




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
1、Chapter 3 Transport Layer1. A transport-layer protocol provides for logical communication between _.A Application processesB HostsC RoutersD End systems2. Transport-layer protocols run in _.A ServersB ClientsC RoutersD End systems3. In transport layer, the send side breaks application messages into
2、_, passes to network layer.A FramesB SegmentsC Data-grams D bit streams4. Services provided by transport layer include _.A HTTP and FTPB TCP and IPC TCP and UDPD SMTP5. Which of the following services is not provided by TCP? A Delay guarantees and bandwidth guaranteesB Reliable data transfers and fl
3、ow controlsC Congestion controlsD In-order data transfers6. These two minimal transport-layer services-_ and _-are the only two services that UDP provides! A process-to-process data delivery, error checkingB congestion control, reliable data transferC flow control, congestion controlD In-order data
4、transfer, error checking7. Port numbers scope is _ to _. A 0, 1023B 0, 65535C 0, 127D 0,2558. The port numbers ranging from _to _ are called well-known port number and are restricted.A 0, 1023B 0, 65535C 0, 127D 0,2559. UDP socket identified by two components, they are _.A source IP addresses and so
5、urce port numbersB source IP addresses and destination IP addressesC destination IP address and destination port numbersD destination port numbers and source port numbers10. TCP socket identified by a (an) _. A 1-tupleB 2-tupleC 3-tupleD 4-tuple11. Which of the following applications normally uses U
6、DP services? A SMTPB Streaming multimediaC FTPD HTTP12. Reliable data transfer protocol over a perfectly reliable channel is_. A rdt1.0 B rdt2.0 C rdt3.0 D
7、rdt2.1 13. Reliable data transfer protocol over a channel with bit errors and packet losses is _. A rdt1.0 B rdt2.0 C rdt3.0 D rdt2.
8、1 14. Which of the following about reliable data transfer over a channel with bit errors is not correct? A RDT2.0: assuming ACK and NAK will not be corrup
9、ted B RDT2.1: assuming ACK and NAK can be corrupted C RDT2.2: only use ACK-s D RDT2.2: use both ACK-s and NAK-s 15. Which of the following protocol
10、s is not pipelining protocols? A TCP B rdt3.0 C GO-BACK-N D selective repeat 16. Which of the following is not correct about GBN protocol? A
11、60; Only using ACK-s B Using cumulative ACK-s C Receiver discards all out-of-order packets D It is not pipelined protocol 17. Which of the following is
12、 not correct about SR protocol? A receiver individually acknowledges all correctly received packets B sender only resends packets for which ACK not received C
13、0; It limits sequence number of sent but un-ACK-ed packets D It is not a pipelined protocol18. Which of the following about TCP connection is not correct? A It is a broadcast connectionB It is a point-to-point conn
14、ectionC It is a pipelined connectionD It is a full duplex connection19. The SYN segment is used for_. A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection20. The FIN segment is used for_.A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a
15、 TCP connection21. How does TCP sender perceive congestion? A Through a timeout eventB Through a receiving duplicate ACK-s eventC Both A and BD Either A or B22. Extending host-to-host delivery to process-to-process delivery is called transport-layer _ and . A multiplexing and de-multiplexingB storin
16、g and forwardingC forwarding and filteringD switching and routing23. UDP is a _ service while TCP is a connection-oriented service. A ConnectionlessB ReliableC Connection-orientedD In-order24. The UDP header has only four fields, they are_. A Source port number, destination port number, length and c
17、hecksumB Source port number, destination port number, source IP and destination IPC source IP, destination IP, source MAC address and destination MAC addressD source IP, destination IP, sequence number and ACK sequence number25. There are two 16-bit integers: 1110 0110 0110 0110, 1101 0101 0101 0101
18、. Their checksum is_. A 0011B 1100C 1111D 000026. The maximum amount of data that can be grabbed and placed in a segment is limited by the_.A Maximum segment size (MSS)B MTUC ChecksumD Sequence number27. The MSS is typically set by first determining the length of the largest link-layer frame that ca
19、n be sent by the local sending host-the so-called_.A Maximum transmission unit (MTU)B MSSC ChecksumD Sequence number28. A File size of 500,000bytes, MSS equals 1000bytes. When we want to transmit this file with TCP, the sequence number of the first segment is 0, and the sequence number of the second
20、 segment is _. A 1000B 999C 1001D 50000029. Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP is said to provide_. A Cumulative acknowledgementsB Selective acknowledgementsC 3 duplicate ACKsD positive ACKs30. Provided =0.125, current value of Estimated-RTT is 0.4s,
21、Sample-RTT is 0.8s, then the new value of Estimated-RTT is _s. A 0.45B 0.6C 0.7D 0.831. Provided RcvBuffer=20,LastByteRcvd=20,LastByteRead=15, then RcvWindow=_. A 14B 15C 16D 1032. TCP service does not provide_. A Reliable data transfer B Flow controlC Delay guarantee D Congestion control33. There a
22、re two states in TCP congestion control, which are _. A slow start and congestion avoidanceB safe start and congestion avoidanceC slow start and congestion abandonD safe start and congestion abandon34. The transport-layer protocol provides logical communication between _, and the network-layer proto
23、col provides logical communication _. A hosts, processes B processes, hostsC threads, processes D processes, threads35. To implement the multicast services the Internet employs the _ protocol. A FTP B
24、 TCP C IGMP D UDP 36. If an application developer chooses _ protocol, then the application process is almost directly talking with IP. A HTTPB RIPC CSMA/CDD UDP37. _ maintains connection-state in the end systems. This connection state inclu
25、des receive and send buffers, congestion-control parameters, and sequence and acknowledgment number parameters. A UDPB TCPC DNSD HTTP38. The host that initiates the session in the Internet is labeled as _.A server B user agentC clientD router39. With TCP there is no _ between sending and receiving t
26、ransport-layer entities. A flow control B handshakingC. congestion control D VC setup40. The Internets _ service helps prevent the Internet from entering a state of gridlock. A datagramB congestion controlC sliding window D timeout event41. Connection setup at the transport layer involves _. A serve
27、r B only the two end systemsC client D router42. A _layer protocol provides for logical communication between applications. A transportB applicationC networkingD MAC43. In static congestion window, if it satisfies W*S/R > RTT + S/R, the Latency is _. A W*S/R ( RTT+ S/R) B 2RTT + O/RC 2RTT + O/R +
28、 (k-1)W* S/R- (RTT + S/R) D 2RTT + S/R44. The receive side of transport layer reassembles segments into messages, passes to _layer. A ApplicationB NetworkingC PhysicalD MAC45. In the following four options, which one is correct? A The variations in the SampleRTT are smoothed out in the computation o
29、f the EstimatedRTTB The timeout should be less than the connections RTTC Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. Then the current value of TimeoutInterval will necessarily be1 secD Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. Then the current
30、value of TimeoutInterval will necessarily be1 sec46. The port number used by HTTP is _. A 80B 25C 110D 5347. The port number used by SMTP is _. A 80B 25C 110D 5348. The port number used by pop3 is _. A 80B 25C 110D 5349. The port number used by DNS is _. A 80B 25C 110D 5350. The port number used by
31、FTP is _. A 20 and 21B 20C 21D 5351. A UDP socket identified by a _ tuple(s). A 2B 4C 1D 352. A TCP socket identified by a _ tuple(s). A 2B 4C 1D 353. A TCP socket does not include_. A Source MAC addressB Source port numberC Destination IP addressD Destination port number54. Which of following about
32、 UDP is not correct. A It is a reliable data transfer protocolB It is connectionlessC no handshaking between UDP sender, receiverD it is a best effort service protocol55. DNS uses _ service. A TCPB UDPC Both TCP and UDPD None of above56. Which of following about UDP is correct?A Finer application-le
33、vel control over what data is sent, and when B No connection establishment (which can add delay), so no delay for establish a connectionC No connection state (so, UDP can typically support many active clients)D Large packet header overhead (16-B)57. Streaming media uses a _ service normally. A TCPB
34、UDPC Both TCP and UDPD None of above58. The UDP header has only _ fields. A 2B 4C 1D 359. Which of the following does not included in UDP header. A Source port numberB Destination port numberC ChecksumD Sequence number60. Which of the following is not a pipelining protocol. A Rdt1.0B Go-Back-NC Sele
35、ctive repeatD TCP61. In the following four descriptions about MSS and MTU, which one is not correct? A The MSS is the maximum amount of application-layer data in the segmentB The MSS is the maximum size of the TCP segment including headersC The MSS is typically set by MTUD The MTU means the largest
36、link-layer frame62. The job of gathering data chunks, encapsulating each data chunk with header information to create segments and passing the segments to the network is called _.A multiplexing B de-multiplexing C forwarding D routing63. In the following four descriptions about the relationship betw
37、een the transport layer and the network layer, which one is not correct? A The transport-layer protocol provides logical communication between hostsB The transport-layer protocol provides logical communication between processesC The services that a transport-layer protocol can provide are often cons
38、trained by the service model of the network-layer protocolD A computer network may make available multiple transport protocols64. Suppose the following three 8-bit bytes: 01010101, 01110000, 01001100. Whats the 1s complement of the sum of these 8-bit bytes? A 00010001 B 11101101 C 00010010 D 1000100
39、065. The following four descriptions about multiplexing and de-multiplexing, which one is correct? A A UDP socket is identified by a two-tuples consisting of a source port number and a destination port number.B If two UDP segment have different source port number, they may be directed to the same de
40、stination process.C If two TCP segments with different source port number, they may be directed to the same destination process.D If two TCP segments with same destination IP address and destination port number, they must be the same TCP connection.66. UDP and TCP both have the fields except _.A sou
41、rce port number B destination port numberC checksum D receive window67. If we define N to be the window size, base to be the sequence number of the oldest unacknowledged packet, and next-seq-num to be the smallest unused sequence number, then the interval nextseqnum,base+N-1 corresponds to packet th
42、at _.A can be sent immediately B have already been transmitted and acknowledgedC cannot be usedD have been sent but not yet acknowledged68. Which of the following about TCP is not correct? A It is a connectionless protocolB Point-to-point protocolC Reliable, in-order byte steam protocolD Pipelined p
43、rotocol69. Which of the following about TCP is not correct? A It is a connectionless protocolB full duplex data transfer protocolC connection-oriented protocolD flow controlled protocol70. The maximum amount of data that can be grabbed and placed in a segment is limited by the _. A Maximum segment s
44、ize (MSS)B MTUC Sequence numberD Check sum71. The MSS is typically set by first determining the length of the largest link-layer frame that can be sent by the local sending host (the so-called_), and then will fit into a single link-layer frame. A Maximum segment size (MSS)B MTUC Sequence numberD Ch
45、eck sum72. The MSS is the maximum amount of _layer data in the segment, not the maximum size of the TCP segment including headers.A ApplicationB TransportC NetworkingD Link73. Which of the following field is not used for connection setup and teardown?A Sequence numberB TSTC SYND FIN 74. _ is the byt
46、e stream number of first byte in the segment. A Sequence numberB ACK numberC Checksum D port number75. _ is the byte sequence numbers of next byte expected from other side. A Sequence numberB ACK numberC Checksum D port number76. Because TCP only acknowledges bytes up to the first missing byte in th
47、e stream, TCP is said to provide _ acknowledgements. A Cumulative B SelectiveC SingleD Negative77. Fast retransmit means in the case that _ duplicate ACK-s are received, the TCP sender resend segment before timer expires.A 3B 4C 5D 678. TCP_ means sender wont overflow receivers buffer by transmittin
48、g too much, too fast. A Flow controlB Congestion controlC Reliable data transferD Connection-oriented service79. TCP provides flow control by having the sender maintain a variable called the _. A Receive windowB Congestion windowC Sliding windowD buffer80. How does TCP sender perceive congestion? A
49、TimeoutB 3 duplicate ACK-sC Both A and BD None of above81. Transport protocols run in _. A Servers B Clients C Routers D End systems82. Which of the following services is not provided by TCP? A Delay guarantees and bandwidth guaranteesB Reliable data transfers and flow controlsC Congestion controlsD
50、 In-order data transfers83. Which service does UDP not provide? A multiplexing B de-multiplexingC error-detection D error-correction84. There are three major events related to data transmission and retransmission in the TCP sender, which one is not in it? A data received from application above B de-
51、multiplexing segmentC timer timeout D ACK receipt85. Which of the following applications normally uses UDP services? A SMTP B Streaming multimedia C FTP D HTTP86. Which of the following about TCP connection is not correct? A It is a broadcast connectionB It is a point-to-point connectionC It is a pi
52、pelined connectionD It is a full duplex connection87. The SYN segment is used for_. A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection88. Which service helps prevent the internet from entering a state of gridlock?A reliable data transfer B flow controlC conges
53、tion control D handshaking procedure89. The Internets _is responsible for moving packets from one host to another. A application layer B transport layerC network layer D link layer90. In the following applications, which one is a bandwidth-sensitive application? A E-mail B web application C real-tim
54、e audio D file transfer91. In the following applications, which one uses UDP? A E-mail B web application C file transfer D DNS92. In the following four descriptions, which one is correct? A If one hosts transport layer uses TCP, then its network layer must use virtual-circuit network.B Datagram netw
55、ork provides connection serviceC The transport-layer connection service is implemented in the routerD The network-layer connection service is implemented in the router as well as in the end system.93. _ is a speeding-matching service-matching the rate which the sender is sending against the rate at
56、which the receiving application is reading.A congestion control B flow controlC sliding-window control D variable control94. In the following four descriptions about Rcv-Window, which one is correct? A The size of the TCP RcvWindow never changes throughout the duration of the connectionB The size of
57、 the TCP RcvWindow will change with the size of the TCP RcvBufferC The size of the TCP RcvWindow must be less than or equal to the size of the TCP RcvBufferD Suppose host A sends a file to host B over a TCP connection, the number of unacknowledged bytes that A sends cannot exceed the size of the size of the RcvWindow.95. There are 6 flag fields. Which one is to indicate that the receiver should pass the data to the upper layer immediately? A PSH B URG C ACK D RST96. Supp
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 教育游戲化學(xué)習(xí)平臺的發(fā)展趨勢與前景
- 智慧課堂中的學(xué)生情緒管理策略研究
- 山東省日照市實驗高級中學(xué)2024-2025學(xué)年高一6月月考物理試題
- 第3章 物質(zhì)的性質(zhì)與轉(zhuǎn)化 單元測試(含答案) 2025-2026學(xué)年高一上學(xué)期化學(xué)魯科版(2019)必修第一冊
- 2025年寧夏銀川市閱海第二中學(xué)中考模擬測試化學(xué)試卷(無答案)
- 醫(yī)療資源均衡化與偏遠(yuǎn)地區(qū)發(fā)展計劃
- 芝士比薩企業(yè)制定與實施新質(zhì)生產(chǎn)力項目商業(yè)計劃書
- 紅色革命基地游企業(yè)制定與實施新質(zhì)生產(chǎn)力項目商業(yè)計劃書
- 體育經(jīng)紀(jì)與代理AI應(yīng)用行業(yè)跨境出海項目商業(yè)計劃書
- 名人傳記出版企業(yè)制定與實施新質(zhì)生產(chǎn)力項目商業(yè)計劃書
- 少隊工作計劃的風(fēng)險控制措施
- 2025-2031年中國天然氣勘探行業(yè)市場運行態(tài)勢及投資潛力研判報告
- 2025年新媒體運營專員面試題及答案
- 北京開放大學(xué)2025年《裝配式技術(shù)與應(yīng)用》形成性考核2答案
- 2024年國家知識產(chǎn)權(quán)局知識產(chǎn)權(quán)發(fā)展研究中心招聘考試真題
- 《水利工程造價與招投標(biāo)》課件-模塊六 招投標(biāo)程序
- 關(guān)于水表考試題及答案
- 2025年安全管理員安全培訓(xùn)考試試題(典型題)
- 短文選詞填空12篇(新疆中考真題+中考模擬)(解析版)
- 2025年中國黃石市寫字樓行業(yè)發(fā)展前景預(yù)測及投資方向研究報告
- 初中歷史論述題必需的24個答題模版
評論
0/150
提交評論