計算機網絡英文題庫附答案chapter3稻谷書屋_第1頁
計算機網絡英文題庫附答案chapter3稻谷書屋_第2頁
計算機網絡英文題庫附答案chapter3稻谷書屋_第3頁
計算機網絡英文題庫附答案chapter3稻谷書屋_第4頁
計算機網絡英文題庫附答案chapter3稻谷書屋_第5頁
已閱讀5頁,還剩13頁未讀 繼續免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

1、chapter 3 transport layer1. a transport-layer protocol provides for logical communication between _.a application processesb hostsc routersd end systems2. transport-layer protocols run in _.a serversb clientsc routersd end systems3. in transport layer, the send side breaks application messages into

2、_, passes to network layer.a framesb segmentsc data-grams d bit streams4. services provided by transport layer include _.a http and ftpb tcp and ipc tcp and udpd smtp5. which of the following services is not provided by tcp? a delay guarantees and bandwidth guaranteesb reliable data transfers and fl

3、ow controlsc congestion controlsd in-order data transfers6. these two minimal transport-layer services-_ and _-are the only two services that udp provides! a process-to-process data delivery, error checkingb congestion control, reliable data transferc flow control, congestion controld in-order data

4、transfer, error checking7. port numbers scope is _ to _. a 0, 1023b 0, 65535c 0, 127d 0,2558. the port numbers ranging from _to _ are called well-known port number and are restricted.a 0, 1023b 0, 65535c 0, 127d 0,2559. udp socket identified by two components, they are _.a source ip addresses and so

5、urce port numbersb source ip addresses and destination ip addressesc destination ip address and destination port numbersd destination port numbers and source port numbers10. tcp socket identified by a (an) _. a 1-tupleb 2-tuplec 3-tupled 4-tuple11. which of the following applications normally uses u

6、dp services? a smtpb streaming multimediac ftpd http12.reliabledatatransferprotocoloveraperfectlyreliablechannelis_.ardt1.0brdt2.0crdt3.0drdt2.113.reliabledatatransferprotocoloverachannelwithbiterrorsandpacketlossesis_.ardt1.0brdt2.0crdt3.0drdt2.114.whichofthefollowingaboutreliabledatatransferoverac

7、hannelwithbiterrorsisnotcorrect?ardt2.0:assumingackandnakwillnotbecorruptedbrdt2.1:assumingackandnakcanbecorruptedcrdt2.2:onlyuseack-sdrdt2.2:usebothack-sandnak-s15.whichofthefollowingprotocolsisnotpipeliningprotocols?atcp brdt3.0cgo-back-n dselectiverepeat16.whichofthefollowingisnotcorrectaboutgbnp

8、rotocol?aonlyusingack-sbusingcumulativeack-screceiverdiscardsallout-of-orderpacketsditisnotpipelinedprotocol17.whichofthefollowingisnotcorrectaboutsrprotocol?areceiverindividuallyacknowledgesallcorrectlyreceivedpacketsbsenderonlyresendspacketsforwhichacknotreceivedcitlimitssequencenumberofsentbutun-

9、ack-edpacketsditisnotapipelinedprotocol18. which of the following about tcp connection is not correct? a it is a broadcast connectionb it is a point-to-point connectionc it is a pipelined connectiond it is a full duplex connection19. the syn segment is used for_. a tcp connection setupb tcp flow con

10、trolc tcp congestion controld closing a tcp connection20. the fin segment is used for_.a tcp connection setupb tcp flow controlc tcp congestion controld closing a tcp connection21. how does tcp sender perceive congestion? a through a timeout eventb through a receiving duplicate ack-s eventc both a a

11、nd bd either a or b22. extending host-to-host delivery to process-to-process delivery is called transport-layer _ and . a multiplexing and de-multiplexingb storing and forwardingc forwarding and filteringd switching and routing23. udp is a _ service while tcp is a connection-oriented service. a conn

12、ectionlessb reliablec connection-orientedd in-order24. the udp header has only four fields, they are_. a source port number, destination port number, length and checksumb source port number, destination port number, source ip and destination ipc source ip, destination ip, source mac address and dest

13、ination mac addressd source ip, destination ip, sequence number and ack sequence number25. there are two 16-bit integers: 1110 0110 0110 0110, 1101 0101 0101 0101. their checksum is_. a 0100010001000011b 1011101110111100c 1111111111111111d 100000000000000026. the maximum amount of data that can be g

14、rabbed and placed in a segment is limited by the_.a maximum segment size (mss)b mtuc checksumd sequence number27. the mss is typically set by first determining the length of the largest link-layer frame that can be sent by the local sending host-the so-called_.a maximum transmission unit (mtu)b mssc

15、 checksumd sequence number28. a file size of 500,000bytes, mss equals 1000bytes. when we want to transmit this file with tcp, the sequence number of the first segment is 0, and the sequence number of the second segment is _. a 1000b 999c 1001d 50000029. because tcp only acknowledges bytes up to the

16、first missing byte in the stream, tcp is said to provide_. a cumulative acknowledgementsb selective acknowledgementsc 3 duplicate acksd positive acks30. provided =0.125, current value of estimated-rtt is 0.4s, sample-rtt is 0.8s, then the new value of estimated-rtt is _s. a 0.45b 0.6c 0.7d 0.831. pr

17、ovided rcvbuffer=20,lastbytercvd=20,lastbyteread=15, then rcvwindow=_. a 14b 15c 16d 1032. tcp service does not provide_. a reliable data transfer b flow controlc delay guarantee d congestion control33. there are two states in tcp congestion control, which are _. a slow start and congestion avoidanc

18、eb safe start and congestion avoidancec slow start and congestion abandond safe start and congestion abandon34. the transport-layer protocol provides logical communication between _, and the network-layer protocol provides logical communication _. a hosts, processes b processes, hostsc threads, proc

19、esses d processes, threads35.toimplementthemulticastservicestheinternetemploysthe_protocol.aftpbtcpcigmpdudp36. if an application developer chooses _ protocol, then the application process is almost directly talking with ip. a httpb ripc csma/cdd udp37. _ maintains connection-state in the end system

20、s. this connection state includes receive and send buffers, congestion-control parameters, and sequence and acknowledgment number parameters. a udpb tcpc dnsd http38. the host that initiates the session in the internet is labeled as _.a server b user agentc clientd router39. with tcp there is no _ b

21、etween sending and receiving transport-layer entities. a flow control b handshakingc. congestion control d vc setup40. the internets _ service helps prevent the internet from entering a state of gridlock. a datagramb congestion controlc sliding window d timeout event41. connection setup at the trans

22、port layer involves _. a server b only the two end systemsc client d router42. a _layer protocol provides for logical communication between applications. a transportb applicationc networkingd mac43. in static congestion window, if it satisfies w*s/r rtt + s/r, the latency is _. a w*s/r ( rtt+ s/r) b

23、 2rtt + o/rc 2rtt + o/r + (k-1)w* s/r- (rtt + s/r) d 2rtt + s/r44. the receive side of transport layer reassembles segments into messages, passes to _layer. a applicationb networkingc physicald mac45. in the following four options, which one is correct? a the variations in the samplertt are smoothed

24、 out in the computation of the estimatedrttb the timeout should be less than the connections rttc suppose that the last samplertt in a tcp connection is equal to 1 sec. then the current value of timeoutinterval will necessarily be1 secd suppose that the last samplertt in a tcp connection is equal to

25、 1 sec. then the current value of timeoutinterval will necessarily be1 sec46. the port number used by http is _. a 80b 25c 110d 5347. the port number used by smtp is _. a 80b 25c 110d 5348. the port number used by pop3 is _. a 80b 25c 110d 5349. the port number used by dns is _. a 80b 25c 110d 5350.

26、 the port number used by ftp is _. a 20 and 21b 20c 21d 5351. a udp socket identified by a _ tuple(s). a 2b 4c 1d 352. a tcp socket identified by a _ tuple(s). a 2b 4c 1d 353. a tcp socket does not include_. a source mac addressb source port numberc destination ip addressd destination port number54.

27、 which of following about udp is not correct. a it is a reliable data transfer protocolb it is connectionlessc no handshaking between udp sender, receiverd it is a best effort service protocol55. dns uses _ service. a tcpb udpc both tcp and udpd none of above56. which of following about udp is corre

28、ct?a finer application-level control over what data is sent, and when b no connection establishment (which can add delay), so no delay for establish a connectionc no connection state (so, udp can typically support many active clients)d large packet header overhead (16-b)57. streaming media uses a _

29、service normally. a tcpb udpc both tcp and udpd none of above58. the udp header has only _ fields. a 2b 4c 1d 359. which of the following does not included in udp header. a source port numberb destination port numberc checksumd sequence number60. which of the following is not a pipelining protocol.

30、a rdt1.0b go-back-nc selective repeatd tcp61. in the following four descriptions about mss and mtu, which one is not correct? a the mss is the maximum amount of application-layer data in the segmentb the mss is the maximum size of the tcp segment including headersc the mss is typically set by mtud t

31、he mtu means the largest link-layer frame62. the job of gathering data chunks, encapsulating each data chunk with header information to create segments and passing the segments to the network is called _.a multiplexing b de-multiplexing c forwarding d routing63. in the following four descriptions ab

32、out the relationship between the transport layer and the network layer, which one is not correct? a the transport-layer protocol provides logical communication between hostsb the transport-layer protocol provides logical communication between processesc the services that a transport-layer protocol c

33、an provide are often constrained by the service model of the network-layer protocold a computer network may make available multiple transport protocols64. suppose the following three 8-bit bytes: 01010101, 01110000, 01001100. whats the 1s complement of the sum of these 8-bit bytes? a 00010001 b 1110

34、1101 c 00010010 d 1000100065. the following four descriptions about multiplexing and de-multiplexing, which one is correct? a a udp socket is identified by a two-tuples consisting of a source port number and a destination port number.b if two udp segment have different source port number, they may b

35、e directed to the same destination process.c if two tcp segments with different source port number, they may be directed to the same destination process.d if two tcp segments with same destination ip address and destination port number, they must be the same tcp connection.66. udp and tcp both have

36、the fields except _.a source port number b destination port numberc checksum d receive window67. if we define n to be the window size, base to be the sequence number of the oldest unacknowledged packet, and next-seq-num to be the smallest unused sequence number, then the interval nextseqnum,base+n-1

37、 corresponds to packet that _.a can be sent immediately b have already been transmitted and acknowledgedc cannot be usedd have been sent but not yet acknowledged68. which of the following about tcp is not correct? a it is a connectionless protocolb point-to-point protocolc reliable, in-order byte st

38、eam protocold pipelined protocol69. which of the following about tcp is not correct? a it is a connectionless protocolb full duplex data transfer protocolc connection-oriented protocold flow controlled protocol70. the maximum amount of data that can be grabbed and placed in a segment is limited by t

39、he _. a maximum segment size (mss)b mtuc sequence numberd check sum71. the mss is typically set by first determining the length of the largest link-layer frame that can be sent by the local sending host (the so-called_), and then will fit into a single link-layer frame. a maximum segment size (mss)b

40、 mtuc sequence numberd check sum72. the mss is the maximum amount of _layer data in the segment, not the maximum size of the tcp segment including headers.a applicationb transportc networkingd link73. which of the following field is not used for connection setup and teardown?a sequence numberb tstc

41、synd fin 74. _ is the byte stream number of first byte in the segment. a sequence numberb ack numberc checksum d port number75. _ is the byte sequence numbers of next byte expected from other side. a sequence numberb ack numberc checksum d port number76. because tcp only acknowledges bytes up to the

42、 first missing byte in the stream, tcp is said to provide _ acknowledgements. a cumulative b selectivec singled negative77. fast retransmit means in the case that _ duplicate ack-s are received, the tcp sender resend segment before timer expires.a 3b 4c 5d 678. tcp_ means sender wont overflow receiv

43、ers buffer by transmitting too much, too fast. a flow controlb congestion controlc reliable data transferd connection-oriented service79. tcp provides flow control by having the sender maintain a variable called the _. a receive windowb congestion windowc sliding windowd buffer80. how does tcp sende

44、r perceive congestion? a timeoutb 3 duplicate ack-sc both a and bd none of above81. transport protocols run in _. a servers b clients c routers d end systems82. which of the following services is not provided by tcp? a delay guarantees and bandwidth guaranteesb reliable data transfers and flow contr

45、olsc congestion controlsd in-order data transfers83. which service does udp not provide? a multiplexing b de-multiplexingc error-detection d error-correction84. there are three major events related to data transmission and retransmission in the tcp sender, which one is not in it? a data received fro

46、m application above b de-multiplexing segmentc timer timeout d ack receipt85. which of the following applications normally uses udp services? a smtp b streaming multimedia c ftp d http86. which of the following about tcp connection is not correct? a it is a broadcast connectionb it is a point-to-poi

47、nt connectionc it is a pipelined connectiond it is a full duplex connection87. the syn segment is used for_. a tcp connection setupb tcp flow controlc tcp congestion controld closing a tcp connection88. which service helps prevent the internet from entering a state of gridlock?a reliable data transf

48、er b flow controlc congestion control d handshaking procedure89. the internets _is responsible for moving packets from one host to another. a application layer b transport layerc network layer d link layer90. in the following applications, which one is a bandwidth-sensitive application? a e-mail b w

49、eb application c real-time audio d file transfer91. in the following applications, which one uses udp? a e-mail b web application c file transfer d dns92. in the following four descriptions, which one is correct? a if one hosts transport layer uses tcp, then its network layer must use virtual-circui

50、t network.b datagram network provides connection servicec the transport-layer connection service is implemented in the routerd the network-layer connection service is implemented in the router as well as in the end system.93. _ is a speeding-matching service-matching the rate which the sender is sen

51、ding against the rate at which the receiving application is reading.a congestion control b flow controlc sliding-window control d variable control94. in the following four descriptions about rcv-window, which one is correct? a the size of the tcp rcvwindow never changes throughout the duration of th

52、e connectionb the size of the tcp rcvwindow will change with the size of the tcp rcvbufferc the size of the tcp rcvwindow must be less than or equal to the size of the tcp rcvbufferd suppose host a sends a file to host b over a tcp connection, the number of unacknowledged bytes that a sends cannot e

53、xceed the size of the size of the rcvwindow.95. there are 6 flag fields. which one is to indicate that the receiver should pass the data to the upper layer immediately? a psh b urg c ack d rst96. suppose the tcp receiver receives the segment that partially or completely fills in gap in received data, it

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
  • 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論