ESAT Forouzan - Chapter 22: Process-to-Process Delivery (UDP and TCP) Flashcards
UDP and TCP are both _____ layer protocols
a. Physical
b. Data Link
c. Network
d. Transport
d. Transport
Which of the following functions does UDP perform?
a. Process-to-process communication
b. Host-to-host communication
c. End-to-end reliable data delivery
d. All of the above
a. Process-to-process communication
UDP needs the _____ address to deliver the user datagram to the correct application program.
a. Port
b. Application
c. Internet
d. Physical
a. Port
Which is a legal port address?
a. 0
b. 513
c. 65,535
d. All of the above
d. All of the above
The definition of reliable delivery includes ____
a. Error-free delivery
b. Receipt of the complete message
c. In-order delivery
d. All of the above
d. All of the above
Which of the following does the UDP guarantee?
a. Sequence numbers on each user datagram
b. Acknowledgments to the sender
c. Flow control
d. None of the above
d. None of the above
The source port address on the UDP user datagram header defines ___
a. The sending computer
b. The receiving computer
c. The application program on the sending computer
d. The application program on the receiving computer
c. The application program on the sending computer
Which of the following is not part of the UDP user datagram header?
a. Length of header
b. Source port address
c. Checksum
d. Destination port address
a. Length of header
The ______ defines the client program
a. Ephemeral port number
b. IP address
c. Well-known port number
d. Physical address
a. Ephemeral port number
The _______ defines the server program
a. Ephemeral port number
b. IP address
c. Well-known port number
d. Physical address
c. Well-known port number
IP is responsible for ____ communication while TCP is responsible for ________ communication
a. Host-to-host; process-to-process
b. Process-to-process; host-to-host
c. Process-to-process; node-to-node
d. Node-to-node; process-to-process
a. Host-to-host; process-to-process
A host can be identified by _______ while a program running on the host can be identified by _____
a. An IP address ; a port number
b. A port number ; an IP address
c. An IP address ; a host address
d. An IP address ; a well-known port
a. An IP address ; a port number
The ______ address uniquely identifies a running application program
a. IP address
b. Host
c. NIC
d. Socket
d. Socket
The ______ field is used to order packets of a message.
a. Urgent pointer
b. Checksum
c. Sequence number
d. Acknowledgment number
c. Sequence number
The _____ field is used for error detection.
a. Urgent pointer
b. Checksum
c. Sequence number
d. Acknowledgment number
b. Checksum
Multiply the header length field by _______ to find the total number of bytes in the TCP header
a. 2
b. 4
c. 6
d. 8
b. 4
Urgent data require the urgent pointer field as well as the URG bit in the _____ field
a. Control
b. Offset
c. Sequence number
d. Reserved
a. Control
In ______, data are sent or processed at a very inefficient rate, such as one byte at a time
a. Nagle’s syndrome
b. Silly window syndrome
c. Sliding window syndrome
d. Delayed acknowledgment
b. Silly window syndrome
To prevent silly window syndrome created by a receiver that processes data at a very slow rate, _____ can be used.
a. Clark’s solution
b. Nagle’s algorithm
c. Delayed acknowledgment
d. (a) or (c)
d. (a) or (c)
To prevent silly window syndrome created by a sender that processes data at a very slow rate, _____ can be used.
a. Clark’s solution
b. Nagle’s algorithm
c. Delayed acknowledgment
d. (a) or (c)
b. Nagle’s algorithm
An ACK number of 1000 always means that _____
a. 999 bytes has been successfully received
b. 1000 bytes has been successfully received
c. 1001 bytes has been successfully received
d. None of the above
d. None of the above
The _____ timer prevents a long idle connection between two TCPs
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
c. Keep-alive
The ____ timer is needed to handle the zero window-size advertisement
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
b. Persistence
Karn’s algorithm is used in calculations by the ______ timer
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
a. Retransmission
The ____ timer is used in the termination phase
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
d. Time-waited
The _____ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
a. Retransmission
Connection establishment involves a _______handshake.
a. One-way
b. Two-way
c. Three-way
d. None of the above
c. Three-way
A special segment called a probe is sent by sending a TCP when the _____ timer goes off.
a. Transmission
b. Persistence
c. Keep-alive
d. Time-waited
b. Persistence