Chapter 9 - Computer Networks - Term 3 (SWQ)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the advantage of segmenting?

Enables many different communications, from many different users, to be interleaved (multiplexed) on the same network.

A client application needs to terminate a TCP communication session with a server. Discuss the termination process steps.

In order to terminate a TCP session, the client sends to the server a segment with the FIN flag set. The server acknowledges the client by sending a segment with the ACK flag set. The server sends a FIN to the client to terminate the server to client session. The client acknowledges the termination by sending a segment with the ACK flag set.

What is the reason of generating ISN at random?

Prevents some certain types of attacks.

PSH

Push Functions

RST

Reset the connection

What would be the order of the TCP segments, when they arrive at destination device?

Segments may arrive out of order.

Explain how the TCP connection is established?

Step 1 - The initiating client requests a client-to-server communication session with the server. Step 2 - The server acknowledges the client-to-server communication session and requests a server-to-client communication session. Step 3 - The initiating client acknowledges the server-to-client communication session.

Refer to the figure above to explain the steps needed to show how the TCP connection is established.

Step 1 - The initiating client requests a client-to-server communication session with the server. Step 2 - The server acknowledges the client-to-server communication session and requests a server-to-client communication session. Step 3 - The initiating client acknowledges the server-to-client communication session.

Characteristics of UDP

- Best effort delivery - Fast - Less overhead - Less load on network

Which of the following is a part of three-way-handshake?

- Establishes that the destination device is present on the network. - Verifies that the destination device is active and accepting requests on the destination port that the client intends to use. - Informs the destination that client intends to establish a communication session on that port.

Features of TCP

- Establishing a session to ensure the application is ready to receive the data - Lost segments are resent so the data is received completely - Same-order delivery to ensure segments are reassembled into the proper order - Flow control to ensure that the receiver is able to process the data being received - Reliable Delivery (TCP and UDP have nothing to do with IP Addresses so whenever a question relates them to IP Addresses as a feature, choose IP feature answer as not a feature)

Features of UDP

- No ordered data reconstruction - Unreliable delivery - Connectionless - No Flow Control

List the three basic operations of reliability with TCP.

- Numbering and tracking data segments transmitted to a specific host from a specific application - Acknowledging received data - Retransmitting any unacknowledged data after a certain period of time

TCP's basic operations

- Numbering and tracking data segments. - Acknowledging received segments. - Re-transmit any unacknowledged data.

TCP Header

- Source Port (16 bits) and Destination Port (16 bits)-Used to identify the application.• Sequence number (32 bits)-Used for data reassembly purposes.• Acknowledgment number (32 bits)-Indicates the data that has been received.• Header length (4 bits)-Known as ʺdata offsetʺ. Indicates the length of the TCP segment header.• Reserved (6 bits)-This field is reserved for the future.• Control bits (6 bits)-Includes bit codes, or flags, which indicate the purpose and function of the TCP segment.• Window size (16 bits)-Indicates the number of bytes that can be accepted at one time.• Checksum (16 bits)-Used for error checking of the segment header and data.• Urgent (16 bits)-Indicates if data is urgent

Discuss three of the transport layer responsibilities in the TCP/IP model.

-Tracking the individual communication streams between applications on the source and destination hosts - Segmenting data at the source and reassembling the data at the destination - Identifying the proper application for each communication stream through the use of port numbers - Multiplexing the communications of multiple users or applications over a single network - Managing the reliability requirements of applications

How many bits are reserved in TCP header to set the control flags?

6 bits

Which of the following TCP services ensures that the application is ready to receive the data? A.Establishing a session B.Same order delivery C.Reliable delivery D.Flow control E.Data reassembly

A

Which of the following TCP services prevents the need for retransmission of the data when the receiving host's resources are overwhelmed A.Flow control B.Same order delivery C.Reliable delivery D.Establishing a session E.Data reassembly

A

Which of the following data types is perfectly suited to UDP? A.Live video B.SMS C.Email messages D.Documents E.Numerical data

A

Which of the following is considered a reliable, full-featured transport layer protocol, which ensures that all of the data arrives at the destination A.TCP B.UDP C.IP D.TFTP E.DNS

A

What would be the ISN of the first segment?

A randomly generated number

ACK

Acknowledgement field significant

How many bytes of overhead does a TCP segment have? A.10 B.20 C.30 D.40 E.50

B

Which of the following is not true about UDP? A.It has much lower overhead than TCP because it's not connection-oriented B.Applications that use UDP are always unreliable C.It is very desirable for protocols that make simple request and reply transactions. D.It is not necessarily an inferior protocol used on the network E.It does not establish a connection before sending data

B

Which of the following is the proper way to representa socket on a web server if the web server Destination port was assigned 80? A.192.168.1.80 B.192.168.1.7:80 C.80:192.168 D.192:80 E.80

B

Explain the following statement. UDP provides the basic functions for delivering data segments between the appropriate applications, with very little overhead and data checking.

Because it is not connection-oriented and does not offer the sophisticated retransmission, sequencing, and flow control mechanisms that provide reliability.

Why does UDP provide low overhead data transport?

Because it is not connection-oriented and does not offer the sophisticated retransmission, sequencing, and flow control mechanisms that provide reliability.

Explain how TCP has the Same-Order Delivery feature

Because networks may provide multiple routes that can have different transmission rates, data can arrive in the wrong order. By numbering and sequencing the segments, TCP can ensure that these segments are reassembled into the proper order.

Which of the following is not a feature UDP required protocol properties? A.Fast B.No acknowledgment C.Resends lost data D.Delivers data as it arrives E.A and D

C

Which of the following is/are applications designed to use TCP? I.HTTP II.Email III.IP telephony A.I only B.II only C.I and II only D.I and III only E.I, II, III

C

Which of the following statements is not true about UDP overhead? I.Live video can tolerate some data loss with minimal effect, and are perfectly suited to UDP. II.UDP datagrams are sent as best effort by the transport layer protocol. III.UDP has a low overhead of 31 bytes. A.I only B.II only C.III only D.I and III only E.I, II, III

C

What does segmenting data means in computer networks?

Cutting the data into smaller chunks

For the following TCP/IP model, what is the right order of layers from top to bottom? A.Network Access >Transport>Application>Internet B.Transport>Application>Internet>Network Access C.Transport>Application>Network Access>Internet D.Application>Transport>Internet>Network Access E.Application>Internet>Transport>Network Access

D

Which of the following protocols would introduce unnecessary network traffic? i.TCP ii.UDP iii.DHCP A.i only B.ii only C.iii only D.i and iii E.ii and iii

D

Which flags are used for TCP session termination? A.RST and FIN B.SYN and ACK C.PSH and SYN D.RST and PSH E.FIN and ACK

E

SYN

Synchronize sequence numbers

What are the transport layer protocols?

TCP, UDP

Which information is used at the destination, that enables the transport layer to reconstruct the pieces of data into a complete data stream that is useful to the application layer? A.User's Information B.Network Information C.Router Information D.Footer Information E.Header Information

E

Which of the following flags is/are used for TCP session termination? I.RST II.PSH III.FIN IV.ASK A.I only B.II only C.III only D.I and II only E.III and IV only

E

Which of the following is true about UDP? I.It has much lower overhead than TCP because it's not connection-oriented II.It does not establish a connection before sending data III.It is not necessarily an inferior protocol used on the network A.I only B.II only C.III only D.I and II only E.I, II and III

E

What is the purpose of using a source port number in a TCP communication?

The source port number in a segment header is used to keep track of multiple conversations between devices. It is also used to keep an open entry for the response from the server.

How is each segment of data identified on a channel?

The transport layer adds a header containing binary data organized into several fields. It is the values in these fields that enable various transport layer protocols to perform different functions in managing data communication.

What does TCP stand for?

Transmission Control Protocol

URG

Urgent pointer field significant

What does UDP stand for?

User Datagram Protocol

B

Using the figure below, which port is used by the server to respond to client 2 as a destination port? A.Port: 49152 B.Port: 51152 C.Port: 80 D.Port: 25 E.Both Ports 80 and 25

B

What is the first layer from top to bottom called in the TCP/IP model as shown in the figure below? A.Network Access B.Transport C.Internet D.Application E.Physical

Multiplexing

What is the process indicated by letter X in the figure below?

B

Which of the following enables many different communications, from many different users, to be interleaved(multiplexed) on the same network as shown in the figure below? A.Encoding B.Multiplexing C.Decoding D.Encryption E.Decryption

Which of the following features is/areoffered for data transmission by UDP? i.Segmentation ii.Reassembly iii.Flow control iv.Reliable delivery

i and ii

What does it mean when we say UDP is known as a best-effort delivery protocol.

In the context of networking, best-effort delivery is referred to as unreliable because there is no acknowledgment that the data is received at the destination. With UDP, there are no transport layer processes that inform the sender of a successful delivery.

How do an ISN gets incremented to set the next segment number?

Incremented by the number bytes that have been transmitted.

FIN

No more data from sender


Ensembles d'études connexes

Medical Terminology Self Test Chapter 2

View Set

Final Exam (All past exam questions)

View Set

Computer Organization and Architecture: Chapter 1 - Introduction

View Set

Hematologic & Immunologic Disorders in Children

View Set

Chapter 60: Assessment of Integumentary Function

View Set