Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Transport Layer

In computer networking it the transport  layer is where  sessions are  exchanged between  hosts. This layer resides  between  the application layer and  network layer the transport layer is  a central  piece of the layered architecture. It has  the critical  role  of providing  communication services directly  to the application processes running on  different hosts. A transport  layer protocol  provides  logical  communication  between  application  processes running  on different hosts. Figure  illustrates the relationship  of the network transport  and application  layers  and the notation of logical  communication. Transport  layer  protocols  are implemented in the  end systems  but not  in network  routers. On the sending side  the  transport  layer converts the messages receives from  a sending application process into  smaller chunks  and adding a transport layer header to each chunk to create the transport  layer  segment. The  transport  layer then passes the segment to the  network  layer at  sending  end system where the segment is encapsulate d within  a network  layer packet  a datagram  and sent to the destination . it  is important to note that network routes act  only on the network  layer segment encapsulated with the datagram. On  the receiving side  the  network  layer extracts the transport layer segment from the  datagram  and passes the  segment up to the  transport layer the transport layer then processes the  received  segment making available the data in  the segment  making available the data  in the  segment  to the receiving application. The network  layer doesn't  generally guarantee that packets of data will arrive in the same order that they  were sent but often  this is a  desirable  feature  so the transport layer  is provided with the simplest  way of  doing this is to  give  each packet  a number and allow  the receiver to recorder the packet . the  transport   layer provides some other  services   like byte  orientation flow  control  reliable data and ports.

The  byte  orientation  services provides  rather  than dealing  with things  on a packet by packet  basis. The transport  layer may  add be ability  to view communication just  as a stream of bytes. This is nice  to deal  with than  random  packet  sizes  however it  rarely  matches  the communication  model  which will  normally  be a  sequence of message of use defined sizes.

The  amount  of memory  on a  computer limited and without  flow  control  a larger computer  might flood a computer  with so much  information  that it can't hold  it all before  dealing with it. Nowadays this is not a big  issue as memory  is cheap while bandwidth  is comparatively  expensive but in earlier time it was more important.

Reliable  data packets may be lost in routers switches bridges and hosts due to  network congestion when  the packet  queers are filled and the network  nodes  have to  delete  packets. Packets  may be lost of corrupted in Ethernet due to interference and  noise since  Ethernet doesn't  retransmit corrupted packets. Packets may be delivered in the wrong  order by an  underlying network some  transport layer protocol for e, g, TCP can fix all these  problems  by means  of error  detection code  for e, g,  checks acknowledgment message, automatic  repeat request  and segment  numbering of course  error  free is impossible  but it  possible to substantially reduce the numbers  of undeleted  error.

Ports  are essentially  ways to address multiple entities in the same  location. For e ,g,  the first line of a postal address is a kind  of port  and distinguishes between  different  occupants of the same house. computer applications will listen to each  use for  information on their  own ports i ,e one can  use more  than one  network  based applications at the same  time.

Transport  layer  lies just  above the network  layer in  protocol  stack whereas a transport layer protocol provides logical  communication  between  running  on different  hosts  a network  layer  provides  logical  communication  between  hosts.

More than one transport  layer  protocols  may be available to network  applications. For  example  the internet  has two  protocols  transmission  control protocol  and user datagram  protocol  each of there  protocols provides  a different  set of  transport layer  services  to the  invoking application.

The ultimate goal  of the  transport  layer is  provide  efficient  reliable and cost  effective  services  to its  users  normally  processes in the application layer. To  achieve this goal  the transport  layer  make use of the  services  provided  by the  network layer.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9527219

Have any Question?


Related Questions in Computer Network & Security

Suppose that third national bank has reserves of 20000 and

Suppose that Third National Bank has reserves of $20,000 and check able deposits of $200,000. The reserve ratio is 10 percent. The bank sells $20,000 in securities to the Federal Reserve Bank in its district, receiving a ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Design and implementation of secure enterprise wireless

Design and implementation of secure enterprise wireless network Purpose of the assessment  (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering th ...

1 these assignments need to be properly supported with

1. These assignments need to be properly supported with references to the scientific literature. 2. Use a 12pt font for the body of your assignment. 3. The assignment many be up to four (4) pages long, including any appe ...

Backgroundyou have obtained a contract position at a small

Background: You have obtained a contract position at a small marketing and advertising firm called the Colour Ability Corporation (CAC). Your contract responsibilities are to help them plan their emerging networking and ...

Data model development and implementationpurpose of the

Data model development and implementation Purpose of the assessment The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data m ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to pr ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As