CSC209H5 Lecture Notes - Lecture 10: Checksum, Simple Mail Transfer Protocol, Transmission Control Protocol

69 views3 pages

Document Summary

Csc209h5s - software programming and tools (winter 2018) It is possible for any two processes to communicate. Ideally, you want the child and parent to talk with each other. A socket behaves like a file (or pipe) Has an entry in the file descriptor table. There are two separate buffers that you are reading/writing from. From a network standpoint, this includes network protocols, layers, clients and servers, addresses/ip, packets, routing etc. Computers use several layers of general protocols to communicate. Next is routing protocol - used for sending information from one machine to another; may have multiple paths of communication. When you"re surfing the web, you send a request and the data is sent and you acknowledge it to the server which then sends more data. Gets the machine name to retrieve the data. Source address bytes data ack port destination address. Each tcp packet is given a header (sequence number and checksum).

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents