CS8591 Computer
Networks
UNIT IV TRANSPORT LAYER
(Multiple Choice Questions (MCQ))
Introduction –
Transport Layer Protocols – Services – Port Numbers – User Datagram Protocol –
Transmission Control Protocol – SCTP.
1. Transport layer is the _________ layer in
OSI layered architecture.
A. First B. Second C. third D. fourth
Ans. D
2. The ______________ layer is responsible for the delivery
of a message from one process to another.
A. physical B. network C. transport D. data
link
Ans. C
3. The __________ layer is lying between the network
layer and session layer
A. physical B. network C. transport D. data
link
Ans. C
4. The __________
layer gets the entire message to the correct process on the destination systems
by adding a type of address called a service-point address (or port address).
A. physical B. network C. transport D. data
link
Ans. C
5. Segmentation and
reassembly are the functions (responsibilities) of _____________ layer.
A. physical B. network C. transport D. data
link
Ans. C
6. Functions of
Transport Layer are
A. End-to-end Delivery, Addressing
B. Reliable Delivery, Flow Control
C. Multiplexing
D. All of the above
Ans. D
7. Two basic types of transport services are
A. Connection services
B. Connectionless services
C. Both (a) and (b)
D. None of the above
Ans. C
8. Aspects related to the reliable delivery of
the data are
A. Error control, Sequence control, Loss
control, Duplication control
B. Error control, Sequence control, Loss
control
C.
Sequence control, Loss control, Duplication control
D.
Error control, Sequence control, Duplication control
Ans. A
9. The _____________
layer oversees the end-to-end (source-to-destination) delivery of an entire
message.
A. physical B. network C. transport D. data
link
Ans. C
10. The _________ layer breaks messages into
packets.
A. physical B. network C. transport D. data
link
Ans. C
11. _________ layer
performs error control if the lower layers are not adequately error free.
A. physical B. network C. transport D. data
link
Ans. C
12. __________ layer
performs flow control if flow control is not done adequately at the network
layer.
A. physical B. network C. transport D. data
link
Ans. C
13. Transport layer
requires transport layer address called a ___________ for selecting multiple
processes running on the destination host.
A. physical address
B. logical address
C. port number (port address)
D. none of the above
Ans. C
14. In the Internet model, the port numbers
are ___ bits integers between 0 and 65,535.
A. 16 B. 32 C. 64 D. 128
Ans. A
15. The client program
defines itself with a port number, chosen randomly by the transport layer
software running on the client host. This is the _____ port number.
A. ephemeral
B. well-known
C. either (a) or (b)
D. none of the above
Ans. A
16. Server define a
port number but not randomly. Internet has decided to use universal port
numbers for servers, these are called __________ port numbers.
A. ephemeral
B. well-known
C. either (a) or (b)
D. none of the above
Ans. B
17. Well-known port
numbers ranging from ________ are assigned and controlled by Internet Assigned
Number Authority (IANA).
A. 0 to 1023
B. 1024 to 49151
C. 49152 to 65535
D. none of the above
Ans. A
18. Registered port
numbers ranging from ________ are not assigned and controlled by IANA.(only
registered to prevent duplication)
A. 0 to 1023
B. 1024 to 49151
C. 49152 to 65535
D. none of the above
Ans. B
19. Ephemeral port numbers (Dynamic port numbers)
ranging from ______ are neither controlled nor registered. (used by any
process)
A. 0 to 1023
B. 1024 to 49151
C. 49152 to 65535
D. none of the above
Ans. C
20. ________________
has Error Control, Sequence Control, Loss Control and Duplication Control.
A. Reliable delivery
B. unreliable delivery
C. either (a) or (b)
D. none of the above
Ans. A
21. In the transport
layer, when transferring data, the primary goal of reliability is __________.
Data must be delivered to their destination exactly as they originated from the
source.
A. Error Control
B. Sequence Control
C. Loss Control and Duplication Control
D. all of the above
Ans. A
22. When the size of
the data unit received from the upper layer is too long for the network layer
datagram or data link frame to handle, the transport protocol divides it into
smaller usable blocks called segments. This process is called ________.
A. Segmentation
B. Concatenation
C. both (a) and (b)
D. none of the above
Ans. A
23. When the size of
the data units belonging to a single session are so small, the transport
protocol can fit several data units together into a single datagram or frame.
The combining process is called _____________.
A. Segmentation
B. Concatenation
C. both (a) and (b)
D. none of the above
Ans. B
24. In transport
layer, some segments may be lost in transit, sequence numbers allow the
receiver’s transport layer protocol to identify any missing segments and
request redelivery. This is called ______________.
A. Error Control
B. Sequence Control
C. Loss Control
D. Duplication Control
Ans. C
25. The transport layer functions must
guarantee that no piece of data arrive at the receiving system duplicated.
This is called _____________.
A. Error Control
B. Sequence Control
C. Loss Control
D. Duplication Control
Ans. D
26. In transport
layer, ____________ is a mechanism which controls overwhelming of data.
A. Error Control
B. Flow Control
C. Loss Control
D. Duplication Control
Ans. B
27. ____________
is the process of combining multiple signals into one signal, over a shared
medium.
A.
Multiplexing
B.
Demultiplexing
C.
Synchronization
D.
None of the above.
Ans.
A
28. ___________ a
process reconverting a signal containing multiple analog or digital signal
streams back into the original separate and unrelated signals.
A.
Multiplexing
B.
Demultiplexing
C.
Synchronization
D.
None of the above.
Ans.
B
29. Basic techniques of multiplexing are:
A. Frequency Division Multiplexing
B. Time Division Multiplexing
C. Wave Division Multiplexing
D. All of the above
Ans. D
30. Which of the
following is true about User Datagram Protocol (UDP)?
A. connectionless, unreliable TCP/IP transport
layer protocol.
B. It provides process-to-to-process
communication.
C. UDP has no error recovery procedures.
D. all of the above
Ans. D
31. Fields on which
the UDP checksum is calculated are:
A. pseudoheader
B. UDP header
C. Data coming the application layer
D. All of the above
32. Applications of
UDP are:
A. UDP is used for some route upding protocols
such as RIP.
B. UDP is a convenient protocol for multimedia
and multicasting applications.
C. It is suitable for a process with internal
flow and error control mechanisms.
D. all of the above
33. UDP is preferred over TCP in the following
applications
A. In multicasting
B. Route update protocol in RIP
C. both (a) and (b)
D. None of the above
Ans. C
34. Which of the
following are true about Socket?
A. Socket is Communication end point.
B. It uses IP address and port number
C. both (a) and (b)
D. None of the above
35. In ______, packets
are called user datagrams.
A. UDP
B. TCP
C. IP
D. none of the above
Ans.A
36. Datagrams have
fixed-size header of ___ bytes.
A.4 B.8 C.16 D.32
Ans. B
37. _______________________
runs over UDP and it is a network protocol for delivering audio and video over
IP networks.
A. Real-time Transport Protocol (RTP)
B. TCP
C. IP
D. none of the above
Ans. A
38. Both UDP and
______________________ are used in the transport layer.
A. Real-time Transport Protocol (RTP)
B. Transmission Control Protocol (TCP)
C. IP
D. none of the above
Ans. B
39. TCP provides a
_____________________________________.
A. connectionless, reliable, byte stream
service
B. connection-oriented, unreliable, byte
stream service
C. connection-oriented, reliable, byte stream
service
D. none of the above
Ans. C
40. The Internet’s _______________________ is
probably the most widely used protocol of this type.
A. Transmission Control Protocol (TCP)
B. User Datagram Protocol (UDP)
C. either (a) or (b)
D. none of the above
Ans. A
41. ______________ provides a reliable
end-to-end byte stream delivery over an unreliable internetwork.
A. Transmission Control Protocol (TCP)
B. User Datagram Protocol (UDP)
C. either (a) or (b)
D. none of the above
Ans. A
42. TCP uses
_________________________________________ mechanisms at the transport layer.
A. flow control and error control
B. flow control and access control
C. error control and access control
D. none of the above
Ans. A
43. TCP provides process-to-process communication
using _________________.
A. logical addresses
B. physical addresses
C. port numbers
D. none of the above
Ans. C
44. ___________________ is a stream-oriented
protocol.
A. User Datagram Protocol (UDP)
B. Transmission Control Protocol (TCP)
C. either (a) or (b)
D. none of the above
Ans. B
45. TCP groups a
number of bytes together into a packet called __________.
A. Segment
B. data unit
C. either (a) or (b)
D. none of the above
Ans. A
46. A packet in TCP is
called a _______________.
A. Segment
B. data unit
C. either (a) or (b)
D. none of the above
Ans. A
47. TCP Services include
A. Stream Delivery Service
B. Full-Duplex Communication
C. Connection-oriented Service & Reliable
Service
D. all of the above
Ans. D
48. TCP allows the sending process to deliver
data as a stream of bytes and the receiving process to receive data as a stream
of bytes. This is _________________.
A. Stream Delivery Service
B. Full-Duplex Communication
C. Connection-oriented Service & Reliable
Service
D. all of the above
Ans. A
49. TCP offers ________________, in which data
can flow in both directions at the same time.
A. Stream Delivery Service
B. Full-Duplex Communication
C. Connection-oriented Service & Reliable
Service
D. all of the above
Ans. B
50. TCP offers a _______________________, in
which the two TCPs establish a connection between them, data are exchange in
both directions, and the connection is terminated.
A. Stream Delivery Service
B. Full-Duplex Communication
C. Connection-oriented Service
D. Reliable Service
Ans. C
51. Transport layer creates the connection
between source and destination. Events involved in the connection are:
A. Connection establishment
B. Data transfer
C. Connection release
D. All of the above
Ans. D
52. TCP provides a _________________ in which
it uses an acknowledgment mechanism to check the safe and sound arrival of
data.
A. Stream Delivery Service
B. Full-Duplex Communication
C. Connection-oriented Service
D. Reliable Service
Ans. D
53. The bytes of data being transferred in
each connection are numbered by _____________. The numbering starts with a
randomly generated number.
A. User Datagram Protocol (UDP)
B. Transmission Control Protocol (TCP)
C. either (a) or (b)
D. none of the above
Ans. B
54. Fields (expressed in bytes) in the
numbering of bytes are
A. Sequence Number
B. Acknowledgment Number
C. both (a) and (b)
D. none of the above
Ans. C
55. After the bytes have been numbered, TCP
assigns a sequence number to each segment that is being sent. The ______________
for each segment is the number of the first byte carried in that segment.
A. Sequence Number
B. Acknowledgment Number
C. both (a) and (b)
D. none of the above
Ans. A
56. TCP packets can contain
an ________________ which is the sequence number of the next
byte the sender expects to receive. The acknowledgement number is cumulative.
A. Sequence Number
B. Acknowledgment Number
C. both (a) and (b)
D. none of the above
Ans. B
57. Suppose a TCP connection is transferring a
file of 5000 bytes. The first byte is numbered 10001. What is the sequence
number for Segment 1 if data is sent in five segments, each carrying 1000
bytes?
A. 10,001
B. 11,001
C. 12,001
D. none of the above
58. In TCP, connection-oriented transmission
require the following procedure(s).
A. Connection establishment
B. Connection termination
C. both (a) and (b)
D. either (a) or (b)
Ans. C
59. The algorithm used by TCP to establish and
terminate a connection is called a __________________.
A. three-way handshake
B. two-way handshake
C. four-way handshake
D. none of the above
Ans. A
60. To keep track of all the different events
happening during connection establishment, connection termination, and data
transfer, TCP is specified as a _________.
A. Finite State Machine
B. Infinite State Machine
C. either (a) or (b)
D. none of the above
Ans. A
61. A connection progresses through a series
of states during its lifetime. The diagram showing the transition of the these
states is called ______________ .
A. State Transition Diagram
B. Finite State Machine
C. either (a) or (b)
D. none of the above
Ans. A
62. URG, ACK, PSH,
RST, SYN and FIN are six flags in ___________ header
A. TCP
B. UDP
C. SCTP
D. None of the above
Ans. A
63. ___________ balances the rate a producer
creates data with the rate a consumer can use the data.
A. flow control
B. error control
C. access control
D. none of the above
Ans. A
64. To accomplish flow control, TCP uses a ________________
protocol.
A. sliding window
B. silly window
C. either (a) or (b)
D. none of the above
65. A _______________ is used to make
transmission more efficient as well as to control the flow of data so that the
destination does not become overwhelmed with data.
A. silly window
B. sliding window
C. either (a) or (b)
D. none of the above
Ans. B
66. TCP’s variant of the sliding window
algorithm serves the following.
A. It guarantees the reliable delivery of
data,
B. It ensures that data is delivered in order,
and
C. It enforces flow control between the sender
and the receiver.
D. all of the above
Ans. D
67. A serious problem can arise in the sliding
window operation when the receiver is only able to accept a few bytes at a time
or when the sender transmits data in small segments repeatedly. This is called
____________ syndrome.
A. sliding window
B. silly window
C. either (a) or (b)
D. B
Ans. B
68. TCP guarantees the _______ delivery of
data. So, it retransmits each segment if an ACK is not received in a certain
period of time.
A. reliable
B. prompt
C. unreliable
D. none of the above
Ans. A
69. In retransmission, TCP sets the timeout as
a function of the________________, it expects between the two ends of the
connection.
A.
Round Trip Time (RTT)
B.
Time to Live (TTL)
C.
either (a) or (b)
D.
none of the above
Ans. A
70. ______________ is a measure of the time it takes for a
packet to travel from a computer, across a network to another computer, and
back.
A.
Round Trip Time (RTT)
B.
Time to Live (TTL)
C.
either (a) or (b)
D.
none of the above
Ans. A
71. To overcome the problem in calculating the
RTT in today's world, TCP uses an ____________ retransmission mechanism.
A. adaptive
B. incremental
C. additive
D. multiplicative
Ans. A
72. Whenever TCP
retransmits a segment, it stops taking sample of the RTT it only measures
sample RTT for segments that have been sent only once. This solution is called
________________________________.
A. Karn / Partridge Algorithm
B. Jacobson / Karels Algorithm
C. either (a) or (b)
D. None of the above
Ans. A
73. In
_______________________ algorithm, the sender measures a new sample RTT as
before. It then folds this new sample into the timeout calculation. This
algorithm is used by any end-to-end protocol.
A. Karn / Partridge
B. Jacobson / Karels
C. either (a) or (b)
D. None of the above
Ans. B
74. ____________
refers to techniques and mechanisms that can either prevent congestion, before
it happens, or remove congestion, after it has happened.
A. Access Control
B. Congestion Control
C. Flow Control
D. Error control
Ans. B
75. Congestion control
are of the following types:
A. Open-loop congestion control (prevention)
B. Closed-loop congestion control (removal)
C. both (a) and (b)
D. None of the above
Ans. C
76. In ____________
congestion control, policies are applied to prevent congestion before it
happens.
A. open-loop
B. closed-loop
C. either (a) or (b)
D. None of the above
Ans. A
77. In _____________
control, mechanisms are used to alleviate congestion after it happens.
A. open-loop
B. closed-loop
C. either (a) or (b)
D. None of the above
Ans. B
78. _________________________
algorithm is a feedback control algorithm best known for its use in TCP
congestion control.
A. Additive-Increase/Multiplicative-Decrease
(AIMD)
B. Slow Start
C. either (a) or (b)
D. both (a) and (b)
Ans. A
79. In
________________________________, TCP maintains a new state variable for each
connection, called Congestion
Window, which is used by the source to limit how much data it is allowed to
have in transit at a given time.
A. Additive-Increase/Multiplicative-Decrease
B. Slow Start
C. either (a) or (b)
D. both (a) and (b)
Ans. A
80. TCP provides a
mechanism, called ___________, which is used to increase the congestion window
rapidly from a cold start. Slow start effectively increases the congestion
window exponentially, rather than linearly.
A. Additive-Increase/Multiplicative-Decrease
(AIMD)
B. Slow Start
C. either (a) or (b)
D. both (a) and (b)
Ans. B
81. When too many
packets are rushing to a node or part of network, the network performance
degrades, and this situation is called as __________.
A. Collision
B. Congestion
C. trap
D. error
Ans. B
82. ____________ occurs because the switches
in a network have a limited buffer size to store arrived packets before and
after processing.
A. Congestion
B. Collision
C. Jamming
D. None of the above
Ans. A
83. The ways to handle
congestion are:
A. Packet elimination
B. Flow control
C. Buffer allocation & Choke packets
D. All of the above
Ans. D
84. A
________________________ scheme allows a network to operate in the region of
low delay and high throughput. It is a prevention mechanism.
A. Congestion control
B. Congestion avoidance
C. both (a) and (b)
D. None of the above
Ans. B
85. Congestion control
is a ___________ whereas congestion avoidance is a _______________.
A. recovery mechanism, prevention mechanism.
B. prevention mechanism, recovery mechanism
C. either (a) or (b)
D. None of the above
Ans. A
86. The first
mechanism ____________ was developed for use on the Digital Network
Architecture (DNA), a connectionless network with a connection-oriented
transport protocol. This technique is implemented in routers to avoid congestion.
A. DECBit
B. Random Early Detection (RED)
C. TCP Vegas
D. None of the above
Ans. A
87. When too many
packets are rushing to a node or part of network, the network performance
degrades, and this situation is called as __________.
A. Collision
B. Congestion
C. trap
D. error
Ans. B
88. A
________________________ scheme allows a network to operate in the region of
low delay and high throughput. It is a prevention mechanism.
A. Congestion control
B. Congestion avoidance
C. both (a) and (b)
D. None of the above
Ans. B
89. Congestion control
is a ___________ whereas congestion avoidance is a _______________.
A. recovery mechanism, prevention mechanism.
B. prevention mechanism, recovery mechanism
C. either (a) or (b)
D. None of the above
Ans. A
90. The first
mechanism ____________ was developed for use on the Digital Network
Architecture (DNA), a connectionless network with a connection-oriented
transport protocol. This technique is implemented in routers to avoid
congestion.
A. DECBit
B. Random Early Detection (RED)
C. TCP Vegas
D. None of the above
Ans. A
91. _____________ is a
traffic shaping mechanism. In it, the input rate can vary but the output rate
remains constant. A technique called leaky bucket can smooth out bursty
traffic.
A. Leaky bucket
B. DECBit
C. RED
D. None of the above
Ans. A
92. The technique of
back pressure refers to a congestion control mechanism in which a congested
node stops receiving data from the immediate upstream node or nodes.
A. backpressure
B. choke packet
C. implicit signaling
D. explicit signaling
Ans. A
93. A ___________ is a
packet sent by a node to the source to inform it of congestion.
A. backpressure
B. choke packet
C. implicit signaling
D. explicit signaling
Ans. B
94. In __________,
there is no communication between the congested node or nodes and the source.
The source guesses that there is a congestion somewhere in the network from
other symptoms.
A. backpressure
B. choke packet
C. implicit signaling
D. explicit signaling
Ans. C
95. In the __________ method, the signal is included in the packets that
carry data.
A. backpressure
B. choke packet
C. implicit signaling
D. explicit signaling
Ans. D
96. Which of the
following are true about Stream Control Transmission Protocol (SCTP)?
A. SCTP is a message-oriented,
B. reliable protocol that combines the best
features of UDP and TCP
C. transport layer protocol
D. All of the above
Ans. D
97. SCTP allows
__________ service in each association.
A. single stream
B. multistream
C. double stream
D. None of the above
Ans. B
98. SCTP association
allows _____________ for each end.
A. only one IP address
B. multiple IP address
C. only two IP address
D. None of the above
Ans. B
99. In SCTP, a data
chunk is numbered using ____________.
A. a Transmisson Sequencce Number (TSN)
B. an SI
C. an SSN
D. None of the above
Ans. A
100. To distinguish
between different data chunks belonging to the same stream, SCTP uses
_______________.
A. TSNs
B. SIs
C. Stream Sequence Numbers (SSNs)
D. None of the above
Ans. C
101. TCP has
__________; SCTP has _______________
A. segment; packets
B. packets; segments
C. frames; segments
D. None of the above
Ans. A
102. The control
information in SCTP is included in the ________.
A. header control field
B. data chunks
C. control chunks
D. none of the above
Ans. C
103. An SCTP packet
can carry _______________.
A. no data chunks
B. only one data chunk
C. several data chunks
D. None of the above
Ans. C
104. In SCTP, the
acknowledgment number and window size are part of each ________________.
A. Control chunk
B. data chunk
C. (a) or (b)
D. None of the above
Ans. A
105. There is no need
for a header length field in SCTP because
A. the size of the header is fixed.
B. there are no options in the general header.
C. both (a) and (b)
D. none of the above
Ans. C
106. The checksum in
SCTP is ___________ bits.
A. 8
B. 16
C. 32
D. 64
Ans. C
107. The association identifier in SCTP is
_________________.
A. a combination of logical address and port
address
B. a unique verification tag
C. either (a) or (b)
D. None of the above
Ans. B
108. In STP, control information and data
information are carried in ________ chunks.
A. the same chunk
B. different chunks
C. either (a) or (b)
D. None of the above
Ans. B
109. In SCTP,
acknowledgment numbers are used to acknowledge ______________.
A. only data chunks
B. only control chunks
C. both data chunks and control chunks
D. None of the above
Ans. A
110. In SCTP packet,
control chunks come _________ data chunks.
A. before
B. after
C. either (a) or (b)
D. None of the above
Ans. A
111. In SCTP,
________________ can be carried in a packet that carries an INIT chunk.
A. no other chunk
B. only control chunks
C. only data chunks)
D. None of the above
Ans. A
112. A connection in
SCTP is called an ___________________.
A. transmission
B. negotiation
C. association
D. None of the above
Ans. C
113. Which of the
following is/are true about Quality of Service (QoS)?
A. Quality of Service (QoS) is a set of
technologies that work on a network to guarantee its ability to dependably run
high-.priority applications and traffic under limited network capacity.
B Measurements of concern to QoS are bandwidth
(throughput), latency (delay), jitter (variance in latency), and error rate.
C. Both (a) and (b)
D. None of the above
Ans. C
114. The _____________________ defines a set
of attributes related to the performance of the connection. For each
connection, the user can request a particular attribute; each service class is
associated with a set of attributes.
A. Quality of Service (QoS)
B. Stream service
C. None of the above
D. All of the above
Ans. A
115. The parameters/attributes of QoS are
A. Reliability
B. Bandwidth
C. Delay and Jitter
D. All of the above
Ans. D
116. The main goal of
QoS is
A. to provide preferential treatment to an
identified flow(s).
B. to increase delay
C. both (a) and (b)
D. None of the above
Ans. A
117. Main categories of QoS are
A. User-oriented
B. Network-oriented
C. both (a) and (b)
D. None of the above
Ans. C
118. Techniques used
to improve QoS are
A. Scheduling,
Traffic shaping, Admission control, Resource reservation
B. Scheduling,
Traffic shaping, Admission control
C. Traffic shaping,
Admission control, Resource reservation
D. Scheduling,
Traffic shaping, Resource reservation
Ans. A
119. Which of the
following are true about delay and jitter?
A. Delay is the time it takes a packet to
travel across the network from source to destination.
B. Jitter is the fluctuation of end-to-end
delay from packet to the next packet.
C. both (a) and (b)
D. None of the above
Ans. C
120. Packets from different flows arrive at a
switch or router for processing. The routers and switches have queues (buffers)
that hold the packets before and after processing. The scheduling method of
processing the packets waiting in a queue is called _________________.
A. Waiting
B. Queuing
C. Flowing
D. None of the above
Ans. B
121. Types of queuing
are
A. First In First Out
queuing
B. Priority queuing
C. Weighted fair
queuing
D. All of the above
Ans. D
122. __________ on
networks is an error-correction technique which can be used to correct data
loss in packets sent over networks. The
way in which interleaving works can create latency issues (the time delay
between data being sent and data being received).
A. intruding
B. interleaving
C. mixing
D. None of the above
Ans. B
123. One of more
synchronization bits are usually added to the beginning of each frame. These
bits are called ___________.
A. framing bits
B. DECbit
C. both (a) and (b)
D. None of the above
Ans. A
Dr. Selvaganesan
Dept of IT, JJCET
Sir can you upload similiar subjects like MA8551, EC8691, CS8501, this is very helpful to students so pls upload these subjects also sir.
ReplyDeleteThank you