Topic Outline
- PROCESS-TO-PROCESS DELIVERY
- Client/Server Paradigm
- Multiplexing and Demultiplexing
- Connectionless Versus Connection-Oriented Service
- Reliable Versus Unreliable
- Three Protocols
- USER DATAGRAM PROTOCOL (UDP)
- Well-Known Ports for UDP
- User Datagram
- Checksum
- UDP Operation
- Use of UDP
- TCP
- TCP Services
- TCP Features
- Segment
- A TCP Connection
- Flow Control
- Error Control
- Congestion Control
- SCTP
- SCTP Services
- SCTP Features
- Packet Format
- An SCTP Association
- Flow Control
- Error Control
- Congestion Control
Begin and Good luck!
Choose the letter of the best answer in each questions.
1. Urgent data requires the urgent pointer field as well as the URG bit in the _______ field.
- A) control
- B) offset
- C) sequence number
- D) none of the above
2. To accomplish flow control, TCP uses a ___________ window protocol.
- A) limited-size
- B) sliding
- C) fixed-size
- D) none of the above
3. UDP and TCP are both _______ layer protocols.
- A) data link
- B) network
- C) transport
- D) none of the above
4. In TCP, one end can stop sending data while still receiving data. This is called a ______.
- A) half-close
- B) half-open
- C) one-way termination
- D) none of the above
5. In SCTP, the acknowledgment number and window size are part of each ________.
- A) data chunk
- B) control chunk
- C) a or b
- D) none of the above
6. A connection in SCTP is called an ____________.
- A) negotiation
- B) association
- C) transmission
- D) none of the above
7. An ACK segment, if carrying no data, consumes ______ sequence number(s).
- A) no
- B) one
- C) two
- D) none of the above
8. The association identifier in SCTP is __________________.
- A) a unique verification tag
- B) a combination of logical and port addresses
- C) either a or b
- D) none of the above
9. In SCTP, a data chunk is numbered using ________.
- A) a TSN
- B) an SI
- C) an SSN
- D) none of the above
10. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________.
- A) 0
- B) 1
- C) randomly generated number
- D) none of the above
11. In the sending computer, UDP receives a data unit from the _______ layer.
- A) application
- B) transport
- C) IP
- D) none of the above
12. SCTP allows __________ service in each association.
- A) single stream
- B) multistream
- C) double stream
- D) none of the above
13. TCP is a ___________ protocol.
- A) connection-oriented
- B) connectionless
- C) both a and b
- D) none of the above
14. UDP uses ________ to handle outgoing user datagrams from multiple processes on one host.
- A) flow control
- B) multiplexing
- C) demultiplexing
- D) none of the above
15. Because the sending and the receiving processes may not write or read data at the same speed, TCP ________.
- A) speeds up the slower process
- B) slows down the faster process
- C) uses buffers
- D) none of the above
16. SCTP association allows _____________ for each end.
- A) only one IP address
- B) multiple IP addresses
- C) only two IP address
- D) none of the above
17. UDP needs the _______ address to deliver the user datagram to the correct application process.
- A) port
- B) application
- C) internet
- D) none of the above
18. In an SCTP packet, control chunks come ___________ data chunks.
- A) after
- B) before
- C) a or b
- D) none of the above
19. TCP is a(n) _______ transport protocol.
- A) unreliable
- B) best-effort delivery
- C) reliable
- D) none of the above
20. TCP delivers _______ out-of-order segments to the process.
- A) all
- B) no
- C) some
- D) none of the above
21. Multiply the header length field by _______ to find the total number of bytes in the TCP header.
- A) 2
- B) 4
- C) 6
- D) none of the above
22. Which of the following does UDP guarantee?
- A) flow control
- B) connection-oriented delivery
- C) either a or b
- D) none of the above
23. TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes.
- A) message; message
- B) stream; stream
- C) block; block
- D) none of the above
24. To distinguish between different data chunks belonging to the same stream, SCTP uses ___________.
- A) TSNs
- B) SIs
- C) SSNs
- D) none of the above
25. The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.
- A) well-known
- B) registered
- C) dynamic
- D) none of the above
26. UDP does not add anything to the services of IP except for providing _______ communication.
- A) node-to-node
- B) process-to-process
- C) host-to-host
- D) none of the above
27. The combination of an IP address and a port number is called a ____________.
- A) transport address
- B) network address
- C) socket address
- D) none of the above
28. The options field of the TCP header ranges from 0 to _______ bytes.
- A) 10
- B) 20
- C) 40
- D) none of the above
29. A port address in UDP is _______bits long.
- A) 8
- B) 16
- C) 32
- D) none of the above
30. The FIN segment consumes ____ sequence numbers if it does not carry data.
- A) two
- B) three
- C) no
- D) none of the above
31. The inclusion of the checksum in the TCP segment is ________.
- A) optional
- B) mandatory
- C) at the discretion of the application program
- D) none of the above
32. The FIN + ACK segment consumes _____ sequence number(s) if it does not carry data.
- A) two
- B) three
- C) one
- D) none of the above
33. TCP uses _________________ to check the safe and sound arrival of data.
- A) an acknowledgment mechanism
- B) out-of-band signaling
- C) the services of another protocol
- D) none of the above
34. ACK segments consume _______ sequence number(s) and _______ acknowledged.
- A) no; are not
- B) one; are not
- C) no; are
- D) none of the above
35. In SCTP, acknowledgment numbers are used to acknowledge _____________.
- A) both data chunks and control chunks
- B) only control chunks
- C) only data chunks
- D) none of the above
36. The source port address on the UDP user datagram header defines _______.
- A) the sending computer
- B) the receiving computer
- C) the process running on the sending computer
- D) none of the above
37. __________ control regulates the amount of data a source can send before receiving an acknowledgment from the destination.
- A) Error
- B) Flow
- C) Congestion
- D) none of the above
38. To use the services of UDP, we need ________ socket addresses.
- A) four
- B) two
- C) three
- D) none of the above
39. The value of the window size is determined by _________.
- A) the sender
- B) the receiver
- C) both the sender and receiver
- D) none of the above
40. TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.
- A) first
- B) last
- C) middle
- D) none of the above
41. An SCTP packet can carry __________.
- A) only one data chunk
- B) several data chunks
- C) no data chunks
- D) none of the above
42. UDP is an acronym for _______.
- A) User Delivery Protocol
- B) User Datagram Procedure
- C) User Datagram Protocol
- D) none of the above
43. A SYN + ACK segment cannot carry data; it consumes _____ sequence number(s).
- A) no
- B) three
- C) two
- D) none of the above
44. TCP groups a number of bytes together into a packet called a ___________.
- A) user datagram
- B) segment
- C) datagram
- D) none of the above
45. There is no need for a header length field in SCTP because ________________.
- A) there are no options in the general header
- B) the size of the header is fixed
- C) both a and b
- D) none of the above
46. Connection establishment in TCP is called __________ handshaking.
- A) two-way
- B) four-way
- C) one-way
- D) none of the above
47. UDP packets are encapsulated in ___________.
- A) an Ethernet frame
- B) an TCP segment
- C) an IP datagram
- D) none of the above
48. The checksum in SCTP is ________ bits.
- A) 16
- B) 32
- C) 64
- D) none of the above
49. TCP sliding windows are __________ oriented.
- A) packet
- B) segment
- C) byte
- D) none of the above
50. If a segment carries data along with an acknowledgment, this is called _______.
- A) backpacking
- B) piggybacking
- C) piggypacking
- D) none of the above
51. If the ACK value is 200, then byte _______ has been received successfully.
- A) 199
- B) 200
- C) 201
- D) none of the above
52. A TCP segment is encapsulated in __________.
- A) an IP datagram
- B) an Ethernet frame
- C) a UDP user datagram
- D) none of the above
53. TCP is a __________protocol.
- A) stream-oriented
- B) message-oriented
- C) block-oriented
- D) none of the above
54. UDP packets are called __________.
- A) user datagrams
- B) segments
- C) frames
- D) none of the above
55. In the sending computer, UDP sends a data unit to the _______ layer.
- A) application
- B) transport
- C) IP
- D) none of the above
56. In SCTP, control information and data information are carried in _______ chunks.
- A) the same chunk
- B) different chunks
- C) either a or b
- D) none of the above
57. TCP has ____________; SCTP has ____________.
- A) packets; segments
- B) segments; packets
- C) segments; frames
- D) none of the above
58. One of the responsibilities of the transport layer protocol is to create a ______ communication.
- A) host-to-host
- B) process-to-process
- C) node-to-node
- D) none of the above
59. The control information in SCTP is included in the ________.
- A) header control field
- B) control chunks
- C) data chunks
- D) none of the above
60. Communication in TCP is ___________.
- A) simplex
- B) half-duplex
- C) full-duplex
- D) none of the above
61. Stream Control Transmission Protocol (SCTP) is a new _____________protocol.
- A) reliable, character-oriented
- B) reliable, message-oriented
- C) unreliable, message-oriented
- D) none of the above
62. To distinguish between different streams, SCTP uses ___________.
- A) a TSN
- B) an SI
- C) an SSN
- D) none of the above
63. Which of the following functions does UDP perform?
- A) process-to-process communication
- B) host-to-host communication
- C) end-to-end reliable data delivery
- D) none of the above
64. IP is responsible for _______ communication while TCP is responsible for _______ communication.
- A) host-to-host; process-to-process
- B) process-to-process; host-to-host
- C) process-to-process; network-to-network
- D) none of the above
65. The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.
- A) ACK flooding
- B) FIN flooding
- C) SYN flooding
- D) none of the above
66. UDP is called a _____________transport protocol.
- A) connectionless, reliable
- B) connection-oriented, unreliable
- C) connectionless, unreliable
- D) none of the above
67. In SCTP, ___________ can be carried in a packet that carries an INIT chunk.
- A) only data chunks
- B) only control chunks
- C) no other chunk
- D) none of the above
68. UDP packets have a fixed-size header of _______ bytes.
- A) 16
- B) 8
- C) 40
- D) none of the above
69. The SYN flooding attack belongs to a group of security attacks known as a _____ attack.
- A) denial of service
- B) replay
- C) man-in-the middle
- D) none of the above
70. When the IP layer of a receiving host receives a datagram, _______.
- A) delivery is complete
- B) a transport layer protocol takes over
- C) a header is added
- D) none of the above
71. The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive.
- A) first
- B) last
- C) next
- D) none of the above
72. A SYN segment cannot carry data; it consumes _____ sequence number(s).
- A) no
- B) one
- C) two
- D) none of the above
73. The acknowledgment number is ________.
- A) independent
- B) randomly generated
- C) cumulative
- D) none of the above
74. The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________.
- A) UDP addresses
- B) transport addresses
- C) port addresses
- D) none of the above
75. Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.
- A) client-server
- B) client-client
- C) server-server
- D) none of the above
76. A(n) _________ machine is a machine that goes through a limited number of states.
- A) infinite state
- B) finite state
- C) both a and b
- D) none of the above
77. UDP uses _______ to handle incoming user datagrams that go to different processes on the same host.
- A) flow control
- B) multiplexing
- C) demultiplexing
- D) none of the above
Post a Comment