Question

1) In a typical TCP connection establishment, the two flags used in the core handshake are...

1) In a typical TCP connection establishment, the two flags used in the core handshake are the _____ and _____ flags.

2) TCP uses _____ to manage the transmission between senders and receivers that can send or receive differing rates to make sure not to overwhelm machines that may be slower.

3) The transport layer protocol used by the TCP / IP suite that does not provide guarantees on ordering or confirmation of receipt of packets is called .

4) SMTP is a protocol for ....

1.

Email

2.

Network Management

3.

Address Resolution

4.

Name services

5) If System 1 was sending data to System 3, when a packet left the router Interface 2, what would the source IP address in the packet be at that point?

ipnet.jpg

1.

192.168.1.10

2.

192.168.1.11

3.

192.168.1.1

4.

192.168.2.1

5.

192.168.2.10

6) If System 1 was sending data to System 3, when a packet left the router Interface 2, what would the source MAC address in the packet be at that point?

1.

00:00:00:00:00:01

2.

00:00:00:00:00:02

3.

00:00:00:00:00:03

4.

00:00:00:00:00:04

5.

00:00:00:00:00:05

7) Given a system with the following: IP Address: 10.10.2.34 Subnet Mask: 255.255.0.0 Gateway 10.10.2.1 Which (select all that apply) of the following addresses would be on the same local network?

1.

10.11.2.30

2.

10.10.23.62

3.

10.10.2.134

4.

192.168.1.1

5.

100.10.2.35

8) Describe how RIP operates. -Why are there problems implementing RIP on large networks?

9) -Describe the difference between bulk data flow and interactive data flow. -Give examples of where each is used.

10) Describe the process of terminating a connection in TCP. Be sure to discuss specifics on why TCP uses the mechanism it does.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer: SYN and ACK Explanation: to establish a connection we must send SYN. Now ACK is received from the other device. Answe

Note:Kindly post remaining questions separately

Add a comment
Know the answer?
Add Answer to:
1) In a typical TCP connection establishment, the two flags used in the core handshake are...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Configure RIPv2 1. Create the following network topology on Packet Tracer 192.168.2.0/30 192.168.2.2 /30 192.168.2.1/30...

    Configure RIPv2 1. Create the following network topology on Packet Tracer 192.168.2.0/30 192.168.2.2 /30 192.168.2.1/30 192.168.1.1/25 1811 R1 281 192.168.1.129/25 1192.168.1.128 /25 192.168.1.0/25 PC-PT PC1 PC-PT PC2 192.168.1.254/25 192.168.1.126/25 2. Configure the PCs and the routers with network information based on their networks. To configure the routers, use the CLI rather than through the GUI Router1: Fa0/0 192.168.1.1 255.255.255.128 Serial 192.168.2.1 255.255.255.252 with clock rate of 64000 Router2: Fa0/0 192.168.1.129 255.255.255.128 Serial 192.168.2.2 255.255.255.252 Completed 4. Now apply RIPv2 to...

  • 1. How many hosts can reside on a single Class C network? 1. 65535 2. 256...

    1. How many hosts can reside on a single Class C network? 1. 65535 2. 256 3. 254 4. 127 2.   Select the invalid IP address 1. 95.31.0.15 2. 143.256.11.2 3. 24.123.33.60 4. 135.10.243.1 3. What layer in the TCP/IP protocol suite would a Web Browser reside? 1. Data Link 2. Application 3. Network 4. Physical 4. If I have developed a new type of network interface device - one that uses a new wireless technology, which layer of the...

  • Computer A Windows Router 1 E0/0 E0/1 GALERIE E0/1 Computer B E0/0 GRE0/2 Router 2 Server...

    Computer A Windows Router 1 E0/0 E0/1 GALERIE E0/1 Computer B E0/0 GRE0/2 Router 2 Server webmail.njit.edy Internet Device Interface IP address MAC address Subnet Mask Gateway Router 1 E0/0 192.168.23.254 00:50:00:01:11:10 255.255.255.0 192.168.23.254 Router 1 E0/1 192.168.12.1 00:50:00:01:11:11 255.255.255.252 Router 2 E0/0 192.167.13.254 00:50:00:02:22:20 255.255.255.0 192.168.13.254 Router 2 E0/1 192.168.12.2 00:50:00:02:22:21 255.255.255.252 Router 2 E0/2 64.95.38.13 00:50:00:02:22:23 255.255.255.252 64.95.38.14 Computer A ETHO 192.168.23.10 23:AA:B1:A1:A3:11 255.255.255.0 192.168.23.254 Computer B ETHO 192.168.23.20 23:FD:1D:A1:02:24 255.255.0.0 192.168.23.254 Server ETHO 192.168.13.1 13:22:02:00:0A:10 255.255.255.0 192.168.13.254...

  • 1. TCP has which of the following characteristics. Choose all true statements. three-way hand shake none...

    1. TCP has which of the following characteristics. Choose all true statements. three-way hand shake none of the above regulated send rate connection state at the server 2. Consider a subnet with prefix 128.119.40.128/26. Given an example of one IP address (of form xxx.xxx.xxx.xxx) that can be assigned to this network. Suppose an ISP owns the block of addresses of the form 128.119.40.64/26. Suppose it wants to create four subnets from this block, with each block having the same number...

  • Refer to the network figure above, showing two Ethernet Subnets connected through an IP Router, for questions #1, #2 and #3. For each device, both its Internet Protocol (IP) address and its MAC addre...

    Refer to the network figure above, showing two Ethernet Subnets connected through an IP Router, for questions #1, #2 and #3. For each device, both its Internet Protocol (IP) address and its MAC address (also called the Physical address or the Ethernet address) are shown. The Subnet Mask used by all devices is 255.255.255.192 (which is same as prefix length “/26”). (5 points) Assuming that Client #1 sent a packet to Client #3 and then Client #3 sent a packet...

  • Question 1 The size of the datagram is determined by the application that sends the data....

    Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...

  • Dears,, I want unique, complete and correct answers to these questions: Q 1. Assume an organization...

    Dears,, I want unique, complete and correct answers to these questions: Q 1. Assume an organization has the classless address 15.25.16.8/17, then find the following: The first address The last address The total number of addresses The network address Does the address 15.25.15.127 belongs to this address space? Does the address 15.25.128.0 belongs to this address space? Q2. a) In an IPv4 packet, the value of HLEN is (1010)2 , and the value of the total length field is (005A)16....

  • Client #1 IP 160.16.0.3 MAC 00:01:02:03:04:22 Client #2 IP 160.16.0.11 Client #3 Web Server MAC 00:01:02:03:04:06...

    Client #1 IP 160.16.0.3 MAC 00:01:02:03:04:22 Client #2 IP 160.16.0.11 Client #3 Web Server MAC 00:01:02:03:04:06 IP 160.16.0.10 IP 160.16.0.70 MAC 00:01:02:03:04:07 Interface Fa0/0 Interface Fao MAC 00:01:02:03:04:33 IP 160.16.0.1 IP 160.16.0.65 MAC 00:01:02:03:04:A1 MAC 00:01:02:03:04:11 1000000000 IP Router Ethernet Ethernet Ethernet Hub Hub Switch Refer to the network figure above, showing two Ethernet Subnets connected through an IP Router, for questions #1 to #5. For each device, both its Internet Protocol (IP) address and its MAC address (also called...

  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • PLEASE ATTACH A SCREENSHOT OF YOUR SUCCESSFUL PING IN PACKET TRACER FOR THE END!!!!!!!!!!! THANK YOU! Objectives Part...

    PLEASE ATTACH A SCREENSHOT OF YOUR SUCCESSFUL PING IN PACKET TRACER FOR THE END!!!!!!!!!!! THANK YOU! Objectives Part A: Configure a simple static routing . Part B: Configure a simple RIP routing Part A: Configure a simple static routing 1. Create the following network topology on Packet Tracer Router-PT Router-PT Addressing Table Device Interface IP Address Subnet Mask Default Gatewa 10.0.0.1 20.0.0.1 30.0.0.1 20.0.0.2 0.0.0.10 30.0.0.10 N/A 255.0.0.0 255.0.0.0 255.0.0.0 255.0.0.0 255.0.0.0 255.0.0.0 Routero 2/0 NIA NIA NIA 10.0.0.1 30.0.0.1...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT