Professional Documents
Culture Documents
Chapter 3 Solutions
Chapter 3 Solutions
Review Questions
1. Which of the following is a reliable communications protocol?
a. UDP
b. TCP
c. IP
d. ICMP
2. Which of the following is used by the TFTP protocol?
a. UDP
b. TCP
c. ICMP
d. Telnet
3. Which of the following is a layer in the TCP/IP protocol stack? (Choose all that apply.)
a. Application
b. Presentation
c. Physical
d. Data Link
e. Internetwork
4. Which of the following is a TCP/IP Application layer protocol? (Choose all that apply.)
a. DNS
b. FTP
c. UDP
d. IP
e. ICMP
5. Which of the following is a TCP/IP Internetwork layer protocol? (Choose all that apply.)
a. ICMP
b. FTP
c. DNS
d. ARP
e. IP
6. Which of the following is a TCP/IP Transport layer protocol? (Choose all that apply.)
a. ARP
b. RARP
c. IP
d. UDP
e. TCP
7. What are the Well-Known port numbers?
a. 1024 - 49151
b. 49152 - 65535
c. 0 - 1021
d. 1 - 1023
8. What is the purpose of the three-way handshake?
a. to establish a reliable connection between two points
b. to establish an unreliable connection between two points
c. to establish a relationship at the Application layer between two points
d. to establish a relationship at the Internetwork layer between two points
9. What is in an ARP table?
a. destination and source MAC addresses
b. MAC and corresponding IP addresses
Case Projects
Case Project 1
One: Resulted from a coordinated effort by the United States Department of Defense (DOD) in
the late 1960s
Two: ARPA was charged with creating a wide area network (WAN). One of the results of the initial
research was the TCP/IP protocol suite.
Three: ARPA chose four university sites to help formulate the initial network: UCSB, UCLA, SRI,
and the University of Utah. Initially, these sites were connected with 50-Kbps leased lines, which
formed the Advanced Research Projects Agency Network. The name was later shortened to
ARPANET.
Four: Academic researchers found the network to be a great way to communicate with one
another. Because the U.S. government never classified or restricted the technology used to
create the network, researchers at other organizations used the information gained from the
project to create their own TCP/IP networks. This furthered the development of the protocol stack
as various groups developed more protocols for the TCP/IP suite.
Five: The DOD funded two more related projects. The first was the adaptation of TCP/IP to work
with the UNIX operating system. The second was the inclusion of the TCP/IP protocol with
Berkeley UNIX (Berkeley Software Distribution UNIX [BSD UNIX]). At the time, 90% of the
university science departments in the United States used BSD UNIX, so TCP/IP quickly increased
in popularity and use.
Six: Eventually, this network interconnected so many different organizations and sites that it
became known as the Internet. Because taxpayer money funded the project and the government
did not classify it, it was considered to be in the public domain. This opened the Internet to
everyone, organizations and individuals alike.
Case Project 2
The purpose of sliding windows is to provide flow control at layer 4 between communicating hosts
when TCP is the transport protocol in use. It allows more than one packet to be sent at once to
the receiving host. In essence, the source computer lets the destination computer know how
many data packets it is willing to send before it requires an acknowledgement (ACK) that the data
has been received. Large data transfers require large windows; otherwise, there would be a lot of
additional network traffic generated by ACKs for each communication. Smaller networks that send
small amounts of data can use smaller windows. Using large windows with small data transfers
can force the sending computer to wait a disproportionate time for an ACK. It may then retransmit
the data, which could result in getting an ACK for both the original, and the retransmitted data.
Devices can dynamically adjust their window size.