Chapter 3 Midterm Review
Chapter 3 Midterm Review
Chapter 3 Midterm Review
delay or bandwidth guarantees for transport layer segments between hosts, then the transport-layer protocol cannot provide delay or bandwidth guarantees for application messages between processes. However, the transport-layer protocol is capable of providing services that the network-layer protocol may not provide, such as reliable data transfer if the networklayer protocol is unreliable (loses, damages, or duplicates packets), and encryption to prevent intruders from reading application messages, even if the network-layer protocol cannot guarantee segment confidentiality.
Demultiplexing: the delivery of transport-layer segments to their correct socket. Each segment is assigned a source port number and destination port number. When the segment arrives at the host, the transport layer examines the destination port number in the segment and sends it to the corresponding socket. Multiplexing: the gathering of data pieces at the source host from different sockets, encapsulation of each data piece with header information to create segments, and passing of the segments to the network layer. Source port number field: segment field that identifies which port the segment came from. The source port number is extracted from the segment by the destination host, then a response is sent using the source port number as the destination port number. Destination port number field: segment field that identifies which port the segment should be delivered to. Well-known port numbers: port numbers from 0-1023. Restricted and reserved for well-known application protocols like HTTP (80) and FTP (21). UDP sockets are identified by two numbers: destination IP address and destination port number. TCP sockets are identified by four numbers: source IP address, source port number, destination IP address, and destination port number. Segments sent to Web servers always have a destination port number of 80.
whether bits within the UDP segment have been altered during delivery by performing the 1s complement of all sum of all the 16-bit words in the segment, with any overflow encountered during the sum being wrapped around. UDP segments with errors are handled differently depending on the application - some discard the segments, while others warn that the segment is damaged, and some don't do anything.