|
1 | | One of the main duties of the transport layer is to provide ____________ communication. |
| | A) | node-to-node |
| | B) | host-to-host |
| | C) | process-to-process |
| | D) | None of the choices are correct |
|
|
|
2 | | A client program normally uses ____________ port number. A server program normally uses __________ port number. |
| | A) | a well-known; an ephemeral |
| | B) | an ephemeral; a well-known |
| | C) | a private; a well-known |
| | D) | None of the choices are correct |
|
|
|
3 | | A socket address is a combination of __________. |
| | A) | A MAC address and a logical address |
| | B) | A MAC address and a port number |
| | C) | a user-specific address and a logical address |
| | D) | None of the choices are correct |
|
|
|
4 | | ______________ means accepting items from more than one source. ______________ means delivering items to more than one source. |
| | A) | Demultiplexing; Multiplexing |
| | B) | Multiplexing; Demultiplexing |
| | C) | Encapsulation; Decapsulation |
| | D) | Pulling; Pushing |
|
|
|
5 | | ________ means the producer delivers the items when they are produced. _______ means the consumer takes the items when it is ready to do so. |
| | A) | Pushing; pulling |
| | B) | Pulling; pushing |
| | C) | Forwarding; accepting |
| | D) | None of the choices are correct |
|
|
|
6 | | In the stop-and-wait protocol, the maximum send window size is ______ and the maximum receive window size is _______ where m is the number of bits in the sequence. |
| | A) | 1; 1 |
| | B) | 2m; – 1 |
| | C) | 1; 2m |
| | D) | 2m; 2m |
|
|
|
7 | | In the Go-Back-N protocol, the maximum send window size is ______ and the maximum receive window size is _______, where m is related to the number of bits in the sequence. number. |
| | A) | 1; 1 |
| | B) | 1; 2m |
| | C) | 2m – 1; 1 |
| | D) | 2m – 1; 2m – 1 |
|
|
|
8 | | In the selective-repeat protocol, the maximum send window size is ______ and the maximum receive window size is _______, where m is the number of bits in the sequence. |
| | A) | 1; 1 |
| | B) | 1; 2m – 1 |
| | C) | 2m – 1; 1 |
| | D) | 2m – 1; 2m – 1 |
|
|
|
9 | | UDP is a ________________ transport protocol. |
| | A) | connectionless, reliable |
| | B) | connection-oriented, unreliable |
| | C) | connectionless, unreliable |
| | D) | None of the choices are correct |
|
|
|
10 | | UDP is an acronym for _______. |
| | A) | User Delivery Protocol |
| | B) | User Datagram Procedure |
| | C) | User Datagram Protocol |
| | D) | None of the choices are correct |
|
|
|
11 | | At the transport layer, to define the processes, we need two identifiers called ____________. |
| | A) | logical addresses |
| | B) | physical addresses |
| | C) | port addresses |
| | D) | None of the choices are correct |
|
|
|
12 | | The ports ranging from 0 to 1,023 are called the ___________ ports. The ports ranging from 1,024 to 49,151 are called ___________ ports. The ports ranging from 49,152 to 65,535 are called the ___________ ports. |
| | A) | well-known; registered; dynamic or private |
| | B) | registered; dynamic or private; well-known |
| | C) | private or dynamic; well-known; registered |
| | D) | private or dynamic; registered; well-known |
|
|
|
13 | | UDP and TCP are two protocols at the ___________ layer. |
| | A) | data link |
| | B) | network |
| | C) | transport |
| | D) | application |
|
|
|
14 | | Which of the following functions are performed by UDP? |
| | A) | process-to-process communication |
| | B) | host-to-host communication |
| | C) | node-to-node communication |
| | D) | None of the choices are correct |
|
|
|
15 | | A port number is _______ bits long. |
| | A) | 8 |
| | B) | 16 |
| | C) | 32 |
| | D) | 64 |
|
|
|
16 | | Which of the following does UDP provide? |
| | A) | flow control |
| | B) | connection-oriented delivery |
| | C) | error control |
| | D) | None of the choices are correct |
|
|
|
17 | | The source port number on the UDP user datagram header defines _______. |
| | A) | the sending computer |
| | B) | the receiving computer |
| | C) | the process running on the sending computer |
| | D) | None of the choices are correct |
|
|
|
18 | | To use the services of UDP, we need ________ socket addresses. |
| | A) | four |
| | B) | two |
| | C) | three |
| | D) | None of the choices are correct |
|
|
|
19 | | UDP packets are called __________ . |
| | A) | user datagrams |
| | B) | segments |
| | C) | frames |
| | D) | None of the choices are correct |
|
|
|
20 | | UDP packets have a fixed-size header of _______ bytes. |
| | A) | 16 |
| | B) | 8 |
| | C) | 40 |
| | D) | 32 |
|
|
|
21 | | TCP is a __________ protocol. |
| | A) | byte-oriented |
| | B) | message-oriented |
| | C) | block-oriented |
| | D) | None of the choices are correct |
|
|
|
22 | | TCP groups a number of bytes together into a packet called a ___________. |
| | A) | user datagram |
| | B) | segment |
| | C) | datagram |
| | D) | None of the choices are correct |
|
|
|
23 | | TCP is a(n) ___________ protocol. |
| | A) | connection-oriented |
| | B) | connectionless |
| | C) | both connection-oriented and connectionless |
| | D) | None of the choices are correct |
|
|
|
24 | | TCP is a(n) _______ transport protocol. |
| | A) | unreliable |
| | B) | best-effort delivery |
| | C) | reliable |
| | D) | None of the choices are correct |
|
|
|
25 | | TCP uses _________________ to check the safe and sound arrival of data. |
| | A) | an acknowledgment mechanism |
| | B) | out-of-band signaling |
| | C) | the services of another protocol |
| | D) | None of the choices are correct |
|
|
|
26 | | The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________. |
| | A) | 0 |
| | B) | 1 |
| | C) | randomly generated number |
| | D) | None of the choices are correct |
|
|
|
27 | | In TCP, the sequence number for each segment is the number of the _______ byte (virtual byte) carried in that segment. |
| | A) | first |
| | B) | last |
| | C) | middle |
| | D) | None of the choices are correct |
|
|
|
28 | | Communication in TCP is ___________. |
| | A) | simplex |
| | B) | half-duplex |
| | C) | full-duplex |
| | D) | None of the choices are correct |
|
|
|
29 | | In TCP, the value of the acknowledgment field in a sent segment defines the sequence number related to the ______ byte a party expects to receive next. |
| | A) | first |
| | B) | last |
| | C) | next |
| | D) | None of the choices are correct |
|
|
|
30 | | The inclusion of the checksum in the TCP segment is ________. |
| | A) | optional |
| | B) | mandatory |
| | C) | depends on the type of data |
| | D) | None of the choices are correct |
|
|
|
31 | | In TCP, a SYN segment consumes _____ sequence number(s). |
| | A) | no |
| | B) | one |
| | C) | two |
| | D) | None of the choices are correct |
|
|
|
32 | | In TCP, a SYN + ACK segment consumes _____ sequence numbers. |
| | A) | no |
| | B) | three |
| | C) | two |
| | D) | one |
|
|
|
33 | | In TCP, an ACK segment, if carrying no data, consumes ______ sequence number(s). |
| | A) | no |
| | B) | one |
| | C) | two |
| | D) | None of the choices are correct |
|
|
|
34 | | The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack. |
| | A) | ACK flooding |
| | B) | FIN flooding |
| | C) | SYN flooding |
| | D) | None of the choices are correct |
|
|
|
35 | | The SYN flooding attack belongs to a group of security attacks known as a _____ attack. |
| | A) | denial of service |
| | B) | replay |
| | C) | man-in-the middle |
| | D) | None of the choices are correct |
|
|
|
36 | | In TCP, a FIN segment consumes ____ sequence numbers if it does not carry data. |
| | A) | two |
| | B) | three |
| | C) | no |
| | D) | one |
|
|
|
37 | | In TCP, a FIN + ACK segment consumes _____ sequence number(s) if it does not carry data. |
| | A) | two |
| | B) | three |
| | C) | one |
| | D) | no |
|
|
|
38 | | In TCP, one end can stop sending data while still receiving data. This is called a ______ termination. |
| | A) | half-close |
| | B) | half-open |
| | C) | full-close |
| | D) | None of the choices are correct |
|
|
|
39 | | TCP sliding windows are __________ oriented. |
| | A) | packet |
| | B) | segment |
| | C) | byte |
| | D) | None of the choices are correct |
|
|
|
40 | | In TCP, the size of the send window is the ________ of rwnd and cwnd. |
| | A) | maximum |
| | B) | sum of |
| | C) | minimum |
| | D) | None of the choices are correct |
|
|
|
41 | | In TCP, the window should not be _________. |
| | A) | opened |
| | B) | closed |
| | C) | shrunk |
| | D) | slide |
|
|
|
42 | | In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a segment of _____ byte(s) after the window is shut down. |
| | A) | ten |
| | B) | zero |
| | C) | one |
| | D) | None of the choices are correct |
|
|
|
43 | | A serious problem can arise in the sliding window operation when either the sending application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______. |
| | A) | silly window syndrome |
| | B) | unexpected syndrome |
| | C) | window bug |
| | D) | None of the choices are correct |
|
|
|
44 | | Nagle's algorithm can solve the silly window syndrome created by the _________. |
| | A) | sender |
| | B) | receiver |
| | C) | both sender and receiver |
| | D) | None of the choices are correct |
|
|
|
45 | | Clark's solution can solve the silly window syndrome created by the _________. |
| | A) | sender |
| | B) | receiver |
| | C) | both sender and receiver |
| | D) | None of the choices are correct |
|
|
|
46 | | Delayed acknowledgment can solve the silly window syndrome created by the _________. |
| | A) | sender |
| | B) | receiver |
| | C) | both sender and receiver |
| | D) | None of the choices are correct |
|
|
|
47 | | In TCP, an ACK segments that carry no data consumes _______ sequence number(s). |
| | A) | no |
| | B) | one |
| | C) | two |
| | D) | None of the choices are correct |
|
|
|
48 | | In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived. |
| | A) | one |
| | B) | two |
| | C) | three |
| | D) | None of the choices are correct |
|
|
|
49 | | In TCP, ________ retransmission timer is set for an ACK segment. |
| | A) | one |
| | B) | a previous |
| | C) | no |
| | D) | None of the choices are correct |
|
|
|
50 | | In TCP, there can be ______ RTT measurement(s) in progress at any time. |
| | A) | two |
| | B) | only one |
| | C) | several |
| | D) | None of the choices are correct |
|
|
|
51 | | We need to multiply the header length field by _______ to find the total number of bytes in the TCP header. |
| | A) | 2 |
| | B) | 4 |
| | C) | 6 |
| | D) | None of the choices are correct |
|
|
|
52 | | In TCP, urgent data requires the urgent pointer field as well as the URG bit (to be set) in the _______ field. |
| | A) | control |
| | B) | offset |
| | C) | sequence number |
| | D) | None of the choices are correct |
|
|
|
53 | | In TCP, if the ACK value is 200, then byte _______ has been received successfully. |
| | A) | 199 |
| | B) | 200 |
| | C) | 201 |
| | D) | None of the choices are correct |
|
|
|
54 | | In TCP, the _______ timer prevents a long idle connection between two TCPs. |
| | A) | retransmission |
| | B) | persistence |
| | C) | keepalive |
| | D) | None of the choices are correct |
|
|
|
55 | | In TCP, the _______ timer is needed to handle the zero window-size advertisement. |
| | A) | retransmission |
| | B) | persistence |
| | C) | keepalive |
| | D) | None of the choices are correct |
|
|
|
56 | | In TCP, Karn's algorithm is used in calculations by the _______ timer. |
| | A) | retransmission |
| | B) | persistence |
| | C) | keepalive |
| | D) | None of the choices are correct |
|
|
|
57 | | In TCP, a special segment called a probe is sent by a sending TCP when the _______ timer goes off. |
| | A) | transmission |
| | B) | persistence |
| | C) | keepalive |
| | D) | None of the choices are correct |
|
|
|
58 | | __________ control refers to the mechanisms and techniques to keep the load below the capacity. |
| | A) | flow |
| | B) | error |
| | C) | congestion |
| | D) | None of the choices are correct |
|
|
|
59 | | In TCP's ________ algorithm the size of the congestion window increases exponentially until it reaches a threshold. |
| | A) | congestion avoidance |
| | B) | congestion detection |
| | C) | slow start |
| | D) | None of the choices are correct |
|
|
|
60 | | In TCP's __________ algorithm the size of the congestion window increases additively until congestion is detected. |
| | A) | congestion avoidance |
| | B) | congestion detection |
| | C) | slow start |
| | D) | None of the choices are correct |
|
|
|
61 | | ________ treats the two signs of congestion detections, timeout and three duplicate ACKs, in the same way. |
| | A) | Taho TCP |
| | B) | Reno TCP |
| | C) | new Reno TCP |
| | D) | None of the choices are correct |
|
|
|
62 | | In ______ TCP, when the connection is established, TCP starts the slow start algorithms and sets the ssthresh variable to a pre-agreed value (normally 64 or 128 kilobytes) and the cwnd variable to 1 MSS. |
| | A) | Taho TCP |
| | B) | Reno TCP |
| | C) | new Reno TCP |
| | D) | None of the choices are correct |
|
|
|
63 | | The ___________ added a new state to the congestion control FSM, called the fast recovery state. |
| | A) | Taho TCP |
| | B) | Reno TCP |
| | C) | new Reno TCP |
| | D) | None of the choices are correct |
|
|
|
64 | | The ___________ treated the two signals of congestion, timeout and arrival of three duplicate ACKs, differently. |
| | A) | Taho TCP |
| | B) | Reno TCP |
| | C) | new Reno TCP |
| | D) | None of the choices are correct |
|
|
|
65 | | The __________ state in Reno TCP is a state somehow between the slow start and the congestion avoidance states. |
| | A) | congestion avoidance |
| | B) | congestion detection |
| | C) | slow recovery |
| | D) | None of the choices are correct |
|
|
|
66 | | In the Reno TCP, when TCP enters the fast recovery, if duplicate ACKs continue to come, TCP ____________________________________. |
| | A) | stays in this state, but the cwnd grows additively |
| | B) | stays in this state, but the cwnd grows exponentially |
| | C) | moves to slow start state |
| | D) | moves to the congestion avoidance state but deflate the size of the cwnd to ssthresh value |
|
|
|
67 | | In the Reno TCP, when TCP enters the fast recovery, if a timeout occurs, TCP ____________________________________. |
| | A) | stays in this state, but the cwnd grows additively |
| | B) | stays in this state, but the cwnd grows exponentially |
| | C) | moves to slow start state |
| | D) | moves to the congestion avoidance state but deflate the size of the cwnd to ssthresh value |
|
|
|
68 | | In the Reno TCP, when TCP enters the fast recovery, if a new (non duplicate) ACK arrives TCP ____________________________________. |
| | A) | stays in this state, but the cwnd grows additively |
| | B) | stays in this state, but the cwnd grows exponentially |
| | C) | moves to slow start state |
| | D) | moves to the congestion avoidance state but deflate the size of the cwnd to ssthresh value |
|
|
|
69 | | A later version of TCP, called ______ TCP, made an extra optimization on the _______ TCP. |
| | A) | New Reno; Reno |
| | B) | New Taho; Taho |
| | C) | New Reno; Taho |
| | D) | New Taho; Reno |
|
|
|
70 | | In the slow start algorithm, the size of the congestion window grows ______________ until ___________________. |
| | A) | exponentially; it reaches a threshold |
| | B) | exponentially; congestion is detected |
| | C) | additively; it reaches a threshold |
| | D) | additively; congestion is detected |
|
|
|
71 | | In the congestion avoidance algorithm, the size of the congestion window grows ______________ congestion is detected. |
| | A) | exponentially; it reaches a threshold |
| | B) | exponentially; congestion is detected |
| | C) | additively; it reaches a threshold |
| | D) | additively; congestion is detected |
|
|
|
72 | | The congestion window size, after it passes the initial slow start state, follows a saw tooth pattern called _________________________________. |
| | A) | exponential increase, additive decrease |
| | B) | additive increase, exponential decrease |
| | C) | multiplicative increase, additive decrease |
| | D) | additive increase, multiplicative decrease |
|
|