(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
I-Which of the following statements about TCP error control is correct?
I-Retransmission timer is based on RTT
O-TCP is classified as which type of protocol
O-CONNECTION
oriented
N-The effective TCP window size is determined by:
N-Minimum of rwnd and cwnd
G-If Host B has a buffer of 5000 bytes and 1000 bytes are unprocessed, what is rwnd?
G-4000 bytes
N-The TCP header length ranges between
N-TCP header 20–60 bytes
N-Which field detects corruption?
N-Checksum
I-Which TCP flag is used to terminate a connection
I-FIN
O-TCP flow control lies between which two protocols
O-Go-Back-N and Selective Repeat
O-ACK
O-Consumes one sequence number if no data
O-In TCP, the sequence number in a segment defines:
O-The number of the first data byte in the segment
G-When the receiver advertises a window size of 0, the sender:
G-Sends a 1-byte probe segment
I-If Host B has a buffer of 5000 bytes and 1000 bytes are unprocessed, what is rwnd?
I-4000 bytes
B-What is the purpose of the checksum field in TCP?
B-To detect errors
I-A common attack exploiting the TCP three-way handshake is:
I-SYN flooding
N-Which flag in the TCP control field is used to initiate a connection
N-SYN
B-The maximum window size in TCP flow control, if 16 bits are used, is:
B-65,535 bytes
B-Which number is the next byte expected by the receiver
B-Acknowledgment number
B-mechanisms TCP use for reliability
B-Flow control and error control
G-“Name the TCP connection establishment method
G-Three-way handshake