Deck 15: Transport Protocols

Full screen (f)
exit full mode
Question
If there is a single host-node link over which all virtual circuits are multiplexed,the throughput of a transport connection can exceed the data rate of that link.
Use Space or
up arrow
down arrow
to flip the card.
Question
In a protocol architecture,the transport protocol sits above application and other upper-layer protocols,and just below the network or internetwork layer.
Question
To begin a connection establishment a TS user is in a ________ state.

A)CLOSED
B)LISTEN
C)OPEN
D)ESTAB
Question
The less the network service provides,the more the transport protocol must do.
Question
The SYN segment functions both as a connection request and as a connection acknowledgment.
Question
An internetwork using IP is an example of a reliable network service.
Question
As with IP,the services provided by TCP are defined in terms of primitives and parameters.
Question
A credit scheme is a more effective scheme with an unreliable network service.
Question
The ________ variable represents a particular TS user at the specified host.

A)Port
B)Host
C)Socket
D)Transport
Question
All of the following are ways of the receiving transport entity to cope with the flow control requirement EXCEPT:

A)use a credit scheme
B)do nothing
C)use a fixed sliding-window protocol
D)accept further segments from the network service
Question
A transport protocol can be either connection oriented,such as UDP,or connectionless,such as TCP.
Question
A retransmission timer is the only timer needed for proper functioning of a transport protocol.
Question
The receiver needs to adopt some policy concerning the amount of data it permits the sender to transmit.
Question
The credit-based flow control mechanism of TCP was designed to enable a destination to restrict the flow of segments from a source to avoid buffer overflow at the destination.
Question
TCP uses a ________ flow control technique.

A)sliding-window
B)upper-layer
C)sequential
D)credit-based
Question
Multiple users employing the same transport protocol and distinguished by port numbers or service access points is ________.

A)multiplexing
B)sequencing
C)flowing
D)full duplex
Question
The sliding-window technique would work well with a reliable network service.
Question
A problem with a two-way handshake is the potential loss of segments and the potential presence of obsolete segments.
Question
When a TCP entity detects the presence of congestion in the Internet,it reduces the flow of data onto the Internet until it detects an easing in congestion.
Question
There is no need for connection establishment and termination procedures to support connection-oriented service with a reliable network service.
Question
________ provides a means of informing the destination TCP user that significant data is in the upcoming data stream.It is up to the destination user to determine appropriate action.

A)Data stream signaling
B)Attention signaling
C)Urgent data signaling
D)Alert signaling
Question
Using ________,a sender retransmits a segment before timeout because it infers that the segment was lost.If the sender subsequently receives an acknowledgement that does not cover all of the segments transmitted before this is initiated,the sender may infer that two segments were lost from the current window and retransmit an additional segment.

A)fast retransmit
B)backoff
C)outward data dissemination
D)Karn's Algorithm
Question
"Abort connection when no segments are received" is the ________ Transport Protocol Timer.

A)2MSL
B)Keepalive
C)Retransmission
D)Persist
Question
A ________ service provides for the establishment,maintenance,and termination of a logical connection between TS users.To date this is the most common type of protocol service available and has a wide variety of applications.
Question
In TCP the combination of port and host is referred to as a ________.
Question
In addition to data each transmitted segment includes in its header three fields related to flow control: acknowledgment number,window,and ________.
Question
TCP uses only a single type of protocol data unit called a ________.
Question
A ________ timer is reset with each outgoing segment.If this timer ever expires the protocol entity is required to send a segment,even if it duplicates a previous one.
Question
Once the Passive Open command is issued,the transport entity creates a connection object of some sort that is in the ________ state.

A)OPEN
B)LISTEN
C)CLOSED
D)FIN
Question
The two facilities that TCP provides for labeling data are push and ________.
Question
The TCP header ________ field contains the number of data octets,beginning with the sequence number indicated in the acknowledgment field,that the sender is willing to accept.

A)Window
B)Checksum
C)Options
D)Acknowledgment Number
Question
When the system upon which a transport entity is running fails and subsequently restarts,the state information of all active connections is lost.The affected connections become ________ because the side that did not fail does not yet realize the problem.
Question
"Listen for connection attempt at specified security and precedence from specified destination" is the description of the TCP Service Request ________ Primitive.

A)Generally Specified Passive Open
B)Unspecified Passive Open
C)Active Open With Data
D)Fully Specified Passive Open
Question
Connection establishment in TCP always uses a ________.

A)four-way handshake
B)three-way handshake
C)two-way handshake
D)handshake
Question
When a data segment arrives that is in sequence,the receiving TCP entity has two options concerning the timing of acknowledgment: Immediate and

A)Cumulative
B)Controlled
C)Delayed
D)Non-responsive
Question
One header must serve to perform all protocol mechanisms.This header has a minimum length of ________ octets.

A)20
B)16
C)8
D)10
Question
The TS user can signal to the local TCP entity that it will passively wait for a request with a ________ command.A server program such as time-sharing or a file transfer application might do this.
Question
The ________ protocol provides an end-to-end transfer service that shields upper- layer protocols from the details of the intervening network or networks.
Question
________ measures the time the transport machine will continue to await an acknowledgment of a transmitted segment after the segment has been retransmitted the maximum number of times.When the timer expires,the transport entity assumes that the other transport entity or intervening network has failed,closes the connection,and signals an abnormal close to the TS user.
Question
In the case of a single network,________ refers to an attached network device.

A)Port
B)Host
C)Socket
D)Entity
Question
A TCP implementation may employ one of three retransmission strategies: First-only,Individual,and ________.
Question
In addition to TCP,the ________ is the other transport-level protocol that is commonly used as part of the TCP/IP protocol suite.
Question
TCP mechanisms can be grouped into the categories of data transfer,connection termination,and ________.
Question
The ________ field in the TCP header contains the sequence number of the next data octet that the TCP entity expects to receive.
Question
RTT Variance Estimation,also known as ________,is the technique specified in the TCP standard that enables a TCP entity to adapt to changes in round-trip time.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Transport Protocols
1
If there is a single host-node link over which all virtual circuits are multiplexed,the throughput of a transport connection can exceed the data rate of that link.
False
2
In a protocol architecture,the transport protocol sits above application and other upper-layer protocols,and just below the network or internetwork layer.
False
3
To begin a connection establishment a TS user is in a ________ state.

A)CLOSED
B)LISTEN
C)OPEN
D)ESTAB
A
4
The less the network service provides,the more the transport protocol must do.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
The SYN segment functions both as a connection request and as a connection acknowledgment.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
An internetwork using IP is an example of a reliable network service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
As with IP,the services provided by TCP are defined in terms of primitives and parameters.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
A credit scheme is a more effective scheme with an unreliable network service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
The ________ variable represents a particular TS user at the specified host.

A)Port
B)Host
C)Socket
D)Transport
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
All of the following are ways of the receiving transport entity to cope with the flow control requirement EXCEPT:

A)use a credit scheme
B)do nothing
C)use a fixed sliding-window protocol
D)accept further segments from the network service
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
A transport protocol can be either connection oriented,such as UDP,or connectionless,such as TCP.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
A retransmission timer is the only timer needed for proper functioning of a transport protocol.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The receiver needs to adopt some policy concerning the amount of data it permits the sender to transmit.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
The credit-based flow control mechanism of TCP was designed to enable a destination to restrict the flow of segments from a source to avoid buffer overflow at the destination.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
TCP uses a ________ flow control technique.

A)sliding-window
B)upper-layer
C)sequential
D)credit-based
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Multiple users employing the same transport protocol and distinguished by port numbers or service access points is ________.

A)multiplexing
B)sequencing
C)flowing
D)full duplex
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The sliding-window technique would work well with a reliable network service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
A problem with a two-way handshake is the potential loss of segments and the potential presence of obsolete segments.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
When a TCP entity detects the presence of congestion in the Internet,it reduces the flow of data onto the Internet until it detects an easing in congestion.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
There is no need for connection establishment and termination procedures to support connection-oriented service with a reliable network service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
________ provides a means of informing the destination TCP user that significant data is in the upcoming data stream.It is up to the destination user to determine appropriate action.

A)Data stream signaling
B)Attention signaling
C)Urgent data signaling
D)Alert signaling
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Using ________,a sender retransmits a segment before timeout because it infers that the segment was lost.If the sender subsequently receives an acknowledgement that does not cover all of the segments transmitted before this is initiated,the sender may infer that two segments were lost from the current window and retransmit an additional segment.

A)fast retransmit
B)backoff
C)outward data dissemination
D)Karn's Algorithm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
"Abort connection when no segments are received" is the ________ Transport Protocol Timer.

A)2MSL
B)Keepalive
C)Retransmission
D)Persist
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
A ________ service provides for the establishment,maintenance,and termination of a logical connection between TS users.To date this is the most common type of protocol service available and has a wide variety of applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
In TCP the combination of port and host is referred to as a ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
In addition to data each transmitted segment includes in its header three fields related to flow control: acknowledgment number,window,and ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
TCP uses only a single type of protocol data unit called a ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
A ________ timer is reset with each outgoing segment.If this timer ever expires the protocol entity is required to send a segment,even if it duplicates a previous one.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
Once the Passive Open command is issued,the transport entity creates a connection object of some sort that is in the ________ state.

A)OPEN
B)LISTEN
C)CLOSED
D)FIN
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The two facilities that TCP provides for labeling data are push and ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The TCP header ________ field contains the number of data octets,beginning with the sequence number indicated in the acknowledgment field,that the sender is willing to accept.

A)Window
B)Checksum
C)Options
D)Acknowledgment Number
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
When the system upon which a transport entity is running fails and subsequently restarts,the state information of all active connections is lost.The affected connections become ________ because the side that did not fail does not yet realize the problem.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
"Listen for connection attempt at specified security and precedence from specified destination" is the description of the TCP Service Request ________ Primitive.

A)Generally Specified Passive Open
B)Unspecified Passive Open
C)Active Open With Data
D)Fully Specified Passive Open
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
Connection establishment in TCP always uses a ________.

A)four-way handshake
B)three-way handshake
C)two-way handshake
D)handshake
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
When a data segment arrives that is in sequence,the receiving TCP entity has two options concerning the timing of acknowledgment: Immediate and

A)Cumulative
B)Controlled
C)Delayed
D)Non-responsive
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
One header must serve to perform all protocol mechanisms.This header has a minimum length of ________ octets.

A)20
B)16
C)8
D)10
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The TS user can signal to the local TCP entity that it will passively wait for a request with a ________ command.A server program such as time-sharing or a file transfer application might do this.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The ________ protocol provides an end-to-end transfer service that shields upper- layer protocols from the details of the intervening network or networks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
________ measures the time the transport machine will continue to await an acknowledgment of a transmitted segment after the segment has been retransmitted the maximum number of times.When the timer expires,the transport entity assumes that the other transport entity or intervening network has failed,closes the connection,and signals an abnormal close to the TS user.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
In the case of a single network,________ refers to an attached network device.

A)Port
B)Host
C)Socket
D)Entity
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
A TCP implementation may employ one of three retransmission strategies: First-only,Individual,and ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
In addition to TCP,the ________ is the other transport-level protocol that is commonly used as part of the TCP/IP protocol suite.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
TCP mechanisms can be grouped into the categories of data transfer,connection termination,and ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The ________ field in the TCP header contains the sequence number of the next data octet that the TCP entity expects to receive.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
RTT Variance Estimation,also known as ________,is the technique specified in the TCP standard that enables a TCP entity to adapt to changes in round-trip time.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.