100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Business Data Communications and Networking, 14th Edition by FitzGerald, Dennis, Durcikova

Rating
-
Sold
-
Pages
114
Grade
A+
Uploaded on
11-09-2024
Written in
2024/2025

Business Data Communications and Networking, 14th Edition by FitzGerald, Dennis, Durcikova

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Course

Document information

Uploaded on
September 11, 2024
Number of pages
114
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

TEST BANK For Business Data Communications and
Networking, 14th Edition by FitzGerald, Dennis,
Durcikova

One of the responsibilities of the transport layer protocol is to create a
_______________ communication. - ANSWER:One of the responsibilities of the
transport layer protocol is to create a PROCESS-TO-PROCESS communication.

UDP is called a _________________ transport protocol. - ANSWER:UDP is called a
CONNECTIONLESS, UNRELIABLE transport protocol.

UDP does not add anything to the services of IP except for providing
__________________ communication. - ANSWER:UDP does not add anything to the
services of IP except for providing PROCESS-TO-PROCESS communication.

UDP is acronym for ___________________. - ANSWER:UDP is an acronym for USER
DATAGRAM PROTOCOL.

Although there are several ways to achieve process-to-process communication, the
most common is through the __________________ paradigm. - ANSWER:Although
there are several ways to achieve process-to-process communication, the most
common is through the CLIENT-SERVER paradigm.

The local host and remote host are defined using IP addresses. To define the process,
we need second identifiers called _________________. - ANSWER:The local host and
remote host are defined using IP addresses. To define the process, we need second
identifiers called PORT ADDRESSES.

The ports ranging from 49,152 to 65,535 can be used as temporary or private port
numbers. They are called the _________________ ports. - ANSWER:The ports
ranging from 49,152 to 65,535 can be used as temporary or private port numbers.
They are called the DYNAMIC ports.

In the sending computer, UDP receives a data unit from the ____________________
layer. - ANSWER:In the sending computer, UDP receives a data unit from the
APPLICATION LAYER.

In the sending computer, UDP sends a data unit to the ___________________ layer.
- ANSWER:In the sending computer, UDP sends a data unit to the IP LAYER.

UDP and TCP are both __________________ layer protocols. - ANSWER:UDP and
TCP are both TRANSPORT LAYER PROTOCOLS.

The function the UDP performs is ____________________. - ANSWER:The function
the UDP performs is PROCESS-TO-PROCESS COMMUNICATION.

,When the IP layer of a receiving host receives a datagram, ____________________. -
ANSWER:When the IP layer of a receiving hoat receives a datagram, A TRANSPORT
LAYER PROTOCOL TAKES OVER.

UDP needs the __________________ address to deliver the user datagram to the
correct application process. - ANSWER:UDP needs the PORT address to deliver the
user datagram to the correct application process.

A port address in UDP is __________ bits long. - ANSWER:A port address in UDP is 16
BITS long.

The source port address on the UDP user datagram header defines
____________________. - ANSWER:The source port address on the UDP user
datagram header defines THE PROCESS RUNNING ON THE SENDING COMPUTER.

The combination of an IP address and a port number is called a
__________________. - ANSWER:The combination of an IP address and a port
number is called a SOCKET ADDRESS.

To use the services of UDP, we need __________________ socket addresses. -
ANSWER:To use the services of UDP, we need TWO SOCKET ADDRESSES.

UDP packets are called _______________. - ANSWER:UDP packets are called USER
DATAGRAMS.

UDP packets are encapsulated in _____________________. - ANSWER:UDP packets
are encapsulated in an IP DATAGRAM.

UDP packets have a fixed-size header of ___________________ bytes. -
ANSWER:UDP packets have a fixed-size header of 8 BYTES.

UDP uses ___________________ to handle outgoing user datagrams from multiple
processes on one host. - ANSWER:UDP uses MULTIPLEXING to handle outgoing user
datagrams from multiple processes on one host.

UDP uses __________________ to handle incoming user datagrams that go to
different processes on the same host. - ANSWER:UDP uses DEMULTIPLEXING to
handle incoming user datagrams that go to different processes on the same host.

TCP is a __________________ protocol. - ANSWER:TCP is a STREAM-ORIENTED
protocol.

TCP allows the sending process to deliver data as a ________________ of bytes and
allows the receiving process to receiving process to obtain data as a
__________________ of bytes. - ANSWER:TCP allows the sending process to deliver

,data as a STREAM of bytes and allows the receiving process to obtain data as a
STREAM of bytes.

Because the sending and the receiving processes may not write or read data at the
same speed, TCP ___________________. - ANSWER:Because the sending and
receiving processes may not write or read data at the same speed, TCP USES
BUFFERS.

TCP groups a number of bytes together into a packet called a _________________. -
ANSWER:TCP groups a number of bytes together into a packet called a SEGMENT.

TCP is a ______________ protocol. - ANSWER:TCP is a CONNECTION-ORIENTED
PROTOCOL.

TCP is a ___________________ transport protocol. - ANSWER:TCP is a RELIABLE
transport protocol.

TCP uses _____________________ to check the safe and sound arrival of data. -
ANSWER:TCP uses an ACKNOWLEDGEMENT MECHANISM to check the safe and
sound arrival of data.

The bytes of data being transferred in each connection are numbered by TCP. The
numbering starts with a __________________. - ANSWER:The bytes of data being
transferred in each connection are numbered by the TCP. The numbering starts with
a RANDOMLY GENERATED NUMBER.

TCP assigns a sequence number to each segment that is being sent. The sequence
number for each segment is the number of the ______________ byte carried in that
segment. - ANSWER:TCP assigns a sequence number to each segment that is being
sent. The sequence number for each segment is the number of the FIRST BYTE
carried in that segment.

Communication in TCP is ___________________. - ANSWER:Communication in TCP
is FULL-DUPLEX.

The value of the acknowledgement field in a segment defines the number of the
_________________ byte a party expects to receive. - ANSWER:The value of the
acknowledgement field in a segment defines the number of the NEXT BYTE A PARTY
EXPECTS TO RECEIVE.

The acknowledgement number is __________________. - ANSWER:The
acknowledgement number is CUMULATIVE.

The value of the window size is determined by _____________________. -
ANSWER:The value of the window size is determined by THE RECEIVER.

, The inclusion of the checksum in the TCP segment is ____________________. -
ANSWER:The inclusion of the checksum in the TCP segment is MANDATORY.

A TCP segment is encapsulated in __________________. - ANSWER:A TCP segment is
encapsulated in AN IP DATAGRAM.

Connection establishment in TCP is called ___________________ handshaking. -
ANSWER:Connection establishment in TCP is called THREE-WAY HANDSHAKING.

A SYN segment cannot carry data; it consumes _______________ sequence
numbers. - ANSWER:A SYN segment cannot carry data; it consumes ONE SEQUENCE
NUMBER.

A SYN + ACK segment cannot carry data; it consumes _________________ sequence
numbers. - ANSWER:...

An ACK segment, if carrying no data, consumes __________________ sequence
numbers. - ANSWER:An ACK segment, if carrying no data, consumes NO SEQUENCE
NUMBERS.

The connection establishment procedure in TCP is susceptible to a serious security
problem called the _______________ attack. - ANSWER:The connection
establishment procedure in TCP is susceptible to a serious security problem called
the SYN FLOODING ATTACK.

The SYN flooding attack belongs to a group of security attacks known as
_______________ attack. - ANSWER:The SYN flooding attack belongs to a group of
security attacks known as DENIAL OF SERVICE ATRACK.

The FIN segment consumes __________________ sequence numbers if it does not
carry data. - ANSWER:...

The FIN + ACK segment consumes _______________ sequence numbers if it does
not carry data. - ANSWER:The FIN + ACK segment consumes ONE SEQUENCE
NUNBER IF IT DOES NOT CARRY DATA.

In TCP, one end can stop sending data while still receiving data. This is called a
____________________. - ANSWER:In TCP, one end can stop sending data while still
receiving data. This is called a HALF-CLOSE.

A ______________ machine is a machine that goes through a limited number of
states. - ANSWER:A FINITE MACHINE is a machine that goes through a limited
number of states.

_______________ control regulates the amount of data a source can send before
receiving an acknowledgement from the destination. - ANSWER:FLOW CONTROL
$17.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
kushboopatel6867
5.0
(1)

Get to know the seller

Seller avatar
kushboopatel6867 Chamberlain College Nursing
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
1 year
Number of followers
0
Documents
1282
Last sold
3 months ago
EXCELLENT HOMEWORK HELP AND TUTORING ,

EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A Am an expert on major courses especially; psychology,Nursing, Human resource Management and Mathemtics Assisting students with quality work is my first priority. I ensure scholarly standards in my documents and that's why i'm one of the BEST GOLD RATED TUTORS in STUVIA. I assure a GOOD GRADE if you will use my work.

Read more Read less
5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions