Functions and significance of tcp header’s fields, Computer Networking

Assignment Help:

Describe the functions and significances of all fields (such as Source Port and Destination Port) of a TCP header.

Functions and significance of tcp header's fields

FIELDS

TCP Source Port

The TCP Source port has the port number; from this port packets are sent. This port is dynamically assigned by the stack of TCP.

TCP Destination Port

The TCP Destination port has a port number and from this port number packets are routed.TCP stack is responsible for routing data to destination point.

Sequence Number     

The sequence number is used for initializing the session in TCP.

Acknowledgment Number

The Acknowledgement Number is number assigned for session initialization.

Data Offset

The Data offset is meant for ending the header of TCP packet and from that point data starts and that data ends is equal to the 32 bit words.

Reserved

This field is responsible for handling future requirements.

Control Bits

702_tcp-control-bits.png

URG (Urgent)

The Urgent pointer in the TCP Header field is of great significance. The urgent pointer points to the data of the packet where urgent data has been saved.

ACK(Acknowledge)

The Acknowledgement is a bit which have a lot of importance. The acknowledgement is used to acknowledge the earlier sent packets. 

Push Function

The push function is used to destroy data through the TCP layer.

Reset

In Reset connection is again reset if there had been any error or any kind of interruption.

Synchronize

In this, system generates some synchronized sequence number and assigns it to sessions and this sequence number is used during the establishment of session.

Finish

If there is no data there to send from the sender then the session will be finished.

           770_TCP-header.png

The length of TCP header is of 32 bit

Window

The window is meant for providing a way of each side of communication that provides a way of checking the flow of packets to the destination point and also be sure that all packets have been received properly by the receiver before sending any new packet to the receiver.Checksum

The Checksum provides a way for checking and verifying that TCP packet that includes header and data should not corrupt in its journey across the network.

Urgent Pointer

This field has a Pointer into the data of the packet to indicate where urgent information is located.

OPTIONS

The options include the additional information about the TCP processing capabilities used during connection between Source and Destination.

Padding

The padding is used to extend the length of the TCP Header its initial bit set to 0.It makes sure that every packet should be send properly.

Data fields

Data fields are used for urgent data.


Related Discussions:- Functions and significance of tcp header’s fields

Connection to packet switches, CONNECTION TO PACKET SWITCHES:  A packe...

CONNECTION TO PACKET SWITCHES:  A packet switch many join to devices and to other packet switches. But the speeds are different in both parts. There are typically high-speed j

Describe the tcp/ip reference model, Computer Networks 1. Differentiate...

Computer Networks 1. Differentiate WAN and LAN. 2. Describe the TCP/IP Reference Model with diagram. 3. Explain Circuit switching and message switching. 4. List the fu

Different type of networking and internetworking device, What is the differ...

What is the different type of networking / internetworking devices? Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. I

Message passing in pvm, Message Passing The PVM communication model giv...

Message Passing The PVM communication model gives asynchronous blocking receive, asynchronous blocking send and nonblocking receive functions. In our methodology, a blocking se

State synchronous FDDI, Synchronous Synchronous traffic is able to cons...

Synchronous Synchronous traffic is able to consume a portion of the 100 Mbps total bandwidth of an FDDI network while asynchronous traffic can consume the rest. Synchronous

Illustrate the term- search engine and surfing, Illustrate the term- Search...

Illustrate the term- Search Engine and Surfing Search Engine: Software used to find information on the Web. Examples are Google, Lycos and Yahoo. Server: A computer with

Explain the process of piggybacking, Q. Explain the process of piggybacking...

Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until

What is cryptography, The science and art of manipulating messages in order...

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

Ipv6 - network layer and routing , IPv6 The  internet  engineering task...

IPv6 The  internet  engineering task force begin  the effort to develop a successor  protocols  to IPv4 in the early  1990 is an internet  layer protocols  for packet  switched

Determine the objectives of computer security, Determine the Objectives of ...

Determine the Objectives of computer security Though computerisation helps a lot in proper organisation of experience, it also opens a Pandora's Box simultaneously. On one

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd