![EBK COMPUTER NETWORKING](https://www.bartleby.com/isbn_cover_images/8220102955479/8220102955479_largeCoverImage.jpg)
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 4, Problem R17RQ
Program Plan Intro
Host:
- A host is a computer system or any device connected to other system or device in a network to exchange the data.
- A network host provides required information or data resources, services, applications and many others to other users present in the network.
- It can be a network node related to the network address.
Internet Protocol:
Internet protocol is a process or protocol in which data is transferred between the computer systems through internet. Each computer system has its own IP address to send or receive the required data. It consists of five different layers namely, application layer, transport layer, network layer, link layer and physical layer.
Datagram:
- In networking, a datagram is a transferring unit which is used to transfer the data from a source to the destination and it doesn’t provide guaranteed service.
- It includes fragmentation process which is defined as the division of the data packet into small one when the data packets are larger than the maximum length of a particular system.
Transmission Control Protocol (TCP):
- TCP is an internet protocol used for exchanging of data between the sender and the receiver. It is a secured protocol for transferring the data.
- When the sender sends data to the receiver, he/she waits for the acknowledgement from the receiver.
- If acknowledgement is received then the next data packet will be sent and the process continues till all the data packets are sent.
- If acknowledgement is not received then the receiver is assumed as hacker or intruder and the connection will be removed.
User Datagram Protocol (UDP):
- User datagram protocol is a connectionless protocol.
- The protocols used in UDP cannot establish the connection for data communication.
- It is one of the communication protocol suites used for transferring small messages termed as datagram.
- Alternative for TCP is UDP, but the data transfer speed of UDP is higher than TCP because there is no acknowledgment and error-checking.
- Checksum and port number are the two services provided by the UDP.
- There is no guarantee for data delivery and duplication of data.
- It doesn’t provide a reliable service.
Network Layer:
Network layer is provides the path in which the data packets are transferred from the source to the destination. It also helps in converting the logical or IP address to physical or Media Access Control (MAC) address.
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Trending nowThis is a popular solution!
![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
With Network Address Translation, a router changes a private IP address in the IP header to the public IP address of the
router, and the source port number (TCP or UDP) is changed to a port number selected by the router. Assuming the
transport layer protocol being used is UDP, what other field of the UDP header may need to be changed?
a. Length
O b. Destination port
Checksum
с.
Assume Host A sends a TCP segment encapsulated in an IP data-gram to Host B. How does Host B's network layer realize that the segment (that is, the payload of the datagram) should be passed to TCP rather than UDP or another upper layer protocol as it receives the datagram?
With Network Address Translation, a router changes a private IP address in the IP header to the public IP address of the router, and the
source port number (TCP or UDP) is changed to a port number selected by the router. Assuming the transport layer protocol being used
is UDP, what other field of the UDP header may need to be changed?
a. Destination port
O b. Checksum
O c. Length
Chapter 4 Solutions
EBK COMPUTER NETWORKING
Ch. 4 - Lets review some of the terminology used in this...Ch. 4 - Prob. R2RQCh. 4 - Prob. R3RQCh. 4 - Prob. R4RQCh. 4 - Prob. R5RQCh. 4 - Prob. R6RQCh. 4 - Prob. R7RQCh. 4 - Prob. R8RQCh. 4 - Prob. R9RQCh. 4 - Prob. R10RQ
Ch. 4 - Prob. R11RQCh. 4 - Prob. R12RQCh. 4 - Prob. R13RQCh. 4 - Prob. R14RQCh. 4 - Prob. R15RQCh. 4 - Prob. R16RQCh. 4 - Prob. R17RQCh. 4 - Prob. R18RQCh. 4 - Prob. R19RQCh. 4 - Prob. R20RQCh. 4 - Prob. R21RQCh. 4 - Prob. R22RQCh. 4 - Prob. R23RQCh. 4 - Prob. R24RQCh. 4 - Prob. R25RQCh. 4 - Prob. R26RQCh. 4 - Prob. R27RQCh. 4 - Prob. R28RQCh. 4 - Prob. R29RQCh. 4 - Prob. R30RQCh. 4 - Prob. R31RQCh. 4 - Prob. R32RQCh. 4 - Prob. R33RQCh. 4 - Prob. R34RQCh. 4 - Prob. R35RQCh. 4 - Prob. P1PCh. 4 - Prob. P2PCh. 4 - Prob. P3PCh. 4 - Consider a datagram network using 32-bit host...Ch. 4 - Consider a datagram network using 8-bit host...Ch. 4 - Consider a datagram network using 8-bit host...Ch. 4 - Prob. P8PCh. 4 - Prob. P9PCh. 4 - Prob. P10PCh. 4 - Prob. P11PCh. 4 - Prob. P12PCh. 4 - Consider sending a 2400-byte datagram into a link...Ch. 4 - Prob. P15PCh. 4 - Prob. P16PCh. 4 - Prob. P17PCh. 4 - Prob. P18PCh. 4 - Prob. P19PCh. 4 - Prob. P20PCh. 4 - Prob. P21PCh. 4 - Prob. P22P
Knowledge Booster
Similar questions
- A 3200 bit long TCP message is transmitted to the IP layer and becomes a datagram after adding a 160 bit header. The following Internet is connected by two LANs through routers. But the data part of the longest data frame that the second LAN can transmit is only 1200 bits. Therefore, datagrams must be segmented in the router. How many bits of data does the second LAN transmit to its upper layer?arrow_forwardSuppose an Ethernet packet represents a TCP acknowledgment; that is, the packet contains an IPv4 header with no options and a 20-byte TCP header but nothing else. Is the IPv4 packet here smaller than the Ethernet minimum packet size, and, if so, by how much? What if the packet is IPv6 with no extension headers?arrow_forwardIP datagrams on a specific network can carry a maximum of only 440 bytes in the data portion. A node on this network, running an application using TCP generates a TCP segment with 1,900 bytes in the data portion. How many IP packets are transmitted to carry this TCP segment, and what are their sizes (including the header of 20 bytes)?arrow_forward
- 1. What is the difference between packet fragmentation (i.e., at network layer) and frame frag- mentation (i.e., at link layer) in terms of purpose? 2. Suppose that host A is connected to a router R1, R1 is connected to another router, R2, and R2 is connected to host B. Suppose that a TCP message that contains 800 bytes of data and 20 bytes of TCP header is passed to the IP function at host A for delivery to B. Show the Total length, DF, MF, and Fragment offset fields of the IP header in each packet transmitted over the three links. (Assume that link A-R1 can support a maximum frame size of 1024 bytes including a 14-byte frame header, link R1-R2 can support a maximum frame size of 512 bytes, including an 8-byte frame header, and link R2-B can support a maximum frame size of 432 bytes including a 12-byte frame header.) (*hint: the Fragment offset field is denominated by 8-bytes, not bytes) 3. What is the purpose of the path MTU discovery process (see textbook Figure 5-42) and why does…arrow_forwardWe have said that an application may choose UDP for a transport protocol because UDP offers finer application control (than TCP) of what data is sent in a segment and when a Why does an application have more control of what data is sent in a segment? b. Why does an application have more control on when the segment is sent?arrow_forwardTCP is a connection-oriented protocol, whereas IP is a connectionless protocol. What is the best way to have these two protocols coexist in the same stack?arrow_forward
- Two transport-layer protocols may be used by certain application applications (UDP or TCP). Thus, how can a computer determine which transport layer is responsible for delivering a packet?arrow_forwardThe maximum packet size (Maximum Transmission Unit or MTU) of an IP packet including IPv4 header on 100 Mbps Ethernet is usually set at 1500 bytes. A typical IPv4 header consists of 20 bytes, and a UDP header consists of 8 bytes. If we split up a file of 20,000,000 bytes so we can send it as a series of UDP payloads, how many IP packets do we have to send in order to transfer the entire file? Enter an integer number without formatting (no commas). Answer:arrow_forwardThe maximum packet size (Maximum Transmission Unit or MTU) of an IP packet including IPv4 header on 100 Mbps Ethernet is usually set at 1500 bytes. A typical IPv4 header consists of 20 bytes, and a UDP header consists of 8 bytes. If we split up a file of 20,000,000 bytes so we can send it as a series of UDP payloads, how many IP packets do we have to send in order to transfer the entire file? Enter an integer number without formatting (no commas). Answer: The MTU for IP packets on 100 Mbps Ethernet is typically set to 1500 bytes. A typical IPv4 header consists of 20 bytes, and a UDP header consists of 8 bytes. If we split up a file of 25,000,000 bytes so we can send it as a series of UDP payloads, how many bytes do we have to send at the network layer in order to transfer the entire file? Enter an integer number (no commas). Answer: You are sending a 27,000,000 byte file using UDP over IP over an Ethernet with MTU 1500 bytes. The Ethernet header is 14 bytes and the frame checksum is 4…arrow_forward
- The services provided by two different transport-layer protocols may be used by certain application applications (UDP or TCP). So, how can a computer tell which transport layer is handling the delivery of a packet?arrow_forwardIn Figure 2.10, when the IP protocol decapsulates the transport-layer packet, how does it know to which upper-layer protocol (UDP or TCP) the packet should be delivered?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningA+ Guide to Hardware (Standalone Book) (MindTap C...Computer ScienceISBN:9781305266452Author:Jean AndrewsPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,Comptia A+ Core 1 Exam: Guide To Computing Infras...Computer ScienceISBN:9780357108376Author:Jean Andrews, Joy Dark, Jill WestPublisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337102063/9781337102063_smallCoverImage.gif)
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305266452/9781305266452_smallCoverImage.gif)
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780357108291/9780357108291_smallCoverImage.jpg)
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
![Text book image](https://www.bartleby.com/isbn_cover_images/9780357108376/9780357108376_smallCoverImage.jpg)
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning