计算机网络英文题库(附答案)chapter3
更新时间:2024-02-28 03:26:01 阅读量: 综合文库 文档下载
Chapter 3 Transport Layer
1. A transport-layer protocol provides for logical communication between ____. A Application processes B Hosts C Routers D End systems
2. Transport-layer protocols run in ____. A Servers B Clients C Routers D End systems
3. In transport layer, the send side breaks application messages into ____, passes to network layer. A Frames B Segments C Data-grams D bit streams
4. Services provided by transport layer include ____. A HTTP and FTP B TCP and IP C TCP and UDP D SMTP
5. Which of the following services is not provided by TCP? A Delay guarantees and bandwidth guarantees B Reliable data transfers and flow controls C Congestion controls D In-order data transfers
6. These two minimal transport-layer services----____ and ____----are the only two services that UDP provides!
A process-to-process data delivery, error checking B congestion control, reliable data transfer C flow control, congestion control D In-order data transfer, error checking 7. Port number’s scope is ____ to ____. A 0, 1023 B 0, 65535 C 0, 127 D 0,255
8. The port numbers ranging from ____to ____ are called well-known port number and are restricted. A 0, 1023 B 0, 65535 C 0, 127
D 0,255
9. UDP socket identified by two components, they are ____. A source IP addresses and source port numbers B source IP addresses and destination IP addresses C destination IP address and destination port numbers D destination port numbers and source port numbers 10. TCP socket identified by a (an) ____. A 1-tuple B 2-tuple C 3-tuple D 4-tuple
11. Which of the following applications normally uses UDP services? A SMTP
B Streaming multimedia C FTP D HTTP
12. Reliable data transfer protocol over a perfectly reliable channel is____. A rdt1.0 B rdt2.0 C rdt3.0 D rdt2.1
13. Reliable data transfer protocol over a channel with bit errors and packet losses is ____.
A rdt1.0 B rdt2.0 C rdt3.0 D rdt2.1
14. Which of the following about reliable data transfer over a channel with bit errors is not correct?
A RDT2.0: assuming ACK and NAK will not be corrupted B RDT2.1: assuming ACK and NAK can be corrupted C RDT2.2: only use ACK-s
D RDT2.2: use both ACK-s and NAK-s
15. Which of the following protocols is not pipelining protocols? A TCP B rdt3.0
C GO-BACK-N D selective repeat
16. Which of the following is not correct about GBN protocol? A Only using ACK-s
B Using cumulative ACK-s
C Receiver discards all out-of-order packets D It is not pipelined protocol
17. Which of the following is not correct about SR protocol?
A receiver individually acknowledges all correctly received packets B sender only resends packets for which ACK not received C It limits sequence number of sent but un-ACK-ed packets D It is not a pipelined protocol
18. Which of the following about TCP connection is not correct? A It is a broadcast connection B It is a point-to-point connection C It is a pipelined connection
D It is a full duplex connection
19. The SYN segment is used for____. A TCP connection setup B TCP flow control
C TCP congestion control D Closing a TCP connection
20. The FIN segment is used for____. A TCP connection setup B TCP flow control
C TCP congestion control D Closing a TCP connection
21. How does TCP sender perceive congestion? A Through a timeout event
B Through a receiving duplicate ACK-s event C Both A and B D Either A or B
22. Extending host-to-host delivery to process-to-process delivery is called transport-layer ____ and . A multiplexing and de-multiplexing B storing and forwarding C forwarding and filtering D switching and routing
23. UDP is a ____ service while TCP is a connection-oriented service. A Connectionless B Reliable
C Connection-oriented D In-order
24. The UDP header has only four fields, they are____.
A Source port number, destination port number, length and checksum
B Source port number, destination port number, source IP and destination IP C source IP, destination IP, source MAC address and destination MAC address D source IP, destination IP, sequence number and ACK sequence number
25. There are two 16-bit integers: 1110 0110 0110 0110, 1101 0101 0101 0101. Their checksum is____. A 0100010001000011 B 1011101110111100 C 1111111111111111 D 1000000000000000
26. The maximum amount of data that can be grabbed and placed in a segment is limited by the____.
A Maximum segment size (MSS) B MTU
C Checksum
D Sequence number
27. The MSS is typically set by first determining the length of the largest link-layer frame that can be sent by the local sending host----the so-called____. A Maximum transmission unit (MTU) B MSS
C Checksum
D Sequence number
28. A File size of 500,000bytes, MSS equals 1000bytes. When we want to transmit this file with TCP, the sequence number of the first segment is 0, and the sequence number of the second segment is ____. A 1000 B 999 C 1001 D 500000
29. Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP is said to provide____.
A Cumulative acknowledgements B Selective acknowledgements C 3 duplicate ACKs D positive ACKs
30. Provided α=0.125, current value of Estimated-RTT is 0.4s, Sample-RTT is 0.8s, then the new value of Estimated-RTT is ____s. A 0.45 B 0.6 C 0.7 D 0.8
31. Provided RcvBuffer=20,LastByteRcvd=20,LastByteRead=15, then RcvWindow=____. A 14 B 15 C 16 D 10
32. TCP service does not provide____.
A Reliable data transfer B Flow control
C Delay guarantee D Congestion control 33. There are two states in TCP congestion control, which are ____. A slow start and congestion avoidance B safe start and congestion avoidance C slow start and congestion abandon D safe start and congestion abandon
34. The transport-layer protocol provides logical communication between ____, and the network-layer protocol provides logical communication ____. A hosts, processes B processes, hosts
C threads, processes
D processes, threads
35. To implement the multicast services the Internet employs the ____ protocol. A FTP B TCP C IGMP D UDP
36. If an application developer chooses ____ protocol, then the application process is almost directly talking with IP. A HTTP B RIP
C CSMA/CD D UDP
37. ____ maintains connection-state in the end systems. This connection state includes receive and send buffers, congestion-control parameters, and sequence and acknowledgment number parameters. A UDP B TCP C DNS D HTTP
38. The host that initiates the session in the Internet is labeled as ____. A server B user agent C client D router
39. With TCP there is no _____ between sending and receiving transport-layer entities.
A flow control B handshaking C. congestion control D VC setup
40. The Internet’s ____ service helps prevent the Internet from entering a state of gridlock.
A datagram B congestion control C sliding window D timeout event
41. Connection setup at the transport layer involves ____. A server B only the two end systems C client D router
42. A ____layer protocol provides for logical communication between applications. A transport B application C networking D MAC
43. In static congestion window, if it satisfies W*S/R > RTT + S/R, the Latency is ____.
A W*S/R – ( RTT+ S/R) B 2RTT + O/R
C 2RTT + O/R + (k-1)[W* S/R- (RTT + S/R)] D 2RTT + S/R
44. The receive side of transport layer reassembles segments into messages, passes to ____layer. A Application B Networking C Physical D MAC
45. In the following four options, which one is correct?
A data received from application above B de-multiplexing segment
C timer timeout D ACK receipt
85. Which of the following applications normally uses UDP services? A SMTP
B Streaming multimedia C FTP D HTTP
86. Which of the following about TCP connection is not correct? A It is a broadcast connection B It is a point-to-point connection C It is a pipelined connection D It is a full duplex connection
87. The SYN segment is used for____. A TCP connection setup B TCP flow control
C TCP congestion control D Closing a TCP connection
88. Which service helps prevent the internet from entering a state of gridlock? A reliable data transfer B flow control
C congestion control D handshaking procedure
89. The Internet’s _____is responsible for moving packets from one host to another. A application layer B transport layer
C network layer D link layer
90. In the following applications, which one is a bandwidth-sensitive application? A E-mail
B web application C real-time audio D file transfer
91. In the following applications, which one uses UDP? A E-mail
B web application C file transfer D DNS
92. In the following four descriptions, which one is correct?
A If one host’s transport layer uses TCP, then its network layer must use virtual-circuit network.
B Datagram network provides connection service
C The transport-layer connection service is implemented in the router
D The network-layer connection service is implemented in the router as well as in the end system.
93. ____ is a speeding-matching service---matching the rate which the sender is sending against the rate at which the receiving application is reading. A congestion control B flow control
C sliding-window control D variable control
94. In the following four descriptions about Rcv-Window, which one is correct?
A The size of the TCP RcvWindow never changes throughout the duration of the connection
B The size of the TCP RcvWindow will change with the size of the TCP RcvBuffer C The size of the TCP RcvWindow must be less than or equal to the size of the TCP RcvBuffer
D Suppose host A sends a file to host B over a TCP connection, the number of unacknowledged bytes that A sends cannot exceed the size of the size of the RcvWindow.
95. There are 6 flag fields. Which one is to indicate that the receiver should pass the data to the upper layer immediately? A PSH B URG C ACK D RST
96. Suppose the TCP receiver receives the segment that partially or completely fills in gap in received data, it will ____.
A immediately send ACK B immediately send duplicate ACK
C wait some time for arrival of another in-order segment D send single cumulative
97. _____ imposes constrain on the rate at which a TCP sender can send traffic into the network.
A sliding window B congestion window
C receive window D variable window
98. Flow control and congestion control are same at that they all limit the rate of the sender, but differ in that ____.
A flow control limits its rate by the size of RcvWindow, but congestion control by the traffic on the link
B congestion control limits its rate by the size of RcvWindow, but flow control by the traffic on the link
C flow control mainly is accomplished by the sender, but congestion control by the receiver.
D flow control mainly is accomplished by the receiver, but congestion control by
the link.
99. This job of delivering the data in a transport-layer segment to the correct socket is called ____.
A multiplexing B de-multiplexing C forwarding D routing
100. If we define N to be the window size, base to be the sequence number of the oldest unacknowledged packet, and next-seq-num to be the smallest unused sequence number, then the interval [base, nextseqnum-1] corresponds to packet that ____. A can be sent immediately
B have already been transmitted and acknowledged C cannot be used
D have been sent but not yet acknowledged
101. ____ are the two types of transport services that the Internet provides to the applications.
A TCP and UDP
B connection-oriented and connectionless service C TCP and IP
D reliable data transfer and flow control
102. In the following descriptions about persistent connection, which one is not correct?
A The server leaves the TCP connection open after sending a response B Each TCP connection is closed after the server sending one object
C There are two versions of persistent connection: without pipelining and with pipelining
D The default mode of HTTP uses persistent connection with pipelining 103. The field of Length in UDP segment specifies the length of ____. A the UDP segment, not including the header B the UDP segment, including the header C the UDP segment’s header D the Length field
104. In TCP segment header, which field can implement the reliable data transfer? A source port number and destination port number B sequence number and ACK number
C urgent data pointer D Receive window
105. In the following four descriptions about TCP connection management, which one is not correct?
A Either of the two processes participating in a TCP connection can end the connection
B If the FIN bit is set to 1, it means that it wants to close the connection
C In the first two step of the three-way handshake, the client and server randomly choose an initial sequence number
D In the three segments of the three-way handshake, the SYN bit must be set to 1 106. Suppose host A sends two TCP segments back to back to host B over a TCP connection. The first segment has sequence number 42, and the second has sequence number 110. If the 1st is lost and 2nd arrives at host B. What will be the acknowledgment number?
A 43 B ACK42 C 109 D ACK110
1. Consider sending an object of size O=500,000bytes from server to client. Let S=500 bytes and RTT=0.2s. Suppose the transport protocol uses static windows with window size 5. For a transmission rate of 100Kbps, determine the latency for sending the whole object. Recall the number of windows K=O/ WS), and there is K-1 stalled state (that is idle time gaps).
2.Consider the following plot of TCP congestion window size as a function of time.
16 Fill in the blanks as follow:
a) The initial value of Threshold at the first transmission round is ____. b) The value of Threshold at the 11st transmission round is ____. c) The value of Threshold at the 21st transmission round is ____. d) After the 9th transmission round, segment loss detected by ____.
(A) Timeout
(B) Triple duplicate ACK
e) After the 19th transmission round, segment loss detected by ____.
(A) Timeout
(B) Triple duplicate ACK
f) During ____ transmission round, the 18th segment is sent.
3.Consider the TCP reliable data transfer in the given graph. If in Segment 1’s Sequence number =10,data=“AC”, please fill in the following blanks. a) In Segment 2, ACK number=____;
b) In Segment 3, Sequence number =____; data=“0123456789”
c) If there are some bits corrupted in segment 3 when it arrives Host B, then the ACK number in Segment 5 is ____; and the ACK number in Segment 6 is ____. Congestion window size 12 8 4 0 2 4 6 8 10 12 14 16 1820 22 2426 28 3032 0 0 0
Transmission round
1 2 3 4 5 6 7
4. The client A wants to request a Web page from Server B. Suppose the URL of the page is 172.16.0.200/experiment, and also it wants to receive French version of object. The time-sequence diagram is shown below, please fill in the blanks.
1 2 3 4 5
Packet① to Packet③ are TCP connection’s segment, then: Packet ①: SYN flag bit= a ACK flag bit= b Sequence number= 92 Packet ②: SYN flag bit=1
ACK flag bit= c Sequence number=100 Packet ③: SYN flag bit= d ACK flag bit=1
Sequence number= e
5. Consider sending an object of size O=100 Kbytes from server to client. Let S=536 bytes and RTT=100msec. Suppose the transport protocol uses static windows with window size W.
(1) For a transmission rate of 25 kbps, determine the minimum possible latency. Determine the minimum window size that achieves this latency. (2) Repeat (1) for 100 kbps.
6. Consider the following plot of TCP congestion window size as a function of time. Please fill in the blanks as below.
16 a) The initial value of Threshold at the first transmission round is____. b) The value of Threshold at the 11th transmission round is_____. c) The value of Threshold at the 21st transmission round is_____.
Congestion window size 12 8 4 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 Transmission round
d) After the 9th transmission round, _____ occurs. e) After the 19th transmission round, ____ are detected.
正在阅读:
党代表候选人初步人选考察材料07-31
区域化党建表态发言稿10-09
员工技能培训心得体会总结03-26
廉政党课讲话稿:加强党性修养坚持廉政从政09-12
腾达Tend无线路由器怎么设置04-24
一些美语常用到的口头语 Microsoft Word 文档(6)12-20
组织设计 - 图文06-09
- 《江苏省环境水质(地表水)自动监测预警系统运行管理办法(试行)》
- 安乐死合法化辩论赛立论稿(浙大新生赛)
- 公共科目模拟试卷公务员考试资料
- 我国固定资产投资FAI对GDP的影响
- 大学生创新创业训练计划项目申请书大创项目申报表
- 完美版—单片机控制步进电机
- 2013资阳中考化学试题
- 18.两位数减一位数退位(397道)
- 工程量计算规则
- 二年级操行评语(下)
- 第3章 流程控制语句
- 浅基桥墩加固技术
- 课题研究的主要方法
- 5100软件说明书 - 图文
- 车间技术员年终总结
- 关于印发《中铁建工集团开展项目管理实验室活动方案》的通知
- 经典诵读结题报告
- 地下水动力学习题答案
- 2018年全国各地高考数学模拟试题平面解析几何试题汇编(含答案解
- 街道办事处主任2018年度述职述廉报告
- 英文
- 题库
- 计算机网络
- chapter3
- 答案
- 图式理论与阅读教学
- 钟表市场将迎来十年景气
- 2010年四年级语文上册诊断自测题 第一单元
- 2015年高考数学复习学案:应用题中的图形建模问题
- 《机械设计》复习思考题 解答
- 2013年重庆大学431金融学综合考研真题
- .基础术语-110703
- 长安锦绣城3、4、22、23楼临时用电施工方案
- 《平行四边形的判定2》教学设计
- 翡翠鉴定大师图文并茂教您翡翠基本判定方法
- 大学生旅行社创业策划书
- 木材材积表大全 最全木材材积表 - 图文
- 与发包人、监理及设计单位、专业分包工程的配合
- 探析北方高寒地区冰雪道路交通管理应对措施
- 执行新个税起征点后工资及年终奖金税金计算方法
- 景观施工图细部细节
- 《电商概论》课后复习 - 图文
- 四项基本功锻造工程
- 浅析WTO争端解决机制
- 国际法案例