Transport layer and
Application layer
COMPUTER NETWORK AND COMMUNICATION
Roll no 61-69
Transmission Control Protocol(TCP)
TCP is a connection-oriented Protocol. it creates a virtual connection between
between two TCPs to send data. In addition, TCP uses flow and error control
mechanism at the transport level.
TCP
TCP
To make sure that each message reaches its target location intact, the TCP/IP
model breaks down the data into small bundles and afterward reassembles the
bundles into the original message on the opposite end. Sending the information in
little bundles of information makes it simpler to maintain efficiency as opposed to
sending everything in one go.
After a particular message is broken down into bundles, these bundles may travel
along multiple routes if one route is jammed but the destination remains the same.
TCP
For example, When a user requests a web page on the internet,
somewhere in the world, the server processes that request and sends
back an HTML Page to that user. The server makes use of a protocol
called the HTTP Protocol. The HTTP then requests the TCP layer to
set the required connection and send the HTML file.
Features of TCP
1. Segment Numbering System
● TCP keeps track of the segments being transmitted or received by assigning numbers to
each and every single one of them.
● A specific Byte Number is assigned to data bytes that are to be transferred while segments
are assigned sequence numbers.
● Acknowledgment Numbers are assigned to received segments.
2. Connection Oriented
● It means sender and receiver are connected to each other till the completion of the process.
● The order of the data is maintained i.e. order remains same before and after transmission.
USER DATAGRAM PROTOCOL(UDP)
The User Datagram Datagram Protocol Protocol (UDP) is called
a connectionless,unreliable transport protocol. It does not add
anything to the services of IP except to provide process-to-
process communication instead of host-to-host communication
UDP
UDP
1. Source Port: Source Port is a 2 Byte long field used to identify the port number of the source.
1. Destination Port: It is a 2 Byte long field, used to identify the port of the destined packet.
1. Length: Length is the length of UDP including the header and the data. It is a 16-bits field.
1. Checksum: Checksum is 2 Bytes long field. It is the 16-bit one’s complement of the one’s complement sum
of the UDP header, the pseudo-header of information from the IP header, and the data, padded with zero
octets at the end (if necessary) to make a multiple of two octets.
Features of UDP
● It is a connectionless protocol.
● It is used for VoIP, video streaming, gaming and live broadcasts.
● It is faster and needs fewer resources.
● The packets don't necessarily arrive in order.
● It allows missing packets -- the sender is unable to know whether a packet
has been received.
● It is better suited for applications that need fast, efficient transmission, such
as games.