Networking Chapter 9 Syn Flag Urg Flag Which The Following Processes Guarantees That Packets Are

subject Type Homework Help
subject Pages 9
subject Words 2101
subject Authors Ed Tittel, James Pyles, Jeffrey L. Carrell

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 1
Indicate whether the statement is true or false.
1. UDP is the only connectionless TCP/IP protocol at the Transport layer.
a.
True
b.
False
2. UDP offers connection-oriented services with sequencing, error recovery, and a sliding window mechanism.
a.
True
b.
False
3. TCP half-open connections occur when the handshake process does not end successfully with a final ACK.
a.
True
b.
False
4. When the Protocol field of an IP header contains the value 17 (0x11), the UDP header follows the IP header.
a.
True
b.
False
5. TCP keep-alives are enabled by default on Windows XP, Windows Vista, Windows 7, Windows Server 2003,
and Windows Server 2008, although any application may disable TCP keep-alives, if desired by its
programmer.
a.
True
b.
False
Indicate the answer choice that best completes the statement or answers the question.
6. A protocol that offers no built-in error-checking or retransmission capability uses which type of packet
delivery?
a.
low performance
b.
connection-oriented
c.
best-effort
d.
high priority
7. Which of the following does TCP support, which is defined as the process of sending numerous data packets
in sequence without waiting for an intervening acknowledgment?
a.
retries
b.
sequence number tracking
c.
windowing
d.
error recovery
8. When an out-of-order data segment is received, the Fast Retransmit process requires the receiver to
immediately send which of the following?
a.
duplicate ACKs
b.
core services
page-pf2
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 2
c.
byte streams
d.
lost segments
9. Which of the following provide the simplest kind of transport services because they simply package
messages, taken as is from the TCP/IP Application layer, into datagrams?
a.
Core services
b.
Port numbers
c.
Logical connections
d.
Connectionless protocols
10. The Fast Recovery process dictates that when a host receives three duplicate ACKs, it must immediately
start retransmitting which of the following without waiting for the retransmission timer to expire.
a.
duplicate ACKs
b.
core services
c.
byte streams
d.
lost segments
11. Which of the following is the overloading of the network or a receiver?
a.
Sequence number tracking
b.
Buffering
c.
Congestion
d.
Windowing
12. Once a TCP connection is established, which of the following can maintain the connection when there is no
data sent across the wire?
a.
watchdog process
b.
core service
c.
keep-alive process
d.
handshake process
13. Which of the following is a simple protocol that is used by applications that contain their own connection-
oriented timeout values and retry counters, similar to those provided by TCP?
a.
UDP
b.
DoS
c.
RTO
d.
MSS
14. By default, Windows Vista, Windows 7, and Windows Server 2008 support a port range of 49152 to which
port number?
a.
55874
b.
58314
c.
61000
page-pf3
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 3
d.
65535
15. The initial sequence number used in a TCP connection is defined by the which of the following and, for
security purposes, should be randomly assigned?
a.
host
b.
packet
c.
port
d.
segment
16. Which of the following is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby
putting the receiver in a zero-window state.
a.
DoS
b.
Silly Window Syndrome
c.
Time Wait delay
d.
Retransmission timeout
17. What is used in order for TCP hosts to create a virtual connection with each other?
a.
sliding window
b.
handshake process
c.
teardown sequence
d.
retry mechanism
18. The TCP connection termination process requires how many packets?
a.
one
b.
two
c.
three
d.
four
19. Which of the following defines the length of the packet from the UDP header to the end of valid data (not
including any data link padding, if padding is required)?
a.
Checksum field
b.
Dynamic Port Number field
c.
Length field
d.
Destination Port Number field
20. Which of the following defines the destination application or process that uses the IP and UDP headers?
a.
Checksum field value
b.
Dynamic Port Number field value
c.
Length field value
d.
Destination Port Number field value
21. Which of the following does TCP support, which is a management method for data transmission used to
page-pf4
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 4
determine the amount of unacknowledged data that can go out on the wire from any sender?
a.
congestion mechanism
b.
retry mechanism
c.
sliding window mechanism
d.
watchdog mechanism
22. Which of the following is detected whenever three or more duplicate ACK packets (known as a triple-ACK)
or timeout events occur, and timeout events are considered more serious than duplicate acknowledgments?
a.
Logical connection
b.
Congestion
c.
Retransmission
d.
Windowing
23. Which of the following is used to indicate that the host completed a transaction?
a.
Reset flag
b.
FIN flag
c.
SYN flag
d.
URG flag
24. Which of the following processes guarantees that packets are ordered properly and protects against missing
segments?
a.
watchdog
b.
keep-alive
c.
handshake
d.
sequence and acknowledgment
25. Dynamic ports are used as which of the following for specific communications while they are underway?
a.
temporary ports
b.
core services
c.
byte streams
d.
lost segments
26. Overloading a receiver occurs when the number of data bytes is greater than which of the following?
a.
advertised window
b.
bandwidth
c.
sliding window
d.
ephemeral port
Enter the appropriate word(s) to complete the statement.
27. The ____________________ window is always the lesser of what the network and receiver can handle.
page-pf5
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 5
28. The ____________________ pseudo-header consists of three fields taken from the IP header: the IP Source
Address field value, the IP Destination Address field value, and the Protocol field value.
29. Because of ____________________'s end-to-end reliability and flexibility, it is the preferred transport
method for applications that transfer large quantities of data and require reliable delivery services.
30. ____________________ defines the range of numbers that identifies dynamic ports.
31. TCP has four defined congestion control mechanisms to ensure the most efficient use of
____________________ along with quick error and congestion recovery.
Match each item with a statement below.
a.
timeout mechanism
b.
temporary port
c.
Time Wait delay
d.
TCP buffer area
e.
retransmission timer
f.
Nagle algorithm
g.
Sequence number tracking
h.
acknowledgment
i.
windowing
32. a method for determining when to stop resending data across packets
33. a port that is used for the duration of the connection
34. an amount of time that a TCP host must not use connection parameters after closing down that connection
35. a queuing area used to hold incoming and outgoing TCP packets
36. the timer that maintains the RTO value
37. a method stating that when small packets are sent but not acknowledged, no further packets shall be sent
38. the process of following the current sequence number sent by a TCP peer and sending an acknowledgment
value to indicate the next-expected sequence number
39. notification of successful receipt of data
40. the process of acknowledging multiple packets with a single acknowledgment
41. Briefly discuss four limitations of UDP.
42. List the fields contained in the UDP header.
page-pf6
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 6
43. Briefly describe the TCP startup connection process.
44. List the two TCP control mechanisms, as defined in RFC 5681.
45. What is the difference between the window size field and the urgent pointer field?
46. Briefly discuss the type of tasks typically handled by connectionless protocols.
47. Briefly define the following TCP flag settings: URG (Urgent), ACK (Acknowledgment), and PSH(Push).
48. What is the order of the half-open connection communication sequence?
49. Briefly describe the following TCP connection states: LISTEN, SYN SENT, SYN RECD, AND CLOSE
WAIT.
50. What are the functions of a connection-oriented protocol?
page-pf7
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 7
page-pf8
Name:
Class:
Date:
page-pf9
Name:
Class:
Date:
page-pfa
Name:
Class:
Date:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.