Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
College aantekeningen

Data communication and networks

Beoordeling
-
Verkocht
-
Pagina's
18
Geüpload op
21-12-2024
Geschreven in
2022/2023

This document contains transport layer functions & end to end communications

Instelling
Vak

Voorbeeld van de inhoud

UNIT –IV
TRANSPORT LAYER


Next Layer in OSI Model is recognized as Transport Layer (Layer-4). All modules and
procedures pertaining to transportation of data or data stream are categorized into this
layer. As all other layers, this layer communicates with its peer Transport layer of the
remote host.
Transport layer offers peer-to-peer and end-to-end connection between two processes
on remote hosts. Transport layer takes data from upper layer (i.e. Application layer) and
then breaks it into smaller size segments, numbers each byte, and hands over to lower
layer (Network Layer) for delivery.

Functions
This Layer is the first one which breaks the information data, supplied by
Application layer in to smaller units called segments. It numbers every byte in the
segment and maintains their accounting.
This layer ensures that data must be received in the same sequence in which it
was sent.
This layer provides end-to-end delivery of data between hosts which may or may
not belong to the same subnet.
All server processes intend to communicate over the network are equipped with
well-known Transport Service Access Points (TSAPs) also known as port
numbers.

End-to-End Communication
A process on one host identifies its peer host on remote network by means of TSAPs,
also known as Port numbers. TSAPs are very well defined and a process which is trying
to communicate with its peer knows this in advance.

,For example, when a DHCP client wants to communicate with remote DHCP server, it
always requests on port number 67. When a DNS client wants to communicate with
remote DNS server, it always requests on port number 53 (UDP).
The two main Transport layer protocols are:
Transmission Control Protocol
It provides reliable communication between two hosts.
User Datagram Protocol
It provides unreliable communication between two hosts.


The transmission Control Protocol (TCP) is one of the most important protocols of
Internet Protocols suite. It is most widely used protocol for data transmission in
communication network such as internet.

Features
TCP is reliable protocol. That is, the receiver always sends either positive or
negative acknowledgement about the data packet to the sender, so that the
sender always has bright clue about whether the data packet is reached the
destination or it needs to resend it.
TCP ensures that the data reaches intended destination in the same order it was
sent.
TCP is connection oriented. TCP requires that connection between two remote
points be established before sending actual data.
TCP provides error-checking and recovery mechanism.

, TCP provides end-to-end communication.
TCP provides flow control and quality of service.
TCP operates in Client/Server point-to-point mode.
TCP provides full duplex server, i.e. it can perform roles of both receiver and
sender.

Header
The length of TCP header is minimum 20 bytes long and maximum 60 bytes.




Source Port (16-bits) - It identifies source port of the application process on the
sending device.
Destination Port (16-bits) - It identifies destination port of the application process
on the receiving device.
Sequence Number (32-bits) - Sequence number of data bytes of a segment in a
session.
Acknowledgement Number (32-bits) - When ACK flag is set, this number
contains the next sequence number of the data byte expected and works as
acknowledgement of the previous data received.
Data Offset (4-bits) - This field implies both, the size of TCP header (32-bit words)
and the offset of data in current packet in the whole TCP segment.
Reserved (3-bits) - Reserved for future use and all are set zero by default.
Flags (1-bit each)
NS - Nonce Sum bit is used by Explicit Congestion Notification signaling
process.
CWR - When a host receives packet with ECE bit set, it sets Congestion

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
21 december 2024
Aantal pagina's
18
Geschreven in
2022/2023
Type
College aantekeningen
Docent(en)
Avanthika
Bevat
Alle colleges

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
NikhithaDasari

Maak kennis met de verkoper

Seller avatar
NikhithaDasari Chaitanya deemed to be university
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
1 jaar
Aantal volgers
0
Documenten
5
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen