{"id":135,"date":"2016-02-03T16:07:14","date_gmt":"2016-02-03T10:37:14","guid":{"rendered":"https:\/\/www.networkbulls.com\/blog\/?p=135"},"modified":"2025-11-07T14:30:15","modified_gmt":"2025-11-07T09:00:15","slug":"understanding-4th-layer-of-osi-model-transport-layer","status":"publish","type":"post","link":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/","title":{"rendered":"Understanding 4th Layer of OSI Model &#8211; Transport Layer"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Transport Layer<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Introduction to Transport Layer<\/strong><\/h2>\n\n\n\n<p>The Transmission Control Protocol (TCP) standard is defined in the Request For Comment (RFC) standards document number 793 [10] by the Internet Engineering Task Force (IETF). The original specification written in 1981 was based on earlier research and experimentation in the original ARPANET.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The fourth and \u201cmiddle\u201d layer of the OSI Reference Model protocol stack is the transport layer, that does not actually transport data, despite its name but ensures that messages are delivered error-free, in sequence, and with no losses or duplications.<\/li>\n<\/ul>\n\n\n\n<p>Transport layer communication falls under two categories:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Connection-oriented<\/strong>\u00a0\u2013 requires that a connection with specific agreed-upon parameters be established before data is sent.<\/li>\n\n\n\n<li><strong>Connectionless<\/strong>\u2013 requires no connection before data is sent<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Transport Layer Functions&nbsp;<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Process-Level Addressing<\/td><td>Transport-layer process-level addressing is the TCP and UDP port mechanism used in TCP\/IP, which allows applications to be individually referenced on any TCP\/IP device.<\/td><\/tr><tr><td>Multiplexing and Demultiplexing<\/td><td>Transport layer protocols on a sending device multiplex the data received from many application programs for transport, combining them into a single stream of data to be sent.<\/td><\/tr><tr><td>Segmentation, Packaging and Reassembly<\/td><td>The transport layer segment the large amounts of data it sends over the network into smaller pieces on the source machine and then reassemble them on the destination machine.<\/td><\/tr><tr><td>Connection Establishment, Management, and Termination<\/td><td>Transport layer connection-oriented protocols are responsible for the series of communications required to establish a connection, maintain it as data is sent over it, and then terminate the connection when it is no longer required.<\/td><\/tr><tr><td>Acknowledgments and Retransmissions<\/td><td>provide guarantee reliable delivery of data using most commonly the combination of acknowledgments and retransmission timers.<\/td><\/tr><tr><td>Flow Control<\/td><td>This features allow one device in a communication to specify to another that it must &#8220;throttle back&#8221; the rate at which it is sending data, to avoid bogging down the receiver with data. These allow mismatches in speed between sender and receiver to be detected and dealt with.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><strong>Major protocols of Transport Layer<\/strong><\/h2>\n\n\n\n<p>As I mentioned above Transport layer is a layer which actually does not sent data but only prepares for transport. So for the same purposes, this layer uses two major protocols&nbsp;<strong>TCP &amp; UDP.&nbsp;<\/strong><strong>&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>TCP (Transmission control protocol)<\/strong><\/p>\n\n\n\n<p>TCP is often described as a byte stream, connection-oriented, reliable delivery transport layer protocol. &nbsp;<\/p>\n\n\n\n<p><strong>UDP (User Datagram Protocols)<\/strong>&nbsp;.<\/p>\n\n\n\n<p>UDP is basically an application interface to IP. It adds no reliability, flow control, or error recovery to IP. It simply serves as a multiplexer\/DE-multiplexer for sending and receiving datagrams, using ports to direct the datagrams &nbsp; &nbsp;<\/p>\n\n\n\n<p><strong>Ports and sockets<\/strong><\/p>\n\n\n\n<p>These are needed to determine which local process at a given host actually communicates with which process, at which remote host, using which protocol. Consider the following example: &nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An application process is assigned a process identifier number (process ID), which is likely to be different each time that process is started.<\/li>\n\n\n\n<li>Process IDs differ between operating system platforms. Hence, they are not uniform.<\/li>\n\n\n\n<li>A server process can have multiple connections to multiple clients at a time, hence simple connection identifiers would not be unique.<\/li>\n<\/ul>\n\n\n\n<p>&nbsp; The concept of ports and sockets provides a way to uniformly and uniquely identify connections and the programs and hosts that are engaged in them, irrespective of specific process IDs. &nbsp;<\/p>\n\n\n\n<p><strong>Ports<\/strong><\/p>\n\n\n\n<p>A port is a 16-bit number, used by the host-to-host protocol to identify to which higher level protocol or application program (process) it must deliver incoming messages. There are two types of port: &nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Well-known:<\/strong>\u00a0Well-known ports belong to standard servers, for example, Telnet uses port 23. Well-known port numbers range between 1 and 1023.<\/li>\n<\/ul>\n\n\n\n<p>The well-known ports are controlled and assigned by the Internet Assigned Number Authority (IANA).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ephemeral:<\/strong>\u00a0Ephemeral port numbers have values greater than 1023, normally in the range 1024 to 65535. A client can use any number allocated to it, as long as the combination of is unique.<\/li>\n<\/ul>\n\n\n\n<p>Ephemeral ports are not controlled by IANA and can be used by ordinary user-developed programs on most systems. &nbsp;<\/p>\n\n\n\n<p><strong>Sockets<\/strong><\/p>\n\n\n\n<p>Sockets are the door between Transport and Application Layer. The socket interface is one of several application programming interfaces (APIs) to the communication protocols. These are simply a combination of transport layer protocol, ip address&amp; port number.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A socket is a special type of file handle, which is used by a process to request network services from the operating system.<\/li>\n\n\n\n<li>A socket address is a triple:<\/li>\n<\/ul>\n\n\n\n<p>For example, in the TCP\/IP suite:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An association is the 5-tuple that completely specifies the two processes that comprise a connection:<\/li>\n<\/ul>\n\n\n\n<p>In the TCP\/IP suite, the following could be a valid association:<\/p>\n\n\n\n<p>Note: &#8211; By typing&nbsp;<strong>netstat<\/strong>&nbsp;at a Windows Command prompt you can see the connections your computer has. &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Multiplexing and De-Multiplexing by Transport Layer<\/strong><\/h3>\n\n\n\n<p>Multiplexing and De-multiplexing are the two very important functions that are performed by Transport Layer.<\/p>\n\n\n\n<p>Transport layer at the sender side receives data from different Applications, encapsulates every packet with a Transport Layer header and pass it on to the underlying Network Layer. This job of the transport layer is known as&nbsp;<strong>Multiplexing.<\/strong><\/p>\n\n\n\n<p>At the receiver&#8217;s side, the transport gathers the data, examines its socket and passes the data to the correct Application. This is known as&nbsp;<strong>De-Multiplexing<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Segmentation, Packaging and Reassembly &#8211; Transport Layer<\/strong><\/h3>\n\n\n\n<p><strong>SEGMENTATION<\/strong><\/p>\n\n\n\n<p>Segmentation is the process of breaking up information into smaller pieces also refers to what it calls &#8216;data streams&#8217;.<\/p>\n\n\n\n<p>Chopping the data into segments has several advantages. Once segmented, the segments are referred to individually as protocol data units. These PDU&#8217;s are encapsulated into packets. Packets can be sent along more than one path to the destination. This increases both the reliability, and the speed at which data can travel across a network.<\/p>\n\n\n\n<p><strong>SEQUENCING<\/strong><\/p>\n\n\n\n<p>TCP packages the data as segments and assigns a sequence number to each segment. It allows the receiving host to reassemble the data from multiple segments in the correct order, upon arrival.<\/p>\n\n\n\n<p><strong>REASSEMBLY<\/strong><\/p>\n\n\n\n<p>Reassembly is the reverse of segmentation. Protocol Data Units are put back together in the correct order to reassemble a stream of data in its original form. &nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">&nbsp;<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>TCP Connection Establishment and Termination<\/strong><\/h4>\n\n\n\n<p>When two hosts communicate using TCP, a connection is established before data can be exchanged. This is handled by the process called a Three-way handshaking method.<\/p>\n\n\n\n<p>The Three-way handshake begins with the initiator sending a TCP segment with the SYN control bit flag set.<\/p>\n\n\n\n<p>TCP identifies two types of OPEN calls:<\/p>\n\n\n\n<p>Active&nbsp;OpenIn an Active Open call a device (client process) using TCP takes the active role and initiates the connection by sending a TCP SYN message to start the connection.<\/p>\n\n\n\n<p>Passive Open&nbsp;A passive OPEN can specify that the device (server process) is waiting for an active OPEN from a specific client. It does not generate any TCP message segment. The server processes listening for the clients are in Passive Open mode.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/newblog.networkbulls.in\/assets\/filemanager\/\/NB\/pics\/blog3.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>&nbsp;<strong>Step 1.<\/strong>&nbsp;Client PC sends a TCP segment with SYN = 1, ACK = 0, ISN (Initial Sequence Number) = 1000.<\/p>\n\n\n\n<p>(Note: -An32bit Initial Sequence Number (ISN) is a random Sequence Number, allocated for the first packet in a new TCP connection.)<\/p>\n\n\n\n<p>The Active Open device (Client PC) sends a segment with the SYN flag set to 1, ACK flag set to 0 and an Initial Sequence Number 1000 (For Example), which marks the beginning of the sequence numbers for data that Client PC will transmit. SYN flag announces an attempt to open a connection.<\/p>\n\n\n\n<p><strong>Step 2.<\/strong>Server receives Client PC\u2019s TCP segment and returns a TCP segment with SYN = 1, ACK = 1, ISN = 2000 (Server Initial Sequence Number), Acknowledgment Number = 2001 (2000 + 1, the next sequence number Server expecting from Client PC).<\/p>\n\n\n\n<p><strong>Step 3.<\/strong>&nbsp;Client PC sends a TCP segment to Server that acknowledges receipt of ServerISN, With flags set as SYN = 0, ACK = 1, Sequence number = 1002, Acknowledgment number = 2001 (2000 + 1, the next sequence number Client PC expecting from Server)<\/p>\n\n\n\n<p>After the Three-way handshake, the connection is open and the participant computers start sending data using the agreed sequence and acknowledge numbers.<strong>&nbsp;<\/strong>&nbsp;<strong>&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>Connection Termination<\/strong><\/p>\n\n\n\n<p>Connection Termination is a Four step process or also called as Four-way Hand-shaking.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.networkbulls.com\/blog\/assets\/upload\/uploads\/2016\/01\/blog3.1.png\"><img decoding=\"async\" src=\"https:\/\/www.networkbulls.com\/blog\/assets\/upload\/uploads\/2016\/01\/blog3.1.png\" alt=\"blog3.1\"\/><\/a><\/figure>\n\n\n\n<p>The four steps are as follows,<\/p>\n\n\n\n<p>The PC1 TCP sends the FIN segment first, ISN=1000(for example).<\/p>\n\n\n\n<p>The PC2 TCP sends the ACK segment to confirm the receipt of the FIN from the client.&nbsp; It increments the sequence number of FIN by 1 and no other user data will add with the ACK segment, ACK=1001.<\/p>\n\n\n\n<p>PC2 does not have any data for transmission, and then it sends the FIN segment to PC1, ISN=1470.<\/p>\n\n\n\n<p>Then PC1 sends the ACK segment again to the server side, ACK=1471. The connection termination fulfilled.<\/p>\n\n\n\n<p><strong>Acknowledgments and Retransmissions<\/strong><\/p>\n\n\n\n<p><strong>Retransmissions.<\/strong>&nbsp;In order to guarantee delivery of data, TCP must implement retransmission schemes for data that may be lost or damaged. To ensure reliable delivery of data and retransmission of segments, TCP uses different types of acknowledgments.<\/p>\n\n\n\n<p><strong>Acknowledgements.<\/strong>&nbsp;This is the process used by TCP communication through which sender ensures that data is transmitted successfully at the receiver end or lost. Some types of acknowledgments used by TCP are as follows:-<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Positive Ack<\/td><td>The receiver explicitly notifies the sender which packets, messages or segments were received correctly also implicitly informs the sender which packets were not received and provides detail on packets which need to be retransmitted.<\/td><\/tr><tr><td>Negative Ack (NACK)<\/td><td>the receiver explicitly notifies the sender which packets, messages, or segments were received incorrectly and thus may need to be retransmitted.<\/td><\/tr><tr><td>Selective Ack (SACK)<\/td><td>the receiver explicitly lists which packets, messages, or segments in a stream are acknowledged (either negatively or positively) useful in Satellite Internet access.<\/td><\/tr><tr><td>Cumulative Ack<\/td><td>The receiver acknowledges that it correctly received a packet, message, or segment in a stream which implicitly informs the sender that the previous packets were received correctly. TCP uses cumulative acknowledgment with its TCP sliding window.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Flow Control<\/strong><\/p>\n\n\n\n<p><strong>Flow&nbsp;<\/strong>control is a mechanism through which transport layer can handle problems like the rate of data transmission, buffer full (a drop of segments) &amp; congestion control etc. for the same purposes it utilizes the method called window sliding protocol.<\/p>\n\n\n\n<p>This window mechanism ensures:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reliable transmission.<\/li>\n\n\n\n<li>Better use of the network bandwidth (better throughput).<\/li>\n\n\n\n<li>Flow-control, since the receiver may delay replying to a packet with an acknowledgment,<\/li>\n<\/ul>\n\n\n\n<p>Knowing its free buffers are available and the window-size of the communication. &nbsp;<\/p>\n\n\n\n<p>Transport Layer is 4th Layer and one of the most important and confusing layer of OSI Model and of&#8217;course if you are preparing for CCNA Certification exam, you can not pass it if basic concepts of OSI Model are not clear to you. If you are looking for&nbsp;<a href=\"http:\/\/www.networkbulls.com\/training-ccna-course-delhi\" target=\"_blank\" rel=\"noreferrer noopener\">Best Institute for CCNA course in India<\/a>, then your search should end here. Go to Network Bulls&#8217; website and see how it is different from other training institutes worldwide.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Transport Layer Introduction to Transport Layer The Transmission Control Protocol (TCP) standard is defined in the Request For Comment (RFC) standards document number 793 [10] by the Internet Engineering Task Force (IETF). The original specification written in 1981 was based on earlier research and experimentation in the original ARPANET. Transport layer communication falls under two [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":145,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-135","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networking-basics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding 4th Layer of OSI Model - Transport Layer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding 4th Layer of OSI Model - Transport Layer\" \/>\n<meta property=\"og:description\" content=\"Transport Layer Introduction to Transport Layer The Transmission Control Protocol (TCP) standard is defined in the Request For Comment (RFC) standards document number 793 [10] by the Internet Engineering Task Force (IETF). The original specification written in 1981 was based on earlier research and experimentation in the original ARPANET. Transport layer communication falls under two [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/\" \/>\n<meta property=\"og:site_name\" content=\"NB Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/networkbullsindia\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-03T10:37:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-07T09:00:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/11\/Understanding-4th-Layer-of-OSI-Model-Transport-Layer.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"830\" \/>\n\t<meta property=\"og:image:height\" content=\"470\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Network Bulls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Network Bulls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/\"},\"author\":{\"name\":\"Network Bulls\",\"@id\":\"https:\/\/www.networkbulls.com\/blog\/#\/schema\/person\/44c2a151f6a704de20bab335454e6073\"},\"headline\":\"Understanding 4th Layer of OSI Model &#8211; Transport Layer\",\"datePublished\":\"2016-02-03T10:37:14+00:00\",\"dateModified\":\"2025-11-07T09:00:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/\"},\"wordCount\":1803,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.networkbulls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/11\/Understanding-4th-Layer-of-OSI-Model-Transport-Layer.jpeg\",\"articleSection\":[\"Networking Basics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/\",\"url\":\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/\",\"name\":\"Understanding 4th Layer of OSI Model - Transport Layer\",\"isPartOf\":{\"@id\":\"https:\/\/www.networkbulls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/11\/Understanding-4th-Layer-of-OSI-Model-Transport-Layer.jpeg\",\"datePublished\":\"2016-02-03T10:37:14+00:00\",\"dateModified\":\"2025-11-07T09:00:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#primaryimage\",\"url\":\"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/11\/Understanding-4th-Layer-of-OSI-Model-Transport-Layer.jpeg\",\"contentUrl\":\"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/11\/Understanding-4th-Layer-of-OSI-Model-Transport-Layer.jpeg\",\"width\":830,\"height\":470,\"caption\":\"Understanding-4th-Layer-of-OSI-Model-Transport-Layer\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.networkbulls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding 4th Layer of OSI Model &#8211; Transport Layer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.networkbulls.com\/blog\/#website\",\"url\":\"https:\/\/www.networkbulls.com\/blog\/\",\"name\":\"NB Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.networkbulls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.networkbulls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.networkbulls.com\/blog\/#organization\",\"name\":\"Network Bullstudy Private Limited\",\"url\":\"https:\/\/www.networkbulls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.networkbulls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/12\/cropped-NB-small-logo.jpeg\",\"contentUrl\":\"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/12\/cropped-NB-small-logo.jpeg\",\"width\":512,\"height\":512,\"caption\":\"Network Bullstudy Private Limited\"},\"image\":{\"@id\":\"https:\/\/www.networkbulls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/networkbullsindia\",\"https:\/\/www.instagram.com\/networkbulls.gurgaon\",\"https:\/\/www.linkedin.com\/company\/network-bulls\",\"https:\/\/www.youtube.com\/user\/NetworkBulls\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.networkbulls.com\/blog\/#\/schema\/person\/44c2a151f6a704de20bab335454e6073\",\"name\":\"Network Bulls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.networkbulls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/76e7f27b74a0376e5099a72d5e301d27d9777ec9b63b2594f49959ebb26f602f?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/76e7f27b74a0376e5099a72d5e301d27d9777ec9b63b2594f49959ebb26f602f?s=96&d=blank&r=g\",\"caption\":\"Network Bulls\"},\"sameAs\":[\"https:\/\/www.networkbulls.com\/\"],\"url\":\"https:\/\/www.networkbulls.com\/blog\/author\/networkbulls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding 4th Layer of OSI Model - Transport Layer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/","og_locale":"en_US","og_type":"article","og_title":"Understanding 4th Layer of OSI Model - Transport Layer","og_description":"Transport Layer Introduction to Transport Layer The Transmission Control Protocol (TCP) standard is defined in the Request For Comment (RFC) standards document number 793 [10] by the Internet Engineering Task Force (IETF). The original specification written in 1981 was based on earlier research and experimentation in the original ARPANET. Transport layer communication falls under two [&hellip;]","og_url":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/","og_site_name":"NB Blog","article_publisher":"https:\/\/www.facebook.com\/networkbullsindia","article_published_time":"2016-02-03T10:37:14+00:00","article_modified_time":"2025-11-07T09:00:15+00:00","og_image":[{"width":830,"height":470,"url":"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/11\/Understanding-4th-Layer-of-OSI-Model-Transport-Layer.jpeg","type":"image\/jpeg"}],"author":"Network Bulls","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Network Bulls","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#article","isPartOf":{"@id":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/"},"author":{"name":"Network Bulls","@id":"https:\/\/www.networkbulls.com\/blog\/#\/schema\/person\/44c2a151f6a704de20bab335454e6073"},"headline":"Understanding 4th Layer of OSI Model &#8211; Transport Layer","datePublished":"2016-02-03T10:37:14+00:00","dateModified":"2025-11-07T09:00:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/"},"wordCount":1803,"commentCount":0,"publisher":{"@id":"https:\/\/www.networkbulls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/11\/Understanding-4th-Layer-of-OSI-Model-Transport-Layer.jpeg","articleSection":["Networking Basics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/","url":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/","name":"Understanding 4th Layer of OSI Model - Transport Layer","isPartOf":{"@id":"https:\/\/www.networkbulls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#primaryimage"},"image":{"@id":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/11\/Understanding-4th-Layer-of-OSI-Model-Transport-Layer.jpeg","datePublished":"2016-02-03T10:37:14+00:00","dateModified":"2025-11-07T09:00:15+00:00","breadcrumb":{"@id":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#primaryimage","url":"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/11\/Understanding-4th-Layer-of-OSI-Model-Transport-Layer.jpeg","contentUrl":"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/11\/Understanding-4th-Layer-of-OSI-Model-Transport-Layer.jpeg","width":830,"height":470,"caption":"Understanding-4th-Layer-of-OSI-Model-Transport-Layer"},{"@type":"BreadcrumbList","@id":"https:\/\/www.networkbulls.com\/blog\/understanding-4th-layer-of-osi-model-transport-layer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.networkbulls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding 4th Layer of OSI Model &#8211; Transport Layer"}]},{"@type":"WebSite","@id":"https:\/\/www.networkbulls.com\/blog\/#website","url":"https:\/\/www.networkbulls.com\/blog\/","name":"NB Blog","description":"","publisher":{"@id":"https:\/\/www.networkbulls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.networkbulls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.networkbulls.com\/blog\/#organization","name":"Network Bullstudy Private Limited","url":"https:\/\/www.networkbulls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.networkbulls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/12\/cropped-NB-small-logo.jpeg","contentUrl":"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/12\/cropped-NB-small-logo.jpeg","width":512,"height":512,"caption":"Network Bullstudy Private Limited"},"image":{"@id":"https:\/\/www.networkbulls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/networkbullsindia","https:\/\/www.instagram.com\/networkbulls.gurgaon","https:\/\/www.linkedin.com\/company\/network-bulls","https:\/\/www.youtube.com\/user\/NetworkBulls"]},{"@type":"Person","@id":"https:\/\/www.networkbulls.com\/blog\/#\/schema\/person\/44c2a151f6a704de20bab335454e6073","name":"Network Bulls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.networkbulls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/76e7f27b74a0376e5099a72d5e301d27d9777ec9b63b2594f49959ebb26f602f?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/76e7f27b74a0376e5099a72d5e301d27d9777ec9b63b2594f49959ebb26f602f?s=96&d=blank&r=g","caption":"Network Bulls"},"sameAs":["https:\/\/www.networkbulls.com\/"],"url":"https:\/\/www.networkbulls.com\/blog\/author\/networkbulls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.networkbulls.com\/blog\/wp-json\/wp\/v2\/posts\/135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.networkbulls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.networkbulls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.networkbulls.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.networkbulls.com\/blog\/wp-json\/wp\/v2\/comments?post=135"}],"version-history":[{"count":1,"href":"https:\/\/www.networkbulls.com\/blog\/wp-json\/wp\/v2\/posts\/135\/revisions"}],"predecessor-version":[{"id":146,"href":"https:\/\/www.networkbulls.com\/blog\/wp-json\/wp\/v2\/posts\/135\/revisions\/146"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.networkbulls.com\/blog\/wp-json\/wp\/v2\/media\/145"}],"wp:attachment":[{"href":"https:\/\/www.networkbulls.com\/blog\/wp-json\/wp\/v2\/media?parent=135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.networkbulls.com\/blog\/wp-json\/wp\/v2\/categories?post=135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.networkbulls.com\/blog\/wp-json\/wp\/v2\/tags?post=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}