Deck 10: TCP and Application Layer Protocols

Full screen (f)
exit full mode
Question
Which of the following is false with respect to TCP?

A)connection-oriented
B)process-to-process
C)transport layer protocol
D)unreliable
Use Space or
up arrow
down arrow
to flip the card.
Question
TCP groups a number of bytes together into a packet called                

A)packet
B)buffer
C)segment
D)stack
Question
The value of acknowledgement field in a segment defines                

A)sequence number of the byte received previously
B)total number of bytes to receive
C)sequence number of the next byte to be received
D)sequence of zeros and ones
Question
Two broad categories of congestion control are

A)open-loop and closed-loop
B)open-control and closed-control
C)active control and passive control
D)active loop and passive loop
Question
Retransmission of packets must not be done when                

A)packet is lost
B)packet is corrupted
C)packet is needed
D)packet is error-free
Question
In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends                        

A)packet which are not lost
B)only those packets which are lost or corrupted
C)packet from starting
D)all the packets
Question
Closed-Loop control mechanisms try to

A)remove after congestion occurs
B)remove after sometime
C)prevent before congestion occurs
D)prevent before sending packets
Question
The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as                

A)admission policy
B)backpressure
C)forward signaling
D)backward signaling
Question
The packet sent by a node to the source to inform it of congestion is called                

A)explicit
B)discard
C)choke
D)backpressure
Question
In the slow-start algorithm, the size of the congestion window increases------------ until it reaches a threshold.

A)exponentially
B)additively
C)multiplicatively
D)suddenly
Question
The packet of information at the application layer is called                      

A)packet
B)message
C)segment
D)frame
Question
Which one of the following is an architecture paradigms?

A)peer to peer
B)client-server
C)http
D)both peer-to-peer & client-server
Question
Application layer offers --------------  service.

A)end to end
B)process to process
C)both end to end and process to process
D)none of the mentioned
Question
E-mail is                    

A)loss-tolerant application
B)bandwidth-sensitive application
C)elastic application
D)none of the mentioned
Question
Pick the odd one out.

A)file transfer
B)file download
C)e-mail
D)interactive games
Question
Which of the following is an application layer service?

A)network virtual terminal
B)file transfer, access, and management
C)mail service
D)all of the mentioned
Question
Which is a time-sensitive service?

A)file transfer
B)file download
C)e-mail
D)internet telephony
Question
Transport services available to applications in one or another form

A)reliable data transfer
B)timing
C)security
D)all of the mentioned
Question
Electronic mail uses which Application layer protocol?

A)smtp
B)http
C)ftp
D)sip
Question
RMI stands for?

A)remote mail invocation
B)remote message invocation
C)remaining method invocation
D)remote method invocation
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: TCP and Application Layer Protocols
1
Which of the following is false with respect to TCP?

A)connection-oriented
B)process-to-process
C)transport layer protocol
D)unreliable
unreliable
2
TCP groups a number of bytes together into a packet called                

A)packet
B)buffer
C)segment
D)stack
segment
3
The value of acknowledgement field in a segment defines                

A)sequence number of the byte received previously
B)total number of bytes to receive
C)sequence number of the next byte to be received
D)sequence of zeros and ones
sequence number of the next byte to be received
4
Two broad categories of congestion control are

A)open-loop and closed-loop
B)open-control and closed-control
C)active control and passive control
D)active loop and passive loop
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
Retransmission of packets must not be done when                

A)packet is lost
B)packet is corrupted
C)packet is needed
D)packet is error-free
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends                        

A)packet which are not lost
B)only those packets which are lost or corrupted
C)packet from starting
D)all the packets
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
Closed-Loop control mechanisms try to

A)remove after congestion occurs
B)remove after sometime
C)prevent before congestion occurs
D)prevent before sending packets
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as                

A)admission policy
B)backpressure
C)forward signaling
D)backward signaling
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
The packet sent by a node to the source to inform it of congestion is called                

A)explicit
B)discard
C)choke
D)backpressure
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
In the slow-start algorithm, the size of the congestion window increases------------ until it reaches a threshold.

A)exponentially
B)additively
C)multiplicatively
D)suddenly
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
The packet of information at the application layer is called                      

A)packet
B)message
C)segment
D)frame
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Which one of the following is an architecture paradigms?

A)peer to peer
B)client-server
C)http
D)both peer-to-peer & client-server
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Application layer offers --------------  service.

A)end to end
B)process to process
C)both end to end and process to process
D)none of the mentioned
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
E-mail is                    

A)loss-tolerant application
B)bandwidth-sensitive application
C)elastic application
D)none of the mentioned
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Pick the odd one out.

A)file transfer
B)file download
C)e-mail
D)interactive games
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is an application layer service?

A)network virtual terminal
B)file transfer, access, and management
C)mail service
D)all of the mentioned
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Which is a time-sensitive service?

A)file transfer
B)file download
C)e-mail
D)internet telephony
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Transport services available to applications in one or another form

A)reliable data transfer
B)timing
C)security
D)all of the mentioned
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Electronic mail uses which Application layer protocol?

A)smtp
B)http
C)ftp
D)sip
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
RMI stands for?

A)remote mail invocation
B)remote message invocation
C)remaining method invocation
D)remote method invocation
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 20 flashcards in this deck.