Preview

Netw

Powerful Essays
Open Document
Open Document
4730 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Netw
Part 1 - Flow Control
Lab Objective
To observe common flow control and error control mechanisms used in networks.
You will examine how TCP works in order to demonstrate the method it uses to control the rate of transmission or flow control. All protocols have methods to assure that transmitted information will not overrun the receiver. We will watch the sliding windows form and grow through the process of slow start.

Explanation and Background
The TCP/IP Protocol Suite has two protocols at the Transport layer, both of which are designed to operate with applications on the upper layers.
UDP (User Datagram Protocol) is a datagram service, designed to carry small messages between applications with as little overhead as possible. The only information carried in the UDP header is for the source and destination port numbers, the length of the datagram and a checksum. UDP makes no guarantees about whether the data will arrive, how quickly it will arrive, or whether it will arrive in any particular order. It is called a pass-through protocol because it does nothing other than pass the data it is given. It is used for audio, video, and other real-time data because of the lack of overhead and because packets missed in such data flows must be ignored anyway.
TCP (Transmission Control Protocol), on the other hand, is a byte stream service that guarantees that a stream of bytes of any length received at the source will be exactly duplicated at the destination. To do this, TCP offers several services.
Segmentation: TCP splits the byte stream up into pieces referred to as segments that will traverse the network. The size of these segments is usually controlled by the layer two protocol being used (i.e., Ethernet) and is referred to as the Maximum Segment Size or MSS. The MSS is agreed to as part of the initial handshake when TCP sets up the connection between source and destination.
Packet Ordering: Packets are sent in order, and that order is maintained and restored

You May Also Find These Documents Helpful

  • Satisfactory Essays

    What field in the TCP header contains a well-known port number that maps to the application that will handle the segment data…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The client accept the connection and send data to server and the server to replay the…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Sends frames to and from with flow control, error control and sync; also addresses topology and medias.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    The Network Layer is accountable for implementing a logical addressing scheme and for transporting the packets from one end to the other end. The network layer can be connectionless or it can be connection oriented. This layer is also responsible for breaking larger packets up for delivery depending on the media this is known as packet switching. These protocols include Apple talk DDP, IP, and IPX.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    7. Find a TCP 3-way handshake for a TELNET session. What is the significance of the TCP 3-way handshake?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    3220 final review

    • 655 Words
    • 4 Pages

    3. What is used by TCP to establish a session between two systems? 69, 121…

    • 655 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    6. The TCP/IP model refers to standards other than those the IETF defines in RFCs. Which of these standards…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210 Final Exam Notes

    • 1243 Words
    • 5 Pages

    The TCP/IP model organizes its standards into layers. The layers make TCP/IP easier for humans to understand what TCP/IP does. It also makes it easier to divide the work among different products. * - write protocols, - create standards, - how networks work*…

    • 1243 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    TCP/IP is a suite of standards that computers use to communicate with across a medium4. TCP (transmission control protocol) is a protocol that requires a connection to transfer data from one node to another. UDP (user datagram protocol) does not require a connection. Information is split up into small sections called packets and sent over the medium. UDP does not require as much packet overhead as TCP and is more efficient to send data quickly. TCP is better for error checking of the data sent and received. Any protocol used has its…

    • 897 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Sliding Window Protocol

    • 351 Words
    • 2 Pages

    Sliding window protocol is used where a reliable transmitting of frame is required. It relies on packeting the frame queue to a definable window size which is provided to sender and receiver.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer.…

    • 932 Words
    • 4 Pages
    Satisfactory Essays