EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 3, Problem R1RQ
a)
Explanation of Solution
Step-by-step process of designing the simplest possible transport-layer protocol:
The STP (Simple Transport Protocol) takes for the process. The protocol takes the data not exceeding 1196 bytes at the sender side.
- The protocol accepts the four byte destination port number, host address, and a destination port address as a chunk which is not exceeding 1196 bytes.
- STP adds a four-byte header to each chunk and puts the port number of the destination in this header.
- The protocol then gives the destination host address and the resulting segment to the network layer.
- After receiving the address and segment, the network layer send the segment to STP at the destination host.
- STP then examines the segment and observes its port number and then the protocol extracts the data from the segment.
- The extracted data passes to the process of identified port number.
b)
Explanation of Solution
Modification:
Consider the segment has two header fields: one is “source port field” and another one is “destination port field”.
- At the source side, STP accepts the chunk of data which is not exceeding 1192 bytes. The data has destination host address, source port number, and a destination port number.
- Then, STP creates a segment which has application data, source port number, and destination port number.
- After creating segment, STP gives the two values to the network layer. They are: segment and destination port number.
- Then the STP receives host address and provides the process the source port number and the application data.
c)
Explanation of Solution
“No”, the transport layer does not do anything in the core of the
Explanation:
The reason is that the transport layer “lives” in the end systems.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Suppose the network layer provides the following service. The network layer in the
source host accepts a segment of maximum size 1,200 bytes and a destination host
address from the transport layer. The network layer then guarantees to deliver the
segment to the transport layer at the destination host. Suppose many network
application processes can be running at the destination host.
a) Design the simplest possible transport-layer protocol that will get application
data to the desired process at the destination host. Assume the operating system
in the destination host has assigned a 4-byte port number to each running
application process.
b) Modify this protocol so that it provides a “return address” to the destination
process.
c) In your protocols, does the transport layer “have to do anything” in the core of the computer network? Explain your answer.
d) The Transmission Control Protocol (TCP) has got six flag fields. List these six
fields and discuss the purpose of each of these…
Consider a TCP segment originating on a host running a Google Chrome Browser
destined for the TU Dublin Webserver:
(1) Separately identify how the port numbers are assigned for the client and server
applications and, identify the range from which these port numbers are
allocated.
(ii) Identify the byte order used to represent these addresses within the segment
header.
(iii) If a port number contained in the segment header is passed to the Application
layer, identify the function used to convert it to the correct byte order within the
application.
Suppose the network layer provides the following service. The network layer in the
source host accepts a segment of maximum size 1,200 bytes and a destination host
address from the transport layer. The network layer then guarantees to deliver the
segment to the transport layer at the destination host. Suppose many network
application processes can be running at the destination host.
a) Design the simplest possible transport-layer protocol that will get application
data to the desired process at the destination host. Assume the operating system
in the destination host has assigned a 4-byte port number to each running
application process.
b) Modify this protocol so that it provides a “return address” to the destination
process.
c) In your protocols, does the transport layer “have to do anything” in the core of
the computer network? Explain your answer.
Chapter 3 Solutions
EBK COMPUTER NETWORKING
Ch. 3 - Prob. R1RQCh. 3 - Prob. R2RQCh. 3 - Consider a TCP connection between Host A and Host...Ch. 3 - Prob. R4RQCh. 3 - Prob. R5RQCh. 3 - Prob. R6RQCh. 3 - Suppose a process in Host C has a UDP socket with...Ch. 3 - Prob. R8RQCh. 3 - Prob. R9RQCh. 3 - In our rdt protocols, why did we need to introduce...
Ch. 3 - Prob. R11RQCh. 3 - Prob. R12RQCh. 3 - Prob. R13RQCh. 3 - Prob. R14RQCh. 3 - Suppose Host A sends two TCP segments back to back...Ch. 3 - Prob. R16RQCh. 3 - Prob. R17RQCh. 3 - Prob. R18RQCh. 3 - Prob. R19RQCh. 3 - Prob. P1PCh. 3 - Prob. P2PCh. 3 - UDP and TCP use 1s complement for their checksums....Ch. 3 - Prob. P4PCh. 3 - Prob. P5PCh. 3 - Prob. P6PCh. 3 - Prob. P7PCh. 3 - Prob. P8PCh. 3 - Prob. P9PCh. 3 - Prob. P10PCh. 3 - Prob. P11PCh. 3 - Prob. P12PCh. 3 - Prob. P13PCh. 3 - Prob. P14PCh. 3 - Prob. P15PCh. 3 - Prob. P16PCh. 3 - Prob. P17PCh. 3 - Prob. P21PCh. 3 - Prob. P22PCh. 3 - Prob. P25PCh. 3 - Prob. P26PCh. 3 - Prob. P27PCh. 3 - Host A and B are directly connected with a 100...Ch. 3 - Prob. P29PCh. 3 - Prob. P30PCh. 3 - Prob. P31PCh. 3 - Prob. P33PCh. 3 - Prob. P34PCh. 3 - Prob. P35PCh. 3 - Prob. P37PCh. 3 - Prob. P38PCh. 3 - Prob. P39PCh. 3 - Prob. P41PCh. 3 - Prob. P42PCh. 3 - Prob. P43PCh. 3 - Prob. P44PCh. 3 - Prob. P45PCh. 3 - Prob. P46PCh. 3 - Prob. P47PCh. 3 - Prob. P48PCh. 3 - Prob. P49PCh. 3 - Prob. P51PCh. 3 - Prob. P53PCh. 3 - Prob. P55P
Knowledge Booster
Similar questions
- Suppose the network layer provides the following service. The network layer in the sourcehost accepts a segment of maximum size 1,200 bytes and a destination host address from thetransport layer. The network layer then guarantees to deliver the segment to the transport layerat the destination host. Suppose many network application processes can be running at thedestination host Modify this protocol so that it provides a “return address” to the destination process.arrow_forwardSuppose the network layer provides the following service. The network layer in the sourcehost accepts a segment of maximum size 1,200 bytes and a destination host address from thetransport layer. The network layer then guarantees to deliver the segment to the transport layerat the destination host. Suppose many network application processes can be running at thedestination host Design the simplest possible transport-layer protocol that will get application data to the desired process at the destination host. Assume the operating system in the destination host has assigned a 4-byte port number to each running application process.arrow_forwardSuppose the network layer provides the following service. The network layer in the source host accepts a segment of maximum size 1,200 bytes and a des- tination host address from the transport layer. The network layer then guaran- tees to deliver the segment to the transport layer at the destination host. Suppose many network application processes can be running at the destination host. a. Design the simplest possible transport-layer protocol that will get applica- tion data to the desired process at the destination host. Assume the operat- ing system in the destination host has assigned a 4-byte port number to each running application process. b. Modify this protocol so that it provides a “return address” to the destina- tion process. c. In your protocols, does the transport layer “have to do anything” in the core of the computer network?arrow_forward
- a) For the given network diagram, suppose an application running on Host 1 transmits a packet towards application running on Host 2. Graphically represent the process of packet encapsulation and de-capsulation along the path from Host 1 to Host 2.b) Both Layer-2 Switch and Router are used to forward network traffic from one interface to another. How are they different in terms of functionality?arrow_forwardSuppose the network layer provides the following service. The network layer in the sourcehost accepts a segment of maximum size 1,200 bytes and a destination host address from thetransport layer. The network layer then guarantees to deliver the segment to the transport layerat the destination host. Suppose many network application processes can be running at thedestination host In your protocols, does the transport layer “have to do anything” in the core of the computer network?arrow_forwardThe service model of a network layer "defines the characteristics of end-to-end transit of packets between sending and receiving hosts," according to us. What is the network layer of the Internet's service model? What guarantees does the Internet's service model make about datagram delivery from host to host?arrow_forward
- Suppose Alice, with a Web-based e-mail account (such as Hotmail or Gmail), sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alice’s host to Bob’s host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts.arrow_forwardAssume the network layer offers the following. The source host's network layer accepts a 1,200-byte segment and a destination host address from the transport layer. The network layer then assures delivery to the destination transport layer. Assume the target host has several network application processes. Does the transport layer “have to perform anything” in your protocols?arrow_forwardConsider a local network with a 1 Gbps access link to the Internet. Hosts on this network are accessing resources with an average size of 2 MB from a distant server at an average rate of 50 requests per second. a. What is the link utilization of the access link to the internet? b. Suppose these requests were to go through a caching proxy server. What would the link utilization to the internet be if half of all requests were served from the cache of the proxy server? с. resources never being needed for example.) Would this still provide any advantages to the end user? Would there be any disadvantages to the end user? Suppose the proxy server could not serve any content from cache (due to the samearrow_forward
- Assume a system uses five protocol layers. If the application program creates a message of 100 bytes and each layer (including the fifth and the first) adds a header of 10 bytes to the data unit, what is the efficiency (the ratio of application layer bytes to the number of bytes transmitted) of the system?arrow_forwardExplain the pros and cons of connectionless protocols over connection-based ones?arrow_forwardSuppose Alan, with a Web-based e-mail account (such as Gmail or Yahoo! Mail), sends a message to Benson, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alan's host to Benson's host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning