ASSIGNMENT-2
Chapter 3:
1. The TCP connection segment from Port A to Port B has a source port number of x and a port destination number of y. What would the source and destination port numbers be for segments going from Port B to A?
Ans: The source and destination port numbers for segments going from Port B to A will be ‘y’ the source port number and destination port number is ‘x’.
2. When would an application developer want to use UDP over TCP? [explain why UDP provides what is needed]
Ans: The TCP’s congestion control is not used by application developer for its application because it can choke the applications sending rate at times of congestion control. To avoid the TCP’s congestion control usually IP
…show more content…
Why is it that voice and video traffic sometimes have to be sent over TCP?
Ans: The voice and video traffic is send over TCP sometimes because it allows the traffic though the firewalls. If its send over UDP, most firewalls are configured to block the UDP traffic.
4. In reliable data protocols, why do you need sequence numbers and timers?
Ans: Sequence numbers are necessary for a receiver to find out whether an entering packet has new data or it is a retransmission in reliable data protocol.
If within the timer duration if ACK is not received for a transmitted packet, the packet or its ACK is assumed to be lost and hence the retransmission of packets takes place. To handle these losses in the channel we use timers.
5. UDP and TCP use checksums. What would the checksum be for the following 3- 8 bit words [instead of 16 bits]? 01010011 01100110 01110100 (show all steps of your work) Is it possible for a 1-bit error to go undetected? How about a 2-bit error?
Ans: The checksum is as follows If there is over flow we wrap 0 1 0 1 0 0 1 1 0 1 1 0 0 1 1 0
…show more content…
To find the errors, receiver will add the four words (the three original words and the checksum). If the sum contains a zero, the receiver knows that there is an error. We can detect all one bit errors , but two-bit errors cannot be detected (e.g., if the last digit of the first word is converted to a 0 and the last digit of the second word is converted to a 1).
6. Describe how TCP flow control would solve the problem of a Host sending data at a much higher rate than the receiving host can read data out of it’s buffers?
Ans: The flow control is provided by TCP as it has the sender which maintains a variable called the receive window. The sender gets an idea of how much free space a buffer has at the receiver with the help of receive window. As TCP is full duplex, sender maintains a discrete receive window at each side of the connection.
7. How is congestion control different than flow
In general, on the internet, every packet follows 5 layers of structures (Application, Transport, Network, Data Link, and Physical). Since I have to talk about Connection-Oriented and Connectionless as a service, I will focus on the Transport layer because they are part of this layer. It allows multiple applications to use one network connection simultaneously, the layer will create ports on your computer allowing them to be reserved and used by the Application layer. Let's say that port 3600 will be used to send a message to port 80 of some other computer, whenever the port is ready to send a message, it passed on to Transport layer. In this layer, it wraps the message inside the Segment which contains some additional
14. Using the terminology introduced in this chapter, think about network topologies. Which of these terms lists a network component that acts the most like a policeman directing traffic in an inter-section by directing the bits through the network?
In reality On the Internet, congestion control is in the responsibility of the transport layer, more precisely of TCP. TCP combines congestion control and reliability mechanisms. This combination allows performing congestion control without the need for explicit feedback about the congestion state of the network, and without direct participation of the intermediate nodes. To detect network congestion, TCP simply observes occurring packet losses. Since on the Internet, missing packets are almost always caused by congestion, a missing packet is interpreted as a sign for network congestion.
TCP/IP stands for transmission control protocol/ internet protocol. TCP/IP is responsible for how devices like computers should be connected over the internet and how data should be transmitted from one computer to another. The IP essentially functions by exchanging set of information which is called packets. Packets are short structures of bytes which contains of headers and body. The body only contains the application data. The headers keep on sending the information back on forth until the data is sent to the right destination, the packets can usually send in the wrong order this means that the data was crashed by the firewall or data was destroyed while sending information.TCP is the transmission communication protocol which delivers packets to the accurate to destination.
Internet Protocol (IP) datagrams may arrive in a seemingly random order of chunks that the receiving IP entity must continuously collect until it can reconstruct the original datagram. Consider that the receiving IP entity possesses a buffer for assembling the original datagram's data field. The buffer will comprise of chunks of data and "holes" between them corresponding to data not yet received.
The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the protocols that are used in it.
UDP uses a simple transmission model without implicit hand-shaking dialogues for providing reliability, ordering, or data integrity. Thus, UDP provides an unreliable service and datagrams may arrive out of order, appear duplicated, or go missing without notice. UDP
The two TCP/IP transport layer protocols (TCP and UDP), are very crucial for the smooth operation of network services for both the computer applications and application layer protocols such as HTTP, FTP, SMTP and Telnet. These two transport layer protocols TCP and UDP execute these services via the employment of IP. They use IP in the efficient routing of packets to their respective destination networks (Steinke,2001).The TCP is further noted by Steinke (2001) to be responsible for the provision of a reliable and yet connection-oriented byte-stream packet delivery while its counterpart UDP is noted to be responsible for the provision of a connectionless but rather unreliable packet delivery. In this paper we explain the work of the two TCP/IP transport layer protocols (TCP and UDP). In addition, describe how TCP and UDP manage key functions such as reliability, port addressing, and segmentation.
Transmission Control Protocols or TCP is among the key methods utilized in Internet Protocol Suites. TCP has got two end systems, a web browser and a web server from which it operates. TCP provides delivery of a stream of bytes from a program on one computer system to another. Internet Protocols operate at a lower level compared to TCP. An IP is used for data transmission across a packet switched internetwork. In X on and X off signals, the X means transmitter. These types of signals are used to manage the movement of data between computer systems on an asynchronous serial connection. In X on, the bit configuration is the keyboard blend of Ctrl-Q and the Ctrl-S combination is for X off. There are two kinds of transmissions, parallel as
Congestion control prevents too much data from being injected into the network, causing links and switches to be overloaded
TRANSPORT LAYER provides the Application layer with session and datagram communication services. TCP and UDP are the core protocols at this layer. TCP provides a one-to-one, connection-oriented, reliable communications service that establishes connections, sequences, and acknowledges packets sent, and recovers packets lost during transmission. In contrast, UDP provides one-to-one or one-to-many, connectionless, unreliable communication service which is used when the amount of data transferred is small (Davis, 2007). For example, when the data would fit into a single packet or when the applications or upper-layer protocols provide reliable delivery. This layer is equivalent to the OSI Transport layer.
Two Algorithms (David A Hayes, Improving http performance using stateless tcp, 2011) are mentioned that show the basic operation of stateless TCP, one for incoming packets and one for outgoing packets from server. These include few rules to react to incoming control packets and also information to deal with application data.
TCP/IP was developed during the 1960s as part of the Department of Defense’s (DoD) Advanced Research Projects Agency (ARPA) effort to build a nationwide packet data network. It was first used in UNIX-based computers in universities and government installations. Today, it is the main protocol used in all Internet operations. On the other hand, the Open Systems Interconnection model (OSI Model) is a conceptual model that characterizes the internal functions of a communication system by separating it into multiple abstract layers. The model is a product of the Open Systems Interconnection project at the International Organization for Standardization (ISO).