnd) = max segment si

State the types of performance of computer hardware The hardware, i.e., the server or computer has a direct relationship on performance in the following areas: Reliabili

What is Bit Stuffing? Bit stuffing is the process of adding one extra 0 whenever five consecutive is follow a 0 in the data, so that the receiver does not mistake the pattern 0

Get the network design for a company

The following DNA sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor (TF). The nucleotide segments capitalized in the giv

No Retransmission This  protocols  will not  through  the correctly received packets  but buffers than  and send  acknowledgment  for those packets. Thus  retransmission of th