Explain TCP connection management with the help of TCP connection management finite state machine.

1 Answer

Answer :

electronics2electrical.com 629 -  .jpg

To keep track of all the different events happening during connection establishment, connection termination, and data transfer,

TCP is specified as the Finite State Machine –FSM


TCP State Machine:

* TCP uses a three way handshake to close connection

* Singled by the FIN bit in the packet header


The figure shows the two FSMs used by the TCP client and server combined in one diagram.

* Ovals/rectangle represents states.

* Transition from one state to another is shown using directed lines.

* Each line has two strings separated by a slash.

* The first string is the input, what TCP receives.

* The second is the output, what TCP sends.

* The dotted black lines in the figure represent the transition that a server normally goes through;

* The solid black lines show the transitions that a client normally goes through.

* Sometimes in some situations, a server transitions through a solid line or a client transitions through a dotted line.

electronics2electrical.com 631 -  .jpg

Related questions

Description : Explain how TCP connections are established using the 3 way handshake. What happens when 2 hosts simultaneously try to establish a connection?

Last Answer : If 2 host Simultaneously try to establish connection: Simultaneous Open: * It's possible for two applications to send a SYN to each other to start a TCP connection, although the possibility is small, ... . * The CLOSING state takes the place of FIN-WAIT-2 or CLOSEWAIT in a common scenario.

Description : Explain the TCP connection establishment using a three way handshake mechanism.

Last Answer : Connection Establishment TCP uses a Three way handshaking mechanism to establish a connection between client and server machines. The three steps in three way handshaking mechanism are as follows.  SYN: ... This is just an ACK segment. It guarantees the completion of three way handshaking.

Description : State the use of 6 flags in TCP header.

Last Answer : There are 6, 1-bit control bits that control connection establishment, termination, abortion, flow control etc.. 1) URG: Urgent pointer If this bit field is set the receiving TCP should ... 6) FIN: No more data from sender. If this bit is set then it terminates the connection.

Description : Compare TCP and UDP

Last Answer : Characteristics TCP UDP Connection TCP is connection oriented Protocol UDP is connection less Protocol  Reliability It provides reliable delivery of messages It provides unreliable delivery of ... FTP, Telnet, SMTP, DNS, HTTP, POP DNS, BOOTP, DHCP, TFTP, RIP

Description : List two advantages of using UDP over TCP.

Last Answer : Advantages of using UDP over TCP : 1) UDP is connection less and unreliable transport layer protocol. i.e. It does not require to maintain a connection. 2) UDP is transaction oriented and ... UDP is faster since it does not require acknowledgment. 4) Useful when time sensitivity is more important

Description : Explain difference between distance vector and link state routing. 

Last Answer : Distance Vector Routing Link State Routing Routing tables are updated by exchanging information with the neighbours.  Complete topology is distributed to every router to update a routing table. ... Harder to configure Count to infinity problem No count to infinity problem

Description : Full form of FSM is: a. Finite state machine b. Fix state machine c. Fun source metal d. Allof these

Last Answer : a. Finite state machine

Description : Show how finite state machine model helps in designing a switching system and give a typical example.

Last Answer : Switching system basically belongs to the class of finite state machines (FSM) which are asynchronous in nature and follows a sequential logic for their operation. They can be modeled by ... circuits and memory elements. Clocked synchronous operation shown in Fig. overcome such problems.  

Description : Consider the following statements related to compiler construction: I. Lexical Analysis is specified by context-free grammars and implemented by pushdown automata. II. Syntax Analysis is specified by regular expressions and implemented by ... Only l (2) Only ll (3) Both I and II (4) Neither I nor Il

Last Answer : Answer: 4

Description : Explain about standard and non standard protocols at the application layer.

Last Answer : HTTP The Hypertext Transfer Protocol (HTTP) is a Application layer protocol used mainly to access data on the World Wide Web. HTTP uses the services of TCP on well-known port 80. FTP ... starts with the client when the user needs to download e-mail from the mailbox on the mail server.

Description : Explain the working of TELNET.

Last Answer : TELNET: TELNET is an abbreviation for TErminaLNETwork. It is the standard TCP/IP protocol for virtual terminal service. TELNET Working: * TELNET is a client-server application that allows a user ... the characters to the appropriate application program.  Fig. Working of TELNET 

Description : Explain different transition method of IPv4 to IPv6.

Last Answer : Three Transition from IPv4 to IPv6 strategies are 1. Dual Stack 2. Tunnelling 3. Header Translation  1. DUAL STACK  In this kind of strategy a station has a dual stack of protocols run IPv4 and ... of the IPv6 packet is converted to an IPv4 header see figure. Fig. Header Translation

Description : Explain working of WWW.

Last Answer : The Web is a repository of information in which the documents, called web pages, are distributed all over the world and related documents are linked together. The WWW today is a distributed client- ... the web server. Each time a request arrives, the corresponding document is sent to the client. 

Description : Explain ICMP protocol. Describe the header format of ICMP.

Last Answer : The Internet Control Message Protocol (ICMP) supports the unreliable and connectionless Internet Protocol (IP). * ICMP messages are encapsulated in IP datagrams. There are two categories of ICMP messages ... query messages, the data section carries extra information based on the type of the query.

Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3

Last Answer : a. 4,2,1,3

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ………. a. 220 service ready message b. 421 service not available message c. Both of the above d. None of the above

Last Answer : c. Both of the above

Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B

Last Answer : a. A & B

Description : The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server A. 1023 B. 402 C. 443 D. 8080

Last Answer : C. 443

Description : The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ____ Service ready message.. A. 420 B. 320 C. 220 D. 120

Last Answer : C. 220

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : Which Nmap scan is does not completely open a TCP connection? A. SYN stealth scan B. TCP scan C. XMAS tree scan D. ACK scan

Last Answer : A. SYN stealth scan

Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.

Last Answer : B. UDP 

Description : Which of the following pairs have different expressive power? (1) Single-tape-turing machine and multi-dimensional turing machine. (2) Multi-tape turing machine and multi-dimensional ... non-deterministic pushdown automata. (4) Deterministic finite automata and Non-deterministic finite automata.

Last Answer : Deterministic push down automata and non-deterministic pushdown automata.

Description : State the concept of fragmentation in IPv4. 

Last Answer : Fragmentation: When the maximum size of datagram is greater than maximum size of data that can be held a frame then the network layer divides the datagram received from x-port layer into ... copied into the fragment header. The three fields Flags, Fragmentation offset and Total length are altered.

Description : State the transmission modes of FTP.

Last Answer : Transmission modes of FTP: 1. Stream mode 2. Block mode 3. Compressed mode

Description : State the need of domain name system.

Last Answer : Need of domain name system: * Since IP addresses are difficult to remember and names are easier to remember Domain Name System is used and DNS servers are used for converting these names into IP addresses. * ... to internet. Use for mapping can map a name to an address or an address to a name. 

Description : State the four advantages of IPv6.

Last Answer : Advantages of IPv6: * Larger address space. * Better header format. * New options for additional functionalities. * Allowance for extension. * Support for more security. * ... Simplified Network configuration * Support for new services * Support for Security * Auto configuration

Description : Describe the HTTP response message format.

Last Answer : Status Line  Status line shows status for the response it indicates response status using a code as well as a status phrase. The status-Line begins with a protocol version, then status code and status phrase. ... fields Body It contains actual content. This part is optional. OR

Description : Describe the RIP message format.

Last Answer : RIP(Routing Information Protocol) message format * RIP is routing protocol based on Distance Vector Routing algorithm which is an intradomain (interior) routing protocol used inside an autonomous ... 32-bit field defines the hop count from the advertising router to the destination network

Description : Construct a diagram to show the application of cookies in a scenario in which the server uses cookies for advertisement.

Last Answer : Use of Cookies for advertisements:  A cookie is also used by advertising agencies. An advertising agency can place banner ads on some main website that is often visited by users. The advertising agency supplies only ... the user is sent and stored in the file, which are used by the server. 

Description : Differentiate between IPv4 and IPv6.

Last Answer : IPv4 IPv6 1. Source and destination addresses are 32 bits (4 bytes) in length. 1. Source and destination addresses are 128 bits(16 bytes) in length. 2. Uses broadcast ... Uses host address (AAAA) resource records in the domain name system to map host names to IPv6 addresses

Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol used to monitor computers

Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol that handles error andcontrol messages

Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above

Last Answer : UDP

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above

Last Answer : SMTP

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : Which of the following of the TCP/IP protocolsis the used for transferring filesfrom one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?  (a) FTP (b) SNMP (c) SMTP (d) RPC

Last Answer : SMTP is used for transferring electronic mail messages from one machine to another.

Description : Minimal deterministic finite automaton for the language L={ 0n | n≥0, n≠4 } will have: (A) 1 final state among 5 states (B) 4 final states among 5 states (C) 1 final state among 6 states (D) 5 final states among 6 states

Last Answer : (D) 5 final states among 6 states

Description : There are exactly ................ different finite automata with three states x, y and z over the alphabet {a, b} where x is always the start state. (A) 64 (B) 256 (C) 1024 (D) 5832

Last Answer : Answer: D

Description : Let L be the language generated by regular expression 0*10* and accepted by the deterministic finite automata M. Consider the relation RM defined by M. As all states are reachable from the start state, RM has ................ equivalence classes. (A) 2 (B) 4 (C) 5 (D) 6

Last Answer : (D) 6

Description : Would a Blue-ray DVD player new in c. 2008 suddenly die? Do they have finite life spans?

Last Answer : They are built to fail after a certain time, to force you to buy a new one.

Description : Do you fear being finite?

Last Answer : No. I feel that I will rise to the occasion.