INFO 2500 Networking Technologies Fundamentals / COMP 3150 Computer Networking
Worksheet Six
Name:
Date: 22/Feb/2014
1) Identify TWO differences between the senders in RDT 2.0 and RDT 2.1
______________________________________________________________________________
______________________________________________________________________________
2) Identify how the following reliable data transfer mechanisms are used in specific RDT protocols
Mechanism
Use
RDT
Protocol
Checksum
Timer
Sequence Number
Acknowledgement
Negative
Acknowledgement
3)
(a) Which RDT protocol(s) can only handle corrupted data packets?
_____________
(b) Which RDT protocol(s) is/are able to handle corrupted data and control packets? ________
(c) Which RDT protocol(s) is/are able to handle lost data packets? ____________
(d) Which RDT protocol(s) cannot handle corrupted data and control packets? ____________
(e) Which RDT protocol(s) can only handle corrupted data packets? ____________
(f) Which RDT protocol(s) only use(s) positive control packets? ____________
4) Using a diagram, explain how the Transport Layer extends the host-to-host delivery service
provided by the Network Layer to provide a process-to-process delivery service for applications
running on hosts.
[5 marks]
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
5) Can a single protocol in the Transport Layer be used by multiple protocols at the Application
Layer? Explain your answer using a brief scenario.
[ 4 marks]
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
6) Two clients, Host A and Host C, are communicating with the same server application operating
via TCP on port 77 on Server Host B. Client A initiates two separate connections with Host B
whereas Host C initiates just one connection. Suppose that Host A happens to assign the same
source port to one of its connections as Host C. Assuming that the IP addresses of the hosts are
the same as their names, fill in the missing fields in the Transport Layer segment headers in the
diagram below.
[6 marks]
7) Based on your answer to Question 6, suppose the Server Host B sends a message back to Host C.
What would be the values of the fields in the packet sent from Host B to Host C? [2 marks]
______________________________________________________________________________
______________________________________________________________________________