Function of osi transport layer, Computer Engineering

Assignment Help:

Q. Function of OSI Transport Layer?

- It takes the information to be sent as well as breaks it into individual packets that are sent and reassembled into a complete message by the Transport Layer at the receiving node

- As well provide a signalling service for the remote node so that the sending node is notified when its data is received successfully by the receiving node

- Transport Layer protocols comprise the capability to acknowledge the receipt of a packet if no acknowledgement is received the Transport Layer protocol can retransmit the packet or time-out the connection and signal an error

- Transport protocols can as well mark packets with sequencing information so that the destination system can properly order the packets if they're received out-of-sequence

- Additionally Transport protocols provide facilities for insuring the integrity of packets.

- Transport protocols offer the capability for multiple application processes to access the network by using individual local addresses to determine the destination process for each data stream


Related Discussions:- Function of osi transport layer

Representation in prolog - logic programs, Representation in Prolog - Logic...

Representation in Prolog - Logic Programs: If we justimpose some additional constraints on first-order logic, so than we get to a representation language knowing as logic prog

Describe briefly how firewalls prevent network, Describe briefly how firewa...

Describe briefly how firewalls prevent network. A firewall is only a program or hardware device which filters the information coming via the Internet connection within your pr

Depth first search - artificial intelligence, Depth First Search - artifici...

Depth First Search - artificial intelligence: Depth first search is very similar to breadth first, except for that the things are added to the top of this agenda rather than o

Need of cisc cpu - computer architecture, Need of CISC CPU -  computer arc...

Need of CISC CPU -  computer architecture: Why is Intel spending money and time to manufacture the Pentium II and the Pentium III? The answer of this question is simple, ba

Marked statement is implemented , Consider the ReadRear Java method (a)...

Consider the ReadRear Java method (a) Illustrate pictures that explain the data structure every time a checkpoint is reached for the problems of sizes one, two, three and four s

What is redefines clause, Redefines clause is used to permit the similar st...

Redefines clause is used to permit the similar storage allocation to be referenced by dissimilar data names.

Password, A phonetic password generator picks two segments randomly for eac...

A phonetic password generator picks two segments randomly for each six letter password. form is CVC. what is the total password population? 1> what is the total password population

Show the fundamental process of instruction execution, Q. Show the fundamen...

Q. Show the fundamental process of instruction execution? The fundamental process of instruction execution is:  1. Instruction is fetched from memory to CPU registers (calle

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd