Explain transport layer of osi model, Computer Engineering

Assignment Help:

Explain Transport Layer of OSI Model.

The transport layer utilizes the services provided through the network layer, as best path selection and logical addressing, to give end-to-end communication in between source and destination.

  • The transport -layer data stream is a logical connection in between the endpoints of a network.
  • End-to-end control is given by sliding windows and reliability into sequencing numbers and acknowledgments.
  • The transport layer regulates information flow to make sure end-to-end connectivity in between host applications accurately and reliably.
  • The TCP/ IP protocol of Layer 4 that is transport layer has two protocols. They are UDP and TCP.

The transport layer admits data from the session layer and also segments the data for transport across the network. Usually, the transport layer is responsible for ensuring that the data is delivered error-free and in the appropriate sequence. Flow control usually occurs at the transport layer.


Related Discussions:- Explain transport layer of osi model

Explain use of mpi functions with an example, Q. Explain use of MPI functio...

Q. Explain use of MPI functions with an example? include int main(int argc, char **argv) { int i, tmp, sum, s, r, N, x[100]; MPI_Init(&argc, &argv); MPI_Comm_size

Algorithem, for calculating simple interest

for calculating simple interest

Explain the multiple bus organization structure, Explain the multiple bus o...

Explain the multiple bus organization structure with neat diagram. The multiple bus organization is using more buses instead of one bus to decrease the number of steps needed an

Microprocessor 8086, i want to know complete detail of 8086 microprocessor ...

i want to know complete detail of 8086 microprocessor such as memory segment ,interface with ram rom ect

What is debate - architecture, What is Debate Debate took place in the ...

What is Debate Debate took place in the 1980s and first half of the 1990s. It was resolved as RISC the winner since it allows more efficient pipelining, results in simpler hard

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

What is drop-down list, A dialog box such as a File menu that have one comm...

A dialog box such as a File menu that have one command until it is clicked when a number of dissimilar commands "drop-down."

State about the harvard mark I and the bug, Harvard mark i and the bug ...

Harvard mark i and the bug The next important effort towards devising an electromechanical computer was done at the harvard University, jointly sponsored by the Department of U

How to fix an asic-based design from easiest to most extreme, How to fix an...

How to fix an ASIC-based design from easiest to most extreme? There are different ways to fix an ASIC-based design as given below: Initially, assume some reviews fundamentally.

Bresenham''s line drawing algorithm, what are advantages and disadvantages ...

what are advantages and disadvantages of bresenham''s line drawing algorithm?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd