Examine the following: What header fields are used to identify a UDP socket? source IP address...
12. The combination of the source and destination IP addresses and the source and destination port numbers is known as a socket. What is a socket used for? 13. Label the following port number ranges. _0 to 1023 1024 to 49151 49152 to 65535 14. What DOS command can be used to see which active TCP connections are open and wing on a networked host? 15. Why is dividing application data into segments necessary 16. Labelcach of the following delivery...
Describe why UDP uses the pseudo-header to verify that the UDP datagram has reached the correct destination, even though the IP layer has already used the destination IP address to ensure that the datagram is addressed to the receiving machine.
14. (10 Points) Suppose Proces A running on Host Process B running on Host Y vi running on Host Z is communicating with Process via a TCP connection. Let x, y, and z be the IP addresses o and Host Z, respectively. Assume the port number o the port number of Process B is 464 26145, and the port number of Process D is 80. a. What are the identifiers of the socket associated with Process B when it is...
1. Change the IP multicast address 233.50.18.2 to Ethernet multicast addresses. . 2. Answer the following question about client-server programs: a. Which program is running on the local machine b. Which program is running on the remote machine (client or server)? c. Which program is an infinitive program (client or server)? d. Which program is a finite program (client or server)? . 3. The following is a dump of a UDP header in hexadecimal format: CB820045007C12B2 a. What is the...
Question 1 1 The time to live field of IP header can prevent -------- in packet forwarding Question 2 In TCP connections, RST packets are used to --------- Question 3 (Multiple answers if applied) The protocol field of the IP header can be A) IP B) TCP C) ICMP D) UDP E) ARP Question 4 Frame exists in ------, packet exists in ------ , data segment existis in------ of TCP/IP model. Question 5 A web browser is -------- --------------- Question...
TCP headers and segmentation (B) 10. Which of the following flelds in the UDP header Is NOT found in the TCP header? source port destination port checksum length 11. The value of the acknowledgement field in a TCP segment defines Number of bytes to retransmit Number of bytes to receive Starting point of next bytes to receive in sequence Total number of bytes left 12. Suppose Host A sends one segment with sequence number 38 and 4 bytes of data...
10. In a network an IP address and prefix is given as 192.168.130.34/17. What is the subnet mask? (A) 0.0.127.255 (B) 255.255.0.0 (C) 255.255.128.0 (D) 0.0.2.34 11. In a network an IP address and prefix are given as 192.168.130.34/17. How many host addresses are there? (A) 34 (B) 32766 (C) 131072 (D) 2 12. One result of subnetting is that the size of the routing table in the routers is reduced (A) True (8) False 13. The port number is...
1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...
Besides IP address, what is the other major component that defines a socket? Compare the three types of sockets that are mainly used for programming (e.g., Java programming)? What is a loopback and when is it used? Imagine that a host with IP address 150.55.66.77 wishes to download a file from a default web server at IP address 202.28.15.123. Give an example of a valid socket pair for a connection between this pair of hosts.
Consider IPv4, each IP address + a port number gives a unique connection (referred to as Internet socket). If 1/4 of the bits in the port field (16 bits) of the TCP header is fixed for certain reason, how many unique connections can be formed?