The Bits and Bytes of Computer Networking. Week 3: The Transport and Application Layers Already Passed
0 view 0 purchase
Course
The Air
Institution
The Air
What ordering of TCP flags makes up the Three-way Handshake? SYN, SYN/ACK, ACK;
The computer that wants to establish a connection sends a packet with the SYN flag set. Then,
the server responds with a packet with both the SYN and ACK flags set. Finally, the original
computer sends a packet with ...
The Bits and Bytes of Computer
Networking. Week 3: The Transport and
Application Layers Already Passed
What ordering of TCP flags makes up the Three-way Handshake? ✔✔SYN, SYN/ACK, ACK;
The computer that wants to establish a connection sends a packet with the SYN flag set. Then,
the server responds with a packet with both the SYN and ACK flags set. Finally, the original
computer sends a packet with just the ACK flag set.
Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is
a port field? ✔✔16 bits; A TCP or UDP port is a 16-bit number, meaning there are theoretically
65,535 possible values it can have.
Please select all valid TCP control flags.
WAIT, URG, ACK, LISTEN, RST, CLOSE ✔✔RST, ACK, URG
A device that blocks traffic that meets certain criteria is know as a ________. ✔✔Firewall; A
firewall is used to block certain defined types of traffic.
, Unlike our five-layer model, the OSI network model adds two more layers on top of the
Application Layer. Select examples of these new layers below. ✔✔The presentation layer; The
presentation layer might handle things like compression or encryption.
the session layer; The session layer handles delivery of data from the transport layer to
applications themselves.
An example of something that operates at the application layer is: ✔✔a web browser; Web
browsers and server operate at the application layer.
What's the standard number for a TTL field? ✔✔64; While this value can be set to anything from
0 to 255, 64 is the recommended standard.
Ports 1-1023 are known as ______ ports. ✔✔system; System ports are used for very well-known
services.
If the transmitting device would like for the receiving device to push currently buffered data to
the application on the receiving end immediately, it would set the ____ flag. ✔✔PSH; The PSH
flag ensures that the receiving end doesn't wait for any further data.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller dennisgathiru. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.