Transport Layer
50 questions available
Questions
How many bytes of overhead does a UDP segment header have?
View answer and explanationWhat is the typical header size for a TCP segment when its options field is empty?
View answer and explanationHow does TCP provide its flow-control service?
View answer and explanationGiven that Ethernet and PPP link-layer protocols typically have a Maximum Transmission Unit (MTU) of 1,500 bytes and a standard TCP/IP header is 40 bytes long, what is a typical value for the Maximum Segment Size (MSS)?
View answer and explanationIn the context of TCP's round-trip time estimation, what is the recommended value of alpha for the exponential weighted moving average (EWMA) formula used to update the EstimatedRTT?
View answer and explanationTo measure the variability of the RTT, TCP calculates DevRTT. What is the recommended value of beta in the EWMA formula for DevRTT?
View answer and explanationHow does TCP calculate the retransmission timeout interval (TimeoutInterval) using the estimated RTT and its variation?
View answer and explanationWithin TCP's reliable data transfer mechanism, what event is the primary trigger for a fast retransmit?
View answer and explanationAccording to the slow-start phase of TCP's congestion control, what is the typical initial value of the congestion window (cwnd)?
View answer and explanationHow does the congestion window (cwnd) increase during TCP's slow-start phase?
View answer and explanationDuring TCP's congestion-avoidance phase, what is the standard method for increasing the congestion window (cwnd)?
View answer and explanationA UDP socket is fully identified by a two-tuple. What does this two-tuple consist of?
View answer and explanationA TCP socket is identified by a four-tuple. What are the four values that constitute this tuple?
View answer and explanationWhat is described as the 'fatal flaw' in the reliable data transfer protocol rdt2.0?
View answer and explanationWhat type of acknowledgments does TCP provide by acknowledging bytes up to the first missing byte in the stream?
View answer and explanationWhat is the numerical range for well-known port numbers used by well-known application protocols like HTTP?
View answer and explanationWhat is the most fundamental responsibility of the transport-layer protocols UDP and TCP, a function known as transport-layer multiplexing and demultiplexing?
View answer and explanationWhat is the main purpose of the checksum field included in a UDP segment?
View answer and explanationIn the Go-Back-N (GBN) protocol, how is an acknowledgment for a packet with sequence number n interpreted?
View answer and explanationWhich of the following statements accurately describes the handling of connection state by TCP and UDP?
View answer and explanationWhat is the name of the classic Denial of Service (DoS) attack that exploits the TCP three-way handshake by sending a large number of SYN segments but never completing the handshake?
View answer and explanationWhat is the name of the effective defense mechanism deployed in most major operating systems to counter SYN flood attacks?
View answer and explanationWhat is the key behavioral difference between TCP Reno and the earlier TCP Tahoe when a loss event indicated by three duplicate ACKs occurs?
View answer and explanationTCP congestion control is often described as an additive-increase, multiplicative-decrease (AIMD) algorithm. What does this refer to?
View answer and explanationWhat is a primary consequence of using pipelining in a reliable data transfer protocol, which allows the sender to transmit multiple packets without waiting for acknowledgments?
View answer and explanationIn a stop-and-wait protocol such as rdt2.0, what is the sender unable to do while it is in the 'wait-for-ACK-or-NAK' state?
View answer and explanationAccording to the discussion of congestion in 'Scenario 2: Two Senders and a Router with Finite Buffers', what is identified as a cost of a congested network?
View answer and explanationIn 'Scenario 3: Four Senders, Routers with Finite Buffers, and Multihop Paths,' what additional cost of network congestion is identified?
View answer and explanationWhy is it possible for an application running over UDP to 'crowd out' TCP traffic on a congested link?
View answer and explanationWhat is the underlying transport-layer protocol used by QUIC (Quick UDP Internet Connections)?
View answer and explanationHow does the QUIC protocol address the Head-of-Line (HOL) blocking problem that can affect multiplexed HTTP requests over a single TCP connection?
View answer and explanationIn the first step of the three-way handshake to establish a TCP connection, the client sends a special segment to the server. Which flag bit in the header is set to 1 for this segment?
View answer and explanationIn the second step of the TCP three-way handshake, the server responds with a SYNACK segment. If the client chose an initial sequence number of 'client_isn', what value does the server place in the acknowledgment field of this segment?
View answer and explanationIn TCP's congestion control mechanism, if a loss event is indicated by a timeout, what is the new value for the slow start threshold (ssthresh)?
View answer and explanationWhat is the core principle behind the TCP CUBIC congestion control algorithm's modification to the congestion avoidance phase?
View answer and explanationIn the Telnet case study, after a user types the character 'C', the client sends a TCP segment containing 'C'. The server then sends a segment back to the client. What is the dual purpose of this server-to-client segment?
View answer and explanationWhat is the recommended initial value for TCP's TimeoutInterval before any RTT measurements have been made?
View answer and explanationWhat happens to the value of TCP's TimeoutInterval immediately after a timeout event occurs?
View answer and explanationIn the Go-Back-N (GBN) reliable data transfer protocol, what action does the receiver take when it receives a packet that is correctly received but is out of order?
View answer and explanationIn the Selective Repeat (SR) reliable data transfer protocol, what action does the receiver take when it receives a packet that is correctly received but is out of order?
View answer and explanationHow many bits long is the sequence number field in the TCP segment header?
View answer and explanationThe UDP header is composed of four fields. What are these four fields?
View answer and explanationHow many bits does the flag field in the TCP header contain?
View answer and explanationTCP is often described as being 'self-clocking'. What does this term refer to?
View answer and explanationIn the household analogy used to explain the relationship between the transport and network layers, what does the postal service (including mail carriers) represent?
View answer and explanationWhat is the service model provided by the Internet's network-layer protocol, IP?
View answer and explanationThe reliable data transfer protocol rdt3.0, which uses a 1-bit sequence number alternating between 0 and 1, is also known by what common name?
View answer and explanationIn an example demonstrating the performance of a stop-and-wait protocol, a sender on a 1 Gbps link with a 30 millisecond RTT sends a 1,000-byte packet. The sender is busy for 0.008 msec out of a total 30.008 msec cycle. What was the calculated sender utilization?
View answer and explanationWhich broad approach to congestion control is used by 'Classic' TCP as standardized in RFC 5681, where the network layer provides no explicit support?
View answer and explanationWhen a process decides to close a TCP connection, the client TCP sends a special segment to the server. Which flag bit in this segment's header is set to 1 to initiate the teardown?
View answer and explanation