ESAT Forouzan - Chapter 22: Process-to-Process Delivery (UDP and TCP) Flashcards
UDP and TCP are both _____ layer protocols
a. Physical
b. Data Link
c. Network
d. Transport
d. Transport
Which of the following functions does UDP perform?
a. Process-to-process communication
b. Host-to-host communication
c. End-to-end reliable data delivery
d. All of the above
a. Process-to-process communication
UDP needs the _____ address to deliver the user datagram to the correct application program.
a. Port
b. Application
c. Internet
d. Physical
a. Port
Which is a legal port address?
a. 0
b. 513
c. 65,535
d. All of the above
d. All of the above
The definition of reliable delivery includes ____
a. Error-free delivery
b. Receipt of the complete message
c. In-order delivery
d. All of the above
d. All of the above
Which of the following does the UDP guarantee?
a. Sequence numbers on each user datagram
b. Acknowledgments to the sender
c. Flow control
d. None of the above
d. None of the above
The source port address on the UDP user datagram header defines ___
a. The sending computer
b. The receiving computer
c. The application program on the sending computer
d. The application program on the receiving computer
c. The application program on the sending computer
Which of the following is not part of the UDP user datagram header?
a. Length of header
b. Source port address
c. Checksum
d. Destination port address
a. Length of header
The ______ defines the client program
a. Ephemeral port number
b. IP address
c. Well-known port number
d. Physical address
a. Ephemeral port number
The _______ defines the server program
a. Ephemeral port number
b. IP address
c. Well-known port number
d. Physical address
c. Well-known port number
IP is responsible for ____ communication while TCP is responsible for ________ communication
a. Host-to-host; process-to-process
b. Process-to-process; host-to-host
c. Process-to-process; node-to-node
d. Node-to-node; process-to-process
a. Host-to-host; process-to-process
A host can be identified by _______ while a program running on the host can be identified by _____
a. An IP address ; a port number
b. A port number ; an IP address
c. An IP address ; a host address
d. An IP address ; a well-known port
a. An IP address ; a port number
The ______ address uniquely identifies a running application program
a. IP address
b. Host
c. NIC
d. Socket
d. Socket
The ______ field is used to order packets of a message.
a. Urgent pointer
b. Checksum
c. Sequence number
d. Acknowledgment number
c. Sequence number
The _____ field is used for error detection.
a. Urgent pointer
b. Checksum
c. Sequence number
d. Acknowledgment number
b. Checksum