Summary unavailable.

Questions

Question 1

How many bytes of overhead does a UDP segment header have?

View answer and explanation
Question 2

What is the typical header size for a TCP segment when its options field is empty?

View answer and explanation
Question 3

How does TCP provide its flow-control service?

View answer and explanation
Question 4

Given that Ethernet and PPP link-layer protocols typically have a Maximum Transmission Unit (MTU) of 1,500 bytes and a standard TCP/IP header is 40 bytes long, what is a typical value for the Maximum Segment Size (MSS)?

View answer and explanation
Question 5

In the context of TCP's round-trip time estimation, what is the recommended value of alpha for the exponential weighted moving average (EWMA) formula used to update the EstimatedRTT?

View answer and explanation
Question 6

To measure the variability of the RTT, TCP calculates DevRTT. What is the recommended value of beta in the EWMA formula for DevRTT?

View answer and explanation
Question 7

How does TCP calculate the retransmission timeout interval (TimeoutInterval) using the estimated RTT and its variation?

View answer and explanation
Question 8

Within TCP's reliable data transfer mechanism, what event is the primary trigger for a fast retransmit?

View answer and explanation
Question 9

According to the slow-start phase of TCP's congestion control, what is the typical initial value of the congestion window (cwnd)?

View answer and explanation
Question 10

How does the congestion window (cwnd) increase during TCP's slow-start phase?

View answer and explanation
Question 11

During TCP's congestion-avoidance phase, what is the standard method for increasing the congestion window (cwnd)?

View answer and explanation
Question 12

A UDP socket is fully identified by a two-tuple. What does this two-tuple consist of?

View answer and explanation
Question 13

A TCP socket is identified by a four-tuple. What are the four values that constitute this tuple?

View answer and explanation
Question 14

What is described as the 'fatal flaw' in the reliable data transfer protocol rdt2.0?

View answer and explanation
Question 15

What type of acknowledgments does TCP provide by acknowledging bytes up to the first missing byte in the stream?

View answer and explanation
Question 16

What is the numerical range for well-known port numbers used by well-known application protocols like HTTP?

View answer and explanation
Question 17

What is the most fundamental responsibility of the transport-layer protocols UDP and TCP, a function known as transport-layer multiplexing and demultiplexing?

View answer and explanation
Question 18

What is the main purpose of the checksum field included in a UDP segment?

View answer and explanation
Question 19

In the Go-Back-N (GBN) protocol, how is an acknowledgment for a packet with sequence number n interpreted?

View answer and explanation
Question 20

Which of the following statements accurately describes the handling of connection state by TCP and UDP?

View answer and explanation
Question 21

What is the name of the classic Denial of Service (DoS) attack that exploits the TCP three-way handshake by sending a large number of SYN segments but never completing the handshake?

View answer and explanation
Question 22

What is the name of the effective defense mechanism deployed in most major operating systems to counter SYN flood attacks?

View answer and explanation
Question 23

What is the key behavioral difference between TCP Reno and the earlier TCP Tahoe when a loss event indicated by three duplicate ACKs occurs?

View answer and explanation
Question 24

TCP congestion control is often described as an additive-increase, multiplicative-decrease (AIMD) algorithm. What does this refer to?

View answer and explanation
Question 25

What is a primary consequence of using pipelining in a reliable data transfer protocol, which allows the sender to transmit multiple packets without waiting for acknowledgments?

View answer and explanation
Question 26

In a stop-and-wait protocol such as rdt2.0, what is the sender unable to do while it is in the 'wait-for-ACK-or-NAK' state?

View answer and explanation
Question 27

According to the discussion of congestion in 'Scenario 2: Two Senders and a Router with Finite Buffers', what is identified as a cost of a congested network?

View answer and explanation
Question 28

In 'Scenario 3: Four Senders, Routers with Finite Buffers, and Multihop Paths,' what additional cost of network congestion is identified?

View answer and explanation
Question 29

Why is it possible for an application running over UDP to 'crowd out' TCP traffic on a congested link?

View answer and explanation
Question 30

What is the underlying transport-layer protocol used by QUIC (Quick UDP Internet Connections)?

View answer and explanation
Question 31

How does the QUIC protocol address the Head-of-Line (HOL) blocking problem that can affect multiplexed HTTP requests over a single TCP connection?

View answer and explanation
Question 32

In the first step of the three-way handshake to establish a TCP connection, the client sends a special segment to the server. Which flag bit in the header is set to 1 for this segment?

View answer and explanation
Question 33

In the second step of the TCP three-way handshake, the server responds with a SYNACK segment. If the client chose an initial sequence number of 'client_isn', what value does the server place in the acknowledgment field of this segment?

View answer and explanation
Question 34

In TCP's congestion control mechanism, if a loss event is indicated by a timeout, what is the new value for the slow start threshold (ssthresh)?

View answer and explanation
Question 35

What is the core principle behind the TCP CUBIC congestion control algorithm's modification to the congestion avoidance phase?

View answer and explanation
Question 36

In the Telnet case study, after a user types the character 'C', the client sends a TCP segment containing 'C'. The server then sends a segment back to the client. What is the dual purpose of this server-to-client segment?

View answer and explanation
Question 37

What is the recommended initial value for TCP's TimeoutInterval before any RTT measurements have been made?

View answer and explanation
Question 38

What happens to the value of TCP's TimeoutInterval immediately after a timeout event occurs?

View answer and explanation
Question 39

In the Go-Back-N (GBN) reliable data transfer protocol, what action does the receiver take when it receives a packet that is correctly received but is out of order?

View answer and explanation
Question 40

In the Selective Repeat (SR) reliable data transfer protocol, what action does the receiver take when it receives a packet that is correctly received but is out of order?

View answer and explanation
Question 41

How many bits long is the sequence number field in the TCP segment header?

View answer and explanation
Question 42

The UDP header is composed of four fields. What are these four fields?

View answer and explanation
Question 43

How many bits does the flag field in the TCP header contain?

View answer and explanation
Question 44

TCP is often described as being 'self-clocking'. What does this term refer to?

View answer and explanation
Question 45

In the household analogy used to explain the relationship between the transport and network layers, what does the postal service (including mail carriers) represent?

View answer and explanation
Question 46

What is the service model provided by the Internet's network-layer protocol, IP?

View answer and explanation
Question 47

The reliable data transfer protocol rdt3.0, which uses a 1-bit sequence number alternating between 0 and 1, is also known by what common name?

View answer and explanation
Question 48

In an example demonstrating the performance of a stop-and-wait protocol, a sender on a 1 Gbps link with a 30 millisecond RTT sends a 1,000-byte packet. The sender is busy for 0.008 msec out of a total 30.008 msec cycle. What was the calculated sender utilization?

View answer and explanation
Question 49

Which broad approach to congestion control is used by 'Classic' TCP as standardized in RFC 5681, where the network layer provides no explicit support?

View answer and explanation
Question 50

When a process decides to close a TCP connection, the client TCP sends a special segment to the server. Which flag bit in this segment's header is set to 1 to initiate the teardown?

View answer and explanation