Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The three way TCP handshake between sender and receiver A) requires a SYN packet

ID: 3671963 • Letter: T

Question

The three way TCP handshake between sender and receiver A) requires a SYN packet from the sender to be answered by a SYN, ACK packet from the recipeint which is followed by an ACK packet from the sender before data starts to flow B) requires the receiver to send a SYN, ACK packet, followed by the sender's FIN packet and the receiver's STArt packet before data can flow C) requires three devices: the sender, receiver and the router to all exchange messages before data can flow D) requires three packets from the sender to be answered by three ACKnowledgements from the receiver before data can be sent 2. The OSPF routing protocol A) is a distance-vector protocol B) is a exterior gateway protocol C) is a link-state protocol D) is a wireless network protocol 3. Content provider networks (Google, Microsoft, Netflix, Akamai, etc.) A) are centrally located at the core of the Internet to save ban dwidth, regardless of the cost B) are connected to their local/regional ISP or local access ISP C) are often connected to several Tier 1 ISPs as well as to large access ISPs to save on costs and bandwidth D) are only allowed to connect to one tier 1 ISP at a time 4. TCP Congestion control A) is based on the KLEENEX protocol, allowing routers to dicharge their congested packets B) is managed by the receiver notifying the sender how much buffer space is available C) is managed by the sender backing down transmission rate if packets are not ACKnowledged, assuming that the network has failed to deliver them due to congestion D) is managed by the sender telling the receiver how much buffer space to allocate 5. The Internet protocol stack A) includes application, transport, network, link and physical B) Includes Ethernet, wireless, fiber and twisted pair C) includes users, servers, nodes, workstations and data links D) includes FTP, SMTP, HTTP, TCP, UDP, DNS AND IP 6. Network layer addressing A) is assigned by the network administrator B) uses addresses assigned by network card manufacturers C) uses port numbers defined by standard protocols D) uses port numbers that are randomly selected during the connection process 7. The transport layer protocol TCP A) provides congestion control by the receiver telling the server how much buffer space it has left B) provides flow control by throttling the sender if the network is overloaded C) provides for dedicated bandwidth and secure communication D) provides reliable transport between the sender and receiver processes 8. In the DHCP protocol A) Four messages are sent: Discover, Offer, Request and ACKnoweldgement B) One message is sent from the router to the client, as soon as it joins the network C) Three messages are sent, the SYN, the SYN,ACK and the ACK D) Two messages are sent - the DHCP request and the DHCP answer 9. Ideally, a server A) is a host that is always on and accepts requests from clients B) is a host that is only on when it is being used by an end-user C) is dynamically assigned an IP address so it can always get one wherever it is D) should be located outside of the data center for security reasons 10. The TCP ACKnowledgement number A) is based on the number of bits sent B) is based on the number of bytes sent C) is based on the number of packets sent D) is derived from the number of SYN packets that have been sent 11. A routing algorithim A) runs each time a packet arrives at a router, and determines the best path for the packet to take B) runs each time a packet arrives at a router, creating a table of routers for the packet to take through the network C) runs each time the network configuration changes, and creates a forwarding table that can be used to make forwarding decisions D) Runs once when the network is designed, defining how all packets will traverse the network 12. Bandwidth A) is a measurement of how wide the packet has to be to transmit the data B) is the measurement of the circumference of the musician's waistline C) is the measurement of throughput of a data link, generally represented in bits per second D) is the measurment of how wide the physical cable is 13. In the ARP protocol A) only the router sends the broadcast looking for other network nodes. All other nodes send ARP requests to the router to update their ARP tables B) only the switch sends the broadcast looking for other nodes. All other nodes send ARP requests to the switch to update their ARP tables C) the ARP response is sent back in a broadcast frame so that all other nodes can update their ARP tables D) the host sends an ethernet broadcast frame asking which layer 2 network device is configured with a specific layer 3 address 14. Regarding routing and forwarding A) forwarding is the process of determining the path that data will take and builds the forwarding table; routing uses the forwarding table to send the packet to the next hop in the network B) forwarding is the process of determining the path that data will take and builds the routing table; routing uses the routing table to send the packet to the next hop in the network C) routing is the process of determining the path that data will take and builds the routing algorithm; forwarding uses the forwarding table to send the packet to the next hop in the network D) routing is the process of determining the path that data will take and builds the routing table; forwarding uses the routing table to send the packet to the next hop in the network 15. A network layer address A) is 32 bits long in IPv4 B) is 48 bits long in Ethernet C) is 97 bits long in IPv6 D) is often represented as four numbers between 256 and 1024, separated by dots "." 16. In regards to media A) guided media needs to be controlled by a controller; unguided media controls itself B) guided media propagates signal in a solid media like copper, fiber and coax; unguided media uses radio signals to propogate signals C) unguided media propagates signal in a solid media like copper, fiber and coax; guided media uses radio signals to propogate signals D) wireless networks need to use guided media to define where signals are sent and receivied; wired networks don't need this help, so they use unguided media 17. The core of the network includes: A) hosts, end systems, workstations, servers, smart phones, tablets B) HTML, web pages, electronic mail and network protocols C) routers, switches and internetworking devices D) Users, people or the outside environment 18. When sending voice or video packet data A) the TCP protocol is used because it does not provide flow control and re-transmission that would negatively impact the audio and video streams B) the TCP protocol is used because it offers flow control and re-transmission C) the UDP protocol is used because it does not provide flow control and re-transmission that would negatively impact the audio and video streams D) the UDP protocol is used because it offers flow control an re-transmission 19. This protocol is used to transfer web pages A) FTP - File Transfer Protocol B) HTML - HyperText Markup Language C) HTTP - HyperText Transfer Protocol D) WPTP - Web Page Transfer Protocol 20. This protocol is used to transport electonic mail messages between mail servers A) IMAP - Internet Message Application Protocol B) IMSP - Internet Mail Server Protocol C) POP3 - Post Office Protocol, version 3 D) SMTP - Simple Mail Transport Protocol 21. This application layer protocol allows for nodes to look up the IP addresses of a given host name A) ARP - Address Resolution Protocol B) DNS - Domain Name Service C) HLP - Host Lookup Protocol D) IPLP - IP Address Lookup Protocol 22. The link layer address A) Is a 128 bit address in IPv6 B) Is a 32 bit address in IPv4 C) is a 48 bit address in Ethernet D) Is assigned by the network administrator 23. The SSL Protocol A) Adds bandwidth management to TCP and UDP to provide for smooth video and audio transmission B) Adds security to the Ethernet by adding encyrption C) Adds security to the TCP protocol by adding encryption D) Adds security to the UDP protocol by adding encyrption 24. UDP is a connectionless protocol, this means A) UDP data packets don't have destination IP addresses B) UDP packets are sent to the recipient without prior negotiation or handshaking C) UDP packets can be read by any node in the network D) UDP packets have to be requested, otherwise they are discarded 25. The edge of the network includes: A) data links, circuits, DSL, Cable modems and Ethernet B) hosts, end systems, workstations, servers, smart phones, tablets C) routers, switches and internetworking devices D) Users, people or the outside environment 26. In a short paragraph, explain the transmission of data from a client and a server. Explain the content (in general) of each message and the direction (from client to server or server to client).Assume that the client initiates the communication session. Include the exchange of messages in a TCP 3-way handshake.Assume that the client knows the IP address of the server already. Assume that the entire "data" to be transmitted from the client to the server is simply the message "hello" and will fit in one TCP packet.Assume that once the client sends the message successfully, that it tears down the connection and isn't going to leave it open. Comment Answers Anonymous Anonymous answered this 4 hours later Was this answer helpful? 0 1 202 answers The three way TCP handshake between sender and receiver A) requires a SYN packet from the sender to be answered by a SYN, ACK packet from the recipeint which is followed by an ACK packet from the sender before data starts to flow. The OSPF routing protocol C) is a link-state protocol. Content provider networks (Google, Microsoft, Netflix, Akamai, etc.) A) are centrally located at the core of the Internet to save bandwidth, regardless of the cost 4. TCP Congestion control D) is managed by the sender telling the receiver how much buffer space to allocate The Internet protocol stack A) includes application, transport, network, link and physical Network layer addressing A) is assigned by the network administrator The transport layer protocol TCP D) provides reliable transport between the sender and receiver processes In the DHCP protocol A) Four messages are sent: Discover, Offer, Request and ACKnoweldgement Ideally, a server A) is a host that is always on and accepts requests from clients The TCP ACKnowledgement number D) is derived from the number of SYN packets that have been sent. It is about segment number sent to server . A routing algorithim C) runs each time the network configuration changes, and creates a forwarding table that can be used to make forwarding decisions Bandwidth C) is the measurement of throughput of a data link, generally represented in bits per second In the ARP protocol D) the host sends an ethernet broadcast frame asking which layer 2 network device is configured with a specific layer 3 address Regarding routing and forwarding A) forwarding is the process of determining the path that data will take and builds the forwarding table; routing uses the forwarding table to send the packet to the next hop in the network A network layer address A) is 32 bits long in IPv4 In regards to media B) guided media propagates signal in a solid media like copper, fiber and coax; unguided media uses radio signals to propogate signals The core of the network includes: C) routers, switches and internetworking devices When sending voice or video packet data C) the UDP protocol is used because it does not provide flow control and re-transmission that would negatively impact the audio and video streams This protocol is used to transfer web pages C) HTTP - HyperText Transfer Protocol This protocol is used to transport electonic mail messages between mail servers A) IMAP - Internet Message Application Protocol This application layer protocol allows for nodes to look up the IP addresses of a given host name B) DNS - Domain Name Service The link layer address C) is a 48 bit address in Ethernet The SSL Protocol C) Adds security to the TCP protocol by adding encryption UDP is a connectionless protocol, this means B) UDP packets are sent to the recipient without prior negotiation or handshaking The edge of the network includes: A) data links, circuits, DSL, Cable modems and Ethernet TCP 3-way Handshake: The Transmission Control Protocol (TCP) level of the TCP/IP transport protocol is connection-oriented. Connection-oriented means that, before any data can be transmitted, a reliable connection must be obtained and acknowledged. TCP level data transmissions, connection establishment, and connection termination maintain specific control parameters that govern the entire process. Thanks Comment

Explanation / Answer

Please find the solution as per your requirements.
If you have any doubt, please get back to me.

Any explanations needed, please get back to me. Thank You!

Solution:

1.

In the three-way handshake, to establish a connection between the sender and the receiver,

Therefore, the correct option is A.

The three-way TCP handshake between sender and receiver requires a SYN packet from the sender to be answered by a SYN, ACK packet from the recipient which is followed by an ACK packet from the sender before data starts to flow.

2.

The OSPF routing protocol:

Therefore, the correct option is C

The OSPF routing protocol is a link-state protocol.

3.

Content provider networks (Google, Microsoft, Netflix, Akamai, etc.,)

Therefore, the correct option is A.

Content provider networks (Google, Microsoft, Netflix, Akamai, etc.,) are centrally located at the core of the internet to save bandwidth, regardless of the cost.

4.

TCP congestion control

Therefore, the correct option is option B.

TCP congestion control is managed by the sender telling the receiver how much buffer space needs to be allocated.

5.

The internet protocol stack

The internet protocol stack includes 5 layers such as Application, Transport, Network, Link, and Physical layers.

Therefore, the correct option is A.

The internet protocol stack includes 5 layers such as Application, Transport, Network, Link, and Physical layers.

6.

Network layer addressing

Therefore, the correct option is A.

Network layer addressing is assigned by the network administrator.

7.

The transport layer protocol TCP

Therefore, the correct option is D.

The transport layer protocol TCP provides reliable transport between the sender and receiver processes.

8.

In the DHCP protocol

Therefore, the correct answer is B.

In the DHCP protocol, one message is sent from the router to the client, as soon as it joins the network.

9.

Ideally, a server

Therefore, the correct option is A.

Ideally, a server is a host that is always on and accepts requests from clients.

10.

The TCP acknowledgment numbers

Therefore, the correct option is B.

The TCP acknowledgment number is based on the number of bytes sent.

11.

A routing algorithm

Therefore, the correct option is A.

A routing algorithm runs each time a packet arrives at a router, and determines the best path for the packet to take.

12.

Bandwidth

Therefore, the correct option is D.

Bandwidth is the measurement of how wide the physical cable is.

13.

In the ARP protocol,

Therefore, the correct option is A.

In the ARP protocol, only the router sends the broadcast looking for other network nodes. All other nodes send ARP requests to the router to update their ARP tables.

14.

Regarding routing and forwarding,

Therefore, the correct option is D.

Regarding routing and forwarding: Routing is the process of determining the path that data will take and builds the routing table; Forwarding uses the routing table to send the packet to the next hop in the network.

15.

A network layer address

Therefore, the correct option is A.

A network layer address is 32 bits long in IPv4.

16.

In regard to media,

Therefore, the correct option is D.

In regards to media, wireless networks need to use guided media to define where signals are sent and received; wired networks don't need this help, so they use unguided media.

17.

The core of the network includes

Therefore, the correct option is C.

The core of the network includes routers, switches, and internetworking devices.

18.

When sending voice or video packet data

Therefore, the correct option is A.

When sending voice or video packet data, the TCP protocol is used because it does not provide flow control and re-transmission that would negatively impact the audio and video streams.

19.

This protocol used to transfer web pages.

Therefore, the correct option is B.

HTML protocol used to transfer web pages.

20.

This protocol is used to transport electronic mail messages between mail servers

Therefore, the correct option is D.

SMTP - Simple Mail Transport Protocol is used to transport electronic mail messages between mail servers.

21.

This application layer protocol allows for nodes to look up the IP addresses of a given hostname

Therefore, the correct option is B.

DNS - Domain Name Service application layer protocol allows for nodes to look up the IP addresses of a given host name.

22.

The link layer address

Therefore, the correct option is B.

The link layer address is a 32-bit address in IPv4.

23.

The SSL Protocol

Therefore, the correct option is B.

The SSL Protocol adds security to the Ethernet by adding encryption.

24.

UDP is a connectionless protocol, this means

Therefore, the correct option is B.

UDP is a connectionless protocol, this means UDP packets are sent to the recipient without prior negotiation or handshaking.

25.

The edge of the network includes:

Therefore, the correct option is C.

The edge of the network includes routers, switches, and internetworking devices.

26.

TCP (Transmission Control Protocol) is a connection-oriented protocol for transferring data reliably in either direction between a pair of users.

The events occurred in the three-way handshake:

Scenario between the client and the server:

Process happening in Client side:

Connection Established: Transmit: When the process is done, the application using TCP signals that the connection is no longer needed.

FIN-WAIT 1: The client, having sent a FIN, is waiting for acknowledgment and for the server to send its own FIN.

FIN-WAIT -1: The client receives the ACK for its FIN.

FIN-WAIT -2: The client is waiting for the server's FIN.

TIME-WAIT: The client waits for a period of time to double the maximum segment life (MSL) time, to ensure the ACK it sent was received.

CLOSED: Now, the connection is closed.

Process happening in Server side:

ESTABLISHED: At this stage, the server is still in normal operating mode.

CLOSE WAIT: The server waits for the application process on its end to signal that it is ready to close.

LAST ACK: The server is waiting for an ACK for the FIN that to be sent.

CLOSED: The connection is closed on the server's end.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote