Question

In: Computer Science

Consider the TCP connection mechanism.    i. What mechanism is used to set up a TCP...

Consider the TCP connection mechanism.
   i. What mechanism is used to set up a TCP connection?
ii. Why is the mechanism needed?
iii. Outline how the mechanism works with a diagram.
iv.CLASSFULL AND CLASSLESS IP

Solutions

Expert Solution

i) Three way handshaking protocol(SYN,SYN-ACK,ACK) is used to establish a TCP(Transmission Control Protocol) Connection.

ii)This mechanism is used to create connection between the client and the server node even before actual data is transmitted.

iii) This three way handshaking works in the following three phases.

Phase 1; The client sends the SYN (Synchronize )packet to server to check for any open ports for the connection establishment.

Phase 2: The server, if any open ports are available sends a SYN-ACK (Synchronization-Acknowledgement) packet to the client.The client receives the SYN-ACK packet.

Phase 3: The client upon receiving the SYN-ACK packet sends ACK packet to the server stating that it received SYN-ACK packet

Now the TCP Socket Connection is established.

iv) The terms classless and classfull IP refers to both IP addressing as well as IP Routing.

Classfull IP:

1) These classfull IP addresses have three parts: Network, Subnet ,Host which contains a 8,16, 24 bit network field based on Class A,B or C Addressing Rules.

Class A: First Octet as Network ID and last three Octets as Host ID.

Class B: First two as Network ID and last two Octets as Host ID.

Class C: First three as Network ID and last Octet as Host ID.

2) Example: Routing Information protocol

3) Subnet mask remains the same for complete network.

4) Limited network can be used and this is the main disadvantage.

5) Imposes Restrictions on the usage of the default route while forwarding IP packets.

CLASSLESS IP:

1)Classless addressing has only two parts. Subnet and host . Here the network and the subnet parts are combined into single part called the subnet or prefix.

2) Subnet mask is of variable length also known as VLSM(Variable length subnet mask) and is not of default type.

3) No boundary limitations on host and network id.

4) Example is BGP (Border gateway protocol)

5) Imposes no Restrictions on the usage of the default route while forwarding IP packets.


Related Solutions

Consider sending a large file from a host to another over a TCP connection that has...
Consider sending a large file from a host to another over a TCP connection that has no loss. Suppose TCP uses AIMD for its congestion control without slow start. The initial MSS=4 and cwnd increases by 1 MSS every time a batch of ACKs is received. Assume approximately constant round-trip times. a. how long does it take for cwnd increase from 5 MSS to 9 MSS (assuming no loss events)? b. What is the average throughout (in terms of MSS...
What role does TCP play during HTTP requests? Is TCP a connection-oriented protocol? Explain in details....
What role does TCP play during HTTP requests? Is TCP a connection-oriented protocol? Explain in details. Also, show your knowledge about layers.
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection requests on a system so that it is unable to respond to legitimate connection requests. Consider a server system with a table for 256 connection requests. This system will retry sending the SYN-ACK packet five times when it fails to receive an ACK packet in response, at 30 second intervals, before purging the request from its table. Assume that no additional countermeasures are used...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection requests on a system so that it is unable to respond to legitimate connection requests. Consider a server system with a table for 256 connection requests. This system will retry sending the SYN-ACK packet five times when it fails to receive an ACK packet in response, at 30 second intervals, before purging the request from its table. Assume that no additional countermeasures are used...
Like a TCP server, a UDP server's job is to set up a communication endpoint and...
Like a TCP server, a UDP server's job is to set up a communication endpoint and passively waits for the client to initiate the communication; however, since UDP is connectionless, UDP communication is initiated by a datagram from the client, without going through a connection setup as in TCP. Write a program to demonstrate the typical UDP server goes through the following four steps: 1. Construct an instance of DatagramSocket, specifying the local port and, optionally, the local address. 2....
WIRESHARK - What is the throughput (bytes transferred per unit time) for the TCP connection? Explain...
WIRESHARK - What is the throughput (bytes transferred per unit time) for the TCP connection? Explain how you calculated this value. This question is based on the trace file tcp-ethereal-trace-1 in in http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip Thanks in advance!
. What is the primary difference between UDP and TCP? One is connection-oriented, one is connectionless...
. What is the primary difference between UDP and TCP? One is connection-oriented, one is connectionless One uses checksums, one does not One is used by a router, the other by a bridge One is used by IP, the other is used by ICMP They are identical 33. A router deals with which part of the IP address: NIC PORT Host ID Network ID 34. A hop in a TCP/IP network refers to: Going through a bridge Going through a...
What method is used to set up a file for reading and/or writing?
What method is used to set up a file for reading and/or writing?
Simultaneous TCP connection initiations are rare, but simultaneous connection termination is relatively common. How do two...
Simultaneous TCP connection initiations are rare, but simultaneous connection termination is relatively common. How do two TCP nodes negotiate the simultaneous sending of FIN packets to one another? Draw the ladder diagram, and label the states on each side. Which node goes into TIMEWAIT state?
Write a Java program that establishes a TCP connection with a mail server through the socket...
Write a Java program that establishes a TCP connection with a mail server through the socket interface, and sends an email message. Your program sends SMTP commands to local mail server, receives and processes SMTP commands from local mail server. It sends email message to one recipient at a time. The email message contains a typical message header and a message body. Here is a skeleton of the code you'll need to write: import java.io.*; import java.net.*; public class EmailSender...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT