preview

Unit 1 Assignment

Decent Essays

ASSIGNMENT-2
Chapter 3:

1. The TCP connection segment from Port A to Port B has a source port number of x and a port destination number of y. What would the source and destination port numbers be for segments going from Port B to A?
Ans: The source and destination port numbers for segments going from Port B to A will be ‘y’ the source port number and destination port number is ‘x’.

2. When would an application developer want to use UDP over TCP? [explain why UDP provides what is needed]
Ans: The TCP’s congestion control is not used by application developer for its application because it can choke the applications sending rate at times of congestion control. To avoid the TCP’s congestion control usually IP …show more content…

Why is it that voice and video traffic sometimes have to be sent over TCP?
Ans: The voice and video traffic is send over TCP sometimes because it allows the traffic though the firewalls. If its send over UDP, most firewalls are configured to block the UDP traffic.

4. In reliable data protocols, why do you need sequence numbers and timers?
Ans: Sequence numbers are necessary for a receiver to find out whether an entering packet has new data or it is a retransmission in reliable data protocol.
If within the timer duration if ACK is not received for a transmitted packet, the packet or its ACK is assumed to be lost and hence the retransmission of packets takes place. To handle these losses in the channel we use timers.

5. UDP and TCP use checksums. What would the checksum be for the following 3- 8 bit words [instead of 16 bits]? 01010011 01100110 01110100 (show all steps of your work) Is it possible for a 1-bit error to go undetected? How about a 2-bit error?
Ans: The checksum is as follows If there is over flow we wrap 0 1 0 1 0 0 1 1 0 1 1 0 0 1 1 0 …show more content…

To find the errors, receiver will add the four words (the three original words and the checksum). If the sum contains a zero, the receiver knows that there is an error. We can detect all one bit errors , but two-bit errors cannot be detected (e.g., if the last digit of the first word is converted to a 0 and the last digit of the second word is converted to a 1).

6. Describe how TCP flow control would solve the problem of a Host sending data at a much higher rate than the receiving host can read data out of it’s buffers?
Ans: The flow control is provided by TCP as it has the sender which maintains a variable called the receive window. The sender gets an idea of how much free space a buffer has at the receiver with the help of receive window. As TCP is full duplex, sender maintains a discrete receive window at each side of the connection.

7. How is congestion control different than flow

Get Access