Tcp connections - transport layer, Computer Networking

Assignment Help:

TCP Connections

TCP  is an end to end point to point  transport  used in internet. being a point  to point  protocols  means that  there is always  s single  sender  a single  receiver for a  TCP session. Being  an end to end protocols  on the other  hand  means that the TCP  session  should  cover al parameters and transportation involved form the  source host to  the destination host. The  latter is an  important  features of the TCP  and should  never e  forgotten during  the analysis  any TCP/ IP network or a protocol  design.

TCP is a pipelined protocols. This means that the TCP  packed  data units  which are  commonly  named TCP segments  are logically  enclosed  in a pipe  and thus they  will be  successively transported within  the end to end  TCP  connections. This  is one of  the reliability  features of the TCP  so that  all TCP segments will be delivered to the  receiver host in the means  that even  if the segment are delivered in a different order TCP will  make  them in order before passing them  to the higher layer protocols that is the  application  layer  figure  show  the logical  pipelining in TCP.

The are buffers at both  sides of a TCP  connections. The  TCP connection however is not seen  by the network elements  such as  routers as they  work at layer below  the transport  layer. These network  elements  just see  the datagram's  that is  the IP layer  packets.

TCP  provides  a means  of full  duplex  data transfer. Therefore  a bidirectional  data flow  is available  in the same TCP connection. TCP puts  a maximum  segment size ( MSS)  on its  data. This MSS  is usually  less than  1500 bytes  but in  practical  network  even smaller  MSS  is used  around 500bytes.

TCP is a connection oriented  protocols. This means  that before  any data transfer  could  be started  a connection must be  established  through  a process called  three way during  this process.

TCP  utilizes a  complete  flow control  flow  control  mechanism . by  this methods TCP not  only  entries that the  sender  host  does not overwhelm the  receiver host sending  too much  data  too fast but  also  ensures a fair  bandwidth  share among, all TCP  sessions  concurrently  used.


Related Discussions:- Tcp connections - transport layer

Error correction - retransmission, When an error is discovered the receiver...

When an error is discovered the receiver is able to ask the sender to retransmit the entire data unit Error Correction-Forward Error Correction A receiver is able to u

Tcp connection, Lat take the CONNECT (client side), LISTEN, and ACCEPT (ser...

Lat take the CONNECT (client side), LISTEN, and ACCEPT (server side) socket primitives a) Why are these three needed for a TCP connection? b) Why are none of them needed for a U

Illustrate the bus backbone network, Q. Illustrate the Bus Backbone network...

Q. Illustrate the Bus Backbone network? - Topology is a bus - Utilized in networks such as 10Base5 or 10Base2 - Normally utilized to connect different buildings or to con

Layered architecture - computer network, Layered Architecture The best...

Layered Architecture The best  way to  understand  any complex system is to break  it into  pieces  and then analyze what they  do and  how they interact. The most logical app

packing -unpacking data with parallel virtual machine , Packing and Unpack...

Packing and Unpacking Data pvm_packs - Pack the active message buffer with arrays of prescribed data type: int info = pvm_packf( const char *fmt, ... ) int info = pv

Packet, a transperent switch is inserted between two local area networks AB...

a transperent switch is inserted between two local area networks ABC and XYZ.network ABC has workstation 1,2,and 3 and Network XYZ has workstation 4,5, and 6. show the contents of

Explain client and server networking model, Explain Client/Server Networkin...

Explain Client/Server Networking Model. A networking model where one or more powerful  computers (servers) give the dissimilar network services and all other user's computers (

Describe the following topics, Describe the following topics A . LAN B . M...

Describe the following topics A . LAN B . MAN C . WAN D . ARPANET

Vpn technology - point to point , VPN Technology For an organization  ...

VPN Technology For an organization  VPN  technology  uses some main  techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls

What is raid in ccna, A method used to standardize and categorize fault-tol...

A method used to standardize and categorize fault-tolerant disk systems. RAID levels give lot of mixes of performance, reliability, and cost. Some servers give three of the RAID le

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd