Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
35 Cards in this Set
- Front
- Back
what is the first critical function of the transport layer? |
The internet's transport layer transports application layer messages between application endpoints. |
|
What two protocols are repsponsible for givng the transport layer additional delivery service beyond the network layer's IP protocol? |
TCP/UDP |
|
True or False? transport layer protocols are implemented by network devices such as routers and switches? |
False |
|
Breaking application messages into smaller chunks and adding a transport layer header to each chunk describes the creation of what? |
segment |
|
The transport layer sends a segment to the network layer.what does the network layer do with the segment? what does this result in?
|
in a source host passes a transport-layer segment and a destination address to the network layer. The network layer then provides the service of delivering the segment to the transport layer in the destination host. |
|
A network router use what fields in the datagram? |
network routers only act on the network layer fields of the datagram, that is they do not examine the fields of the transport layer segment encapsulated with the datagram. On the receiving side, the network layer extracts the transport layer segment from the datagram and passes the segment up to the transport layer. The transport layer then processes the received segment, making the data in the segment available to the receiving application. |
|
The network layer provides logical communication between___________? |
hosts |
|
The transport layer provides logical communication between__________? |
between application processes running on different hosts. |
|
what is the most fundamentally responsibility between the transport layer and the network layers? |
TCP is used where a reliable connection is required while UDP is used in case of unreliable connections. |
|
In a few sentences describe the IP protocol layer |
celebrated IP Protocol, which defines the fields in the datagram as well as how the end systems and routers act on these fields. There is only one IP protocol, and all Internet components that have a net- destinations. Although the network layer contains both the IP protocol and numerous routing protocols, it is often simply referred to as the IP layer, reflecting the fact that IP is the glue that binds the Internet together. |
|
Extending host to host delivery to process to process delivery is called? |
called transport-layer multiplexing and demultiplexing. |
|
what two services does UDP provide? |
The UDP protocol provides a con- reliability, no flow control, and no congestion control. |
|
What two services does TCP provide? |
TCP provides a connection-oriented service to its applications. This service includes guaranteed delivery of application-layer messages to the destination and flow control (that is, sender/receiver speed matching). TCP also breaks long messages into shorter seg- transmission rate when the network is congested. |
|
what is demuliplexing? |
demultiplexing, that is, extending the host-to-host delivery service provided by the network layer to a process-to-process delivery service for applications running on the hosts. In order to keep the discussion concrete, |
|
what is multiplexing? |
to create segments, and passing the segments to the network layer is called multiplexing. |
|
A UDP socket is fully identified by what two fields? |
no handshake and is connectionless |
|
A TCP socket is identifiable by what four fields? |
header, source,destination,IP address |
|
what is the utility of NMAP? |
Determining which applications are listening on which ports is a relatively easy task. |
|
how would a web server utilize "Threads"? |
Web servers often use only one process, and create a new thread with a new connection socket for each new client connection. (A thread can be viewed as a lightweight subprocess.) |
|
Why is UDP described as a connectionless service? |
is a data transmission method used in packet switching networks by which each data unit is individually addressed and routed based on information carried in each unit, rather than in the setup information of a prearranged, fixed data channel as inconnection-oriented communication. |
|
how many bytes of overhead is the TCP segment? |
20 bytes |
|
how many bytes of overhead is UDP? |
8 bytes |
|
what are the four fields of the in the UDP segment? |
source port, dest port, length, checksum |
|
Describe the GBN protocol |
the sender is allowed to transmit multiple packets (when available) without waiting for an acknowledgment, but is constrained to have no more than some maximum allowable number, N, of unacknowledged packets in the pipeline. We describe the GBN protocol in some detail in this section. But before read- companion Web site. |
|
what are three events must a GBN sender respond to? |
invocation from above,receipt of an ACK, a timeout event |
|
how does the SR protocol differ from the GBN protocol? |
With selective repeat, the sender sends a number of frames specified by a window size even without the need to wait for individual ACK from the receiver as in go-back-n ARQ. |
|
who is Vinton Cerf? |
Vinton Cerf and Robert Kahn, recognized the importance of interconnecting these networks and invented a cross- |
|
describe the 3 way handshake |
The TCP three-way handshake in Transmission Control Protocol (also called the TCP-handshake; three message handshake and/or SYN-SYN-ACK) is the method used by TCP set up a TCP/IP connection over an Internet Protocol based network. |
|
Describe MSS and MTU and how they are used? |
is a standardized technique incomputer networking for determining the maximum transmission unit (MTU) size on the network path between two Internet Protocol (IP) hosts, usually with the goal of avoiding IP fragmentation. |
|
The ethernet MSS is of what size? |
1,500 bytes |
|
Describe/identify fields in the TCP segment structure |
1.TCP Header Length 2.URG(urgent) 3.The sequence number field 4.The flag field 5.Source and Destination 6.Reveive Window 7.Checksum |
|
Describe the TCP sequence number and how it is created |
TCP has a 32-bit sequence number field, where TCP sequence numbers count bytes in the byte stream rather than packets. . |
|
describe the TCP Acknowledgement number |
idk |
|
What is meant by cumulative acknowledgement in TCP? |
In our GBN protocol, an acknowledgment for a packet with sequence number n will be taken to be a cumulative acknowledgment, indicating that all packets with a sequence number up to and including n have been correctly received at the receiver. |
|
Why and how is doubling the timeout interval used in TCP? |
who knows |