Đang chuẩn bị liên kết để tải về tài liệu:
Ebook Computer networks - A systems approach (4th edition): Part 2

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

(BQ) Part 2 book "Computer networks - A systems approach" has contents: Reliable byte stream, simple demultiplexer, performance, queuing disciplines, congestion avoidance mechanisms, data compression, cryptographic tools, secure systems,.and other contents. | End-to-End Protocols Victory is the beautiful, bright coloured flower. Transport is the stem without which it could never have blossomed. —Winston Churchill T he previous three chapters have described various technologies that can be used to connect together a collection of computers: direct links (including LAN technologies like Ethernet and token ring), packet-switched networks (including cell-based networks like ATM), and internetworks. The next problem is to turn this host-to-host packet delivery service into a process-to-process communication channel. This is the role played P R O B L E M by the transport level of the network architecture, which, because it supGetting Processes to ports communication between the Communicate end application programs, is sometimes called the end-to-end protocol. Two forces shape the end-to-end protocol. From above, the application-level processes that use its services have certain requirements. The following list itemizes some of the common properties that a transport protocol can be expected to provide: ■ ■ Delivers messages in the same order they are sent. ■ Delivers at most one copy of each message. ■ Supports arbitrarily large messages. ■ Supports synchronization between the sender and the receiver. ■ Allows the receiver to apply flow control to the sender. ■ 380 Guarantees message delivery. Supports multiple application processes on each host. Note that this list does not include all the functionality that application processes might want from the network. For example, it does not include security, which is typically provided by protocols that sit above the transport level. From below, the underlying network upon which the transport protocol operates has certain limitations in the level of service it can provide. Some of the more typical limitations of the network are that it may ■ Drop messages. ■ Reorder messages. ■ Deliver duplicate copies of a given message. ■ Limit messages to some finite .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.