Data Communications and Networking
One of the responsibilities of the transport layer protocol is to create a _______________
communication. - ANS-One of the responsibilities of the transport layer protocol is to create a
PROCESS-TO-PROCESS communication.
UDP is called a _________________ transport protocol. - ANS-UDP is called a
CONNECTIONLESS, UNRELIABLE transport protocol.
UDP does not add anything to the services of IP except for providing __________________
communication. - ANS-UDP does not add anything to the services of IP except for providing
PROCESS-TO-PROCESS communication.
UDP is acronym for ___________________. - ANS-UDP is an acronym for USER DATAGRAM
PROTOCOL.
Although there are several ways to achieve process-to-process communication, the most
common is through the __________________ paradigm. - ANS-Although there are several
ways to achieve process-to-process communication, the most common is through the
CLIENT-SERVER paradigm.
The local host and remote host are defined using IP addresses. To define the process, we need
second identifiers called _________________. - ANS-The local host and remote host are
defined using IP addresses. To define the process, we need second identifiers called PORT
ADDRESSES.
The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers.
They are called the _________________ ports. - ANS-The ports ranging from 49,152 to 65,535
can be used as temporary or private port numbers. They are called the DYNAMIC ports.
In the sending computer, UDP receives a data unit from the ____________________ layer. -
ANS-In the sending computer, UDP receives a data unit from the APPLICATION LAYER.
In the sending computer, UDP sends a data unit to the ___________________ layer. - ANS-In
the sending computer, UDP sends a data unit to the IP LAYER.
UDP and TCP are both __________________ layer protocols. - ANS-UDP and TCP are both
TRANSPORT LAYER PROTOCOLS.
The function the UDP performs is ____________________. - ANS-The function the UDP
performs is PROCESS-TO-PROCESS COMMUNICATION.
,When the IP layer of a receiving host receives a datagram, ____________________. -
ANS-When the IP layer of a receiving hoat receives a datagram, A TRANSPORT LAYER
PROTOCOL TAKES OVER.
UDP needs the __________________ address to deliver the user datagram to the correct
application process. - ANS-UDP needs the PORT address to deliver the user datagram to the
correct application process.
A port address in UDP is __________ bits long. - ANS-A port address in UDP is 16 BITS long.
The source port address on the UDP user datagram header defines ____________________. -
ANS-The source port address on the UDP user datagram header defines THE PROCESS
RUNNING ON THE SENDING COMPUTER.
The combination of an IP address and a port number is called a __________________. -
ANS-The combination of an IP address and a port number is called a SOCKET ADDRESS.
To use the services of UDP, we need __________________ socket addresses. - ANS-To use
the services of UDP, we need TWO SOCKET ADDRESSES.
UDP packets are called _______________. - ANS-UDP packets are called USER
DATAGRAMS.
UDP packets are encapsulated in _____________________. - ANS-UDP packets are
encapsulated in an IP DATAGRAM.
UDP packets have a fixed-size header of ___________________ bytes. - ANS-UDP packets
have a fixed-size header of 8 BYTES.
UDP uses ___________________ to handle outgoing user datagrams from multiple processes
on one host. - ANS-UDP uses MULTIPLEXING to handle outgoing user datagrams from multiple
processes on one host.
UDP uses __________________ to handle incoming user datagrams that go to different
processes on the same host. - ANS-UDP uses DEMULTIPLEXING to handle incoming user
datagrams that go to different processes on the same host.
TCP is a __________________ protocol. - ANS-TCP is a STREAM-ORIENTED protocol.
TCP allows the sending process to deliver data as a ________________ of bytes and allows
the receiving process to receiving process to obtain data as a __________________ of bytes. -
ANS-TCP allows the sending process to deliver data as a STREAM of bytes and allows the
receiving process to obtain data as a STREAM of bytes.
,Because the sending and the receiving processes may not write or read data at the same
speed, TCP ___________________. - ANS-Because the sending and receiving processes may
not write or read data at the same speed, TCP USES BUFFERS.
TCP groups a number of bytes together into a packet called a _________________. - ANS-TCP
groups a number of bytes together into a packet called a SEGMENT.
TCP is a ______________ protocol. - ANS-TCP is a CONNECTION-ORIENTED PROTOCOL.
TCP is a ___________________ transport protocol. - ANS-TCP is a RELIABLE transport
protocol.
TCP uses _____________________ to check the safe and sound arrival of data. - ANS-TCP
uses an ACKNOWLEDGEMENT MECHANISM to check the safe and sound arrival of data.
The bytes of data being transferred in each connection are numbered by TCP. The numbering
starts with a __________________. - ANS-The bytes of data being transferred in each
connection are numbered by the TCP. The numbering starts with a RANDOMLY GENERATED
NUMBER.
TCP assigns a sequence number to each segment that is being sent. The sequence number for
each segment is the number of the ______________ byte carried in that segment. - ANS-TCP
assigns a sequence number to each segment that is being sent. The sequence number for each
segment is the number of the FIRST BYTE carried in that segment.
Communication in TCP is ___________________. - ANS-Communication in TCP is
FULL-DUPLEX.
The value of the acknowledgement field in a segment defines the number of the
_________________ byte a party expects to receive. - ANS-The value of the acknowledgement
field in a segment defines the number of the NEXT BYTE A PARTY EXPECTS TO RECEIVE.
The acknowledgement number is __________________. - ANS-The acknowledgement number
is CUMULATIVE.
The value of the window size is determined by _____________________. - ANS-The value of
the window size is determined by THE RECEIVER.
The inclusion of the checksum in the TCP segment is ____________________. - ANS-The
inclusion of the checksum in the TCP segment is MANDATORY.
A TCP segment is encapsulated in __________________. - ANS-A TCP segment is
encapsulated in AN IP DATAGRAM.
, Connection establishment in TCP is called ___________________ handshaking. -
ANS-Connection establishment in TCP is called THREE-WAY HANDSHAKING.
A SYN segment cannot carry data; it consumes _______________ sequence numbers. -
ANS-A SYN segment cannot carry data; it consumes ONE SEQUENCE NUMBER.
A SYN + ACK segment cannot carry data; it consumes _________________ sequence
numbers. - ANS-...
An ACK segment, if carrying no data, consumes __________________ sequence numbers. -
ANS-An ACK segment, if carrying no data, consumes NO SEQUENCE NUMBERS.
The connection establishment procedure in TCP is susceptible to a serious security problem
called the _______________ attack. - ANS-The connection establishment procedure in TCP is
susceptible to a serious security problem called the SYN FLOODING ATTACK.
The SYN flooding attack belongs to a group of security attacks known as _______________
attack. - ANS-The SYN flooding attack belongs to a group of security attacks known as DENIAL
OF SERVICE ATRACK.
The FIN segment consumes __________________ sequence numbers if it does not carry data.
- ANS-...
The FIN + ACK segment consumes _______________ sequence numbers if it does not carry
data. - ANS-The FIN + ACK segment consumes ONE SEQUENCE NUNBER IF IT DOES NOT
CARRY DATA.
In TCP, one end can stop sending data while still receiving data. This is called a
____________________. - ANS-In TCP, one end can stop sending data while still receiving
data. This is called a HALF-CLOSE.
A ______________ machine is a machine that goes through a limited number of states. -
ANS-A FINITE MACHINE is a machine that goes through a limited number of states.
_______________ control regulates the amount of data a source can send before receiving an
acknowledgement from the destination. - ANS-FLOW CONTROL regulates the amount of data a
source can send before receiving an acknowledgement from the destination.
To accomplish flow control, TCP uses a _________________ window protocol. - ANS-To
accomplish flow control, TCP uses a SLIDING WINDOW PROTOCOL.
TCP sliding windows are __________________ oriented. - ANS-TCP sliding windows are BYTE
ORIENTED.
One of the responsibilities of the transport layer protocol is to create a _______________
communication. - ANS-One of the responsibilities of the transport layer protocol is to create a
PROCESS-TO-PROCESS communication.
UDP is called a _________________ transport protocol. - ANS-UDP is called a
CONNECTIONLESS, UNRELIABLE transport protocol.
UDP does not add anything to the services of IP except for providing __________________
communication. - ANS-UDP does not add anything to the services of IP except for providing
PROCESS-TO-PROCESS communication.
UDP is acronym for ___________________. - ANS-UDP is an acronym for USER DATAGRAM
PROTOCOL.
Although there are several ways to achieve process-to-process communication, the most
common is through the __________________ paradigm. - ANS-Although there are several
ways to achieve process-to-process communication, the most common is through the
CLIENT-SERVER paradigm.
The local host and remote host are defined using IP addresses. To define the process, we need
second identifiers called _________________. - ANS-The local host and remote host are
defined using IP addresses. To define the process, we need second identifiers called PORT
ADDRESSES.
The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers.
They are called the _________________ ports. - ANS-The ports ranging from 49,152 to 65,535
can be used as temporary or private port numbers. They are called the DYNAMIC ports.
In the sending computer, UDP receives a data unit from the ____________________ layer. -
ANS-In the sending computer, UDP receives a data unit from the APPLICATION LAYER.
In the sending computer, UDP sends a data unit to the ___________________ layer. - ANS-In
the sending computer, UDP sends a data unit to the IP LAYER.
UDP and TCP are both __________________ layer protocols. - ANS-UDP and TCP are both
TRANSPORT LAYER PROTOCOLS.
The function the UDP performs is ____________________. - ANS-The function the UDP
performs is PROCESS-TO-PROCESS COMMUNICATION.
,When the IP layer of a receiving host receives a datagram, ____________________. -
ANS-When the IP layer of a receiving hoat receives a datagram, A TRANSPORT LAYER
PROTOCOL TAKES OVER.
UDP needs the __________________ address to deliver the user datagram to the correct
application process. - ANS-UDP needs the PORT address to deliver the user datagram to the
correct application process.
A port address in UDP is __________ bits long. - ANS-A port address in UDP is 16 BITS long.
The source port address on the UDP user datagram header defines ____________________. -
ANS-The source port address on the UDP user datagram header defines THE PROCESS
RUNNING ON THE SENDING COMPUTER.
The combination of an IP address and a port number is called a __________________. -
ANS-The combination of an IP address and a port number is called a SOCKET ADDRESS.
To use the services of UDP, we need __________________ socket addresses. - ANS-To use
the services of UDP, we need TWO SOCKET ADDRESSES.
UDP packets are called _______________. - ANS-UDP packets are called USER
DATAGRAMS.
UDP packets are encapsulated in _____________________. - ANS-UDP packets are
encapsulated in an IP DATAGRAM.
UDP packets have a fixed-size header of ___________________ bytes. - ANS-UDP packets
have a fixed-size header of 8 BYTES.
UDP uses ___________________ to handle outgoing user datagrams from multiple processes
on one host. - ANS-UDP uses MULTIPLEXING to handle outgoing user datagrams from multiple
processes on one host.
UDP uses __________________ to handle incoming user datagrams that go to different
processes on the same host. - ANS-UDP uses DEMULTIPLEXING to handle incoming user
datagrams that go to different processes on the same host.
TCP is a __________________ protocol. - ANS-TCP is a STREAM-ORIENTED protocol.
TCP allows the sending process to deliver data as a ________________ of bytes and allows
the receiving process to receiving process to obtain data as a __________________ of bytes. -
ANS-TCP allows the sending process to deliver data as a STREAM of bytes and allows the
receiving process to obtain data as a STREAM of bytes.
,Because the sending and the receiving processes may not write or read data at the same
speed, TCP ___________________. - ANS-Because the sending and receiving processes may
not write or read data at the same speed, TCP USES BUFFERS.
TCP groups a number of bytes together into a packet called a _________________. - ANS-TCP
groups a number of bytes together into a packet called a SEGMENT.
TCP is a ______________ protocol. - ANS-TCP is a CONNECTION-ORIENTED PROTOCOL.
TCP is a ___________________ transport protocol. - ANS-TCP is a RELIABLE transport
protocol.
TCP uses _____________________ to check the safe and sound arrival of data. - ANS-TCP
uses an ACKNOWLEDGEMENT MECHANISM to check the safe and sound arrival of data.
The bytes of data being transferred in each connection are numbered by TCP. The numbering
starts with a __________________. - ANS-The bytes of data being transferred in each
connection are numbered by the TCP. The numbering starts with a RANDOMLY GENERATED
NUMBER.
TCP assigns a sequence number to each segment that is being sent. The sequence number for
each segment is the number of the ______________ byte carried in that segment. - ANS-TCP
assigns a sequence number to each segment that is being sent. The sequence number for each
segment is the number of the FIRST BYTE carried in that segment.
Communication in TCP is ___________________. - ANS-Communication in TCP is
FULL-DUPLEX.
The value of the acknowledgement field in a segment defines the number of the
_________________ byte a party expects to receive. - ANS-The value of the acknowledgement
field in a segment defines the number of the NEXT BYTE A PARTY EXPECTS TO RECEIVE.
The acknowledgement number is __________________. - ANS-The acknowledgement number
is CUMULATIVE.
The value of the window size is determined by _____________________. - ANS-The value of
the window size is determined by THE RECEIVER.
The inclusion of the checksum in the TCP segment is ____________________. - ANS-The
inclusion of the checksum in the TCP segment is MANDATORY.
A TCP segment is encapsulated in __________________. - ANS-A TCP segment is
encapsulated in AN IP DATAGRAM.
, Connection establishment in TCP is called ___________________ handshaking. -
ANS-Connection establishment in TCP is called THREE-WAY HANDSHAKING.
A SYN segment cannot carry data; it consumes _______________ sequence numbers. -
ANS-A SYN segment cannot carry data; it consumes ONE SEQUENCE NUMBER.
A SYN + ACK segment cannot carry data; it consumes _________________ sequence
numbers. - ANS-...
An ACK segment, if carrying no data, consumes __________________ sequence numbers. -
ANS-An ACK segment, if carrying no data, consumes NO SEQUENCE NUMBERS.
The connection establishment procedure in TCP is susceptible to a serious security problem
called the _______________ attack. - ANS-The connection establishment procedure in TCP is
susceptible to a serious security problem called the SYN FLOODING ATTACK.
The SYN flooding attack belongs to a group of security attacks known as _______________
attack. - ANS-The SYN flooding attack belongs to a group of security attacks known as DENIAL
OF SERVICE ATRACK.
The FIN segment consumes __________________ sequence numbers if it does not carry data.
- ANS-...
The FIN + ACK segment consumes _______________ sequence numbers if it does not carry
data. - ANS-The FIN + ACK segment consumes ONE SEQUENCE NUNBER IF IT DOES NOT
CARRY DATA.
In TCP, one end can stop sending data while still receiving data. This is called a
____________________. - ANS-In TCP, one end can stop sending data while still receiving
data. This is called a HALF-CLOSE.
A ______________ machine is a machine that goes through a limited number of states. -
ANS-A FINITE MACHINE is a machine that goes through a limited number of states.
_______________ control regulates the amount of data a source can send before receiving an
acknowledgement from the destination. - ANS-FLOW CONTROL regulates the amount of data a
source can send before receiving an acknowledgement from the destination.
To accomplish flow control, TCP uses a _________________ window protocol. - ANS-To
accomplish flow control, TCP uses a SLIDING WINDOW PROTOCOL.
TCP sliding windows are __________________ oriented. - ANS-TCP sliding windows are BYTE
ORIENTED.