Topic Outline
- PROCESS-TO-PROCESS DELIVERY
- Client/Server Paradigm
- Multiplexing and Demultiplexing
- Connectionless Versus Connection-Oriented Service
- Reliable Versus Unreliable
- Three Protocols
- USER DATAGRAM PROTOCOL (UDP)
- Well-Known Ports for UDP
- User Datagram
- Checksum
- UDP Operation
- Use of UDP
- TCP
- SCTP
- SCTP Services
- SCTP Features
- Packet Format
- An SCTP Association
- Flow Control
- Error Control
- Congestion Control
Begin and Good luck!
1. Urgent data requires the urgent pointer field as well as the URG bit in the _______ field.
- A) control
- B) offset
- C) sequence number
- D) none of the above
2. To accomplish flow control, TCP uses a ___________ window protocol.
- A) limited-size
- B) sliding
- C) fixed-size
- D) none of the above
3. UDP and TCP are both _______ layer protocols.
- A) data link
- B) network
- C) transport
- D) none of the above
4. In TCP, one end can stop sending data while still receiving data. This is called a ______.
- A) half-close
- B) half-open
- C) one-way termination
- D) none of the above
5. In SCTP, the acknowledgment number and window size are part of each ________.
- A) data chunk
- B) control chunk
- C) a or b
- D) none of the above
6. A connection in SCTP is called an ____________.
- A) negotiation
- B) association
- C) transmission
- D) none of the above
7. An ACK segment, if carrying no data, consumes ______ sequence number(s).
- A) no
- B) one
- C) two
- D) none of the above
8. The association identifier in SCTP is __________________.
- A) a unique verification tag
- B) a combination of logical and port addresses
- C) either a or b
- D) none of the above
9. In SCTP, a data chunk is numbered using ________.
- A) a TSN
- B) an SI
- C) an SSN
- D) none of the above
10. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________.
- A) 0
- B) 1
- C) randomly generated number
- D) none of the above
11. In the sending computer, UDP receives a data unit from the _______ layer.
- A) application
- B) transport
- C) IP
- D) none of the above
12. SCTP allows __________ service in each association.
- A) single stream
- B) multistream
- C) double stream
- D) none of the above
13. TCP is a ___________ protocol.
- A) connection-oriented
- B) connectionless
- C) both a and b
- D) none of the above
14. UDP uses ________ to handle outgoing user datagrams from multiple processes on one host.
- A) flow control
- B) multiplexing
- C) demultiplexing
- D) none of the above
15. Because the sending and the receiving processes may not write or read data at the same speed, TCP ________.
- A) speeds up the slower process
- B) slows down the faster process
- C) uses buffers
- D) none of the above
16. SCTP association allows _____________ for each end.
- A) only one IP address
- B) multiple IP addresses
- C) only two IP address
- D) none of the above
17. UDP needs the _______ address to deliver the user datagram to the correct application process.
- A) port
- B) application
- C) internet
- D) none of the above
18. In an SCTP packet, control chunks come ___________ data chunks.
- A) after
- B) before
- C) a or b
- D) none of the above
19. TCP is a(n) _______ transport protocol.
- A) unreliable
- B) best-effort delivery
- C) reliable
- D) none of the above
20. TCP delivers _______ out-of-order segments to the process.
- A) all
- B) no
- C) some
- D) none of the above
21. Multiply the header length field by _______ to find the total number of bytes in the TCP header.
- A) 2
- B) 4
- C) 6
- D) none of the above
22. Which of the following does UDP guarantee?
- A) flow control
- B) connection-oriented delivery
- C) either a or b
- D) none of the above
23. TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes.
- A) message; message
- B) stream; stream
- C) block; block
- D) none of the above
24. To distinguish between different data chunks belonging to the same stream, SCTP uses ___________.
- A) TSNs
- B) SIs
- C) SSNs
- D) none of the above
25. The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.
- A) well-known
- B) registered
- C) dynamic
- D) none of the above
26. UDP does not add anything to the services of IP except for providing _______ communication.
- A) node-to-node
- B) process-to-process
- C) host-to-host
- D) none of the above
27. The combination of an IP address and a port number is called a ____________.
- A) transport address
- B) network address
- C) socket address
- D) none of the above
28. The options field of the TCP header ranges from 0 to _______ bytes.
- A) 10
- B) 20
- C) 40
- D) none of the above
29. A port address in UDP is _______bits long.
- A) 8
- B) 16
- C) 32
- D) none of the above
30. The FIN segment consumes ____ sequence numbers if it does not carry data.
- A) two
- B) three
- C) no
- D) none of the above
31. The inclusion of the checksum in the TCP segment is ________.
- A) optional
- B) mandatory
- C) at the discretion of the application program
- D) none of the above
32. The FIN + ACK segment consumes _____ sequence number(s) if it does not carry data.
- A) two
- B) three
- C) one
- D) none of the above
33. TCP uses _________________ to check the safe and sound arrival of data.
- A) an acknowledgment mechanism
- B) out-of-band signaling
- C) the services of another protocol
- D) none of the above
34. ACK segments consume _______ sequence number(s) and _______ acknowledged.
- A) no; are not
- B) one; are not
- C) no; are
- D) none of the above
35. In SCTP, acknowledgment numbers are used to acknowledge _____________.
- A) both data chunks and control chunks
- B) only control chunks
- C) only data chunks
- D) none of the above
36. The source port address on the UDP user datagram header defines _______.
- A) the sending computer
- B) the receiving computer
- C) the process running on the sending computer
- D) none of the above
37. __________ control regulates the amount of data a source can send before receiving an acknowledgment from the destination.
- A) Error
- B) Flow
- C) Congestion
- D) none of the above
38. To use the services of UDP, we need ________ socket addresses.
- A) four
- B) two
- C) three
- D) none of the above
39. The value of the window size is determined by _________.
- A) the sender
- B) the receiver
- C) both the sender and receiver
- D) none of the above
40. TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.
- A) first
- B) last
- C) middle
- D) none of the above
41. An SCTP packet can carry __________.
- A) only one data chunk
- B) several data chunks
- C) no data chunks
- D) none of the above
42. UDP is an acronym for _______.
- A) User Delivery Protocol
- B) User Datagram Procedure
- C) User Datagram Protocol
- D) none of the above
43. A SYN + ACK segment cannot carry data; it consumes _____ sequence number(s).
- A) no
- B) three
- C) two
- D) none of the above
44. TCP groups a number of bytes together into a packet called a ___________.
- A) user datagram
- B) segment
- C) datagram
- D) none of the above
45. There is no need for a header length field in SCTP because ________________.
- A) there are no options in the general header
- B) the size of the header is fixed
- C) both a and b
- D) none of the above
46. Connection establishment in TCP is called __________ handshaking.
- A) two-way
- B) four-way
- C) one-way
- D) none of the above
47. UDP packets are encapsulated in ___________.
- A) an Ethernet frame
- B) an TCP segment
- C) an IP datagram
- D) none of the above
48. The checksum in SCTP is ________ bits.
- A) 16
- B) 32
- C) 64
- D) none of the above
49. TCP sliding windows are __________ oriented.
- A) packet
- B) segment
- C) byte
- D) none of the above
50. If a segment carries data along with an acknowledgment, this is called _______.
- A) backpacking
- B) piggybacking
- C) piggypacking
- D) none of the above
51. If the ACK value is 200, then byte _______ has been received successfully.
- A) 199
- B) 200
- C) 201
- D) none of the above
52. A TCP segment is encapsulated in __________.
- A) an IP datagram
- B) an Ethernet frame
- C) a UDP user datagram
- D) none of the above
53. TCP is a __________protocol.
- A) stream-oriented
- B) message-oriented
- C) block-oriented
- D) none of the above
54. UDP packets are called __________.
- A) user datagrams
- B) segments
- C) frames
- D) none of the above
55. In the sending computer, UDP sends a data unit to the _______ layer.
- A) application
- B) transport
- C) IP
- D) none of the above
56. In SCTP, control information and data information are carried in _______ chunks.
- A) the same chunk
- B) different chunks
- C) either a or b
- D) none of the above
57. TCP has ____________; SCTP has ____________.
- A) packets; segments
- B) segments; packets
- C) segments; frames
- D) none of the above
58. One of the responsibilities of the transport layer protocol is to create a ______ communication.
- A) host-to-host
- B) process-to-process
- C) node-to-node
- D) none of the above
59. The control information in SCTP is included in the ________.
- A) header control field
- B) control chunks
- C) data chunks
- D) none of the above
60. Communication in TCP is ___________.
- A) simplex
- B) half-duplex
- C) full-duplex
- D) none of the above
61. Stream Control Transmission Protocol (SCTP) is a new _____________protocol.
- A) reliable, character-oriented
- B) reliable, message-oriented
- C) unreliable, message-oriented
- D) none of the above
62. To distinguish between different streams, SCTP uses ___________.
- A) a TSN
- B) an SI
- C) an SSN
- D) none of the above
63. Which of the following functions does UDP perform?
- A) process-to-process communication
- B) host-to-host communication
- C) end-to-end reliable data delivery
- D) none of the above
64. IP is responsible for _______ communication while TCP is responsible for _______ communication.
- A) host-to-host; process-to-process
- B) process-to-process; host-to-host
- C) process-to-process; network-to-network
- D) none of the above
65. The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.
- A) ACK flooding
- B) FIN flooding
- C) SYN flooding
- D) none of the above
66. UDP is called a _____________transport protocol.
- A) connectionless, reliable
- B) connection-oriented, unreliable
- C) connectionless, unreliable
- D) none of the above
67. In SCTP, ___________ can be carried in a packet that carries an INIT chunk.
- A) only data chunks
- B) only control chunks
- C) no other chunk
- D) none of the above
68. UDP packets have a fixed-size header of _______ bytes.
- A) 16
- B) 8
- C) 40
- D) none of the above
69. The SYN flooding attack belongs to a group of security attacks known as a _____ attack.
- A) denial of service
- B) replay
- C) man-in-the middle
- D) none of the above
70. When the IP layer of a receiving host receives a datagram, _______.
- A) delivery is complete
- B) a transport layer protocol takes over
- C) a header is added
- D) none of the above
71. The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive.
- A) first
- B) last
- C) next
- D) none of the above
72. A SYN segment cannot carry data; it consumes _____ sequence number(s).
- A) no
- B) one
- C) two
- D) none of the above
73. The acknowledgment number is ________.
- A) independent
- B) randomly generated
- C) cumulative
- D) none of the above
74. The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________.
- A) UDP addresses
- B) transport addresses
- C) port addresses
- D) none of the above
75. Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.
- A) client-server
- B) client-client
- C) server-server
- D) none of the above
76. A(n) _________ machine is a machine that goes through a limited number of states.
- A) infinite state
- B) finite state
- C) both a and b
- D) none of the above
77. UDP uses _______ to handle incoming user datagrams that go to different processes on the same host.
- A) flow control
- B) multiplexing
- C) demultiplexing
- D) none of the above
0 comments: Post Yours! Read Comment Policy ▼
PLEASE NOTE:
I have Zero Tolerance to Spam. It will be deleted immediately upon review.
Post a Comment