You are on page 1of 5

Transport Layer

1. One of the responsibilities of the transport layer protocol is to create a ______ communication. a. host-to-host b. process-to-process c. node-to-node

d. none of the above 2. UDP is called a ________________transport protocol.

3.

4.

5.

a. connectionless, reliable b. connection-oriented, unreliable c. connectionless, unreliable d. none of the above The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ . a. UDP addresses b. transport addresses c. port address d. none of the above In the sending computer, UDP sends a data unit to the _______ layer. a. Application b. Transport c. IP d. None of the above UDP uses _______ to handle incoming user datagrams that go to different processes on the same host a. Flow control b. Multiplexing c. De-multiplexing d. Multiple access

MULTIPLEXING
1. The sharing of a medium and its link by two or more devices is called _______. a. Multiplexing b. De-multiplexing

2.

3.

4.

5.

In synchronous TDM, for n signal sources of the same data rate, each frame contains _______ slots. a. N b. N +1 c. N -1 d. 0..n In a multiplexed system, __ lines share the bandwidth of ____ link. a. 1:n b. N:1 c. N:n d. 1:1 _____ is a digital process that allows several connections to share the high bandwidth of a link. a. FDM b. TDM c. WDM d. None of the above In ________, we combine signals from different sources to fit into a larger bandwidth. a. Spread spectrum

c. Line discipline d. Modulation

b. c. d.

Line coding Block coding modulation

SOCKETS
1. A _______ is a program providing services to the ______ program a. Server; client b. Client; server c. Server; server d. None _______ server can process only one request at a time. a. Iterative b. Concurrent c. Concurrent or iterative d. None An interface is a set of ___________ designed to facilitate interaction between two entities a. Programs b. Instructions c. Rules d. None Information in a computer is stored in_______________byte order. a. Host b. Network c. Server d. Client SOCK_STREAM sockets are used by ______ processes a. UDP b. TCP c. STCP d. FDP SOCK_SEQPACKET sockets are used by ______ processes. a. b. c. d. UDP TCP STCP FDP

2.

3.

4.

5.

6.

UDP 1. The Unreliable Datagram Protocol (UDP) communication point is identified by a. process ID only b. host name only c. host IP address and port number 2. Messages (Datagrams) under UDP are received atomically. What does it mean? a. A connection must be setup between the client and the server to send UDP messages b. A message must be transmitted entirely or not at all c. Client process must block until the entire UDP message is received at the

server. 3. What happens if a UDP message is lost due to network error on the way from client host to server host? a. UDP client does not do anything b. UDP client retransmits the message c. UDP client adjusts its flow control mechanism 4. The difference between simple-request protocol and request-reply protocol is in a. creating the UDP end-point at the client side b. exchanging messages between the client and server sides c. creating the UDP end-point at the server side d. accepting connection at the server side 10. Consider the at-most-once-semantics property in client-server connectionless communication protocols. How would you implement this property on the server? a. Nothing special has to be done on the server when using UDP protocol b. Server needs to keep copies of previous requests, check for duplicate requests and retransmit reply to the client without re-executing the request c. Server needs to keep copies of the previous request, execute each request and send reply to the client TCP 1. How does a host that has sent TCP data know that the data was received? a. A TCP acknowledgement is sent from the receiver b. An ICMP echo reply is sent from the receiver c. An incremented TCP sequence number is sent from the receiver d. A SYN/ACK is sent from the receiver 2. Which of the following best characterizes TCP versus UDP (in most cases)? a. TCP is less reliable and quicker b. TCP is slower, more reliable, and requires more overhead c. TCP is faster, more reliable, and more streamlined d. TCP is less reliable and connection oriented 3. A TCP flag of RESET indicates: a. An intention to open a new TCP connection b. An intention to gracefully close and acknowledge the termination of both sides of the connection c. An intention to abort a TCP connection d. An intention to close the connection after all in transmit data is received 4. TCP typically begins a session with: a. The three way handshake of client to server with SYN set, the server response of SYN/ACK, and the client acknowledgement of ACK b. The three way handshake of server to client with SYN set, the client response of SYN/ACK, and the server acknowledgement of ACK

c. TCP is not connection oriented so no handshake is required d. A handshake consisting of the client request to the server with SYN set and a server response of a SYN 5. A server port of UDP or TCP 53 is typically associated with what service? a. HTTP b. DNS c. FTP d. RPC CONGESTION CONTROL
1. In ________ we try to avoid traffic congestion a. Congestion control b. Quality of Service c. A or b d. A & b Traffic ______ are qualitative values that represent a data flow. a. Controls b. Descriptors c. Values d. None The _______ defines the maximum data rate of the traffic. a. Peak data rate b. Maximum burst rate

2.

3.

4.

5.

In the ______ traffic model, the data rate changes suddenly in a very short time. a. CBR b. VBR c. Bursty d. None of the above In Frame Relay, the ________ bit is used to warn the receiver of congestion in the network. a. BECN b. FECN c. A or b d. A & B

c. Effective bandwidth d. Baud rate

DNS
1. In a _______ name space, a name is assigned to an address. A name in this space is a sequence of characters without structure a. Flat b. Hierarchical c. Organized d. None In a _________name space, each name is made of several parts. a. Flat b. Hierarchical c. Organized d. None In the DNS, the names are defined in ___________ structure. a. Inverted Tree

2.

3.

4.

5.

b. Linear list c. Graph d. Array The root of the DNS tree is _______. a. 63 characters b. Empty string c. String d. Integer list A full domain name is a sequence of labels separated by ________. a. Dot b. Slash c. Semicolon d. colons

You might also like