SlideShare a Scribd company logo
1 of 17
Transmission Control
Protocol (TCP)
Introduction
• TCP stands for Transmission Control Protocol.
• It is a transport layer protocol that facilitates the transmission of
packets from source to destination.
• It is a connection-oriented protocol that means it establishes the
connection prior to the communication that occurs between the
computing devices in a network.
Introduction
• The main functionality of the TCP is to take the data from the
application layer.
• Then it divides the data into a several packets, provides
numbering to these packets, and finally transmits these packets
to the destination.
• The TCP, on the other side, will reassemble the packets and
transmits them to the application layer.
Features of TCP protocol
• Reliable
• TCP is a reliable protocol as it follows the flow and error control
mechanism.
• It also supports the acknowledgment mechanism, which checks the
state and sound arrival of the data.
• In the acknowledgment mechanism, the receiver sends either positive
or negative acknowledgment to the sender so that the sender can get
to know whether the data packet has been received or needs to
Features of TCP protocol
• Order of the data is maintained
• This protocol ensures that the data reaches the intended receiver in the
same order in which it is sent.
• It orders and numbers each segment so that the TCP layer on the
destination side can reassemble them based on their ordering.
• Connection-oriented
• It is a connection-oriented service that means the data exchange
occurs only after the connection establishment.
• When the data transfer is completed, then the connection will get
terminated.
Features of TCP protocol
• Full duplex
• It is a full-duplex means that the data can transfer in both directions at
the same time.
• Stream-oriented
• TCP is a stream-oriented protocol as it allows the sender to send the
data in the form of a stream of bytes and also allows the receiver to
accept the data in the form of a stream of bytes.
• TCP creates an environment in which both the sender and receiver are
connected by an imaginary tube known as a virtual circuit.
• This virtual circuit carries the stream of bytes across the internet.
Working of TCP
• In TCP, the connection is established by using three-way
handshaking. The client sends the segment with its sequence
number.
• The server, in return, sends its segment with its own sequence
number as well as the acknowledgement sequence, which is
one more than the client sequence number.
• When the client receives the acknowledgment of its segment,
then it sends the acknowledgment to the server.
• In this way, the connection is established between the client and
the server.
Advantages of TCP
• It provides a connection-oriented reliable service, which means
that it guarantees the delivery of data packets. If the data
packet is lost across the network, then the TCP will resend the
lost packets.
• It provides a flow control mechanism using a sliding window
protocol.
• It provides error detection by using checksum and error control
by using Go Back or ARP protocol.
• It eliminates the congestion by using a network congestion
avoidance algorithm that includes various schemes such as
additive increase/multiplicative decrease (AIMD), slow start, and
congestion window.
Disadvantage of TCP
• It increases a large amount of overhead as each segment gets
its own TCP header, so fragmentation by the router increases
the overhead.
TCP Header Format
TCP Header Fields
• Source port: It defines the port of the application, which is
sending the data. So, this field contains the source port
address, which is 16 bits.
• Destination port: It defines the port of the application on the
receiving side. So, this field contains the destination port
address, which is 16 bits.
• Sequence number: This field contains the sequence number of
data bytes in a particular session.
TCP Header Fields
• Acknowledgment number: When the ACK flag is set, then this
contains the next sequence number of the data byte and works
as an acknowledgment for the previous data received. For
example, if the receiver receives the segment number 'x', then it
responds 'x+1' as an acknowledgment number.
• HLEN: It specifies the length of the header indicated by the 4-
byte words in the header. The size of the header lies between
20 and 60 bytes. Therefore, the value of this field would lie
between 5 and 15.
• Reserved: It is a 4-bit field reserved for future use, and by
default, all are set to zero.
Flags
There are six control bits or flags:
• URG: It represents an urgent pointer. If it is set, then the data is
processed urgently.
• ACK: If the ACK is set to 0, then it means that the data packet does
not contain an acknowledgment.
• PSH: If this field is set, then it requests the receiving device to push
the data to the receiving application without buffering it.
• RST: If it is set, then it requests to restart a connection.
• SYN: It is used to establish a connection between the hosts.
• FIN: It is used to release a connection, and no further data exchange
will happen.
TCP Header Fields
• Window size
• It is a 16-bit field. It contains the size of data that the receiver can accept. This field is
used for the flow control between the sender and receiver and also determines the
amount of buffer allocated by the receiver for a segment. The value of this field is
determined by the receiver.
• Checksum
• It is a 16-bit field. This field is optional in UDP, but in the case of TCP/IP, this field is
mandatory.
TCP Header Fields
• Urgent pointer
• It is a pointer that points to the urgent data byte if the URG flag is set to 1. It
defines a value that will be added to the sequence number to get the
sequence number of the last urgent byte.
• Options
• It provides additional options. The optional field is represented in 32-bits. If
this field contains the data less than 32-bit, then padding is required to obtain
the remaining bits.
THANK YOU!!!

More Related Content

Similar to Transmission Control Protocol_ Computer Networks

REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesRhydham Joshi
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layerjamunaashok
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
Computer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptxComputer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptxpallavir61
 
TRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxTRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxutkarshlodhi4
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxAnkitKumar891632
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocolSundra Anand
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxDESTROYER39
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxsarosh32
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
Transmission control protocol ...............................
Transmission control protocol ...............................Transmission control protocol ...............................
Transmission control protocol ...............................SwatiHans10
 

Similar to Transmission Control Protocol_ Computer Networks (20)

REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
 
Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Computer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptxComputer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptx
 
Tcp
TcpTcp
Tcp
 
TRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxTRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptx
 
lecturer3.pptx
lecturer3.pptxlecturer3.pptx
lecturer3.pptx
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptx
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
TCP/IP & UDP
TCP/IP & UDPTCP/IP & UDP
TCP/IP & UDP
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Working of TCP
Working of TCP Working of TCP
Working of TCP
 
Transmission control protocol ...............................
Transmission control protocol ...............................Transmission control protocol ...............................
Transmission control protocol ...............................
 

More from Manimaran A

2 Data Transmission Concepts and Terminology.ppt
2 Data Transmission Concepts and Terminology.ppt2 Data Transmission Concepts and Terminology.ppt
2 Data Transmission Concepts and Terminology.pptManimaran A
 
1Bit and Byte Stuffing computer networks
1Bit and Byte Stuffing computer networks1Bit and Byte Stuffing computer networks
1Bit and Byte Stuffing computer networksManimaran A
 
Dictionaries and Tolerant Retrieval.ppt
Dictionaries and Tolerant Retrieval.pptDictionaries and Tolerant Retrieval.ppt
Dictionaries and Tolerant Retrieval.pptManimaran A
 
History of Data Visualization
History of Data VisualizationHistory of Data Visualization
History of Data VisualizationManimaran A
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...Manimaran A
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 

More from Manimaran A (9)

2 Data Transmission Concepts and Terminology.ppt
2 Data Transmission Concepts and Terminology.ppt2 Data Transmission Concepts and Terminology.ppt
2 Data Transmission Concepts and Terminology.ppt
 
1Bit and Byte Stuffing computer networks
1Bit and Byte Stuffing computer networks1Bit and Byte Stuffing computer networks
1Bit and Byte Stuffing computer networks
 
Dictionaries and Tolerant Retrieval.ppt
Dictionaries and Tolerant Retrieval.pptDictionaries and Tolerant Retrieval.ppt
Dictionaries and Tolerant Retrieval.ppt
 
Day-2.pptx
Day-2.pptxDay-2.pptx
Day-2.pptx
 
Day-4.pptx
Day-4.pptxDay-4.pptx
Day-4.pptx
 
Day - 6.pptx
Day - 6.pptxDay - 6.pptx
Day - 6.pptx
 
History of Data Visualization
History of Data VisualizationHistory of Data Visualization
History of Data Visualization
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 

Recently uploaded

Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationEmaan Sharma
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.benjamincojr
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdfKamal Acharya
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Toolssoginsider
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New HorizonMorshed Ahmed Rahath
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailingAshishSingh1301
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 

Recently uploaded (20)

Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 

Transmission Control Protocol_ Computer Networks

  • 2. Introduction • TCP stands for Transmission Control Protocol. • It is a transport layer protocol that facilitates the transmission of packets from source to destination. • It is a connection-oriented protocol that means it establishes the connection prior to the communication that occurs between the computing devices in a network.
  • 3. Introduction • The main functionality of the TCP is to take the data from the application layer. • Then it divides the data into a several packets, provides numbering to these packets, and finally transmits these packets to the destination. • The TCP, on the other side, will reassemble the packets and transmits them to the application layer.
  • 4. Features of TCP protocol • Reliable • TCP is a reliable protocol as it follows the flow and error control mechanism. • It also supports the acknowledgment mechanism, which checks the state and sound arrival of the data. • In the acknowledgment mechanism, the receiver sends either positive or negative acknowledgment to the sender so that the sender can get to know whether the data packet has been received or needs to
  • 5. Features of TCP protocol • Order of the data is maintained • This protocol ensures that the data reaches the intended receiver in the same order in which it is sent. • It orders and numbers each segment so that the TCP layer on the destination side can reassemble them based on their ordering. • Connection-oriented • It is a connection-oriented service that means the data exchange occurs only after the connection establishment. • When the data transfer is completed, then the connection will get terminated.
  • 6. Features of TCP protocol • Full duplex • It is a full-duplex means that the data can transfer in both directions at the same time. • Stream-oriented • TCP is a stream-oriented protocol as it allows the sender to send the data in the form of a stream of bytes and also allows the receiver to accept the data in the form of a stream of bytes. • TCP creates an environment in which both the sender and receiver are connected by an imaginary tube known as a virtual circuit. • This virtual circuit carries the stream of bytes across the internet.
  • 7. Working of TCP • In TCP, the connection is established by using three-way handshaking. The client sends the segment with its sequence number. • The server, in return, sends its segment with its own sequence number as well as the acknowledgement sequence, which is one more than the client sequence number. • When the client receives the acknowledgment of its segment, then it sends the acknowledgment to the server. • In this way, the connection is established between the client and the server.
  • 8.
  • 9. Advantages of TCP • It provides a connection-oriented reliable service, which means that it guarantees the delivery of data packets. If the data packet is lost across the network, then the TCP will resend the lost packets. • It provides a flow control mechanism using a sliding window protocol. • It provides error detection by using checksum and error control by using Go Back or ARP protocol. • It eliminates the congestion by using a network congestion avoidance algorithm that includes various schemes such as additive increase/multiplicative decrease (AIMD), slow start, and congestion window.
  • 10. Disadvantage of TCP • It increases a large amount of overhead as each segment gets its own TCP header, so fragmentation by the router increases the overhead.
  • 12. TCP Header Fields • Source port: It defines the port of the application, which is sending the data. So, this field contains the source port address, which is 16 bits. • Destination port: It defines the port of the application on the receiving side. So, this field contains the destination port address, which is 16 bits. • Sequence number: This field contains the sequence number of data bytes in a particular session.
  • 13. TCP Header Fields • Acknowledgment number: When the ACK flag is set, then this contains the next sequence number of the data byte and works as an acknowledgment for the previous data received. For example, if the receiver receives the segment number 'x', then it responds 'x+1' as an acknowledgment number. • HLEN: It specifies the length of the header indicated by the 4- byte words in the header. The size of the header lies between 20 and 60 bytes. Therefore, the value of this field would lie between 5 and 15. • Reserved: It is a 4-bit field reserved for future use, and by default, all are set to zero.
  • 14. Flags There are six control bits or flags: • URG: It represents an urgent pointer. If it is set, then the data is processed urgently. • ACK: If the ACK is set to 0, then it means that the data packet does not contain an acknowledgment. • PSH: If this field is set, then it requests the receiving device to push the data to the receiving application without buffering it. • RST: If it is set, then it requests to restart a connection. • SYN: It is used to establish a connection between the hosts. • FIN: It is used to release a connection, and no further data exchange will happen.
  • 15. TCP Header Fields • Window size • It is a 16-bit field. It contains the size of data that the receiver can accept. This field is used for the flow control between the sender and receiver and also determines the amount of buffer allocated by the receiver for a segment. The value of this field is determined by the receiver. • Checksum • It is a 16-bit field. This field is optional in UDP, but in the case of TCP/IP, this field is mandatory.
  • 16. TCP Header Fields • Urgent pointer • It is a pointer that points to the urgent data byte if the URG flag is set to 1. It defines a value that will be added to the sequence number to get the sequence number of the last urgent byte. • Options • It provides additional options. The optional field is represented in 32-bits. If this field contains the data less than 32-bit, then padding is required to obtain the remaining bits.