Visualization of Three Way Handshake Mechanism of TCP/IP
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
The three way hand shake in transmission control protocol (also called the three message hand shake) is the method used to establish and tear down network connections. These hand shaking technique is referred to as the three way hand shake or as “SYN-SYN-ACK”(or more accurately SYN,SYN-ACK,ACK).The Transmission Control Protocol(TCP) hand shaking mechanism is designed so that two computers attempting to communicate can negotiate the parameters of the network connection before beginning communication. This process is also designed so that both ends can initiate and negotiate separate connections at the same time. This three way handshake is implemented in Computer Graphics using OpenGL by using Microsoft Visual Studio 2008.
Authors and Affiliations
Usha Rani J, Madhu M Nayak, Anandhi G
Identification of Stargardt Disease by Comparing with the Healthy Eye
Stargardt’s disease / Fundus Flavimaculatus (STGD/FF) is a yellow-white spot forms on the outer layer of retina. Which affects RPE Cells (Retinal Pigment Epithelium). Photoreceptor digesion-when light falls on photorece...
Swelling Properties of Fly Ash Mixed with Bentonite
The present study has been carried out to find out the swelling properties of fly ash and bentonite mixtures. Laboratory tests were conducted at different proportions of fly ash and bentonite. Fly ash is a naturally cem...
Introduction To Artificial intelligence
Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing syst...
Short Range Inter Vehicle Communication, Sharing Information Using DSRC
Vehicular communication systems are a type of network in which the vehicles are the communicating nodes, providing each other with information, such as safety warnings and traffic information. As a cooperative approach,...
Analysis of Routing Protocols in MANET
Mobile Ad hoc Networks (MANET) use anonymous routing protocols that hide node identities and routes from outside observers in order to provide anonymity protection. Existing anonymous routing protocols relay on hop by h...