Process-to-Process Delivery:

Similar documents
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

Stream Control Transmission Protocol

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Chapter 24. Transport-Layer Protocols

TSIN02 - Internetworking

TSIN02 - Internetworking

Unit 2.

TSIN02 - Internetworking

TCP/IP Protocol Suite 1

TSIN02 - Internetworking

Chapter 11. User Datagram Protocol (UDP)

Business Data Networks and Security 10th Edition by Panko Test Bank

User Datagram Protocol

IS370 Data Communications and Computer Networks. Chapter 5 : Transport Layer

Networking Technologies and Applications

UNIT IV TRANSPORT LAYER

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

05 Transmission Control Protocol (TCP)

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

TCP/IP. Chapter 5: Transport Layer TCP/IP Protocols

Interconnecting Networks with TCP/IP

Chapter 5 End-to-End Protocols

6. The Transport Layer and protocols

OSI Transport Layer. objectives

EE 610 Part 2: Encapsulation and network utilities

ECE4110 Internetwork Programming. Introduction and Overview

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

Unix Network Programming

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Introduction to TCP/IP networking

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24

Transport Layer Marcos Vieira

NETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

4.0.1 CHAPTER INTRODUCTION

Transport Layer Review

Lesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Packet Header Formats

TCP/IP Transport Layer Protocols, TCP and UDP

TCP /IP Fundamentals Mr. Cantu

Computer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University


ITS323: Introduction to Data Communications

Lecture 3: The Transport Layer: UDP and TCP

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

CSCI-GA Operating Systems. Networking. Hubertus Franke

Transport Protocols. Internet has broadly two types of transport protocols as shown in figure below:

CHAPTER-2 IP CONCEPTS

Position of IP and other network-layer protocols in TCP/IP protocol suite

ECE 650 Systems Programming & Engineering. Spring 2018

Transport Protocols. Raj Jain. Washington University in St. Louis

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

Video Streaming with the Stream Control Transmission Protocol (SCTP)

Simulation of TCP Layer

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

n Understand EC-Council s scanning methodology n Describe scan types and the objectives of scanning

User Datagram Protocol (UDP):

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

ECE 435 Network Engineering Lecture 15

TCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end byte stream over an unreliable internetwork.

TCP: Transmission Control Protocol RFC 793,1122,1223. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC

UNIT V. Computer Networks [10MCA32] 1

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri

Mobile Transport Layer Lesson 02 TCP Data Stream and Data Delivery

Hands-On Ethical Hacking and Network Defense

Outline. History Introduction Packets Association/ Termination Data Transmission concepts Multihoming Streams

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

CSCI-1680 Transport Layer I Rodrigo Fonseca

I TCP 1/2. Internet TA: Connection-oriented (virtual circuit) Connectionless (datagram) (flow control) (congestion control) TCP Connection-oriented

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions

ICMP. Outline ICMP. ICMP oicmp is provided within IP which generates error. Internet Control Message Protocol. Ping Traceroute

NWEN 243. Networked Applications. Layer 4 TCP and UDP

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Process-la-Process Delivery: UDp, TCp, and SCTP

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Lab - Using Wireshark to Examine TCP and UDP Captures

Transport Layer TCP & UDP Week 7. Module : Computer Networks Lecturers : Lucy White Office : 324

ECE697AA Lecture 3. Today s lecture

Internet and Intranet Protocols and Applications

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

CSE 461 The Transport Layer

Transport Layer Protocols. Internet Transport Layer. Agenda. TCP Fundamentals

Connections. Topics. Focus. Presentation Session. Application. Data Link. Transport. Physical. Network

Introduction to Network. Topics

The transport layer is responsible for the delivery ofa message from one process to another.

Review of Important Networking Concepts

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Transcription:

CHAPTER 23 Process-to-Process Delivery: Solutions to Review Questions and Exercises Review Questions 1. Reliability is not of primary importance in applications such as echo, daytime, BOOTP, TFTP and SNMP. In custom software, reliability can be built into the client/server applications to provide a more reliable, low overhead service. 2. IP and UDP are both connectionless and unreliable protocols. The main difference in their reliability is that IP only calculates a checksum for the IP header and not for the data while UDP calculates a checksum for the entire datagram. 3. Port addresses do not need to be universally unique as long as each IP address/port address pair uniquely identify a particular process running on a particular host. A good example would be a network consisting of 50 hosts, each running echo server software. Each server uses the well known port number 7, but the IP address, together with the port number of 7, uniquely identify a particular server program on a particular host. Port addresses are shorter than IP addresses because their domain, a single system, is smaller than the domain of IP addresses, all systems on the Internet. 4. Ephemeral is defined as short-lived or transitory. Ephemeral port numbers are only used for the duration of a single communication between client and server, so they are indeed short-lived. 5. The minimum size of a UDP datagram is 8 bytes at the transport layer and 28 bytes at the IP layer. This size datagram would contain no data only an IP header with no options and a UDP header. The implementation may require padding. 6. Since the length of a datagram must be contained in a 2 byte field, the maximum size of a UDP datagram is 65,535 bytes (header plus data). However, given that the IP layer must also store the total length of the packet in a 2 byte field, the maximum length would be 20 bytes less than this, or 65,515 bytes, to leave room for the IP header. The implementation may impose a smaller limit than this. 7. The smallest amount of process data that can be encapsulated in a UDP datagram is 0 bytes. 1

2 8. The largest amount of process data that can be encapsulated in a UDP datagram is 65,507 bytes. (65,535 minus 8 bytes for the UDP header minus 20 bytes for the IP header). The implementation may impose a smaller limit than this. 9. See Table 23.1. Table 23.1 Answer to the Question 9. Fields in UDP Fields in TCP Explanation Source Port Address Source Port Address Destination Port Address Destination Port Address Total Length There is no need for total length. Checksum Checksum Sequence Number Acknowledge Number Header Length Reserved Control Window Size Urgent Pointer Options and Padding UDP cannot handle urgent data. UDP uses no options. 10. UDP is preferred because each user datagram can be used for each chunk of data. However, a better solution is SCTP. 11. a. None of the control bits are set. The segment is part of a data transmission without piggybacked acknowledgment. b. The FIN bit is set. This is a FIN segment request to terminate the connection. c. The ACK and the FIN bits are set. This is a FIN+ACK in response to a received FIN segment. 12. The maximum size of the TCP header is 60 bytes. The minimum size of the TCP header is 20 bytes. Exercises 13. See Figure 23.1. 14. The client would use the IP address 122.45.12.7, combined with an ephemeral port number, for its source socket address and the IP address 200.112.45.90, combined with the well- known port number 161, as the destination socket address. 15. The server would use the IP address 130.45.12.7, combined with the well-known port number 69 for its source socket address and the IP address 14.90.90.33, combined with an ephemeral port number as the destination socket address. 16. This datagram cannot be transferred using a single user datagram.

3 Figure 23.1 Solution to Exercise 13 52010 48 69 0 Data (40 bytes) 17. 16 bytes of data / 24 bytes of total length = 0.666 18. 16 bytes of data / 44 bytes of total length = 0.364 19. 16 bytes of data / 72 byte minimum frame size = 0.222 20. a. Port number 1586 b. Port number 13 c. 28 bytes d. 20 bytes (28 8 byte header) e. From a client to a server f. Daytime 21. It looks as if both the destination IP address and the destination port number are corrupted. TCP calculates the checksum and drops the segment. 22. 0111 in decimal is 7. The total length of the header is 7 4 or 28. The base header is 20 bytes. The segment has 8 bytes of options. 23. See Figure 23.2. Figure 23.2 Solution to Exercise 23 52001 20 or 21 14532 751 785 5 0 1 1 0 0 0 2000 0 0 40 bytes of data 24. a. The source port number is 0x0532 (1330 in decimal). b. The destination port number is 0x0017 (23 in decimal). c. The sequence number is 0x00000001 (1 in decimal).

4 d. The acknowledgment number is 0x00000000 (0 in decimal). e. The header length is 0x5 (5 in decimal). There are 5 4 or 20 bytes of header. f. The control field is 0x002. This indicates a SYN segment used for connection establishment. g. The window size field is 0x07FF (2047 in decimal). 25. Every second the counter is incremented by 64,000 2 = 128,000. The sequence number field is 32 bits long and can hold only 2 32 1. So it takes (2 32 1)/(128,000) seconds or 33,554 seconds. 26. 3000 2000 = 1000 bytes 27. See Figure 23.3. Figure 23.3 Solution to Exercise 27 Client SYN Ephemeral port Well-known port 14534 785 5 0 0 0 0 1 0 Checksum SYN + ACK Ephemeral port Well-known port 21732 14535 785 5 0 1 0 0 1 0 window size Checksum 0 ACK Ephemeral port Well-known port 14534 21733 785 5 0 1 0 0 0 0 window size Checksum 0 Server 28. a. At TCP level: 16 bytes of data / (16 bytes of data + 20 bytes of TCP header) 0.44 or 44 percent b. At IP level 16 bytes of data / (16 bytes of data + 20 bytes of TCP header + 20 bytes of IP header) 0.29 or 29 percent c. At data link level (assuming no preamble or flag): 16 bytes of data / (16 bytes of data + 20 bytes of TCP header + 20 bytes of IP header + 18 bytes of Ethernet header and trailer 0.22 or 22 percent, 29. The largest number in the sequence number field is 2 32 1. If we start at 7000, it takes [(2 32 1) 7000] / 1,000,000 = 4295 seconds. 30. See Figure 23.4.

5 Figure 23.4 Solution to Exercise 30 22001 32000 a. Sliding window before 24001 36000 b. Sliding window after 31. See Figure 23.5. Figure 23.5 Solution to Exercise 31 Before 2001 3001 5000 After receiving ACK 2500 3001 6499 After sending 1000 bytes 2500 4001 6499 32. The SACK chunk with a cumtsn of 23 was delayed. 33. See Figure 23.6. Note that the value of cumtsn must be updated to 8. 34. See Figure 23.7. Chunks 18 and 19 are sent but not acknowledged (200 bytes of data). 18 DATA chunks (1800 bytes) can be sent, but only 4 chunks are in the queue. Chunk 20 is the next chunk to be sent.

6 Figure 23.6 Solution to Exercise 33 20 19 18 17 16 Received 14 13 12 11 8 7 6 5 4 3 2 1 To process 11,14 16,20 OutOfOrder 5 cumtsn 1800 4 cumtsn winsize lastack Figure 23.7 Solution to Exercise 34 From process outstanding chunks Sending Queue 23 22 21 20 19 18 To send 20 2000 200 curtsn rwnd intransit