The Ip Connectionless Protocol Relies On What Other Protocol To Guarantee Delivery Of Data??
The Ip Connectionless Protocol Relies On What Other Protocol To Guarantee Delivery Of Data??
Share
Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
The Ip Connectionless Protocol Relies on What Other Protocol to Guarantee Delivery of Data??
Answer:
The connectionless IP protocol relies on TCP to deliver data The connectionless IP protocol relies on TCP to deliver data. It converts a large number of data fragments into smaller packets for transmitting. The major parts of the internet protocol datagram are,
Protocol:
The datagram describes the high-level protocol embedded.
IP identification (IPID):
It is used to identify the IP datagrams and also reassembles the fragmented packets.
Source IP address:
The source IP address is the address of the host where the datagram is located.
Destination IP address:
A destination to which the datagram will be sent.
Time-to-live (TTL):
Keep packets and datagram routing in a circle. When the time to live is zero, the datagram is dropped. TTL recognizes each router in the network by sending the datagram with increasing TTL and tracks these when time-to-live is exceeded.
Transmission control protocol:
t is one of the main protocols in the Internet protocol suite. TCP established and maintains network conversations in which by application exchanges data. Together with Internet Protocol, it works to define in which way computers send data packets from one point to another. So, the whole internet protocol suite is referred to as TCP/IP. Transmission control protocol provides a stream of octets that are reliable, error-checked, and sorted among the costume performed on the host communication via an internet protocol network. The prime internet application such as email, file transfer, world wide web, and remote administration depend on the TCP. These are part of the transport layer of the entire TCP/IP suite. On the transmission control protocol, SSL/TLS is mostly run on it.
Uses:
The transmission control protocol is to make sure that the transmission between the client and the server is secure. Regardless of the amount, it guarantees the unity of data over the network. That is the reason it is used to transmit data from the high-level protocol that needs to arrive at all the data. Some examples of these protocols are,