Question

In: Computer Science

When you develop an application, you must choose one of the available transport-layer protocols. How do...

When you develop an application, you must choose one of the available transport-layer protocols. How do you make this choice? And, if you have to provide secure transmission for this application data, how it can be achieved?

Solutions

Expert Solution

When you develop an application, you must choose one of the available transport-layer protocols. How do you make this choice? And, if you have to provide secure transmission for this application data, how it can be achieved?

Answer:

            The internet has two main protocols in the transport layer namely TCP (Transmission Control Protocol) and UDP (User Datagram Protocol ). TCP is a connection oriented protocol and UDP is a connectionless protocol.

Choice of protocol for the application:

· TCP is the best choice. TCP is designed to provide a reliable end-to-end byte stream over an unreliable internet work. An internet work differs from a single network because different parts may have different topologies, packet sizes, band widths etc. TCP was designed to adapt to properties of the internet work and to overcome the failures.

· TCP guarantees that the recipient will receive the packets in the correct order by numbering it. After receiving the packet, the receiver will sent acknowledgement message back to the sender. If the sender doesn’t get this acknowledgement message, it will resent the same packet again to the receiver.

· TCP is slower than UDP, but guaranteed delivery of data packets occur in case of TCP.

· All TCP connections are full duplex and point to point. It does not support multicasting or broadcasting.

· When an application passes data to TCP, it may send it immediately or buffer it at its discretion.

· Another feature of TCP service is regarding urgent data transfer. When the urgent data are received at the destination, the receiving application is interrupted, so it can stop whatever it was doing and read the data stream to find the urgent data.

Security:

Security controls exit for network communications at each layer of TCP/IP. In TCP each packets are checked for errors. There is no loss of data or any type of corruption of data happens for TCP. The secure number and acknowledgement number fields provide more security for the data transmission through TCP.


Related Solutions

when you develop an application, you must choose one of the available transport layer protocols. how...
when you develop an application, you must choose one of the available transport layer protocols. how do you make the choice? And, if you have to provide secure transmission for this application data, how it can be achieved?
Explain the two different categories of Application layer protocols, and then detail the PDU used at...
Explain the two different categories of Application layer protocols, and then detail the PDU used at this layer.​
Write 3 vulnerabilities related to transport layer protocols and processes. Explain each vulnerability and it's significance...
Write 3 vulnerabilities related to transport layer protocols and processes. Explain each vulnerability and it's significance to your data security or privacy.
How is an application layer firewall different from a packet-filtering firewall? Why is an application layer...
How is an application layer firewall different from a packet-filtering firewall? Why is an application layer firewall sometimes called a proxy server? What is stateful inspection? What is a VPN? Why is it becoming more widely used? What is content filtering, and should it be leveraged on a corporate network? Backup your statement with 2 or 3 facts. Please pick two peer posts for your responses. Do you agree with their statements on content filtering or disagree and why? Are...
Choose an application domain. Choose an App to develop in the domain. Write these down. domain...
Choose an application domain. Choose an App to develop in the domain. Write these down. domain :(a) Public Health / Persuasion for Mask Wearing or Public Health / Mass Vaccination Initiative, if possible , For concrete use cases and scenarios, personalize or customize the best, most suitable, appropriate choice for a specific class or segment of users or end-users.
When you put a Servlet in a Web Application on the Tomcat/Glassfish server, how do you...
When you put a Servlet in a Web Application on the Tomcat/Glassfish server, how do you go about running this Servlet? a. From the Browser’s URL(give path):
You are presented with the following two scenarios. Choose one of these individuals and develop a...
You are presented with the following two scenarios. Choose one of these individuals and develop a fitness/wellness plan that will result in their specific goals. For the individual that you choose, evaluate their goals and apply the information you have learned in this course to create a program for that individual. That program should be part of a paper (at least two pages, double-spaced) submitted via Canvas. Please include ALL of the following items in the creation of that fitness/wellness...
What is the Transport Layer and what does it do?   (Please explain flow control, error management,...
What is the Transport Layer and what does it do?   (Please explain flow control, error management, and segmentation and reassembly in the Transport Layer)
When do you use a one-tailed test? When do you use a two-tailed test? How is...
When do you use a one-tailed test? When do you use a two-tailed test? How is SPSS used to perform the calculations needed for each?
How do the media options available to advertisers vary in different parts of the world? (Choose...
How do the media options available to advertisers vary in different parts of the world? (Choose two different countries for discussion except for USA) How are marketers utilizing these media options? Specify with examples.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT