Приймаються статті для публікації в № 2 (42)/2022
rn Міжнародного науково-практичного журналу "Товари і ринки" з технічних та економічних наук 

Статті

THE TRANSPORT LAYER OF THE ISO/OSI MODEL IN COM­PUTER NETWORKS

Автор: sveta on . Posted in 2021_04(40)

Cite as APA style citation
Kostjuk Ju., Shestak Ja. Transportnyj riven' modeli ISO/OSI v komp’juternyh merezhah. Mizhnarodnyj naukovo-praktychnyj zhurnal "Tovary i rynky". 2021. № 4. P. 49-58.

FREE FULL TEXT (PDF)

UDC 338.47:004.057.4   DOI: https://doi.org/10.31617/tr.knute.2021(40)05
     
KOSTIUK Yuliia
 
E-mail: kostyuk_yu@knute.edu.ua
ORCID ID: 0000-0001-5423-0985
  Assistant Lecturer at the Department of Software Engineering and Cyber Security,
Kyiv National University of Trade and Economics

19, Kyoto str., Kyiv, 02156, Ukraine
     
SHESTAK Yaroslav
 
E-mail: Ця електронна адреса захищена від спам-ботів. вам потрібно увімкнути JavaScript, щоб побачити її.
ORCID ID: 0000-0002-5102-9642
  sen. Lecturer at the Department of Software Engineering and Cyber Security,
Kyiv National University of Trade and Economics

19, Kyotostr., Kyiv, 02156, Ukraine

THE TRANSPORT LAYER OF THE ISO/OSI MODEL IN COM­PUTER NETWORKS

Background. The transport layer is designed to deliver data without errors, losses and duplication in the order in which they were transmitted. It provides data transfer between two applications with the required level of reliability. Transport layer protocols, which guarantee reliable data delivery, establish a virtual connection before data exchange and resend segments in case of loss or damage.
The aim of the study was to determine the role of transport security protocols in computer networks.
Materials and methods. To achieve the goal, the study used statistical analysis and a systematic approach.
Results. TCP provides reliable message transmission through the formation of logical connections, while allowing peers on the sending computer and the receiving computer to support data exchange in duplex mode. It also has the ability to seamlessly send a byte stream generated on one of the computers to any other computer connected to the network. In addition, TCP controls the connection load, UDP does not control anything but the integrity of the received datagrams.
Conclusion. The difference between TCP and UDP is the so-called "delivery guarantee". TCP requires a response from the client to whom the data packet is delivered, confirmation of delivery, and for this he needs a pre-established connection. TCP is also considered reliable, unlike UDP, which is called "unreliable datagram protocol". TCP eliminates data loss, duplication and shuffling of packets, delays, UDP allows all this, and it does not need a connection to work., as a result of which the data is transferred on UDP, should manage received, even with losses.
Keywords: protocols, transport layer, data, transmission control, communication session, reliable delivery, datagrams.

REFERENCES

  1. Novi komp’juterni zasoby, obchysljuval’ni mashyny ta merezhi [New computer means, computers and networks]. (2001). Zbirnyk naukovyh prac’. Vol. 2. Kyi’v: NANU, Instytut kibernetyky imeni V. M. Glushkova, Naukova rada NAN z problemy "Kibernetyka" [in Ukrainian].
  2. Kuchernjuk, P. V. (2018). Metody i tehnologii’ zahystu komp’juternyh merezh (merezhnyj, transportnyj ta prykladnyj rivni) [Methods and technologies of computer network protection (network, transport and application levels)]. Microsystems, Electron & Acoust, 23, 52-58. Kyi’v: Nacional’nyj tehnichnyj universytet Ukrai’ny "Kyi’vs’kyj politehnichnyj instytut imeni Igorja Sikors’kogo" [in Ukrainian].
  3. Strubyc’kyj, R. P. (2015). Porivnjal’nyj analiz shvydkosti roboty protokoliv garantovanoi’ peredachi danyh, bazovanyh na UDP u mizhkontynental’nij merezhi [Comparative analysis of the speed of UDP-based guaranteed data transmission protocols in the intercontinental network]. Visnyk Hmel’nyc’kogo nacional’nogo universytetu – Bulletin of Khmelnytsky National University, 2, 173-177 [in Ukrainian].
  4. Kumar, S., & Rai, S. (2012). Survey on Transport Layer Protocols: TCP & UDP. International Journal of Computer Applications46 (7), 20-25 [in English].
  5. Tymchenko, O. V., Verhola, B. M., Kyryk, M. I., & Sami, Askar. (2008). Spivvidnoshennja mizh jakistju poslug merezh peredachi danyh i rivnjamy OSI [The correlation between the quality of data network services and OSI levels]. Zbirnyk naukovyh prac’ IPME NAN Ukrai’ny. Issue 49, 150-157. Kyi’v [in Ukrainian].
  6. Thanh, V. T., & Urano, Y. (2010). Mobile TCP socket for secure applications. Advanced Communication Technology (ICACT)The 12th International Conference. (pp. 971-974). Nangang, China [in English].
  7. Hong, R. L. (2011). Research and application of TCP/IP protocol in embedded system. 2011 IEEE 3rd International Conference on Communication Software and Networks. (pp. 584-587) [in English].
  8. Assar, A., & Hofmann, K. (2016). A hardware implementation of the TCP protocol applying TCP-BIC and TCP-CUBIC standards. Microelectronics (ICM). 28th International Conference. (pp. 37-40). Giza, Egypt [in English].
  9. Liu, Q., Zhiqiang, X., & Zhengying, L. (2017). Implementation of hardware TCP/IP stack for DAQ systems with flexible data channel. Electronics Letters. Vol. 53, Issue 8, 530-532 [in English].
  10. Eddy, W. М., & Ishac, J. (2005). Location Management in a Transport Layer, Mobility Architecture. NASA/TM-2005-213844 [in English].
  11. Pavlykevych, M. (2009). Telekomunikacijni merezhi. Ch. 2. Merezhi IR [Telecommunication networks. Part 2. IP networks]. L’viv: Vydavnyctvo nacional’nogo universytetu "L’vivs’ka politehnika" [in Ukrainian].
  12. Jakymenko, I. Z. (2013). Kryterii’ ocinky rivnja zahystu komp’juternyh merezh z vrahuvannjam i’h arhitektury [Criteria for assessing the level of protection of computer networks, taking into account their architecture]. Informatyka ta matematychni metody v modeljuvanni – Informatics and mathematical methods in modeling. Vol. 3, 1, 82-90 [in Ukrainian].
  13. CCNAv7: Introduction to Network. Networking Academiy. Retrieved from https://www.netacad.com/ru/courses/networking/ccna-introduction-networks [in English].
  14. Tymchenko, O. V., Verhola, B. M., & Sami, Askar. (2007). Kryterii’ efektyvnosti funkcionuvannja komp’juternyh merezh. Modeljuvannja ta informacijni tehnologii’ [Criteria for the effectiveness of computer networks. Modeling and information technologies]. Zbirnyk naukovyh prac’ IPME NAN Ukrai’ny. Issue 43, 184-190. Kyi’v [in Ukrainian].
  15. Zajchenko, O. Ju., & Zajchenko, Ju. P. (2010). Komp’juterni merezhi [Computer networks]. Kyi’v: Vydavnychyj dim "Slovo" [in Ukrainian].