CIN 2103 - Chapter 9 (Transport)

Ace your homework & exams now with Quizwiz!

*netstat ______ option is used to display IPs and ports in numerical form* A. -p B. -i C. -n D. -m

-n

https://i.imgur.com/6oM3NOU.png *In the figure, the source is transmitting ______ bytes of data within each segment.* A. 1,460 B. 2,921 C. 4,381 D. 10,000

1,460

List 4 applications along with their port number and protocol.

1- 80, TCP, HTTP 2- 110, TCP, POP 3- 143, TCP, IMAP 4- 443, TCP, HTTPS More answers can be found here: https://i.imgur.com/tFrpBiQ.png

List 3 features of UDP

1- Best-effort delivery (unreliable) 2- No acknowledgment 3- Similar to a non-registered letter

List 6 applications that use UDP.

1- DHCP 2- DNS 3- SNMP 4- TFTP 5- voip 6- IPTv

List 2 applications that use UDP

1- DNS 2- TFTP

List 4 features of UDP

1- Data is reconstructed in the order that it is received 2- Any segments lost are not resent 3- No session establishment 4- Does not inform the sender about resource availability

List 4 features of the TCP protocol

1- Establishing a session 2- Reliable delivery 3- Same-order delivery 4- Flow control

List 4 applications that use TCP

1- FTP 2- HTTP 3- SMTP 4- DNS

List 5 properties of the UDP protocol

1- Fast 2- Low overhead 3- Does not require acknowledgements 4- Does not resend lost data 5- Delivers data as it arrives

List 4 applications that use TCP.

1- HTTP 2- FTP 3- SMTP 4- Telnet

List 3 types of applications best suited for UDP.

1- Live video and multimedia 2- Simple request and reply 3- Handle reliability themselves

List 3 responsibilities of the TCP

1- Numbering and tracking data segments 2- Acknowledging received data 3- Retransmitting any unacknowledged data after a certain period of time

List 4 properties of the TCP protocol

1- Reliable 2- Acknowledges data 3- Re-sends lost data 4- Delivers data in sequenced order

List 2 roles of the Transport layer.

1- Responsible for establishing a temporary communication session between two applications and delivering data between them. 2- Link between the application layer and the lower layers that are responsible for network transmission.

List 7 fields of a TCP header

1- Source and Destination Port 2- Sequence number 3- Acknowledgement number 4- Header length 5- Control bits 6- Window size 7- Checksum

List 4 fields of the UDP header

1- Source port 2- Destination port 3- Length 4- Checksum

List 3 Responsibilities of the Transport Layer

1- Tracking the conversation 2- Segmentation 3- Identifying the application

TCP/IP provides 2 transport layer protocols. List them.

1- Transmission Control Protocol (TCP) 2- User Datagram Protocol (UDP)

*What is the total size of the TCP header in bytes?* A. 10 B. 20 C. 30 D. 40

20

*Window size is agreed on during ______-way handshake.* A. 1 B. 2 C. 3 D. 4

3

*The ______ number is the number of the next expected byte* A. Window size B. Acknowledgement

Acknowledgement

*______ indicates data has been received and ready for next byte from source* A. Source and Destination Port B. Sequence number C. Acknowledgement number D. Header length E. Control bits F. Window size G. Checksum

Acknowledgement number

*Segmentation ______ conversation multiplexing - multiple applications an use the network at the same time* A. Allows B. Disallows

Allows

Why does UDP provide low overhead data transport?

Because: 1- it has a small datagram header. 2- It doesn't have network management traffic

https://i.imgur.com/6oM3NOU.png *PC A ______ adjust its send window as it receives acknowledgments from PC B.* A. Can B. Cannot

Can

*Congestion ______ retransmission of lost TCP segments* A. Causes B. Doesn't cause

Causes

*______ - Used for error checking of segment header and data* A. Source and Destination Port B. Sequence number C. Acknowledgement number D. Header length E. Control bits F. Window size G. Checksum

Checksum

https://i.imgur.com/VfwSjaS.png *PC A reduces the number of bytes it sends before receiving an acknowledgment. This is an example of ______.* A. Traffic control B. Congestion control

Congestion control

*______ - purpose and function of TCP segment* A. Source and Destination Port B. Sequence number C. Acknowledgement number D. Header length E. Control bits F. Window size G. Checksum

Control bits

*Tell the destination what service is being requested. Example: Port 80 web services are being requested* A. Source Port B. Destination Port

Destination Port

*UDP ______ retransmission, sequencing, and flow control* A. Has B. Doesn't have

Doesn't have

*Sockets ______ multiple processes to be distinguished* A. Enable B. Disable

Enable

*Ensures the application is ready to receive the data* A. Establishing a session B. Reliable delivery C. Same-order delivery D. Flow control

Establishing a session

*Negotiate the amount of traffic that can be forwarded at a given time* A. Establishing a session B. Reliable delivery C. Same-order delivery D. Flow control

Establishing a session

*Regulate the amount of data the source transmits* A. Establishing a session B. Reliable delivery C. Same-order delivery D. Flow control

Flow control

*______ - length of TCP segment header* A. Source and Destination Port B. Sequence number C. Acknowledgement number D. Header length E. Control bits F. Window size G. Checksum

Header length

*UDP ______ connection-oriented* A. Is B. Is not

Is not

*Segmentation facilities data transport by the ______ network layers* A. Higher B. Lower

Lower

*Identifying the Application - Ensures that even with multiple applications running on a device, all applications receive the correct data via ______* A. Device numbers B. Port numbers

Port numbers

*TCP and UDP manage multiple conversations by using unique identifiers called ______ * A. Host numbers B. Port numbers

Port numbers

*Port numbers that range from 49152 to 65535 belong to ______ port group.* A. Well-known ports B. Registered ports C. Private and/or Dynamic ports

Private and/or Dynamic ports

*Usually assigned dynamically by the client's OS and used to identify the client application during communication.* A. Well-known ports B. Registered ports C. Private and/or Dynamic ports

Private and/or Dynamic ports

*The segment header used for ______.* A. Reassembly only B. Tracking only C. Reassembly and tracking

Reassembly and tracking

*Port numbers that range from 1024 to 49151 belong to ______ port group.* A. Well-known ports B. Registered ports C. Private and/or Dynamic ports

Registered ports

*This port group is assigned by IANA to a requesting entity to use with specific processes or applications.* A. Well-known ports B. Registered ports C. Private and/or Dynamic ports

Registered ports

*Ensuring that each segment that the source sends arrives at the destination* A. Establishing a session B. Reliable delivery C. Same-order delivery D. Flow control

Reliable delivery

*Numbering & Sequencing the segments guarantees reassembly into the proper order* A. Establishing a session B. Reliable delivery C. Same-order delivery D. Flow control

Same-order delivery

*Source and destination ports are usually placed in a ______, which will be encapsulated in IP packet* A. Data B. Segment C. Frame D. Bit

Segment

*The transport layer divides the data into ______ that are easier to manage and transport.* A. Segments B. Packets C. Frames D. Bits

Segments

*______ used for data reassembly* A. Source and Destination Port B. Sequence number C. Acknowledgement number D. Header length E. Control bits F. Window size G. Checksum

Sequence number

*Segmenting the data into ______ chunks enables many different communications to be multiplexed on the same network.* A. Bigger B. Smaller

Smaller

*192.168.1.7:80 is an example of ______* A. Socket B. IP with subnet mask

Socket

*When combining an IP and a port number, a ______ is formed* A. Frame B. Socket

Socket

*______ port acts as a return address* A. Source B. Destination

Source

*Originating application port that is dynamically generated by sending device. Example: Each separate HTTP conversation is tracked based on the source ports.* A. Source Port B. Destination Port

Source Port

*______ used to identify application* A. Source and Destination Port B. Sequence number C. Acknowledgement number D. Header length E. Control bits F. Window size G. Checksum

Source and Destination Port

*UDP is a ______ * A. Stateful protocol - with tracking B. Stateless protocol - no tracking

Stateless protocol - no tracking

*The transport layer ______ each individual conversation flowing between a source and a destination application.* A. Tracks B. Doesn't track

Tracks

*Additional fields needed in header which increases size and delay.* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

Transmission Control Protocol (TCP)

*Considered reliable which ensures that all of the data arrives at the destination.* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

Transmission Control Protocol (TCP)

*Databases, web browsers, and email clients require that all data that is sent arrives at the destination in its original condition. Which protocol should it use?* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

Transmission Control Protocol (TCP)

*SMTP/POP and HTTP should use ______* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

Transmission Control Protocol (TCP)

*To avoid and control congestion, ______ employs several congestion handling mechanisms, timers, and algorithms* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

Transmission Control Protocol (TCP)

*______ frees applications from having to manage reliability* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

Transmission Control Protocol (TCP)

*______ is a connection-oriented protocol* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

Transmission Control Protocol (TCP)

*The ______ layer moves data between applications on devices in the network.* A. Transport B. Network C. Data link D. Physical

Transport

*Does not provide for reliability.* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

*Fewer fields and is faster than the other protocol.* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

*IP telephony and stream live videos should use ______* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

*If one or two segments of a live video stream fail to arrive, if disruption in the stream, may not be noticeable to the user. Which protocol should it use?* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

*Use ______ for less overhead and to reduce possible delays.* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

*______ does not establish a connection before sending data.* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

*______ reassembles data in order received and forwards to application. Application must identify the proper sequence* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

*______ reliability is handled by the application* A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

*Port numbers that range from 0 to 1023 belong to ______ port group.* A. Well-known ports B. Registered ports C. Private and/or Dynamic ports

Well-known ports

*This port group is reserved for services and applications. * A. Well-known ports B. Registered ports C. Private and/or Dynamic ports

Well-known ports

https://i.imgur.com/6oM3NOU.png *Typically, PC B ______ wait for 10,000 bytes before sending an acknowledgment.* A. Will B. Will not

Will not

*The ______ determines the number of bytes that can be sent before expecting an acknowledgement.* A. Window size B. Acknowledgement

Window size

*______ - number of bytes that can be accepted at one time* A. Source and Destination Port B. Sequence number C. Acknowledgement number D. Header length E. Control bits F. Window size G. Checksum

Window size

*Retransmission of segments can make the congestion ______ * A. Better B. Worse

Worse

*By default, ______ will attempt to resolve IP addresses to domain names and port numbers to well-known applications* A. ping B. netstat

netstat

*______ is a command and a network utility that can be used to verify connections* A. ip interface B. netstat

netstat


Related study sets

AP Euro Period 3 (1815-1914), AP Euro period 3

View Set

Life Insurance Study Guide Part 2

View Set

AGAMA BAB 6 - Ibadah Haji dan Umrah

View Set

Exam II- Chapter 8: The Sensorimotor System

View Set

Servers3.1 - Implementing Hyper V & Virtual Networks

View Set

WEEK 11 ADN220 [THE CONCEPT OF FAMILY]

View Set

Chapter 7: Managing Stress and Emotions

View Set