Chapter 5 Flashcards

1
Q

Demultiplexor - Definition and Purpose

A
  • Simple Transport Protocol: Extends host-to-host delivery service to process-to-process communication.
  • Multiple Processes: Protocol allows multiple application processes on each host to share the network.
  • Example Protocol: User Datagram Protocol (UDP).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Demultiplexor - Addressing and Identification

A
  • Direct Identification: Processes could use OS-assigned process IDs (PIDs).
  • Common Approach: Processes use an abstract locator called a port.
  • Port Usage: Source sends a message to a port; destination receives from a port.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Demultiplexor - UDP Header

A
  • Port Identifier: Contains identifiers (ports) for sender and receiver.
  • Port Limit: UDP port field is 16 bits long, allowing up to 64k ports.
  • Host-Port Pair: Process identified by a (port, host) pair, creating the demultiplexing key for UDP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Demultiplexor - Learning the Port

A
  • Client-Server Interaction: Client process initiates contact with server process.
  • Well-Known Ports: Servers accept messages at fixed, widely published ports.
  • Port Mapper Service: A single well-known port can help clients find the appropriate port for services.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Demultiplexor - Implementation of Ports

A
  • Port Abstraction: Implemented differently across systems, often as message queues.
  • Message Handling: Protocol appends messages to the queue; discards if full.
  • Blocking and Receiving: Process blocks if the queue is empty, waiting for messages.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Demultiplexor - UDP Checksum

A
  • Checksum Purpose: Ensures correctness of the message.
  • Checksum Components:
    • UDP header
    • Message body
    • Pseudoheader
      • Protocol number
      • Source/destination IP addresses
      • UDP length field
  • Checksum Verification: Helps detect if a message is misdelivered by verifying the correct endpoints.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definition and Properties -Reliable Byte Stream (TCP)

A
  • TCP Overview: TCP provides a reliable, connection-oriented, byte-stream service.
  • Applications: Useful for applications needing in-order, reliable data delivery.
  • Protocol Popularity: TCP is widely used and highly tuned.
  • Duplex Communication: TCP supports full-duplex, meaning two simultaneous byte streams in each direction.
  • Flow Control: Mechanism to limit the data sent by the sender based on the receiver’s capacity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

End-to-End Issues - TCP

A
  • Sliding Window Algorithm: Core to TCP, adapted for the Internet’s complexity.
  • Differences from Link-Level Sliding Window: Runs over the Internet, handling more complications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reliable and Ordered Delivery - TCP

A
  • Send and Receive Buffers: Maintains data not yet acknowledged or read by the application.
  • Data Pointers: Pointers track sent, acknowledged, written, read, expected, and received bytes.
  • Buffer Management: Data management in buffers for reliable delivery.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Flow Control - TCP

A
  • Receive Buffer Management: Ensures the sender doesn’t overrun the receiver’s buffer.
  • Advertised Window: Limits the sender’s unacknowledged data based on receiver’s buffer.
  • Window Size Calculation: Based on buffer capacity and data pointers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TCP Header and Segment Format

A
  • TCP Header Fields: Contains source and destination ports, sequence and acknowledgment numbers, window size, and flags.
  • Segment Structure: Includes data payload and various control flags for managing connections.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TCP Connection Management

A
  • Connection Setup: Three-way handshake for connection establishment.
  • Connection Teardown: Multiple states for graceful connection closure, ensuring all data is transmitted and acknowledged.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP Variants and Extensions

A
  • Timeout Mechanism: Extensions to improve RTT measurement and handle high-speed networks.
  • Window Scaling: Option to handle larger window sizes for high bandwidth-delay networks.
  • Selective Acknowledgment (SACK): Allows for efficient retransmission of lost segments without retransmitting correctly received segments.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sliding Window Revisited

A
  • TCP’s Use: Ensures reliable delivery, in-order delivery, and flow control.
  • Advertised Window: Receiver controls the sender’s data transmission based on buffer availability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly