Networking, 14th Edition by FitzGerald, Dennis,
Durcikova
One of the responsibilities of the transport layer protocol is to create a
_______________ communication. - ANSWER:One of the responsibilities of the
transport layer protocol is to create a PROCESS-TO-PROCESS communication.
UDP is called a _________________ transport protocol. - ANSWER:UDP is called a
CONNECTIONLESS, UNRELIABLE transport protocol.
UDP does not add anything to the services of IP except for providing
__________________ communication. - ANSWER:UDP does not add anything to the
services of IP except for providing PROCESS-TO-PROCESS communication.
UDP is acronym for ___________________. - ANSWER:UDP is an acronym for USER
DATAGRAM PROTOCOL.
Although there are several ways to achieve process-to-process communication, the
most common is through the __________________ paradigm. - ANSWER:Although
there are several ways to achieve process-to-process communication, the most
common is through the CLIENT-SERVER paradigm.
The local host and remote host are defined using IP addresses. To define the process,
we need second identifiers called _________________. - ANSWER:The local host and
remote host are defined using IP addresses. To define the process, we need second
identifiers called PORT ADDRESSES.
The ports ranging from 49,152 to 65,535 can be used as temporary or private port
numbers. They are called the _________________ ports. - ANSWER:The ports
ranging from 49,152 to 65,535 can be used as temporary or private port numbers.
They are called the DYNAMIC ports.
In the sending computer, UDP receives a data unit from the ____________________
layer. - ANSWER:In the sending computer, UDP receives a data unit from the
APPLICATION LAYER.
In the sending computer, UDP sends a data unit to the ___________________ layer.
- ANSWER:In the sending computer, UDP sends a data unit to the IP LAYER.
UDP and TCP are both __________________ layer protocols. - ANSWER:UDP and
TCP are both TRANSPORT LAYER PROTOCOLS.
The function the UDP performs is ____________________. - ANSWER:The function
the UDP performs is PROCESS-TO-PROCESS COMMUNICATION.
,When the IP layer of a receiving host receives a datagram, ____________________. -
ANSWER:When the IP layer of a receiving hoat receives a datagram, A TRANSPORT
LAYER PROTOCOL TAKES OVER.
UDP needs the __________________ address to deliver the user datagram to the
correct application process. - ANSWER:UDP needs the PORT address to deliver the
user datagram to the correct application process.
A port address in UDP is __________ bits long. - ANSWER:A port address in UDP is 16
BITS long.
The source port address on the UDP user datagram header defines
____________________. - ANSWER:The source port address on the UDP user
datagram header defines THE PROCESS RUNNING ON THE SENDING COMPUTER.
The combination of an IP address and a port number is called a
__________________. - ANSWER:The combination of an IP address and a port
number is called a SOCKET ADDRESS.
To use the services of UDP, we need __________________ socket addresses. -
ANSWER:To use the services of UDP, we need TWO SOCKET ADDRESSES.
UDP packets are called _______________. - ANSWER:UDP packets are called USER
DATAGRAMS.
UDP packets are encapsulated in _____________________. - ANSWER:UDP packets
are encapsulated in an IP DATAGRAM.
UDP packets have a fixed-size header of ___________________ bytes. -
ANSWER:UDP packets have a fixed-size header of 8 BYTES.
UDP uses ___________________ to handle outgoing user datagrams from multiple
processes on one host. - ANSWER:UDP uses MULTIPLEXING to handle outgoing user
datagrams from multiple processes on one host.
UDP uses __________________ to handle incoming user datagrams that go to
different processes on the same host. - ANSWER:UDP uses DEMULTIPLEXING to
handle incoming user datagrams that go to different processes on the same host.
TCP is a __________________ protocol. - ANSWER:TCP is a STREAM-ORIENTED
protocol.
TCP allows the sending process to deliver data as a ________________ of bytes and
allows the receiving process to receiving process to obtain data as a
__________________ of bytes. - ANSWER:TCP allows the sending process to deliver
,data as a STREAM of bytes and allows the receiving process to obtain data as a
STREAM of bytes.
Because the sending and the receiving processes may not write or read data at the
same speed, TCP ___________________. - ANSWER:Because the sending and
receiving processes may not write or read data at the same speed, TCP USES
BUFFERS.
TCP groups a number of bytes together into a packet called a _________________. -
ANSWER:TCP groups a number of bytes together into a packet called a SEGMENT.
TCP is a ______________ protocol. - ANSWER:TCP is a CONNECTION-ORIENTED
PROTOCOL.
TCP is a ___________________ transport protocol. - ANSWER:TCP is a RELIABLE
transport protocol.
TCP uses _____________________ to check the safe and sound arrival of data. -
ANSWER:TCP uses an ACKNOWLEDGEMENT MECHANISM to check the safe and
sound arrival of data.
The bytes of data being transferred in each connection are numbered by TCP. The
numbering starts with a __________________. - ANSWER:The bytes of data being
transferred in each connection are numbered by the TCP. The numbering starts with
a RANDOMLY GENERATED NUMBER.
TCP assigns a sequence number to each segment that is being sent. The sequence
number for each segment is the number of the ______________ byte carried in that
segment. - ANSWER:TCP assigns a sequence number to each segment that is being
sent. The sequence number for each segment is the number of the FIRST BYTE
carried in that segment.
Communication in TCP is ___________________. - ANSWER:Communication in TCP
is FULL-DUPLEX.
The value of the acknowledgement field in a segment defines the number of the
_________________ byte a party expects to receive. - ANSWER:The value of the
acknowledgement field in a segment defines the number of the NEXT BYTE A PARTY
EXPECTS TO RECEIVE.
The acknowledgement number is __________________. - ANSWER:The
acknowledgement number is CUMULATIVE.
The value of the window size is determined by _____________________. -
ANSWER:The value of the window size is determined by THE RECEIVER.
, The inclusion of the checksum in the TCP segment is ____________________. -
ANSWER:The inclusion of the checksum in the TCP segment is MANDATORY.
A TCP segment is encapsulated in __________________. - ANSWER:A TCP segment is
encapsulated in AN IP DATAGRAM.
Connection establishment in TCP is called ___________________ handshaking. -
ANSWER:Connection establishment in TCP is called THREE-WAY HANDSHAKING.
A SYN segment cannot carry data; it consumes _______________ sequence
numbers. - ANSWER:A SYN segment cannot carry data; it consumes ONE SEQUENCE
NUMBER.
A SYN + ACK segment cannot carry data; it consumes _________________ sequence
numbers. - ANSWER:...
An ACK segment, if carrying no data, consumes __________________ sequence
numbers. - ANSWER:An ACK segment, if carrying no data, consumes NO SEQUENCE
NUMBERS.
The connection establishment procedure in TCP is susceptible to a serious security
problem called the _______________ attack. - ANSWER:The connection
establishment procedure in TCP is susceptible to a serious security problem called
the SYN FLOODING ATTACK.
The SYN flooding attack belongs to a group of security attacks known as
_______________ attack. - ANSWER:The SYN flooding attack belongs to a group of
security attacks known as DENIAL OF SERVICE ATRACK.
The FIN segment consumes __________________ sequence numbers if it does not
carry data. - ANSWER:...
The FIN + ACK segment consumes _______________ sequence numbers if it does
not carry data. - ANSWER:The FIN + ACK segment consumes ONE SEQUENCE
NUNBER IF IT DOES NOT CARRY DATA.
In TCP, one end can stop sending data while still receiving data. This is called a
____________________. - ANSWER:In TCP, one end can stop sending data while still
receiving data. This is called a HALF-CLOSE.
A ______________ machine is a machine that goes through a limited number of
states. - ANSWER:A FINITE MACHINE is a machine that goes through a limited
number of states.
_______________ control regulates the amount of data a source can send before
receiving an acknowledgement from the destination. - ANSWER:FLOW CONTROL