Transport Layer Study Guide Networking

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/77

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards

The transport layer is responsible for

logical communications between applications running on different hosts such as establishing a temporary session between two hosts and the reliable transmission of information for an application.

2
New cards

The transport layer has no

knowledge of the destination host type, the type of media over which the data must travel, the path taken by the data, the congestion on a link, or the size of the network.

3
New cards

What two protocols does the transport layer use?

TCP and UDP (Transmission Control Protocol and User Datagram Protocol)

4
New cards

At the transport layer, each set of data flowing between a source application and a destination application is known as?

a conversation and is tracked separately.

5
New cards

True or False: Most networks have a limitation on the amount of data that can be included in a single packet. Therefore, data must be divided into manageable pieces.

True

6
New cards

It is the transport layer's responsibility to divide the application data into

appropriately sized blocks.

7
New cards

Depending on the transport layer protocol used, the transport layer blocks are called

either segments or datagrams.

8
New cards

The transport layer divides the data into smaller blocks (i.e., segments or datagrams) so that

it's easier to manage and transport.

9
New cards

The transport layer protocol also adds header information containing binary data organized into several fields to each block of data. It is the values in these fields that enable

various transport layer protocols to perform different functions in managing data communication.

10
New cards

True or False: The transport layer ensures that even with multiple applications running on a device, all applications receive the correct data.

True

11
New cards

The transport layer must be able to separate and manage multiple communications with different transport requirement needs. To pass data streams to the proper applications, the transport layer identifies the target application using an identifier called

a port number.

12
New cards

each software process that needs to access the

network is assigned a port number unique to that host.

13
New cards

Sending some types of data (e.g., a streaming video) across a network, as one complete communication stream, can consume

all the available bandwidth.

14
New cards

This would prevent other communication conversations from occurring at the same time.

It would also make error recovery and retransmission of damaged data difficult.

15
New cards

The transport layer uses segmentation and multiplexing to enable

different communication conversations to be interleaved on the same network.

16
New cards

Error checking can be performed on the data in the segment

to determine if the segment was altered during transmission.

17
New cards

Transport layer protocols specify how to transfer messages between hosts, and are responsible for

managing reliability requirements of a conversation.

18
New cards

TCP is considered

a reliable, full-featured transport layer protocol, which ensures that all of the data arrives at the destination.

19
New cards

TCP includes fields which ensure the delivery of the application data. These fields require additional

processing by the sending and receiving hosts.

20
New cards

TCP transport is analogous to

sending packages that are tracked from source to destination.

21
New cards

TCP provides reliability and flow control using these basic operations

Number and track data segments transmitted to a specific host from a specific application Acknowledge received data, Retransmit any unacknowledged data after a certain amount of time, Sequence data that might arrive in wrong order Send data at an efficient rate that is acceptable by the receiver

22
New cards

In order to maintain the state of a conversation and track the information, TCP must first establish a connection between the sender and the receiver. This is why TCP is known as a

connection-oriented protocol.

23
New cards

UDP is a simpler transport layer protocol than TCP. It does not

provide reliability and flow control, which means it requires fewer header fields.

24
New cards

Because the sender and the receiver UDP processes do not have to manage reliability and flow control, this means UDP datagrams can be

processed faster than TCP segments.

25
New cards

UDP provides the basic functions for delivering datagrams between the appropriate applications, with

very little overhead and data checking.

26
New cards

True or False: UDP is a connectionless protocol. Because UDP does not provide reliability or flow control, it does not require an established connection.

True

27
New cards

True or False: Because UDP does not track information sent or received between the client and server, UDP is also known as a state protocol.

False

28
New cards

True or False: UDP is also known as a best-effort delivery protocol because there is no acknowledgment that the data is received at the destination. With UDP, there are no transport layer processes that inform the sender of a successful delivery.

True

29
New cards

True or False: UDP is like placing a regular, non registered, letter in the mail. The sender of the letter is not aware of the availability of the receiver to receive the letter. Nor is the post office responsible for tracking the letter or informing the sender if the letter does not arrive at the final destination.

True

30
New cards

True or False: Some applications can tolerate some data loss during transmission over the network, but delays in transmission are unacceptable. For these applications, TCP is the better choice because it requires less network overhead.

False

31
New cards

True or False: For other applications it is important that all the data arrives and that it can be processed in its proper sequence. For these types of applications, TCP is used as the transport protocol

True

32
New cards

The application uses TCP to perform

buffering, bandwidth probing, and congestion control, in order to better control the user experience.

33
New cards

What features does TCP have?

Establishes a Session, Ensures Reliable Delivery, Provides Same-Order Delivery, Supports Flow Control.

34
New cards

TCP is a stateful protocol which means

it keeps track of the state of the communication session.

35
New cards

To track the state of a session,

TCP records which information it has sent and which information has been acknowledged.

36
New cards

The stateful session begins with

the session establishment and ends with the session termination.

37
New cards

True or False: TCP handles all tasks associated with dividing the data stream into segments, providing reliability, controlling data flow, and reordering segments.TCP blocks the application from having to manage any of these tasks

True

38
New cards
39
New cards

True or False: UDP is such a complex protocol that it is usually described in terms of what it does not do compared to TCP.

False

40
New cards

What features do UDP have?

Data is reconstructed in the order that it is received; Any segments that are lost are not resent., There is no session establishment., The sending is not informed about resource availability.

41
New cards

True or False: If reliability is required when using UDP as the transport protocol, it must be handled by the application.

True

42
New cards

True or False: One of the most important requirements for delivering live video and voice over the network is that the data continues to flow quickly. Live video and voice applications can tolerate some data loss with minimal or no noticeable effect, and are perfectly suited to TCP.

False

43
New cards

What are the three types of applications that are best suited for UDP?

Live video and multimedia applications, Simple request and reply applications, Application that handles reliability themselve

44
New cards

DNS will use TCP if the DNS request or DNS response is more than

512 bytes, such as when a DNS response includes many name resolutions

45
New cards

True or False: Although DNS and SNMP use TCP by default, both can also use UDP

False

46
New cards

The source port number is associated with the

originating application on the local host whereas the destination port number is associated with the destination application on the remote host.

47
New cards

The source and destination ports are placed within the segment. The segments are then encapsulated within an IP packet. The IP packet contains the IP address of the source and destination. The combination of the source IP address and source port number, or the destination IP address and destination port number is known as

a socket.

48
New cards

The Internet Assigned Numbers Authority (IANA) is the standards organization responsible for assigning various addressing standards, including the 16-bit port numbers. The 16 bits used to identify

the source and destination port numbers provides a range of ports from 0 through 65535.

49
New cards

What examples show that some applications may use both TCP and UDP?

DNS uses UDP when clients send requests to a DNS server. However, communication between two DNS servers always uses TCP.

50
New cards

Netstat is an important network utility

that can be used to verify those connections.

51
New cards

What is shown when you enter the command netstat to list the protocols in use

the local address and port numbers, the foreign address and port numbers, and the connection state.

52
New cards

True or False: To close a connection, the Finish (FIN) control flag must be set in the segment header. To end each one-way TCP session, a two-way handshake, consisting of a FIN segment and an Acknowledgement (ACK) segment, is used. Therefore, to terminate a single conversation supported by TCP, four exchanges are needed to end both sessions. Either the client or the server can initiate the termination.

True

53
New cards

What are the functions within a three-way handshake?

It establishes that the destination device is present on the network. It verifies that the destination device has an active service and is accepting requests on the destination port number that the initiating client intends to use. It informs the destination device that the source client intends to establish a communication session on that port number.

54
New cards

What are the six control bits flags?

URG, ACK, PSH, RST, SYN, FIN.

55
New cards

URG -

Urgent pointer field significant

56
New cards

ACK -

Acknowledgment flag used in connection establishment and session termination

57
New cards

PSH -

Push function

58
New cards

RST -

Reset the connection when an error or timeout occurs

59
New cards

SYN -

Synchronize sequence numbers used in connection establishment

60
New cards

FIN -

No more data from sender and used in session termination

61
New cards

During session setup, an initial sequence number (ISN) is set. This ISN represents

the starting value of the bytes that are transmitted to the receiving application.

62
New cards

True or False: As data is transmitted during the session, the sequence number is incremented by the number of bytes that have been transmitted.

True

63
New cards

True or False: The ISN does not begin at one but is effectively a random number. This is to prevent certain types of malicious attacks.

True

64
New cards

The receiving TCP process places the data from a segment into a ____________. Segments are then placed in the proper sequence order and passed to the application layer when reassembled. Any segments that arrive with sequence numbers that are out of order are held for later processing. Then, when the segments with the missing bytes arrive, these segments are processed in order.

receiving buffer

65
New cards

The sequence (SEQ) number and acknowledgement (ACK) number are used

together to confirm receipt of the bytes of data contained in the transmitted segments

66
New cards

The SEQ number identifies the first byte of data in the segment being transmitted. TCP uses the ACK number sent back to the source to indicate the next byte that the receiver expects to receive. This is called

expectational acknowledgement.

67
New cards

True or False: Host operating systems today typically employ an optional TCP feature called selective acknowledgment (SACK), negotiated during the three-way handshake. If both hosts support SACK, the receiver can explicitly acknowledge which segments (bytes) were received including any discontinuous segments.

True

68
New cards

Flow control is

the amount of data that the destination can receive and process reliably

69
New cards

Flow control helps maintain

the reliability of TCP transmission by adjusting the rate of data flow between source and destination for a given session

70
New cards

The window size determines the number of bytes that can be sent before expecting an acknowledgment. The acknowledgment number is the

number of the next expected byte.

71
New cards

The window size is the number of bytes that the destination device

of a TCP session can accept and process at one time

72
New cards

True or False: The initial window size is agreed upon when the TCP session is established during the three-way handshake

True

73
New cards

True or False: The source device must increase the number of bytes sent to the destination device based on the window size of the destination

False

74
New cards

The source is transmitting 1,460 bytes of data within each TCP segment. This is typically the

Maximum Segment Size (MSS) that the destination device can receive

75
New cards

A common MSS is 1,460 bytes when using IPv4. A host determines the value of its MSS field by subtracting the IP and TCP headers from the Ethernet maximum transmission unit (MTU). On an Ethernet interface, the default MTU is ______ bytes

1500

76
New cards

True or False: If the source determines that the TCP segments are either not being acknowledged or not acknowledged in a timely manner, then it can increase the number of bytes it sends before receiving an acknowledgment

False

77
New cards

True or False: If the data sequence is important to the application, the application must identify the proper sequence and determine how the data should be processed.

True

78
New cards

True or False: When UDP receives a datagram destined for one of these ports, it forwards the application data to the wrong application based on its port number.

False