INFO 2500 Networking Technologies Fundamentals / COMP 3150 Computer Networking Worksheet Six Name: Date: 22/Feb/2014 1) Identify TWO differences between the senders in RDT 2.0 and RDT 2.1 ______________________________________________________________________________ ______________________________________________________________________________ 2) Identify how the following reliable data transfer mechanisms are used in specific RDT protocols Mechanism Use RDT Protocol Checksum Timer Sequence Number Acknowledgement Negative Acknowledgement 3) (a) Which RDT protocol(s) can only handle corrupted data packets? _____________ (b) Which RDT protocol(s) is/are able to handle corrupted data and control packets? ________ (c) Which RDT protocol(s) is/are able to handle lost data packets? ____________ (d) Which RDT protocol(s) cannot handle corrupted data and control packets? ____________ (e) Which RDT protocol(s) can only handle corrupted data packets? ____________ (f) Which RDT protocol(s) only use(s) positive control packets? ____________ 4) Using a diagram, explain how the Transport Layer extends the host-to-host delivery service provided by the Network Layer to provide a process-to-process delivery service for applications running on hosts. [5 marks] ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ 5) Can a single protocol in the Transport Layer be used by multiple protocols at the Application Layer? Explain your answer using a brief scenario. [ 4 marks] ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ 6) Two clients, Host A and Host C, are communicating with the same server application operating via TCP on port 77 on Server Host B. Client A initiates two separate connections with Host B whereas Host C initiates just one connection. Suppose that Host A happens to assign the same source port to one of its connections as Host C. Assuming that the IP addresses of the hosts are the same as their names, fill in the missing fields in the Transport Layer segment headers in the diagram below. [6 marks] 7) Based on your answer to Question 6, suppose the Server Host B sends a message back to Host C. What would be the values of the fields in the packet sent from Host B to Host C? [2 marks] ______________________________________________________________________________ ______________________________________________________________________________
© Copyright 2024 ExpyDoc