100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

The Bits and Bytes of Computer Networking: The Transport and Application Layers WK 3

Rating
-
Sold
-
Pages
3
Grade
A
Uploaded on
23-11-2022
Written in
2022/2023

The Bits and Bytes of Computer Networking: The Transport and Application Layers WK 3 What ordering of TCP flags makes up the Three-way Handshake? SYN, SYN/ACK, ACK; The computer that wants to establish a connection sends a packet with the SYN flag set. Then, the server responds with a packet with both the SYN and ACK flags set. Finally, the original computer sends a packet with just the ACK flag set. Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is a port field? 16 bits; A TCP or UDP port is a 16-bit number, meaning there are theoretically 65,535 possible values it can have. Please select all valid TCP control flags. WAIT, URG, ACK, LISTEN, RST, CLOSE RST, ACK, URG A device that blocks traffic that meets certain criteria is know as a ________. Firewall; A firewall is used to block certain defined types of traffic. Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below. The presentation layer; The presentation layer might handle things like compression or encryption. the session layer; The session layer handles delivery of data from the transport layer to applications themselves. An example of something that operates at the application layer is: a web browser; Web browsers and server operate at the application layer. What's the standard number for a TTL field? 64; While this value can be set to anything from 0 to 255, 64 is the recommended standard. Ports 1-1023 are known as ______ ports. system; System ports are used for very well-known services. If the transmitting device would like for the receiving device to push currently buffered data to the application on the receiving end immediately, it would set the ____ flag. PSH; The PSH flag ensures that the receiving end doesn't wait for any further data.

Show more Read less
Institution
The Bits And Bytes Of Computer Networking
Course
The Bits and Bytes of Computer Networking








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
The Bits and Bytes of Computer Networking
Course
The Bits and Bytes of Computer Networking

Document information

Uploaded on
November 23, 2022
Number of pages
3
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

The Bits and Bytes of Computer Networking: The Transport and Application Layers WK 3 What ordering of TCP flags makes up the Three -way Handshake? SYN, SYN/ACK, ACK; The computer that wants to establish a connection sends a packet with the SYN flag set. Then, the server responds with a packet with both the SYN and ACK flags set. Finally, the original computer sends a packet with just the ACK flag set . Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is a port fi eld? 16 bits; A TCP or UDP port is a 16 -bit number, meaning there are theoretically 65,535 possible values it can have. Please select all valid TCP control flags. WAIT, URG, ACK, LISTEN, RST, CLOSE RST, ACK, URG A device that blocks traffic that meets c ertain criteria is know as a ________. Firewall; A firewall is used to block certain defined types of traffic. Unlike our five -layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers bel ow. The presentation layer; The presentation layer might handle things like compression or encryption. the session layer; The session layer handles delivery of data from the transport layer to applications themselves. An example of something that operate s at the application layer is: a web browser; Web browsers and server operate at the application layer. What's the standard number for a TTL field? 64; While this value can be set to anything from 0 to 255, 64 is the recommended standard. Ports 1 -1023 ar e known as ______ ports. system; System ports are used for very well -known services. If the transmitting device would like for the receiving device to push currently buffered data to the application on the receiving end immediately, it would set the ____ flag. PSH; The PSH flag ensures that the receiving end doesn't wait for any further data.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bri254 Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
895
Member since
5 year
Number of followers
738
Documents
3375
Last sold
2 weeks ago
Best Tutorials, Exam guides, Homework help.

When assignments start weighing you down, take a break. I'm here to create a hassle-free experience by providing up-to-date and recent study materials. Kindly message me if you can't find your tutorial and I will help.

4.0

178 reviews

5
106
4
19
3
25
2
5
1
23

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions