Computer Networking > QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking Week 3: The Transport and Application Layers Already Passe (All)

The Bits and Bytes of Computer Networking Week 3: The Transport and Application Layers Already Passed

Document Content and Description Below

The Bits and Bytes of Computer Networking. Week 3: The Transport and Application Layers Already Passed What ordering of TCP flags makes up the Three-way Handshake? ✔✔SYN, SYN/ACK, ACK; The com... puter that wants to establish a connection sends a packet with the SYN flag set. Then, the server responds with a packet with both the SYN and ACK flags set. Finally, the original computer sends a packet with just the ACK flag set. Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is a port field? ✔✔16 bits; A TCP or UDP port is a 16-bit number, meaning there are theoretically 65,535 possible values it can have. Please select all valid TCP control flags. WAIT, URG, ACK, LISTEN, RST, CLOSE ✔✔RST, ACK, URG A device that blocks traffic that meets certain criteria is know as a ________. ✔✔Firewall; A firewall is used to block certain defined types of traffic. Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below. ✔✔The presentation layer; The presentation layer might handle things like compression or encryption. the session layer; The session layer handles delivery of data from the transport layer to applications themselves. An example of something that operates at the application layer is: ✔✔a web browser; Web browsers and server operate at the application layer. What's the standard number for a TTL field? ✔✔64; While this value can be set to anything from 0 to 255, 64 is the recommended standard. Ports 1-1023 are known as ______ ports. ✔✔system; System ports are used for very well-known services. If the transmitting device would like for the receiving device to push currently buffered data to the application on the receiving end immediately, it would set the ____ flag. ✔✔PSH; The PSH flag ensures that the receiving end doesn't wait for any further data. HTTP is an example of a(n) ______ layer protocol. ✔✔application; There are lots of application layer protocols, but HTTP is one of the most common ones. Ports that are generally used to establish outbound connections are known as ______ ports. ✔✔ephemeral; The exact ports used are different, depending on the operating system, but they're all known as ephemeral ports. How many bits are used to direct traffic to specific services running on a networked computer? ✔✔16; A port is a 16-bit number that's used to direct traffic to specific services running on a networked computer. A network has the ability to direct traffic toward all of the receiving services. What provides this ability in the transport layer? ✔✔Multiplexing; Multiplexing in the transport layer means that nodes on a network have the ability to direct traffic toward many different receiving services. What port does the File Transfer Protocol (FTP) typically listen on? ✔✔21; FTP typically listens on port 21. A device receives a Transmission Control Protocol (TCP) packet. The device understands where the actual data payload begins. Which portion of the TCP header provides this information? ✔✔Data offset; The data offset field communicates how long the TCP header for a segment is. This causes the receiving network device to understand where the actual data payload begins How many bits are reserved for the Transmission Control Protocol (TCP) flags? ✔✔6; 6 bits are reserved for the 6 TCP control flags. A connection, at which layer, implies that every segment of data sent is acknowledged? ✔✔transport; A connection at the transport layer implies that every segment of data sent is acknowledged. Connection-oriented protocols protect against dropped data by forming connections and using what type of constant stream? ✔✔acknowledgements; Connection-oriented protocols protect against dropped data with a constant stream of acknowledgements. How many Transmission Control Protocol (TCP) control flags are there? ✔✔6 You are sending a very small amount of information that you need the listening program to respond to immediately. Which Transmission Control Protocol (TCP) flag will be used? ✔✔PSH; The PSH flag will be used to push the information immediately. A device involved in a Transmission Control Protocol (TCP) connection is ready to close the connection. The other device in the connection agrees. What has occured? ✔✔four-way handshake; A four-way handshake occurs when the session is closed. [Show More]

Last updated: 1 year ago

Preview 1 out of 5 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Also available in bundle (1)

The Bits and Bytes of Computer Networking Bundled Exams (Week 1-6) Questions and Answers Already Passed

The Bits and Bytes of Computer Networking Bundled Exams (Week 1-6) Questions and Answers Already Passed

By Nutmegs 1 year ago

$20

9  

Reviews( 0 )

$8.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
70
0

Document information


Connected school, study & course


About the document


Uploaded On

Feb 07, 2023

Number of pages

5

Written in

Seller


seller-icon
Nutmegs

Member since 3 years

578 Documents Sold


Additional information

This document has been written for:

Uploaded

Feb 07, 2023

Downloads

 0

Views

 70

Document Keyword Tags

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·