Chapter 5 Flashcards
1
Q
Demultiplexor - Definition and Purpose
A
- Simple Transport Protocol: Extends host-to-host delivery service to process-to-process communication.
- Multiple Processes: Protocol allows multiple application processes on each host to share the network.
- Example Protocol: User Datagram Protocol (UDP).
2
Q
Demultiplexor - Addressing and Identification
A
- Direct Identification: Processes could use OS-assigned process IDs (PIDs).
- Common Approach: Processes use an abstract locator called a port.
- Port Usage: Source sends a message to a port; destination receives from a port.
3
Q
Demultiplexor - UDP Header
A
- Port Identifier: Contains identifiers (ports) for sender and receiver.
- Port Limit: UDP port field is 16 bits long, allowing up to 64k ports.
- Host-Port Pair: Process identified by a (port, host) pair, creating the demultiplexing key for UDP.
4
Q
Demultiplexor - Learning the Port
A
- Client-Server Interaction: Client process initiates contact with server process.
- Well-Known Ports: Servers accept messages at fixed, widely published ports.
- Port Mapper Service: A single well-known port can help clients find the appropriate port for services.
5
Q
Demultiplexor - Implementation of Ports
A
- Port Abstraction: Implemented differently across systems, often as message queues.
- Message Handling: Protocol appends messages to the queue; discards if full.
- Blocking and Receiving: Process blocks if the queue is empty, waiting for messages.
6
Q
Demultiplexor - UDP Checksum
A
- Checksum Purpose: Ensures correctness of the message.
-
Checksum Components:
- UDP header
- Message body
- Pseudoheader
- Protocol number
- Source/destination IP addresses
- UDP length field
- Checksum Verification: Helps detect if a message is misdelivered by verifying the correct endpoints.
7
Q
Definition and Properties -Reliable Byte Stream (TCP)
A
- TCP Overview: TCP provides a reliable, connection-oriented, byte-stream service.
- Applications: Useful for applications needing in-order, reliable data delivery.
- Protocol Popularity: TCP is widely used and highly tuned.
- Duplex Communication: TCP supports full-duplex, meaning two simultaneous byte streams in each direction.
- Flow Control: Mechanism to limit the data sent by the sender based on the receiver’s capacity.
8
Q
End-to-End Issues - TCP
A
- Sliding Window Algorithm: Core to TCP, adapted for the Internet’s complexity.
- Differences from Link-Level Sliding Window: Runs over the Internet, handling more complications.
9
Q
Reliable and Ordered Delivery - TCP
A
- Send and Receive Buffers: Maintains data not yet acknowledged or read by the application.
- Data Pointers: Pointers track sent, acknowledged, written, read, expected, and received bytes.
- Buffer Management: Data management in buffers for reliable delivery.
10
Q
Flow Control - TCP
A
- Receive Buffer Management: Ensures the sender doesn’t overrun the receiver’s buffer.
- Advertised Window: Limits the sender’s unacknowledged data based on receiver’s buffer.
- Window Size Calculation: Based on buffer capacity and data pointers.
11
Q
TCP Header and Segment Format
A
- TCP Header Fields: Contains source and destination ports, sequence and acknowledgment numbers, window size, and flags.
- Segment Structure: Includes data payload and various control flags for managing connections.
12
Q
TCP Connection Management
A
- Connection Setup: Three-way handshake for connection establishment.
- Connection Teardown: Multiple states for graceful connection closure, ensuring all data is transmitted and acknowledged.
13
Q
TCP Variants and Extensions
A
- Timeout Mechanism: Extensions to improve RTT measurement and handle high-speed networks.
- Window Scaling: Option to handle larger window sizes for high bandwidth-delay networks.
- Selective Acknowledgment (SACK): Allows for efficient retransmission of lost segments without retransmitting correctly received segments.
14
Q
Sliding Window Revisited
A
- TCP’s Use: Ensures reliable delivery, in-order delivery, and flow control.
- Advertised Window: Receiver controls the sender’s data transmission based on buffer availability.