EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Question
Book Icon
Chapter 4, Problem P22P
Program Plan Intro

Internet Protocol (IP):

Internet protocol is a process or protocol in which data is transferred between the computer systems through internet. Each computer system has its own IP address to send or receive the required data.

Datagram:

  • In networking, a datagram is a transferring unit which is used to transfer the data from a source to the destination and it doesn’t provide guaranteed service.
  • It includes fragmentation process which is defined as the division of the data packet into small one when the data packets are larger than the maximum length of a particular system.

Transmission Control Protocol (TCP):

  • TCP is an internet protocol used for exchanging of data between the sender and the receiver. It is a secured protocol for transferring the data.
  • When the sender sends data to the receiver, he/she waits for the acknowledgement from the receiver.
  • If acknowledgement is received then the next data packet will be sent and the process continues till all the data packets are sent.
  • If acknowledgement is not received then the receiver is assumed as hacker or intruder and the connection will be removed.

User Datagram Protocol (UDP):

  • User datagram protocol is a connectionless protocol.
  • The protocols used in UDP cannot establish the connection for data communication.
  • It is one of the communication protocol suites used for transferring small messages termed as datagram.
  • Alternative for TCP is UDP, but the data transfer speed of UDP is higher than TCP because there is no acknowledgment and error-checking.
  • Checksum and port number are the two services provided by the UDP.
  • There is no guarantee for data delivery and duplication of data.
  • It doesn’t provide a reliable service.

Blurred answer
Students have asked these similar questions
Question 5: Suppose you attach a network monitor to observe the sequence of frames that travel over a link from sender A to receiver B. The problem is to deduce what protocols, if any, could have generated the observed sequence. The following diagrams depict a flow of frames, with their corresponding sequence numbers, from the sender (A). There may be traffic from B to A, which is not depicted in the diagram. A gap between adjacent frames implies passage of time with no transmission from the sender. Note that the x-axis is time, and not space. Justify your answer. A A A ● ● ● ● 1 5 ● 3 5 0 ● 0 0 1 1 1 ● Go-Back-N ● Selective Repeat 1 0 5 0 c) For Diagram 3, the protocol is not: Stop-and-Wait Time Diagram 1 2 Time a) For Diagram 1, the most likely protocol being used is: Stop-and-Wait ● Go-Back-N (if Go-Back-N, give the window size) Selective Repeat (if Selective Repeat, give the window size) Diagram 2 Time 3 Diagram 3 1 Time b) For Diagram 2, the most likely protocol being used is:…
Consider the SDN OpenFlow network shown in the Figure. Suppose we want switch s2 tofunction as a firewall. Specify the flow table entries in s2 that implements the followingfirewall behaviors for delivery of datagrams destined to h3 and h4. You do not need tospecify the forwarding behavior in s2 that forwards traffic to other routers. [20]a. Only traffic arriving from hosts h1 and h6 should be delivered to hosts h3 or h4(i.e., that arriving traffic from hosts h2 and h5 is blocked).b. Only TCP traffic is allowed to be delivered to hosts h3 or h4 (i.e., that UDP trafficis blocked).c. Only traffic destined to h3 is to be delivered (i.e., all traffic to h4 is blocked).d. Only UDP traffic from h1 and destined to h3 is to be delivered. All other traffic isblocked
P22. Consider again the SDN OpenFlow network shown in Figure 4.30 . Suppose we want switch s2 to function as a firewall. Specify the flow table in s2 that implements the following firewall behaviors (specify a different flow table for each of the four firewalling behaviors below) for delivery of datagrams destined to h3 and h4. You do not need to specify the forwarding behavior in s2 that forwards traffic to other routers.  Only traffic arriving from hosts h1 and h6 should be delivered to hosts h3 or h4 (i.e., that arriving traffic from hosts h2 and h5 is blocked).  Only TCP traffic is allowed to be delivered to hosts h3 or h4 (i.e., that UDP traffic is blocked).  Only traffic destined to h3 is to be delivered (i.e., all traffic to h4 is blocked).  Only UDP traffic from h1 and destined to h3 is to be delivered. All other traffic is blocked.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education