Transport protocols - udp and tcp, Computer Networking

Most real-life applications are built on top of the UDP and TCP transport protocols. UDP, which stands for User Datagram Protocol, provides the capability of delivering individual messages from one computer to another. However, these messages might be lost or can arrive out of order.

Why would someone want to use such a protocol? One example application might be video streaming, in which we don't care that much if a packet was lost, and if the video has kept playing, we're not going to go back and show an old frame which has arrived late. While UDP has its place for some speci?c applications, by far the most used transport protocol is TCP (Transmission Control Protocol). TCP provides a connection with reliable, in-order delivery of a

731_Transport protocols - UDP and TCP.png

stream of bytes, so the application programmer doesn't have to worry very much about dropped packets, packets which arrive out of order, or the details of network message boundaries. Notice that maybe the most important feature provided by transport protocols is the possibility of performing process-to-process communication. This capability means that not only can we send messages from one machine to another, but from a speci?c process in the origin machine to a speci?c process in the destination machine. In addition to the IP addresses, we also use the port numbers, which are endpoint sub-addresses, visible to the application layer. If we think of IP addresses as analogous to "building numbers", we can interpret ports as analogous to "apartment numbers".

Posted Date: 3/13/2013 6:19:25 AM | Location : United States







Related Discussions:- Transport protocols - udp and tcp, Assignment Help, Ask Question on Transport protocols - udp and tcp, Get Answer, Expert's Help, Transport protocols - udp and tcp Discussions

Write discussion on Transport protocols - udp and tcp
Your posts are moderated
Related Questions
Q1.  What  advantages  do  you  see  in  having  a  layered  concept  of  computer  networks?  Which layers or OSI structure deals with identification of a host? Explain the proces

Simulate extremely limited forms of IP and ICMP. You will simulate 6 computers, 4 hosts and 2 routers, that are connected in an imaginary network with the topology as shown belo

Explain the term - global corporate-wide network It would be highly interesting to note that more than 70 per cent of all security related problems start from within the organi

Cable, Erase, and Reload the Router Step 1: Cable the network. Cable a network that is same to the one in the topology diagram. Step 2: Clear the configuration on the rou

Q. Show V.32 standard? - ITU-T's V.32 standard was issued in 1991 for asynchronous and full-duplex operation at 14.4 Kbps. V.32bis - Is an extension of the V.32 technology?


Token Passing Station is able to send only when it receives a special frame called a token Token circulates around the ring If station wishes to sen

Sending a message to a group multicast address is known as multicasting, and its routing algorithm is known as multicast routing.

Data Alignment Arrays are aligned to templates by the ALIGN directive. The ALIGN directive is used to align elements of different arrays with each other, indicating that they s

show ipx servers is the command that shows the SAP table