Você está na página 1de 7

SEMESTER 1 Chapter 4 OSI Transport Layer V 4.

4.1.1

Tracking the individual communication between applications on the source and destination hosts Segmenting data and managing each piece Reassembling the segments into streams of application data Identifying the different applications 4.1.1.3 What does the Transport Identifies the segment of data and provides for Layer header provide? identification of the Transport Layer Protocol to use 4.1.2 Describe the process of divides application data into blocks of data that segmentation and are an appropriate size reassembly? reassembles the data before sending it to the destination application or service How does the Transport Each of these applications or services is Layer accomplish assigned an address known as a port so that conversation multiplexing? the Transport layer can determine with which application or service the data is identified. What are the four additional Connection-oriented conversations duties the Transport Layer Reliable delivery can provide? Ordered data reconstruction Flow control 4.1.2.2 What are the four processes Establishing a Session that the Transport Layer Reliable Delivery uses to control Same Order Delivery conversations? Flow Control 4.1.3 What does reliability mean ensuring that each piece of data that the to a network? source sends arrives at the destination. What are the three basic tracking transmitted data operations of reliability at acknowledging received data the transport layer? retransmitting any unacknowledged data What trade-off is necessary value of reliability and the burden it places on to ensure reliability? the network How is a best-effort protocol there is no acknowledgement that the data is different than a reliable received at the destination. protocol? What is another term used unreliable to describe a best-effort protocol? List some examples of databases, web pages, and e-mail applications that require reliable transmission. Give an example of an Streaming video application that can use unreliable transmission.

What are the 4 primary responsibilities of the Transport Layer?

4.1.4

Know the information in the diagram that lists the differences between unreliable and reliable transmissions. What are the two most common protocols at the Transport Layer? What is the advantage of using UDP? What are the pieces of UDP information called? What are some applications that use UDP?

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Speed Datagram Applications that use UDP include: Domain Name System (DNS) Video Streaming Voice over IP (VoIP) same order delivery, reliable delivery, and flow control. 20 bytes

What are the 3 additional functions that TCP offers? How much overhead is required to offer the 3 functions of TCP? What are the pieces of TCP information called? What are some applications that use TCP?

segments Applications that use TCP are: Web Browsers E-mail File Transfers Port numbers

4.1.5.1 What are the unique identifiers that define the conversations called? In the originating message what is the source port? In the originating message what is the destination port? How do server processes have port numbers assigned? How do clients have port numbers assigned? What is another term sometimes used instead of port number? For this course, what does a socket pair describe? 4.1.5.2 What organization is responsible for assigning port numbers?

number for this communication associated with the originating application on the local host the number for this communication associated with the destination application on the remote host Statically

dynamically Socket number

the source and destination IP addresses and port numbers, is also unique and identifies the conversation between the two hosts IANA Internet Assigned Numbers Authority

What is the range of Well Known Ports? What are well known ports? What is the range of Registered Ports? What are registered ports?

0 to 1023 reserved for services and applications. 1024 to 49151 These port numbers are assigned to user processes or applications. These processes are primarily individual applications that a user has chosen to install rather than common applications that would receive a Well Known Port. When not used for a server resource, these ports may also be used dynamically selected by a client as its source port. 49152 to 65535 Also known as Ephemeral Ports, these are usually assigned dynamically to client applications when initiating a connection. It is not very common for a client to connect to a service using a Dynamic or Private Port (although some peer-to-peer file sharing programs do). yes

What is the range for Dynamic or Private Ports? What are dynamic or private ports?

Is it possible for a port number to be used by both TCP and UDP? 4.1.5.3 What is the utility that can be used to view open connections? 4.1.6.1 What are the two reasons data is divided into pieces before it is sent? What is provided in a UDP header? What is provided in a TCP header? In which protocol do segments arrive in an unspecified order? 4.1.6.2 Packet Tracer Activity. Please pay close attention to Task 2 and examine the information about the packets- it will help on the test 4.2.1 What makes TCP a reliable protocol? What do acknowledgements do?

Netstat

ensures that data is transmitted within the limits of the media and that data from different applications can be multiplexed on to the media. Port Numbers Port, sequence, acknowledgement, and flow control numbers UDP

connection-oriented sessions Let the sender know you received the data

4.2.2

What happens if the acknowledgment does not arrive in the predetermined time? What is the additional overhead created in the hosts by using TCP? Make certain you roll over each piece of the diagram. Which device initiates the communication process? What can never happen in two server conversations? The diagram does a very good job at showing the process of port assignment Describe the steps in establishing a three way handshake.

it retransmits that data to the destination

the necessity to keep track of which segments are awaiting acknowledgement and by the retransmission process.

Client two services assigned to the same port number within the same Transport layer services.

4.2.3

What are the three steps in TCP connection establishment?

Establishes that the destination device is present on the network Verifies that the destination device has an active service and is accepting requests on the destination port number that the initiating client intends to use for the session Informs the destination device that the source client intends to establish a communication session on that port number 1. The initiating client sends a segment containing an initial sequence value, which serves as a request to the server to begin a communications session. 2. The server responds with a segment containing an acknowledgement value equal to the received sequence value plus 1, plus its own synchronizing sequence value. The value is one greater than the sequence number because there is no data contained to be acknowledged. This acknowledgement value enables the client to tie the response back to the original segment that it sent to the server. 3. Initiating client responds with an acknowledgement value equal to the sequence value it received plus one. This completes the process of establishing the connection. URG - Urgent pointer field significant ACK - Acknowledgement field significant PSH - Push function RST - Reset the connection SYN - Synchronize sequence numbers

What are the six control bit fields possible and what do they mean?

4.2.4

What is the Initial Sequence Number (ISN)?

What happens to the ISN as packets are sent?

4.2.4.2 What is sent back to the client in step 2? What is the value of the acknowledgement number field? Explain what is meant by 2 one-way sessions exist in TCP? 4.2.4.3 What is the final step in the three-way hand shake? What are 3 ways in which security can be added?

FIN- No more data from sender The initial value for the sequence number is randomly chosen and is used to begin tracking the flow of data from the client to the server for this session The ISN in the header of each segment is increased by one for each byte of data sent from the client to the server as the data conversation continues. the server sends a segment back to the client with the ACK flag set indicating that the Acknowledgment number is significant equal to the client initial sequence number plus 1 one from the client to the server, and the other from the server to the client The client responds with both the sequence and acknowledgement bit set and no data Denying the establishment of TCP sessions Only allowing sessions to be established for specific services Only allowing traffic as a part of already established sessions. FIN finish control flag 1. When the client has no more data to send in the stream, it sends a segment with the FIN flag set. 2. The server sends an ACK to acknowledge the receipt of the FIN to terminate the session from client to server. 3. The server sends a FIN to the client, to terminate the server to client session. 4. The client responds with an ACK to acknowledge the FIN from the server.

4.2.5

What must be sent to close a TCP session? What are the 4 exchanges needed to close a TCP conversation?

4.2.5.2 Packet Tracer Lab to better understand the process of TCP 4.3.1 How does TCP reassemble packets into the original data file? How are sequence numbers incremented? What does the receiving process do with the TCP segment? Where do the reassemble segments go?

Sequence numbers are assigned in the header of each packet to achieve this goal the sequence number is incremented by the number of bytes that have been transmitted The receiving TCP process places the data from a segment into a receiving buffer. To the Application Layer

What happens when all the segments do not arrive? 4.3.2 What is the relationship between sequence and acknowledgement numbers work?

4.3.3

What is the process TCP uses with sequence and acknowledgement numbers called? What does TCP do to overcome the overhead of waiting for acknowledgements? What is the name for the amount of data that can be sent before an acknowledgement is received called? How does TCP handle missing segments?

Any segments that arrive with noncontiguous sequence numbers are held for later processing. The sequence number indicates the relative number of bytes that have been transmitted in this session including the bytes in the current segment. TCP uses the acknowledgement number in segments sent back to the source to indicate the next byte in this session that the receiver expects to receive Expectational acknowledgement

multiple segments of data can be sent before and acknowledged with a single TCP message in the opposite direction Window size

What do hosts implement today to improve the TCP process?

4.3.4.1 How does flow control assist the reliability of TCP transmissions?

What does window size specify? How does TCP use window size to improve communication?

4.3.4.2 What happens to window size when network

When TCP at the source host has not received an acknowledgement after a predetermined amount of time, it will go back to the last acknowledgement number that it received and retransmit data from that point forward. If both hosts support Selective Acknowledgements, it is possible for the destination to acknowledge bytes in discontinuous segments and the host would only need to retransmit the missing data. by adjusting the effective rate of data flow between the two services in the session. When the source is informed that the specified amount of data in the segments is received, it can continue sending more data for this session. the amount of data that can be transmitted before an acknowledgement must be received TCP feedback mechanism adjusts the effective rate of data transmission to the maximum flow that the network and destination device can support without loss. TCP attempts to manage the rate of transmission so that all data will be received and retransmissions will be minimized. TCP can reduce the window size to require that received segments be acknowledged

4.4.1

resources are constrained? What happens after periods of transmission with no data losses or constrained resources? What do you think occurs with window size on the school network when a major update occurs district wide? (smaller, larger) According to the first 2 paragraphs, what is the major advantage of using UDP? What are the key Application layer protocols that use UDP includes?

more frequently the receiver will begin to increase the window field

The window size would get smaller

Lower overhead

4.4.2

4.4.3 4.4.4

4.4.2

Why do the processes above use UDP? What is UDP also referred to as? How are segments put back in order if the application requires a specific order? How are TCP and UDP similar? Note: This is essentially the same as TCP so it is very testable. Understand how port numbers are assigned. What happens to port numbers in a response from the server? Packet Tracer Activity- look at each packet and gain an understanding of what UDP is sending and receiving.

Domain Name System (DNS) Simple Network Management Protocol (SNMP) Dynamic Host Configuration Protocol (DHCP) Routing Information Protocol (RIP) Trivial File Transfer Protocol (TFTP) Online games The low overhead of UDP makes it very desirable for such applications Transaction based the application will have to identify the proper sequence of the data and determine how the data should be processed They both use port numbers

the source and destination port numbers in the datagram header are reversed

Você também pode gostar