Function of tcp - ip transport layer, Computer Networking

Assignment Help:

Q. Function of TCP/IP Transport Layer ?

TCP/IP Transport Layer

- Defines two standard transport protocols UDP and TCP

- TCP equipment a dependable data-stream protocol

  • Connection oriented

- UDP implements an undependable data-stream

  • Connectionless

- TCP offers reliable data transmission

- UDP is helpful in many applications

  • e.g. Where data requirements to be broadcasted or multicasted

- Primary difference is that UDP doesn't necessarily provide reliable data transmission

- Several programs will use a separate TCP connection as well as a UDP connection

1031_Function of TCP - IP Transport Layer.png

- TCP is accountable for data recovery

  • By providing a series number with each packet that it sends
  • TCP needs acknowledgement (ACK) to ensure correct data is received

- Packet is able to be retransmitted if error detected

- Use of acknowledgement (ACK)

2217_Function of TCP - IP Transport Layer1.png

- Flow control with Window

  • by means of specifying an acceptable range of sequence numbers

610_Function of TCP - IP Transport Layer2.png

- UDP and TCP introduce the concept of ports

- Common ports as well as the services that run on them:

 FTP 21 and 20

 telnet 23

 SMTP 25

 http 80

 POP3 110

- By specifying ports as well as including port numbers with TCP/UDP data multiplexing is achieved

- Multiplexing permits multiple network connections to take place simultaneously

- The port numbers together with the source and destination addresses for the data determine a socket


Related Discussions:- Function of tcp - ip transport layer

What is the difference between trigger and rule, What is the difference bet...

What is the difference between trigger and rule? The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by client

Networking services, Your Windows client failed to broadcast to all servers...

Your Windows client failed to broadcast to all servers that it has accepted an IP address offer. What step is this in the four-step DORA process? a. Discovery b. Offering c. Reques

What is data storage technology, Normally, we think of communications scien...

Normally, we think of communications science as dealing with the contemporaneous exchange of information among distant parties. Though, many of the same techniques employed in data

Show scalability and reliability of computer network, How do you account fo...

How do you account for higher scalability and reliability of computer network? Ans: Computer network will have a large number of computers, which can share database, software

Explain about nonboundary-level masking, Q. Explain about Nonboundary-Level...

Q. Explain about Nonboundary-Level Masking? Nonboundary-Level Masking Bytes in the IP address that correspond to 255 in the mask will be repeated in the subnet addres

Identify three characteristics of switches, Switches operate at layer 2. Th...

Switches operate at layer 2. They enhance bandwidth by decreasing the number of devices sharing the media. They isolate collisions. Like a bridge they forward traffic based upon la

Enumerate about the traffic policing, Enumerate about the Traffic policing ...

Enumerate about the Traffic policing Traffic policing happens when a flow of data is regulated so that cells (or frames or packets) that exceed a performance level are discarde

Configure the management interface- spanning tree protocol, Configure the m...

Configure the management interface address on all three switches.  S1(config)#interface vlan1 S1(config-if)#ip address 172.17.10.1 255.255.255.0 S1(config-if)#no shutdown

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd