• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/94

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

94 Cards in this Set

  • Front
  • Back
Connection-Oriented
Befre applications can send data they must handshake with eachother and start the transfer
Full Duplex Service
Both hosts can send data back and forth to each other at the same time
Point to Point
Connection between single receiver ansender. Only two hosts
How does the three way handshake work
1.) Client sends syn segment with initial sequence value
2.) Server sends synack with initial sequence value
3.) Client sends ack with possible data
Send buffer
On the sender side, application data is stored here and sent intermittently
MSS
Maximum Segment Size, the maximum amount of data in a tcp segment. Not including header information
MTU
Maximum Transmission Unit - Largest link layer frame that can be sent by sending host
TCP Segment
Combination of data and header information
Sequence numbers in TCP
Are based on bytes of data and what the receiver is expecting to get next
What is the receive window used for
flow control on the receiver side
How do ACKS work in TCP
Send ack for next byte you are expecting. Cumulative
RTT
round trip time, time from when a segment is sent until it is acknowledged
How is Sample RTT taken?
Oldest segment is timed for RTT. Not affter retransmit
Timeout Interval equation
EstimatdRTT + 4 * DevRTT
Fast Retransmit
After receiving triple ACK, the sender will resend Acked segment before the timer goes of
Selective Acknowledgment
Allows a receiver to acknowledge out of order segments selecitvly rather than just cumulatively acknowleding the last correctly received in order segment
Receive Window
Sender variable that gives an idea to sender about how much free buffer space is available at the receiver
Receive Buffer
The amount of data a client is willing to receive for this connection
Last Byte Read
The number of the last byte in the data stream read from the buffer by the client process
LastByteRcvd
The number o the last byte in the data stream that has arrived from the network and has been placed in the receive buffer at the client
LastByteSent
The last byte the sender has sent
LastyteAcked
The last byte the sender has received an ack for
What does the server make sure of for flow control
LastByteSent - LastByteAcked < rcvwindow
What does the client do when its rwnd becomes 0 and it has nothing to send to the server?
Server sends 1 byte data (with seq of ack) packages to client so client acks with rcvwindow size
How is a TCP connection initiated
1.) Client sends SYN packet with no data and segment it wants to start at
2.) Server allocates variables. Respons with SYN, ACKS segment #+1 and sends own segment
3.) Client allocates variables sends regular data with ack set to client + 1
How is a TCP connection closed
1.) Client sends Fin
2.) Server Acks
3.)Server sends Fin
4.) Client Acks
5.) Client waits for time after time is up, clears connection
Offered load
The rate at which the transport layer sends segments (containing original and retransmitted data) into the network
End-to-End congestion Control
Networ layer provides no explicit support and the end system must control it
Network-Assisted Congestion Control
Routers provide feedback to the sender regarding congestion.
What are the two ways Network-assisted congestion control work
1.) Choke Packet - Router sends information to process
2.) Router modifies a bit in packet
congestion window
A sender side value that constrains the rate at which a sender can send traffic into the network
slow start
cwnd starts at 1 and increases by 1 for each received ack
3 Ways to leave slow start
1.) CWND >= ssthresh
congestion avoidance

2.) Timeout. Start slow start but set cwnd to 1 and ssthresh to cwnd/2

3.) 3 duplicate acks. Set ssthres to cwnd/2 and cwnd to ssthresh + 3 and go to faast recovery
When is congestion avoidance entered?
1.) When CWND >= ssthresh

2.) New ack is received when in fast recovery
How does congestion avoidance work
For each new ack, cwnd is incremented by cwnd + mss * (mss /cwnd)
What happens for congestion control when 3 duplicate acks are encountered
ssthresh = cwnd /2
cwnd = ssthresh + 3
What happens in fast recovery / how do get out
1.) Every duplicate ack increases cwnd by mss

EXITING

2.) ON timeout go to slow start
ssthresh = cwnd/2
cwnd = 1

3.) ON new ack go to congestion
cwnd = ssthresh
What is the difference between tahoe and reno
TCP reno has fast recovery after a triple ack, tahoe goes to slow start stage
AIMD
Additive-increase, multiplicative-decrease. Sawtooth graph
Forwarding
Local action of transferring a packet from an input link interface to the appropriate output link interace
Routing
Network-wide process that determines the end-to-end paths that packets take from source to destination
Forwarding Table
Router reads the value in the packets header and determines which out going link to put the packet to
How are forwarding tables populated (3 things)
1.) By routing algorithms

2.) Central cerver routing alogortihms

decentralized routing algorithms
Link Layer Switches
Base forwarding decision on value in link-layer field
Routers (forwarding decisions)
Base decision on network layer-field
Network Service model
The characteristics of end-to-end transport of packets between sending and receiving end systems
best effort service
1.) Timing between packets isn't guranteed

2.) Packet order isn't guranteed

3.) Delivery of packets isn't guranteed
CBR ATM
(Constant Bit Rate) Network service that provides constant bit rate
ABR
(Avaiable Bit Rate) Minimum throughput provided
VC Network
Virtual Circuit Networks - provide a connection service at the network layer
Datagram Network
Provides a connectionless service
Signaling messages
Messages that the end systems send into the network to initiate or terminate a VC, and the messages passed between the routers to set up the VC
Longest Prefix matching rule
longest matching entry in the table is the match
Switching Fabric ways
memory, crossbarr, bus
Packet Scheduler
Output port must queue requests and determine which to transmit
Drop Tail
Drop the remove one of already queued packets to make room for a new one
HOL
Head of line blocking - queued packet in input queue must wait for transfer through the fabric (even though its output port is free) because it is blocked by another packet at the head of the line
Why is the header length field needed in the IP datagram
Can contain a variable number of options
What is the datagram length field in the ip datagram
The total length of the datagram (header plus data) in bytes
Interface
Boundary between the host and physical link
Subnet
Network that interconectes other host interfaces and one router interface
Subnet mask
Denoted as ip with /* where all front bits are required
CIDR
Classless interdomain Routing . Generalized the notion of subnet addressing.
Broadcast address
255.255.255.255 Broadcasts information to all hosts on a subnet
DHCP
Dynamic Host Configuration Protocol. Allows a host to obtain an ip address automatically
NAT
network address translation
realm
A network whose addresses only have meaning to devices within that network
ICMP
Internet Control message Protocol
TCP Header - Header length Field
Since the options field makes it so TCP headers can be variable size, the header field is required to indicate how many bytes are in the header
TCP Header - ACK bit
Indicates that the value carried in the ack field is valid
TCP Header - RST, SYN, FIN bits
Used for connetion setup and teardown
TCP Header - PSH bit
indicates that the receiver should pass the data to the upper layer immediately
TCP Header - URG bit
used to indicate that there is data in this segment that the sending-side upper-layer has marked urgent
RDT 1.0
Reliable data transfer over perfectly reliable channel
RDT 2.0
Bit errors, send ack or nak to determine if we got a corrupted/uncorrupted piece of data
Stop and Wait protocol
Sender will not send new packet until it is sure previous packet has been received correctly
RDT 2.1
Add sequence numbers
rdt 3.0
Can lose packets. add timers
Memorize TCP header
SDSA
HUFR
IUOD

source port
dest port
sequence number
ack number
header length
unusued
flags
receive window
internet checksum
urgent data point
options
data
IPv4 Datagram header - version number
4 bits that indicate what version is being used
IPv4 Datagram header - header length
the length of the variable length header. Indicates where the data begins
IPv4 Datagram header - type of service
used to distinguish if application is real time or what
IPv4 Datagram header - datagram length
total length of the datagram (header plus data) measured in bytes
16 bits
IPv4 Datagram header - identifier, flags, fragmentation offset
used for fragmentation
IPv4 Datagram header - ttl
time to live, used to ensure datagrams are dropped if this value reaches 0
IPv4 Datagram header - protocol
used when the datagram reaches its final destination. 17 for udp and 6 for tcp
IPv4 Datagram header - header checksum
checksum used for the ip datagram header
IPv4 Datagram header - Ip addresses
indicate where to deliver the datagram
IPv4 Datagram header - options
allow the header options to be extended
IPv4 Datagram header - data
where the actual data is held
how does CIDR work
First portion of bits indicate network. next part indicates inside an organization
How are ICMP packets carried
As IP data payload
How is ICMP read
it is demultiplexed to ICMP
ipv4 datagram format
VHTD
IFF
TUH
S
D
O
D

1.) version, haeder length, type of service, datagram length
2.) identifier, flags, fragmentation offset
3.) time to live, upper layer protocol, checksum
4.) soruce ip
5.) destination ip
6.) options
7.) data