Transport Layer Protocols And Services

InamUllah Khan, Muhammad Abul Hassan


This paper includes a brief survey on Transport Layer Protocols like User Datagram Protocol (UDP), Transmission ControlProtocol (TCP) and Stream Control Transmission Protocol (SCTP). It also includes Port Addressing. This paper lists out features and services, problems and comparison of these protocols.


MehrnoushRahmani, Andrea Pettiti, Ernst Biersack, Eckehard Steinbach, Joachim Hillebrand 2008.“A Comparative study of network transport protocols for invehicle media streaming”, BMW Group Research and Technology, Munich, Germany.

Hafiz Muhammad Omer Chughtai, Shahzad A. Malik, Muhammad Yousaf, “Performance Evaluation of Transport Layer Protocols for Video Traffic over WiMax”, COMSATS Institute of Information Technology, Islamabad, Pakistan. Available:

Manfred Georg 2006. “A Survey of TCP Optimizations for Wireless Channels”,

A. S. Tanenbaum 2003. “Computer Networks”, fourth edition Prentice Hall PTR.

SirishaMedidi, Jin Ding, and MuraliMedidi 2002. “Performance of Transport Protocols in Wireless Networks”, School of Electrical Engineering and Computer Science, Washington State University, Pullman.

SaimaZafar 2011. “A Survey of Transport Layer Protocols for Wireless Sensor Networks”. [7] Behrouz A. Forouzan 2003. “Data Communications and Networking”, 2nd Edition.McGraw hill. “Transport Layer”, WIKIPEDIA. [9] “TCP vs UDP-Difference and comparison. [10] Postel J. 1981. “Transmission control protocol”, RFC 793, DARPA internet program, protocol specification.

Postel J. 1980. “User datagram Protocol”, 768, USC/Information Sciences Institute.

KusumDalal, PrachiChaudhary, Dr. PawanDahiya 2011. “Performance Evaluation of TCP and UDP Protocols in VANET Scenarios using NCTUns-6.0 Simulation Tool”, Murthal, Haryana, Volume 36– No.6.

Frank Aune 2004. “Cross-Layer Design Tutorial”, Norwegian University of Science and Technology, Dept. of Electronics and Telecommunications, Trondheim, Norway.

J. Mahdavi and S. Floyd 1999.“Tcp-friendly".

VikasKawadia 2004. “Protocols and architecture for wireless Adhoc networks”, Department of Electrical and Computer Engineering, University of Illinois at UrbanaChampaign. CPIPTutorial.pdf .TCP/IP protocol suite, tutorial., “User datagram protocol”, WIKIPEDIA. [18] HaitaoZheng, Member, Jill Boyce 2001. “An Improved UDP Protocol for Video Transmission Over Internet-toWireless Networks”. .“Internet protocol suite”, WIKIPEDIA.

Inamullah khan and Muhammad abulhassan,network layer attacks mechanisms in MANETS-A Survey IJRCCT VOl ,ISSUE-6 June 2016

M. A. Jan, P. Nanda and X. He, “Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN,” in Wired/Wireless Internet Communication, Lecture Notes in Computer Science, pp. 154–167, Springer, Berlin, Germany, 2013.

M. A. Jan, P. Nanda, X. He and R. P. Liu, “PASCCC: Priority-based application-specific congestion control clustering protocol” Computer Networks, Vol. 74, PP-92-102, 2014.

M. A. Jan, P. Nanda, M. Usman, and X. He, “PAWN: A Payload-based mutual Authentication scheme for Wireless Sensor Networks,” Concurrency and Computation: Practice and Experience, “accepted”, 2016.

M. A. Jan, P. Nanda, X. He and R. P. Liu, “A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network” in Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015, IEEE.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2012, All rights reserved.|

Creative Commons License
International Journal of Research in Computer and Communication Technology Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJRCCT , Permissions beyond the scope of this license may be available at