Question

In: Computer Science

A common protocol stack used by many applications is to use TCP at the transport layer...

A common protocol stack used by many applications is to use TCP at the transport layer and IP at the network layer. The ICMP protocol is also used to report on problems encountered by IP.

  1. The IP protocol provides a service referred to as “best effort”. Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control (ensuring the sender does not overwhelm the receiver).
  2. Describe the service TCP provides with respect to flow control and explain the mechanisms it uses to overcome the deficiencies of IP.

Solutions

Expert Solution

Ans- ICMP: is an integral part of IP and must be implemented by every Ip. the ICMP report the error in the processing of datagram. there are based on two important point .

1. Error handeling or Feedback messaging.

  • TTL Exceed.
  • parameter problem.
  • source quench.
  • source redirect.
  • Destination Unreachable.

2. Request and Reply

  • Echo request and reply.
  • Time stamp request and reply.
  • Network mask request and reply.
  • Router solicitation.

TCP: Transmission Control Protocol is a set of standardized rules allow the computer to communicate on a network as the internet. it is following important points.

  • Reliable.
  • end to end .
  • Byte stream protocol.
  • Connection Oriented.
  • mux and demux.

IP- it is define IP address of protocol. which uses IP communication of routing function and internet. tcp and Ip both are allow source and destination.

TCP implement for IP 's deficiencies by providing reliable ,stream- oriented connections that hide most of IP. The protocol refear   most Tcp/Ip protocol are based onTcp , the TCP/IP are twin pillars of TCP/IP. it is used unix operating .

Segment Format- is used 32 bit words and 20byte header.

Source port number- it identifies the port number of sender it is a 16 bit field.

Destination port number- it idetifies the port number of recieving application .it is a 16 bit field.

Sequence Numbers- is a 32 bit field.tcp assign unique sequence number to each byte of data of segment .

TCP header conatins the first byte's sequence number.

Round -Trip Time Estimation- round -trip time estimation is perform parameter of tcp .it is used low packets retransmit.if too high connection can sit idle while the host waits to timeout.


Related Solutions

A common protocol stack used by many applications is to use TCP at the transport layer...
A common protocol stack used by many applications is to use TCP at the transport layer and IP at the network layer. The ICMP protocol is also used to report on problems encountered by IP. The IP protocol provides a service referred to as “best effort”. Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control (ensuring the sender does not overwhelm the receiver). Describe the service TCP provides with respect to flow control...
What are the potential dangers to merge network layer with transport layer of computer networking protocol...
What are the potential dangers to merge network layer with transport layer of computer networking protocol stack?
discuss the types of networks that would require TCP as a transport protocol because of its...
discuss the types of networks that would require TCP as a transport protocol because of its characteristics. Provide the application and or services, also include port numbers with description.
Describe the difference between IP and Network Access layer in TCP protocol and also explain the...
Describe the difference between IP and Network Access layer in TCP protocol and also explain the control information embedded in these two layers
1a) In your own words, what is the difference between Transport Control Protocol (TCP) and User...
1a) In your own words, what is the difference between Transport Control Protocol (TCP) and User Datagram Protocol (UDP)? Also give some examples of services that use TCP and UDP. b) PC1 is assigned the IP address 192.168.13.8 with a subnet mask of 255.255.255.224. PC1 sends a packet to PC2 which has an IP address of 192.168.13.65. Is PC1 (192.168.13.8) and PC2 (192.168.13.65) in the same subnet based on the subnet mask of PC1 (255.255.255.224)?
List three applications that use UDP and three applications that use TCP and explain why those...
List three applications that use UDP and three applications that use TCP and explain why those applications use the selected Transport layer protocol.
What types of applications could work without a Transport protocol? What are some of the problems...
What types of applications could work without a Transport protocol? What are some of the problems modern networks would face if there was no Transport protocol in the TCP/IP suite?
1.Where does TLS fit on the Internet protocol stack? 2.How do applications use TLS? 3.How does...
1.Where does TLS fit on the Internet protocol stack? 2.How do applications use TLS? 3.How does TLS provide authentication? Does it provide mutual authentication (both client and server-side)? Is that required? 4.What is the purpose of padding, Message Authentication Code (MAC), handshake protocol, change cyber suite (CCS) protocol? 5.How does TLS provide: confidentiality, availability, integrity, non-repudiation? 6.Is TCP a user of TLS services or does it provide services to TLS (hard question) – explain your answer in one sentence? 7.Does...
1.ARPANET originally used TCP/IP as a routing protocol for messages True False 2. Programming language developed...
1.ARPANET originally used TCP/IP as a routing protocol for messages True False 2. Programming language developed for business use and meant to run on multiple different computers. COBOL Fortran LISP BASIC 3.Transistors and vacuum tubes are no longer used in computers True False 4.The PDP series of minicomputers were developed by IBM. True False 5.Programming language popular with engineers because the code looked like algebra COBOL Fortran LISP BASIC
If two applications use TCP to send data but only send 10 bytes per segment (e.g....
If two applications use TCP to send data but only send 10 bytes per segment (e.g. by using the push operation), what is the maximum percent of the network bandwidth they will have for their data?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT