Essay about Networks: Transmission Control Protocol and Connection

Submitted By singer33
Words: 460
Pages: 2

Protocols are divided into two categories based on their use of connections: * Connection-Oriented Protocols: These protocols require that a logical connection be established between two devices before transferring data. However, this is generally accomplished by following a specific set of rules that specify how a connection should be initiated, negotiated, managed and eventually terminated. Usually one device begins by sending a request to open a connection, and the other responds. They pass control information to determine if and how the connection should be set up. If this is successful, data is sent between the devices. When they are finished, the connection is broken (Kozierok, 2005). * Connectionless Protocols: These types of protocols do not establish a connection between devices. As soon as a device has data to send to another, it just sends it (2005).
The Relationship Between Connection Orientation and Circuits
In order to establish a circuit between two devices, they must also be connected. For this reason, circuit-switched networks are inherently based on connections. This has led to the terms “circuit-switched” and “connection-oriented” being used interchangeably (2005).
Furthermore, connection-oriented protocols are important because they enable the implementation of applications that require connections, over packet-switched networks that have no inherent sense of a connection (2005). For example, to use the TCP/IP File Transfer Protocol, the user would be able to connect to a server, enter a login and password, and then execute commands to change directories, send or retrieve files, and so on (2005). Therefore, this requires the establishment of a connection over which commands, replies and data can be passed. Similarly, the Telnet Protocol involves establishing a connection—it lets you remotely use another machine (2005). However this process works (indirectly) over the IP protocol, which is based on the use of packets, through the