Deck 15: Transport Protocols

ملء الشاشة (f)
exit full mode
سؤال
If there is a single host-node link over which all virtual circuits are multiplexed,the throughput of a transport connection can exceed the data rate of that link.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In a protocol architecture,the transport protocol sits above application and other upper-layer protocols,and just below the network or internetwork layer.
سؤال
To begin a connection establishment a TS user is in a ________ state.

A)CLOSED
B)LISTEN
C)OPEN
D)ESTAB
سؤال
The less the network service provides,the more the transport protocol must do.
سؤال
The SYN segment functions both as a connection request and as a connection acknowledgment.
سؤال
An internetwork using IP is an example of a reliable network service.
سؤال
As with IP,the services provided by TCP are defined in terms of primitives and parameters.
سؤال
A credit scheme is a more effective scheme with an unreliable network service.
سؤال
The ________ variable represents a particular TS user at the specified host.

A)Port
B)Host
C)Socket
D)Transport
سؤال
All of the following are ways of the receiving transport entity to cope with the flow control requirement EXCEPT:

A)use a credit scheme
B)do nothing
C)use a fixed sliding-window protocol
D)accept further segments from the network service
سؤال
A transport protocol can be either connection oriented,such as UDP,or connectionless,such as TCP.
سؤال
A retransmission timer is the only timer needed for proper functioning of a transport protocol.
سؤال
The receiver needs to adopt some policy concerning the amount of data it permits the sender to transmit.
سؤال
The credit-based flow control mechanism of TCP was designed to enable a destination to restrict the flow of segments from a source to avoid buffer overflow at the destination.
سؤال
TCP uses a ________ flow control technique.

A)sliding-window
B)upper-layer
C)sequential
D)credit-based
سؤال
Multiple users employing the same transport protocol and distinguished by port numbers or service access points is ________.

A)multiplexing
B)sequencing
C)flowing
D)full duplex
سؤال
The sliding-window technique would work well with a reliable network service.
سؤال
A problem with a two-way handshake is the potential loss of segments and the potential presence of obsolete segments.
سؤال
When a TCP entity detects the presence of congestion in the Internet,it reduces the flow of data onto the Internet until it detects an easing in congestion.
سؤال
There is no need for connection establishment and termination procedures to support connection-oriented service with a reliable network service.
سؤال
________ provides a means of informing the destination TCP user that significant data is in the upcoming data stream.It is up to the destination user to determine appropriate action.

A)Data stream signaling
B)Attention signaling
C)Urgent data signaling
D)Alert signaling
سؤال
Using ________,a sender retransmits a segment before timeout because it infers that the segment was lost.If the sender subsequently receives an acknowledgement that does not cover all of the segments transmitted before this is initiated,the sender may infer that two segments were lost from the current window and retransmit an additional segment.

A)fast retransmit
B)backoff
C)outward data dissemination
D)Karn's Algorithm
سؤال
"Abort connection when no segments are received" is the ________ Transport Protocol Timer.

A)2MSL
B)Keepalive
C)Retransmission
D)Persist
سؤال
A ________ service provides for the establishment,maintenance,and termination of a logical connection between TS users.To date this is the most common type of protocol service available and has a wide variety of applications.
سؤال
In TCP the combination of port and host is referred to as a ________.
سؤال
In addition to data each transmitted segment includes in its header three fields related to flow control: acknowledgment number,window,and ________.
سؤال
TCP uses only a single type of protocol data unit called a ________.
سؤال
A ________ timer is reset with each outgoing segment.If this timer ever expires the protocol entity is required to send a segment,even if it duplicates a previous one.
سؤال
Once the Passive Open command is issued,the transport entity creates a connection object of some sort that is in the ________ state.

A)OPEN
B)LISTEN
C)CLOSED
D)FIN
سؤال
The two facilities that TCP provides for labeling data are push and ________.
سؤال
The TCP header ________ field contains the number of data octets,beginning with the sequence number indicated in the acknowledgment field,that the sender is willing to accept.

A)Window
B)Checksum
C)Options
D)Acknowledgment Number
سؤال
When the system upon which a transport entity is running fails and subsequently restarts,the state information of all active connections is lost.The affected connections become ________ because the side that did not fail does not yet realize the problem.
سؤال
"Listen for connection attempt at specified security and precedence from specified destination" is the description of the TCP Service Request ________ Primitive.

A)Generally Specified Passive Open
B)Unspecified Passive Open
C)Active Open With Data
D)Fully Specified Passive Open
سؤال
Connection establishment in TCP always uses a ________.

A)four-way handshake
B)three-way handshake
C)two-way handshake
D)handshake
سؤال
When a data segment arrives that is in sequence,the receiving TCP entity has two options concerning the timing of acknowledgment: Immediate and

A)Cumulative
B)Controlled
C)Delayed
D)Non-responsive
سؤال
One header must serve to perform all protocol mechanisms.This header has a minimum length of ________ octets.

A)20
B)16
C)8
D)10
سؤال
The TS user can signal to the local TCP entity that it will passively wait for a request with a ________ command.A server program such as time-sharing or a file transfer application might do this.
سؤال
The ________ protocol provides an end-to-end transfer service that shields upper- layer protocols from the details of the intervening network or networks.
سؤال
________ measures the time the transport machine will continue to await an acknowledgment of a transmitted segment after the segment has been retransmitted the maximum number of times.When the timer expires,the transport entity assumes that the other transport entity or intervening network has failed,closes the connection,and signals an abnormal close to the TS user.
سؤال
In the case of a single network,________ refers to an attached network device.

A)Port
B)Host
C)Socket
D)Entity
سؤال
A TCP implementation may employ one of three retransmission strategies: First-only,Individual,and ________.
سؤال
In addition to TCP,the ________ is the other transport-level protocol that is commonly used as part of the TCP/IP protocol suite.
سؤال
TCP mechanisms can be grouped into the categories of data transfer,connection termination,and ________.
سؤال
The ________ field in the TCP header contains the sequence number of the next data octet that the TCP entity expects to receive.
سؤال
RTT Variance Estimation,also known as ________,is the technique specified in the TCP standard that enables a TCP entity to adapt to changes in round-trip time.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Transport Protocols
1
If there is a single host-node link over which all virtual circuits are multiplexed,the throughput of a transport connection can exceed the data rate of that link.
False
2
In a protocol architecture,the transport protocol sits above application and other upper-layer protocols,and just below the network or internetwork layer.
False
3
To begin a connection establishment a TS user is in a ________ state.

A)CLOSED
B)LISTEN
C)OPEN
D)ESTAB
A
4
The less the network service provides,the more the transport protocol must do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
The SYN segment functions both as a connection request and as a connection acknowledgment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
An internetwork using IP is an example of a reliable network service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
As with IP,the services provided by TCP are defined in terms of primitives and parameters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
A credit scheme is a more effective scheme with an unreliable network service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
The ________ variable represents a particular TS user at the specified host.

A)Port
B)Host
C)Socket
D)Transport
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
All of the following are ways of the receiving transport entity to cope with the flow control requirement EXCEPT:

A)use a credit scheme
B)do nothing
C)use a fixed sliding-window protocol
D)accept further segments from the network service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
A transport protocol can be either connection oriented,such as UDP,or connectionless,such as TCP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
A retransmission timer is the only timer needed for proper functioning of a transport protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
The receiver needs to adopt some policy concerning the amount of data it permits the sender to transmit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
The credit-based flow control mechanism of TCP was designed to enable a destination to restrict the flow of segments from a source to avoid buffer overflow at the destination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
TCP uses a ________ flow control technique.

A)sliding-window
B)upper-layer
C)sequential
D)credit-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
Multiple users employing the same transport protocol and distinguished by port numbers or service access points is ________.

A)multiplexing
B)sequencing
C)flowing
D)full duplex
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
The sliding-window technique would work well with a reliable network service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
A problem with a two-way handshake is the potential loss of segments and the potential presence of obsolete segments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
When a TCP entity detects the presence of congestion in the Internet,it reduces the flow of data onto the Internet until it detects an easing in congestion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
There is no need for connection establishment and termination procedures to support connection-oriented service with a reliable network service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
________ provides a means of informing the destination TCP user that significant data is in the upcoming data stream.It is up to the destination user to determine appropriate action.

A)Data stream signaling
B)Attention signaling
C)Urgent data signaling
D)Alert signaling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
Using ________,a sender retransmits a segment before timeout because it infers that the segment was lost.If the sender subsequently receives an acknowledgement that does not cover all of the segments transmitted before this is initiated,the sender may infer that two segments were lost from the current window and retransmit an additional segment.

A)fast retransmit
B)backoff
C)outward data dissemination
D)Karn's Algorithm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
"Abort connection when no segments are received" is the ________ Transport Protocol Timer.

A)2MSL
B)Keepalive
C)Retransmission
D)Persist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
A ________ service provides for the establishment,maintenance,and termination of a logical connection between TS users.To date this is the most common type of protocol service available and has a wide variety of applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
In TCP the combination of port and host is referred to as a ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
In addition to data each transmitted segment includes in its header three fields related to flow control: acknowledgment number,window,and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
TCP uses only a single type of protocol data unit called a ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
A ________ timer is reset with each outgoing segment.If this timer ever expires the protocol entity is required to send a segment,even if it duplicates a previous one.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
Once the Passive Open command is issued,the transport entity creates a connection object of some sort that is in the ________ state.

A)OPEN
B)LISTEN
C)CLOSED
D)FIN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
The two facilities that TCP provides for labeling data are push and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
The TCP header ________ field contains the number of data octets,beginning with the sequence number indicated in the acknowledgment field,that the sender is willing to accept.

A)Window
B)Checksum
C)Options
D)Acknowledgment Number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
When the system upon which a transport entity is running fails and subsequently restarts,the state information of all active connections is lost.The affected connections become ________ because the side that did not fail does not yet realize the problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
"Listen for connection attempt at specified security and precedence from specified destination" is the description of the TCP Service Request ________ Primitive.

A)Generally Specified Passive Open
B)Unspecified Passive Open
C)Active Open With Data
D)Fully Specified Passive Open
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
Connection establishment in TCP always uses a ________.

A)four-way handshake
B)three-way handshake
C)two-way handshake
D)handshake
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
When a data segment arrives that is in sequence,the receiving TCP entity has two options concerning the timing of acknowledgment: Immediate and

A)Cumulative
B)Controlled
C)Delayed
D)Non-responsive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
One header must serve to perform all protocol mechanisms.This header has a minimum length of ________ octets.

A)20
B)16
C)8
D)10
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
The TS user can signal to the local TCP entity that it will passively wait for a request with a ________ command.A server program such as time-sharing or a file transfer application might do this.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
The ________ protocol provides an end-to-end transfer service that shields upper- layer protocols from the details of the intervening network or networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
________ measures the time the transport machine will continue to await an acknowledgment of a transmitted segment after the segment has been retransmitted the maximum number of times.When the timer expires,the transport entity assumes that the other transport entity or intervening network has failed,closes the connection,and signals an abnormal close to the TS user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
In the case of a single network,________ refers to an attached network device.

A)Port
B)Host
C)Socket
D)Entity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
A TCP implementation may employ one of three retransmission strategies: First-only,Individual,and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
In addition to TCP,the ________ is the other transport-level protocol that is commonly used as part of the TCP/IP protocol suite.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
TCP mechanisms can be grouped into the categories of data transfer,connection termination,and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
The ________ field in the TCP header contains the sequence number of the next data octet that the TCP entity expects to receive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
RTT Variance Estimation,also known as ________,is the technique specified in the TCP standard that enables a TCP entity to adapt to changes in round-trip time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.