DOC-20241209-WA0002.
DOC-20241209-WA0002.
DOC-20241209-WA0002.
UDP application :
• Domain Name Services.
• Simple Network Management Protocol.
• Trivial File Transfer Protocol.
• Routing Information Protocol.
• Kerberos.
3.The dump of a UDP header in hexadecimal format is as :BC 82000 D 002 B001 D
Ans. The UDP header has four parts, each of two bytes.
Ans. Transmission Control Protocol (TCP) to the processes at the application layer:
Full-Duplex Service
• TCP offers a full-duplex service where the data can flow in both directions
simultaneously. Each TCP will then have a sending buffer and receiving buffer. The TCP
segments are sent in both directions.
Connection-Oriented Service
We are already aware that the TCP is a connection-oriented protocol. When a process
wants to communicate (send and receive) with another process (process -2), the sequence
of operations is as follows:
Reliable Service
1) Source port address: -This is a 16-bit field that defines the port number of the
application program in the host that is sending the segment. This serves the same
purpose as the source port address in the UDP header.
2) Destination port address: - This is a 16-bit field that defines the port number of the
application program in the host that is receiving the segment. This serves the same
purpose as the destination port address in the UDP header.
3) Header length: -This 4-bit field indicates the number of 4-byte words in the TCP header.
The length of the header can be between 20 and 60 bytes. Therefore, the value of this
field can be between 5 (5 x 4 = 20) and 15 (15 x 4 = 60).
4) Reserved:- This is a 6-bit field reserved for future use.
5) Control Field:-This field defines 6 different control bits or flags. These are 6, 1 bit
control bits that controls connection establishment, connection termination,
connection abortion, flow control, mode of transfer etc
The function of control fields in TCP are:
• URG: Urgent pointer is valid.
• PSH: Request for push.
• RST: Reset the connection.
• SYN: Synchronize sequence numbers.
• FIN: Terminate the connection.
6) Window Size: This field tells the window size of the sending TCP
in bytes.
7) Checksum: This field holds the checksum for error control. It is mandatory in TCP as
opposed to UDP.
7. Describe Flow control under SCTP
Ans. SCTP handle two units of data: the byte and the chunk. The values of rwnd and cwnd
are expressed in bytes; the values of TSN and acknowledgments are expressed in chunks.
Receiver Site: The receiver has one buffer (queue) and three variables. The queue holds
the received data chunks that not read by the process. Three variables:
Sender Site: The sender has one buffer (queue) and three variables. We assume each
chunk is 100 bytes long. The buffer holds the chunks that either sent or ready to be sent.
Three variables:
SYN: The client sends the first segment, a SYN segment, in which only the SYN flag is set.
This segment is for synchronization of sequence numbers.
If 2 host
Simultaneously try to establish connection:
Simultaneous Open:
• It's possible for two applications to send a SYN to each other to start a TCP connection,
although the possibility is small, because both sides have to know which port on the
other side to send to. This process is called "Simultaneous Open", or "simultaneous
active open on both sides".
• In a simultaneous open, both applications issue active opens.
• This is a rare situation in which there is no client or server; communication is between
two peers that know their local port numbers.
• Both TCPs go through SYN-SENT and SYN-RCVD states before going to the
ESTABLISHED state.
• Both processes act as client and server.
• The two SYN+ACK segments acknowledge the SYN segments and open the connection.
2. *Explain TCP with respect to flow control and error control
Ans. TCP Flow Control is a protocol designed to manage the data flow Between the user
and the server. It ensures that there is a specific Bandwidth for sending and receiving data
so the data can be processed Without facing any major issues. In order to achieve this, the
TCP Protocol uses a mechanism called the sliding window protocol. Error control in TCP is
mainly done through the use of three simple Techniques :
1. Checksum – Every segment contains a checksum field which is Used to find corrupted
segments. If the segment is corrupted, Then that segment is discarded by the
destination TCP and is Considered lost.
2. Acknowledgement – TCP has another mechanism called Acknowledgement to affirm
that the data segments have been Delivered. Control segments that contain no data but
have Sequence numbers will be acknowledged as well but ACK Segments are not
acknowledged.
3. Retransmission – When a segment is missing, delayed to deliver to a receiver,
corrupted when it is checked by the receiver then that segment is retransmitted again.
Segments are retransmitted only during two events: when the sender
receives three duplicate acknowledgements (ACK) or when a retransmission timer
expires.
3. *Describe the fields of SCTP packet format. Explain SCTP association
establishment process.
Ans. SCTP transmits data in the form of messages and each message
contains one or more packets. The control come before data chunks.
• Flow control make it possible for sender to send the amount of data bytes
that can be sent without worrying an acknowledgment and is one of the
most important duties of the data link layer.
• It ensures that there is a specific Bandwidth for sending and receiving data
so the data can be processed Without facing any major issues.
5. *Demonstrate with suitable example of the call collision of TCP
Ans. The connection is established in TCP using the three-way handshake as
discussed earlier To create a connection. One side, say the server, passively
stays for an incoming link by Implementing the LISTEN and ACCEPT primitives,
either determining a particular other Side or nobody in particular. The other
side performs a connect primitive specifying the I/O Port to which it wants to
join. The maximum TCP segment size available, other options are Optionally
like some private data (example password). The CONNECT primitive transmits
A TCP segment with the SYN bit on and the ACK bit off and waits for a
response. The sequence of TCP segments sent in the typical case, as shown
in the figure below –
When the segment sent by Host-1 reaches the destination, i.e., host -2, the
receiving server Checks to see if there is a process that has done a LISTEN on
the port given in the Destination port field. If not, it sends a response with the
RST bit on to refuse the Connection. Otherwise, it governs the TCP segment to
the listing process, which can accept Or decline the connection.
Call Collision: If two hosts try to establish a connection simultaneously
between the same Two sockets, then the events sequence is demonstrated in
the figure under such Circumstances. Only one connection is established. It
cannot select both the links because Their endpoints identify connections.
Suppose the first set up results in a connection identified by (x, y) and the
second connection are also released up. In that case, only tail enter will be
made, i.e., for (x, y) for the initial sequence number, a clock-based scheme is
used, with a clock pulse coming after every 4 microseconds. For ensuring
additional safety when a host crashes, it may not reboot for sec, which is the
maximum packet lifetime. This is to make sure that no packets fromprevious
connections are roaming around.