Which characteristics are part of tcp




















UDP is connection less Reliable Resends anything not recevied. John Smith Answered Mar 01, Write Your Answer. What is the difference between Wavelength and Frequency?

What is the difference between Enable and Enable Secret Password? What is cloud computing? What is the difference between Bluetooth and Wireless? What is the difference between Bandwidth and Speed? Ask Your Own Question. What is networking? What is the difference between Internet and Intranet? What is the difference between Client and Server? What is the difference between Telnet and SSH? What is the difference between Layer 2 Switch and Layer 3 Switch?

What is the difference between Domain and Range? Why is flow control used for TCP data transfer? Topics Related To Networking. Search Image library Upload. In the transport layer, the data is transferred in the form of segments and each segment carries the data and the control information.

Now, let us know how the TCP connection is established. The transmission control protocol transmits the data in both directions. So it is called the full-duplex. In a full-duplex, the data can be transmitted in both directions. When two transmission control protocols are connected to each other.

Each TCP is used to initialize the communication. We use the three-way handshaking protocol in order to establish the connection between the two transmission control protocols. Let us take an example to understand the three-way handshake protocol in detail. Let say we have one client and server.

The client will send a synchronized data packet to the server. The main purpose of this step is to know if the server is available for the new connection or not. Next, the server needs to keep all the ports open to establishing a new connection. After receiving the SYN data packet to the server, the server replies back with the acknowledgment and the synchronized packet. When the client receives the acknowledgment packet from the server. The client again sends the acknowledgment to the server as it received its acknowledgment.

The concept of framing is quite different. It is not the characteristic of the Transmission control protocol. Framing is one of the services that is offered by the data link layer. Let us know how the framing works and why it is not one of the characteristics of the framing. Suppose we have two nodes node A and node B and each node will consist of an adapter, the adapter will send the data that is received from the data link layer into the signals.

The signal will flow through the cable or by the medium that is received by the physical layer of node B. The application layer creates the data that is a set of the zeroes and ones, then it goes to the transport layer. The transport layer adds some sets of the zeroes and the ones. It is then handed over to the network layer and also add the network layer header we will call the packet. It adds zeroes and ones are added at the header part. In Framing the data is transmitted in the form of bits which is the point-to-point connection.

RFCs contain protocol implementation specifications defined in terminology that is unique to data communications. To discuss computer networking, it is necessary to use terms that have special meaning. Even other computer professionals may not be familiar with all the terms in the networking alphabet soup.

As is always the case, English and computer-speak are not equivalent or even necessarily compatible languages. Although descriptions and examples should make the meaning of the networking jargon more apparent, sometimes terms are ambiguous.

A common frame of reference is necessary for understanding data communications terminology. An architectural model developed by the International Standards Organization ISO is frequently used to describe the structure and function of data communications protocols. This architectural model, which is called the Open Systems Interconnect OSI Reference Model , provides a common reference for discussing communications. The OSI Reference Model contains seven layers that define the functions of data communications protocols.

Each layer of the OSI model represents a function performed when data is transferred between cooperating applications across an intervening network. Figure identifies each layer by name and provides a short functional description for it.

Looking at this figure, the protocols are like a pile of building blocks stacked one upon another. Because of this appearance, the structure is often called a stack or protocol stack. A layer does not define a single protocol—it defines a data communications function that may be performed by any number of protocols. Therefore, each layer may contain multiple protocols, each providing a service suitable to the function of that layer. For example, a file transfer protocol and an electronic mail protocol both provide user services, and both are part of the Application Layer.

Every protocol communicates with its peers. A peer is an implementation of the same protocol in the equivalent layer on a remote system; i. Peer-level communications must be standardized for successful communications to take place.

In the abstract, each protocol is concerned only with communicating to its peers; it does not care about the layers above or below it. However, there must also be agreement on how to pass data between the layers on a single computer, because every layer is involved in sending data from a local application to an equivalent remote application. The upper layers rely on the lower layers to transfer the data over the underlying network.

Data is passed down the stack from one layer to the next until it is transmitted over the network by the Physical Layer protocols. At the remote end, the data is passed up the stack to the receiving application.

The individual layers do not need to know how the layers above and below them function; they need to know only how to pass data to them. Isolating network communications functions in different layers minimizes the impact of technological change on the entire protocol suite. New applications can be added without changing the physical network, and new network hardware can be installed without rewriting the application software.

The Application Layer is the level of the protocol hierarchy where user-accessed network processes reside. This includes all of the processes that users directly interact with as well as other processes at this level that users are not necessarily aware of. For cooperating applications to exchange data, they must agree about how data is represented.

The Transport Layer in the OSI reference model guarantees that the receiver gets the data exactly as it was sent. The Network Layer manages connections across the network and isolates the upper layer protocols from the details of the underlying network.

The reliable delivery of data across the underlying physical network is handled by the Data Link Layer. The Physical Layer defines the characteristics of the hardware needed to carry the data transmission signal. Features such as voltage levels and the number and location of interface pins are defined in this layer.

As in the OSI model, data is passed down the stack when it is being sent to the network, and up the stack when it is being received from the network. Each layer in the stack adds control information to ensure proper delivery.

This control information is called a header because it is placed in front of the data to be transmitted. Each layer treats all the information it receives from the layer above as data, and places its own header in front of that information. The addition of delivery information at every layer is called encapsulation.

See Figure for an illustration of this. When data is received, the opposite happens. Each layer strips off its header before passing the data on to the layer above. As information flows back up the stack, information received from a lower layer is interpreted as both a header and data. Each layer has its own independent data structures.

Conceptually, a layer is unaware of the data structures used by the layers above and below it. In reality, the data structures of a layer are designed to be compatible with the structures used by the surrounding layers for the sake of more efficient data transmission. Still, each layer has its own data structure and its own terminology to describe that structure. The Internet layer views all data as blocks called datagrams. Most networks refer to transmitted data as packets or frames. Figure shows a network that transmits pieces of data it calls frames.

The protocols in this layer provide the means for the system to deliver data to the other devices on a directly attached network. This layer defines how to use the network to transmit an IP datagram. Unlike higher-level protocols, Network Access Layer protocols must know the details of the underlying network its packet structure, addressing, etc. The Network Access Layer is often ignored by users. Consequently, there are many access protocols—one for each physical network standard.

Functions performed at this level include encapsulation of IP datagrams into the frames transmitted by the network, and mapping of IP addresses to the physical addresses used by the network. The IP address must be converted into an address that is appropriate for the physical network over which the datagram is transmitted. As implemented in Unix, protocols in this layer often appear as a combination of device drivers and related programs.

The modules that are identified with network device names usually encapsulate and deliver the data to the network, while separate programs perform related functions such as address mapping. The Internet Protocol IP is the most important protocol in this layer. There are more recent versions of IP. IPv5 never came into operational use. IPv6 is an IP standard that provides greatly expanded addressing capacity.

Because IPv6 uses a completely different address structure, it is not interoperable with IPv4. While IPv6 is a standard version of IP, it is not yet widely used in operational, commercial networks. Since our focus is on practical, operational networks, we do not cover IPv6 in detail. IPv4 is the protocol you will configure on your system when you want to exchange data with remote systems, and it is the focus of this text. All protocols, in the layers above and below IP, use the Internet Protocol to deliver data.

The Internet Protocol is the building block of the Internet. Its functions include:. First, IP is a connectionless protocol.

In contrast, a connection-oriented protocol exchanges control information with the remote system to verify that it is ready to receive data before any data is sent. When the handshaking is successful, the systems are said to have established a connection. The Internet Protocol relies on protocols in other layers to establish the connection if they require connection-oriented service.

IP also relies on protocols in the other layers to provide error detection and error recovery. The Internet Protocol is sometimes called an unreliable protocol because it contains no error detection and recovery code.

This is not to say that the protocol cannot be relied on—quite the contrary. A packet is a block of data that carries with it the information necessary to deliver it, similar to a postal letter, which has an address written on its envelope.

A packet-switching network uses the addressing information in the packets to switch packets from one physical network to another, moving them toward their final destination. Each packet travels the network independently of any other packet.

The datagram is the packet format defined by the Internet Protocol. Figure is a pictorial representation of an IP datagram.

The first five or six bit words of the datagram are control information called the header. By default, the header is five words long; the sixth word is optional.

The header contains all the information necessary to deliver the packet. The Internet Protocol delivers the datagram by checking the Destination Address in word 5 of the header. The Destination Address is a standard bit IP address that identifies the destination network and the specific host on that network.

The format of IP addresses is explained in Chapter 2. If the Destination Address is the address of a host on the local network, the packet is delivered directly to the destination. If the Destination Address is not on the local network, the packet is passed to a gateway for delivery. Gateways are devices that switch packets between the different physical networks.

Deciding which gateway to use is called routing. IP makes the routing decision for each individual packet. Internet gateways are commonly and perhaps more accurately referred to as IP routers because they use Internet Protocol to route packets between networks. However, if a host is connected to more than one network called a multi-homed host , it can forward packets between the networks.

When a multi-homed host forwards packets, it acts just like any other gateway and is in fact considered to be a gateway. Figure shows the use of gateways to forward packets. The hosts or end systems process packets through all four protocol layers, while the gateways or intermediate systems process the packets only up to the Internet Layer where the routing decisions are made. Systems can deliver packets only to other devices attached to the same physical network. Packets from A1 destined for host C1 are forwarded through gateways G1 and G2.

Host A1 first delivers the packet to gateway G1 , with which it shares network A. Gateway G1 delivers the packet to G2 over network B. Gateway G2 then delivers the packet directly to host C1 because they are both attached to network C. Host A1 has no knowledge of any gateways beyond gateway G1. It sends packets destined for both networks C and B to that local gateway and then relies on that gateway to properly forward the packets along the path to their destinations.



0コメント

  • 1000 / 1000