• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/35

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

35 Cards in this Set

  • Front
  • Back

what is the first critical function of the transport layer?

The internet's transport layer transports application layer messages between application endpoints.

What two protocols are repsponsible for givng the transport layer additional delivery service beyond the network layer's IP protocol?

TCP/UDP

True or False? transport layer protocols are implemented by network devices such as routers and switches?

False

Breaking application messages into smaller chunks and adding a transport layer header to each chunk describes the creation of what?

segment

The transport layer sends a segment to the network layer.what does the network layer do with the segment? what does this result in?


in a source host passes a transport-layer segment and a destination address to the network layer. The network layer then provides the service of delivering the segment to the transport layer in the destination host.

A network router use what fields in the datagram?

network routers only act on the network layer fields of the datagram, that is they do not examine the fields of the transport layer segment encapsulated with the datagram. On the receiving side, the network layer extracts the transport layer segment from the datagram and passes the segment up to the transport layer. The transport layer then processes the received segment, making the data in the segment available to the receiving application.

The network layer provides logical communication between___________?

hosts

The transport layer provides logical communication between__________?

between application processes running on different hosts.

what is the most fundamentally responsibility between the transport layer and the network layers?

TCP is used where a reliable connection is required while UDP is used in case of unreliable connections.

In a few sentences describe the IP protocol layer

celebrated IP Protocol, which defines


the fields in the datagram as well as how the end systems and routers act on these


fields. There is only one IP protocol, and all Internet components that have a net-
work layer must run the IP protocol. The Internet’s network layer also contains rout-
ing protocols that determine the routes that datagrams take between sources and


destinations. Although the network layer contains both the IP protocol and numerous routing protocols, it is often simply referred to as the IP layer, reflecting the fact that IP is the glue that binds the Internet together.

Extending host to host delivery to process to process delivery is called?

called transport-layer multiplexing and


demultiplexing.

what two services does UDP provide?

The UDP protocol provides a con-
nectionless service to its applications. This is a no-frills service that provides no


reliability, no flow control, and no congestion control.

What two services does TCP provide?

TCP provides a


connection-oriented service to its applications. This service includes guaranteed


delivery of application-layer messages to the destination and flow control (that is,


sender/receiver speed matching). TCP also breaks long messages into shorter seg-
ments and provides a congestion-control mechanism, so that a source throttles its


transmission rate when the network is congested.

what is demuliplexing?

demultiplexing, that is,


extending the host-to-host delivery service provided by the network layer to a


process-to-process delivery service for applications running on the hosts. In order to


keep the discussion concrete,

what is multiplexing?

to create segments, and passing the segments to the network


layer is called multiplexing.

A UDP socket is fully identified by what two fields?

no handshake and is connectionless

A TCP socket is identifiable by what four fields?

header, source,destination,IP address

what is the utility of NMAP?

Determining which applications are listening on which ports is a relatively easy


task.

how would a web server utilize "Threads"?

Web servers often use only


one process, and create a new thread with a new connection socket for each new


client connection. (A thread can be viewed as a lightweight subprocess.)

Why is UDP described as a connectionless service?

is a data transmission method used in packet switching networks by which each data unit is individually addressed and routed based on information carried in each unit, rather than in the setup information of a prearranged, fixed data channel as inconnection-oriented communication.

how many bytes of overhead is the TCP segment?

20 bytes

how many bytes of overhead is UDP?

8 bytes

what are the four fields of the in the UDP segment?

source port, dest port, length, checksum

Describe the GBN protocol

the sender is allowed to transmit multiple packets


(when available) without waiting for an acknowledgment, but is constrained to have no


more than some maximum allowable number, N, of unacknowledged packets in the


pipeline. We describe the GBN protocol in some detail in this section. But before read-
ing on, you are encouraged to play with the GBN applet (an awesome applet!) at the


companion Web site.

what are three events must a GBN sender respond to?

invocation from above,receipt of an ACK, a timeout event

how does the SR protocol differ from the GBN protocol?

With selective repeat, the sender sends a number of frames specified by a window size even without the need to wait for individual ACK from the receiver as in go-back-n ARQ.

who is Vinton Cerf?

Vinton Cerf and Robert Kahn,


recognized the importance of interconnecting these networks and invented a cross-
network protocol called TCP/IP, which stands for Transmission Control

describe the 3 way handshake

The TCP three-way handshake in Transmission Control Protocol (also called the TCP-handshake; three message handshake and/or SYN-SYN-ACK) is the method used by TCP set up a TCP/IP connection over an Internet Protocol based network.

Describe MSS and MTU and how they are used?

is a standardized technique incomputer networking for determining the maximum transmission unit (MTU) size on the network path between two Internet Protocol (IP) hosts, usually with the goal of avoiding IP fragmentation.

The ethernet MSS is of what size?

1,500 bytes



Describe/identify fields in the TCP segment structure

1.TCP Header Length


2.URG(urgent)


3.The sequence number field


4.The flag field


5.Source and Destination


6.Reveive Window


7.Checksum

Describe the TCP sequence number and how it is created

TCP has a 32-bit sequence number


field, where TCP sequence numbers count bytes in the byte stream rather than packets.


.

describe the TCP Acknowledgement number

idk

What is meant by cumulative acknowledgement in TCP?

In our GBN protocol, an acknowledgment for a packet with sequence number n will be taken to be a cumulative acknowledgment, indicating that all packets with a sequence number up to and including n have been correctly received at the receiver.

Why and how is doubling the timeout interval used in TCP?

who knows