Key Concepts of Host-to-Host Protocols
Written on 04:55 by Ahmet Emir
Since you’ve apparent both a connection-oriented (TCP) and connectionless (UDP) agreement in action,
it would be acceptable to abridge the two here. Table 2.1 highlights some of the key concepts that
you should accumulate in apperception apropos these two protocols. You should acquire this table.
A blast affinity could absolutely advice you accept how TCP works. Most of us know
that afore you allege to addition on a phone, you charge aboriginal authorize a affiliation with that
other person—wherever they are. This is like a basic ambit with the TCP protocol. If you
were giving addition important advice during your conversation, you ability say, “You
know?” or ask, “Did you get that?” Saying article like this is a lot like a TCP acknowledgment—
it’s advised to get you verification. From time to time (especially on corpuscle phones),
people additionally ask, “Are you still there?” They end their conversations with a “Goodbye” of
some kind, putting cease on the buzz call. TCP additionally performs these types of functions.
Alternately, application UDP is like sending a postcard. To do that, you don’t charge to acquaintance the
other affair first. You artlessly abode your message, abode the postcard, and mail it. This is
analogous to UDP’s connectionless orientation. Since the bulletin on the postcard is probably
not a amount of activity or death, you don’t charge an acceptance of its receipt. Similarly, UDP
does not absorb acknowledgments.
Let’s booty a attending at addition figure, one that includes TCP, UDP, and the applications associated
to anniversary protocol, Amount 2.5.
