Introduction to Networks 6.0 Chapter 9Name Click here to enter text.

Transport Layer

9.1.1.1

The transport layer is responsible for establishing a Click here to enter text.between two applications and delivering data between them.

9.1.1.2

What are the responsibilities of the transport layer?

  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.

9.1.1.3

What is multiplexing? Click here to enter text.

What does the transport layer do to the segments of data? Click here to enter text.

9.1.1.4

Click here to enter text.is a reliable transport layer protocol which ensures that data arrives at the destination.

Click here to enter text.is a transport layer protocol that does not provide reliability.

9.1.1.5

What are the three basic operations of the TCP protocol?

  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.

9.1.1.6

UDP is considered unreliable and a best effort protocol. Why? Click here to enter text.

9.1.1.7

What types of applications require TCP? Click here to enter text.

What types of applications require UDP? Click here to enter text.

9.1.2.1

Briefly describe the services that TCP provides. Click here to enter text.

  • Establishing a Session- Click here to enter text.
  • Reliable Delivery- Click here to enter text.
  • Same-Order Delivery -Click here to enter text.
  • Flow Control- Click here to enter text.

9.1.2.2

What is a stateful protocol? Click here to enter text.

What is the purpose of the following parts of the TCP segment?

  • Source Port (16 bits) and Destination Port (16 bits) -.Click here to enter text.
  • Sequence number (32 bits) -Click here to enter text.
  • Acknowledgment number (32 bits) - Click here to enter text.
  • Header length (4 bits) - Click here to enter text.
  • Reserved (6 bits) -Click here to enter text.
  • Control bits (6 bits) - Click here to enter text.
  • Window size (16 bits) - Click here to enter text.
  • Checksum (16 bits) - Click here to enter text.
  • Urgent (16 bits)- Click here to enter text.

9.1.2.3

What are the features of UDP?

  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.

9.1.2.4

What is a stateless protocol? Click here to enter text.

If reliability is required when using UDP as the transport protocol, it must be handled by the Click here to enter text.

9.1.2.5

How do UDP and TCP handle multiple, simultaneous conversation? Click here to enter text.

9.1.2.6

What is the source port? Click here to enter text.

What is the destination port? Click here to enter text.

9.1.2.7

What is a socket pair? Click here to enter text.

The source port acts as a Click here to enter text.for therequesting application?

What is the difference between the source port and the destination port? Click here to enter text.

9.1.2.8

What are well-known port numbers? Click here to enter text.

What are registered port numbers? Click here to enter text.

What are dynamic ports? Click here to enter text.

9.1.2.9

What command can be used to list protocols in use? Click here to enter text.

9.2.1.1

Study figures 1-5 to understand how servers can offer more than one service? Click here to enter text.

9.2.1.2

What are the 3 steps TCP uses to establish a connection?

  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.

9.2.1.3

What are the 4 steps to terminate a connection?

  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.

9.2.1.4

The 3 Way handshake:

  • Establishes that the destination device is Click here to enter text. on the network
  • Verifies that the destination device has an active Click here to enter text.and is accepting requests on the Click here to enter text. that the initiating client intends to use
  • Informs the destination device that the source client intends to establish a Click here to enter text. on that port number

What is a flag? Click here to enter text.

9.2.1.5

Watch the video.

9.2.2.1

Click here to enter text.numbers indicate how to reassemble and reorder received segments.

9.2.2.2

Watch the video.

9.2.2.3

Watch the video.

9.2.2.4

Click here to enter text.helps maintain the reliability of TCP transmission by adjusting the rate of data flow between source and destination for a given session.

The Click here to enter text.is agreed upon when the TCP session is established during the three-way handshake.

The process of the destination sending acknowledgments as it processes bytes received and the continual adjustment of the source’s send window is known as Click here to enter text..

9.2.2.5

By determining the rate at which TCP segments are sent but not acknowledged, the source can assume a certain level of Click here to enter text..

It is the source that is reducing the number of unacknowledged bytes it sends and not the window size determined by the Click here to enter text. .

9.2.3.1

Why does UDP have much lower overhead than TCP? Click here to enter text.

9.2.3.2

What happens to UDP datagrams if they are received out of order? Click here to enter text.

9.2.3.3

UDP-based server applications are assigned well-known or registered port numbers. Why? Click here to enter text.

9.2.3.4

Click through Figures 1-5.

9.2.4.1

Why do the applications in the figure use TCP? Click here to enter text.

9.2.4.2

Why do the applications in the figure use UDP? Click here to enter text.