Explain how TCP connections are established using the 3 way handshake. What happens when 2 hosts simultaneously try to establish a connection?

1 Answer

Answer :

If 2 host Simultaneously try to establish connection:

Simultaneous Open:

* It's possible for two applications to send a SYN to each other to start a TCP connection, although the possibility is small, because both sides have to know which port on the other side to send to.


This process is called "Simultaneous Open", or "simultaneous active open on both sides".

* In a simultaneous open, both applications issue active opens.

* This is a rare situation in which there is no client or server;  communication is between two peers that know their local port numbers.

* Both TCPs go through SYN-SENT and SYN-RCVD states before going to the ESTABLISHED state.

* Both processes act as client and server.

* The two SYN+ACK segments acknowledge the SYN segments and open the connection.


OR


Simultaneous Close:

* It's permitted in TCP for both sides to do "active close", which is called "Simultaneous Close". During "Simultaneous Close", 4 packets are exchanged, the same as in normal situations.

* In this situation, both ends issue an active close.

* Both TCPs go to the FIN-WAIT-1 state and send FIN segments that are in transit simultaneously.

* After receiving the FIN segment, each end goes to the CLOSING state and sends an ACK segment.

* The CLOSING state takes the place of FIN-WAIT-2 or CLOSEWAIT in a common scenario.

Related questions

Description : Explain the TCP connection establishment using a three way handshake mechanism.

Last Answer : Connection Establishment TCP uses a Three way handshaking mechanism to establish a connection between client and server machines. The three steps in three way handshaking mechanism are as follows.  SYN: ... This is just an ACK segment. It guarantees the completion of three way handshaking.

Description : Explain TCP connection management with the help of TCP connection management finite state machine.

Last Answer : To keep track of all the different events happening during connection establishment, connection termination, and data transfer, TCP is specified as the Finite State Machine -FSM TCP ... , a server transitions through a solid line or a client transitions through a dotted line.

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Transmission control protocol is a) connection oriented protocol b) uses a three way handshake to establish a connection c) recievs data from application as a single stream d) all of the mentioned

Last Answer : d) all of the mentioned

Description : List two advantages of using UDP over TCP.

Last Answer : Advantages of using UDP over TCP : 1) UDP is connection less and unreliable transport layer protocol. i.e. It does not require to maintain a connection. 2) UDP is transaction oriented and ... UDP is faster since it does not require acknowledgment. 4) Useful when time sensitivity is more important

Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B

Last Answer : a. A & B

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Compare TCP and UDP

Last Answer : Characteristics TCP UDP Connection TCP is connection oriented Protocol UDP is connection less Protocol  Reliability It provides reliable delivery of messages It provides unreliable delivery of ... FTP, Telnet, SMTP, DNS, HTTP, POP DNS, BOOTP, DHCP, TFTP, RIP

Description : State the use of 6 flags in TCP header.

Last Answer : There are 6, 1-bit control bits that control connection establishment, termination, abortion, flow control etc.. 1) URG: Urgent pointer If this bit field is set the receiving TCP should ... 6) FIN: No more data from sender. If this bit is set then it terminates the connection.

Description : ………………...is a minimal protocol that allows isolated hosts to link via TCP/IP over the telephone network and ………………..uses a proposed international standard for transmitting HDLC over asynchronous lines. A. LCP, PPP B. PPP, LCP C. SLIP, PPP D. PPP, SLIP

Last Answer : C. SLIP, PPP

Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network

Last Answer : Answer: Marks to all

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these

Last Answer : c. DNS requests are generally very small and fit well within UDP segments

Description : Consider the following statements. I. TCP connections are full duplex. II. TCP has no option for selective acknowledgment III. TCP connections are message streams. a. Only I is correct b. Only I and II are correct c. Only II and III are correct d. All of I, II and III are correct

Last Answer : a. Only I is correct

Description : State weather the following statement is true or false for Point-to-Point Protocol 1). It is still in widespread use for dial-up TCP/IP connections 2) Point-to-point circuits in the form of asynchronous lines have long been ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true

Last Answer : D. 1. true, 2. false, 3. true

Description : How the TCP connections are needed in FTP?

Last Answer : FTP establishes two connections between the hosts. One connection is used for data transfer, the other for control information. The control connection uses very simple rules of communication. The data connection needs more complex rules due to the variety of data types transferred.

Description : Is there any advantage or disadvantage to having two internet connections open simultaneously?

Last Answer : You can aggregate bandwidth, but it is not terribly straightforward. If you are interested I’ll try to find you the link.

Description : What connections do you see between the school system Horace Mann helped establish and today’s schools?

Last Answer : We don't do homework but we can put you on the right path. Why don't you make a list from your textbook of Horace Mann's educational goals and ideas and then think about how they relate to ... know them. Who is in charge? Who designs the curriculum? What subjects are taught? How is it funded?

Description : The OSI layer that provides the control functions necessary to establish, manage and terminated the connections as required to satisfy the user reques

Last Answer : Session layer

Description : What file will you use to establish Oracle connections from a remote client?

Last Answer : tnsnames.ora

Description : The technology that is used to establish wireless networking is (1) TCP/IP (2) J2ME (3) MATLAB (4) Bluetooth

Last Answer : Bluetooth

Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3

Last Answer : a. 4,2,1,3

Description : Do you know any true hoarders and you think the show hosts/doctors try to make the hoarder give up too many of their possessions?

Last Answer : I never saw that show but I feel people should be able to keep their junk,along with all 35 cats! Long live crazy cat ladies!Those wacky!@#$%^& XD

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : Is it just me or has your internet connection speed gone to hell since the FCC let the net neutrality lapse in favor of allowing the big media giants control access, connections and speed?

Last Answer : It’s probably you.

Description : Why underground service connections are service connections are costly than overhead service connection

Last Answer : Reason: Underground service connection is given by underground cable. This cable is costly than bare conductor. Sometimes cable trench is required for cable laying, which requires additional cost. So underground service connections are costly than overhead service connection.

Description : Explain about standard and non standard protocols at the application layer.

Last Answer : HTTP The Hypertext Transfer Protocol (HTTP) is a Application layer protocol used mainly to access data on the World Wide Web. HTTP uses the services of TCP on well-known port 80. FTP ... starts with the client when the user needs to download e-mail from the mailbox on the mail server.

Description : Explain the working of TELNET.

Last Answer : TELNET: TELNET is an abbreviation for TErminaLNETwork. It is the standard TCP/IP protocol for virtual terminal service. TELNET Working: * TELNET is a client-server application that allows a user ... the characters to the appropriate application program.  Fig. Working of TELNET 

Description : Explain different transition method of IPv4 to IPv6.

Last Answer : Three Transition from IPv4 to IPv6 strategies are 1. Dual Stack 2. Tunnelling 3. Header Translation  1. DUAL STACK  In this kind of strategy a station has a dual stack of protocols run IPv4 and ... of the IPv6 packet is converted to an IPv4 header see figure. Fig. Header Translation

Description : Explain difference between distance vector and link state routing. 

Last Answer : Distance Vector Routing Link State Routing Routing tables are updated by exchanging information with the neighbours.  Complete topology is distributed to every router to update a routing table. ... Harder to configure Count to infinity problem No count to infinity problem

Description : Explain working of WWW.

Last Answer : The Web is a repository of information in which the documents, called web pages, are distributed all over the world and related documents are linked together. The WWW today is a distributed client- ... the web server. Each time a request arrives, the corresponding document is sent to the client. 

Description : Explain ICMP protocol. Describe the header format of ICMP.

Last Answer : The Internet Control Message Protocol (ICMP) supports the unreliable and connectionless Internet Protocol (IP). * ICMP messages are encapsulated in IP datagrams. There are two categories of ICMP messages ... query messages, the data section carries extra information based on the type of the query.

Description : In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ………. a. 220 service ready message b. 421 service not available message c. Both of the above d. None of the above

Last Answer : c. Both of the above

Description : The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server A. 1023 B. 402 C. 443 D. 8080

Last Answer : C. 443

Description : The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ____ Service ready message.. A. 420 B. 320 C. 220 D. 120

Last Answer : C. 220

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : Which Nmap scan is does not completely open a TCP connection? A. SYN stealth scan B. TCP scan C. XMAS tree scan D. ACK scan

Last Answer : A. SYN stealth scan

Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.

Last Answer : B. UDP 

Description : What happens to the unused blessed hosts after communion?

Last Answer : Need answer

Description : What happens if 4 hosts have failed and a 5th one also fails?

Last Answer : That depends. If you have admission control enabled, if there are any resource constraints some VM's may not restart. If you have admission control disabled, the VM's will get restarted ... you have enough port groups configured on your vSwitch for your Virtual Machine port group to accommodate

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : I want to establish a remote desktop connection.?

Last Answer : Depending on what version of Windows you're running, you may already have a remote desktop connection software on your computer. If you do, just check your programs list. Windows Vista comes with the ... client. Cisco Any Connect is used across the board, and is pretty much the go-to application.

Description : What do I need to do to establish a remote desktop connection from home to my work computer?

Last Answer : you need to use a program like isloonline which is the link below. islo online is very usfull for accessing computer desktops and much more www.islonline.com

Description : Working papers prepared by a CPA in connection with an audit engagement are owned by the CPA, subject to certain limitations. The rationale for this rule is to a. Protect the ... d. Establish a continuity of relationship with the client whereby indiscriminate replacement of CPAs is discouraged.

Last Answer : Provide the CPA with evidence and documentation which may be helpful in the event of a lawsuit.

Description : The working papers prepared by a CPA in connection with an audit engagement are owned by the CPA, subject to certain limitations. The rationale for this rule is to a. Protect the ... d. Establish a continuity of relationship with the client whereby indiscriminate replacement of CPAs is discouraged

Last Answer : Provide the CPA with evidence and documentation which may be helpful in the event of a lawsuit