0% found this document useful (0 votes)
16 views3 pages

Comm Final

The document covers various networking concepts including UDP and TCP protocols, their functionalities, and key terms such as packetization, framing, and error detection. It explains the structure of headers, connection establishment, and methods for reliable communication. Additionally, it discusses addressing, multiple-access methods, and the importance of checksums and acknowledgments in data transmission.

Uploaded by

ghhmfyv9vb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views3 pages

Comm Final

The document covers various networking concepts including UDP and TCP protocols, their functionalities, and key terms such as packetization, framing, and error detection. It explains the structure of headers, connection establishment, and methods for reliable communication. Additionally, it discusses addressing, multiple-access methods, and the importance of checksums and acknowledgments in data transmission.

Uploaded by

ghhmfyv9vb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

UDP packets or user datagrams have a _____ made of four fields


Ans: fixed-size header of 8 bytes

2. ___ defines the number of the next byte a party expects to receive which means that the
party takes the number of the last byte that it has received, safe and sound
Ans: Acknowledgment Number

3. TCP uses a combination of Go-Back-N and Selective repeat protocols to provide reliability and
flow and error control

4. Each station is assigned a code, which is a sequence of numbers called chips to avoid collision in
_____
Ans: Code-division multiple access

5. The most common way to achieve process-to-process communication is through the ____.
Ans: Client-server paradigm

6. The process of encapsulating the payload in a network-layer packet at the source and
decapsulating. The payload from the network-layer packet at the
Ans: packetization

7. The IP address defines the __ among the different devices in the world and the port number
defines the ___ on this particular host.
Ans: Host, the process

8. Bit Stuff the following frame payload 0001111100001111100011111101111


Ans: 0001111100000111110 000111110101111

9. TCP groups a number of bytes together into a packet in the transport layer for
supporting the streaming of data is called a _____
Ans: Segment

10. When data transfer takes place between any 2 hosts, which flags are set?
Ans: PSH, ACK

11. The connection establishment process in TCP is called __


Ans: 3-way handshaking

12. In the TCP segment format, fill in the missing Flag field
Ans:
Header URG ACK PSH RST SYN FIN Window
Length. size

13. The ____waits for all packets belonging to the same message to arrive before delivering the
message to the upper layer
Ans: Destination device
14. Network layer is responsible for finding the best route using ________ defining the best route
between source and destination hosts
Ans: Routing protocols
15. Selective Repeat ARQ
Ans: resends only packets that are lost

16. The stations seek information from one another to find which station has the right to
send to avoid collision of messages on shared medium in ____
Ans: Controlled Access Protocol

17. ____ field is used to detect errors over the entire user datagram
Ans: Checksum

18. ____ was designed to compensate the deficiencies of network issues


Ans: ICMP messages

19. To preform the responsibilities of the TCP for safe and reliable communication, it uses
Ans: Checksum for error detection, retransmission of lost or corrupted packets, acknowledgments
and timers

20. Protocols that handle multiple-access protocol belong to a sublayer in the data-link layer and Physical
Layer is called ____
Ans: Media access control

21. ____ are not assigned or controlled by ICANN. They can only be registered with ICANN to
prevent duplication
Ans: Registered ports

22. __________is the piece of information in the packet header to make a decision by the router to
find the corresponding output interface number in the forwarding table
Ans: Destination address

23. ___ provides process-to-process communication using port numbers.


Ans: TCP

24. An IPv4 address is a _____ that uniquely and universally defines the connection of a device to the
Internet.
Ans: 32-bit address
25. During a half-close termination of connection the server sends the __ Flag when the
client does not respond for a period of time to close the connection
Ans: FIN

26. Any important or urgent data can be detected only if the _ _ Flag is set in the TCP
segment Header
Ans: URG

27. Features of UCP datagrams Ans: user datagrams are not numbered
28. TCP is the reliable transport protocol that uses an __ mechanism to check the safe and sound
arrival of data.
Ans: Acknowledgment
29. The process of separating a message from one source to a destination by adding a sender address
and a destination address along with some control information is called Ans: Framing
30. Find errors if any in the format of IPV4 address IP Address
- 123.45.1010.4 can't be mixed with binary numbers
- 12.43.65.67.34 there can't be no more than 4 numbers
- 256.45.100.10 all numbers need to be less than or equal to 255
- 104.16.143.10 no error found

31. Use of UDP


Ans: Used for some route updating protocols such as Routing Information Protocol.
Used for interactive real-time applications that cannot tolerate delay between received
message

32. What are the 3 steps which occur during the Connection-Oriented Process when a process A
wants to send and receive data from another process B ( place the process in order )
I. The connection is terminated.
II. The two TCPs establish a connection between them.
III. Data are exchanged in both directions.
Ans: II,III,I
33. In bit-oriented framing an 8-bit pattern of ___ is added to the data section of a frame as delimiter
Ans: 01111110

34. A classless address is given as 13.10.11.10/29 find the following

a) What’s the binary representation? 00001101 00001010 00001011 00001010


b) What’s the network address? 13.10.11.8/29
c) What’s the broadcast address? 13.110.11.15/29
d) How many host addresses are in the block? n=29 , host address = 2^32-n -2 = 2^3-2 =6
e) First and the last node address in the block? First = 13.10.11.9/29 , Last = 13.10.11.14/29

35. _____ is the Multiple-access method in which the available bandwidth of a link is
shared in time, frequency, or through code, among different stations
Ans: Channelization

36. Use of dividing larger messages into smaller frames


- Larger frames occupy the medium for longer
- Even a single bit error might require retransmitting the entire frame
- Retransmission is expensive for larger messages
- All of the above

37. The _____ in the path are not allowed to decapsulate the packets they received unless
the packets need to be fragmented.
Ans: router

38. ______ is connectionless & unreliable whereas, _____ is connection oriented and
reliable
Ans: UDP – TCP

You might also like