TCP provides reliable data transmission through mechanisms like positive acknowledgment and retransmission of lost packets. It is a connection-oriented protocol that establishes logical connections between endpoints using a three-way handshake. TCP delivers data as a continuous byte stream and ensures packets are delivered accurately and in order. UDP is an unreliable, connectionless protocol that provides simple datagram delivery without acknowledgments or guaranteed ordering.
TCP provides reliable data transmission through mechanisms like positive acknowledgment and retransmission of lost packets. It is a connection-oriented protocol that establishes logical connections between endpoints using a three-way handshake. TCP delivers data as a continuous byte stream and ensures packets are delivered accurately and in order. UDP is an unreliable, connectionless protocol that provides simple datagram delivery without acknowledgments or guaranteed ordering.
TCP provides reliable data transmission through mechanisms like positive acknowledgment and retransmission of lost packets. It is a connection-oriented protocol that establishes logical connections between endpoints using a three-way handshake. TCP delivers data as a continuous byte stream and ensures packets are delivered accurately and in order. UDP is an unreliable, connectionless protocol that provides simple datagram delivery without acknowledgments or guaranteed ordering.
TCP provides reliable data transmission through mechanisms like positive acknowledgment and retransmission of lost packets. It is a connection-oriented protocol that establishes logical connections between endpoints using a three-way handshake. TCP delivers data as a continuous byte stream and ensures packets are delivered accurately and in order. UDP is an unreliable, connectionless protocol that provides simple datagram delivery without acknowledgments or guaranteed ordering.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 11
TCP
Transport Layer Protocol
Transport Layer
• The protocol layer just above the Internet Layer is
the Host-to-Host Transport Layer. • This name is usually shortened to Transport Layer. The two most important protocols in the Transport Layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Transport Layer • TCP provides reliable data delivery service with end-to-end error detection and correction. UDP provides low-overhead, connectionless datagram delivery service. • Both protocols deliver data between the Application Layer and the Internet Layer. Applications programmers can choose whichever service is more appropriate for their specific applications. User Datagram Protocol • The User Datagram Protocol gives application programs direct access to a datagram delivery service, like the delivery service that IP provides. This allows applications to exchange messages over the network with a minimum of protocol overhead. UDP • UDP is an unreliable, connectionless datagram protocol. As noted previously, unreliable merely means that there are no techniques in the protocol for verifying that the data reached the other end of the network correctly. • Within your computer, UDP will deliver data correctly. UDP uses 16- bit Source Port and Destination Port numbers in word 1 of the message header, to deliver data to the correct applications process. Figure shows the UDP message format. Transmission Control Protocol • Applications that require the transport protocol to provide reliable data delivery use TCP because it verifies that data is delivered across the network accurately and in the proper sequence. • TCP is a reliable, connection-oriented, byte-stream protocol. Let’s look at each of the terms—reliable, connection-oriented, and byte-stream—in more detail.
• TCP provides reliability with a mechanism called Positive Acknowledgment with Re-
transmission (PAR). Simply stated, a system using PAR sends the data again, unless it hears from the remote system that the data arrived successfully. The unit of data exchanged between cooperating TCP modules is called a segment (see Figure). • Each segment contains a checksum that the recipient uses to verify that the data is undamaged. If the data segment is received undamaged, the receiver sends a positive acknowledgment back to the sender. If the data segment is damaged, the receiver discards it. After an appropriate time-out period, the sending TCP module re-transmits any segment for which no positive acknowledgment has been received. Let’s look at each of the terms—reliable, connection-oriented, and byte-stream—in more detail.
• TCP is connection-oriented. It establishes a logical end-to-end connection
between the two communicating hosts. Control information, called a handshake, is exchanged between the two endpoints to establish a dialogue before data is transmitted. TCP indicates the control function of a segment by setting the appropriate bit in the Flags field in word 4 of the segment header. • The type of handshake used by TCP is called a three-way handshake because three segments are exchanged. • Host A begins the connection by sending host B a segment with the Synchronize sequence numbers (SYN) bit set. This segment tells host B that A wishes to set up a connection, and it tells B what sequence number host A will use as a starting number for its segments. (Sequence numbers are used to keep data in the proper order.) • Host B responds to A with a segment that has the Acknowledgment (ACK) and SYN bits set. B’s segment acknowledges the receipt of A’s segment, and informs A which Sequence Number host B will start with. Finally, host A sends a segment that acknowledges receipt of B’s segment, and transfers the first actual data.