计算机网络英文题库(附答案)chapter3

2020-02-21 22:18

Chapter 3 Transport Layer

1. A transport-layer protocol provides for logical communication between ____. A Application processes B Hosts C Routers D End systems

2. Transport-layer protocols run in ____. A Servers B Clients C Routers D End systems

3. In transport layer, the send side breaks application messages into ____, passes to network layer. A Frames B Segments C Data-grams D bit streams

4. Services provided by transport layer include ____. A HTTP and FTP B TCP and IP C TCP and UDP D SMTP

5. Which of the following services is not provided by TCP? A Delay guarantees and bandwidth guarantees B Reliable data transfers and flow controls C Congestion controls D In-order data transfers

6. These two minimal transport-layer services----____ and ____----are the only two services that UDP provides!

A process-to-process data delivery, error checking B congestion control, reliable data transfer C flow control, congestion control D In-order data transfer, error checking 7. Port number’s scope is ____ to ____. A 0, 1023 B 0, 65535 C 0, 127 D 0,255

8. The port numbers ranging from ____to ____ are called well-known port number and are restricted. A 0, 1023 B 0, 65535 C 0, 127

D 0,255

9. UDP socket identified by two components, they are ____. A source IP addresses and source port numbers B source IP addresses and destination IP addresses C destination IP address and destination port numbers D destination port numbers and source port numbers 10. TCP socket identified by a (an) ____. A 1-tuple B 2-tuple C 3-tuple D 4-tuple

11. Which of the following applications normally uses UDP services? A SMTP

B Streaming multimedia C FTP D HTTP

12. Reliable data transfer protocol over a perfectly reliable channel is____. A rdt1.0 B rdt2.0 C rdt3.0 D rdt2.1

13. Reliable data transfer protocol over a channel with bit errors and packet losses is ____.

A rdt1.0 B rdt2.0 C rdt3.0 D rdt2.1

14. Which of the following about reliable data transfer over a channel with bit errors is not correct?

A RDT2.0: assuming ACK and NAK will not be corrupted B RDT2.1: assuming ACK and NAK can be corrupted C RDT2.2: only use ACK-s

D RDT2.2: use both ACK-s and NAK-s

15. Which of the following protocols is not pipelining protocols? A TCP B rdt3.0

C GO-BACK-N D selective repeat

16. Which of the following is not correct about GBN protocol? A Only using ACK-s

B Using cumulative ACK-s

C Receiver discards all out-of-order packets D It is not pipelined protocol

17. Which of the following is not correct about SR protocol?

A receiver individually acknowledges all correctly received packets B sender only resends packets for which ACK not received C It limits sequence number of sent but un-ACK-ed packets D It is not a pipelined protocol

18. Which of the following about TCP connection is not correct? A It is a broadcast connection B It is a point-to-point connection C It is a pipelined connection

D It is a full duplex connection

19. The SYN segment is used for____. A TCP connection setup B TCP flow control

C TCP congestion control D Closing a TCP connection

20. The FIN segment is used for____. A TCP connection setup B TCP flow control

C TCP congestion control D Closing a TCP connection

21. How does TCP sender perceive congestion? A Through a timeout event

B Through a receiving duplicate ACK-s event C Both A and B D Either A or B

22. Extending host-to-host delivery to process-to-process delivery is called transport-layer ____ and . A multiplexing and de-multiplexing B storing and forwarding C forwarding and filtering D switching and routing

23. UDP is a ____ service while TCP is a connection-oriented service. A Connectionless B Reliable

C Connection-oriented D In-order

24. The UDP header has only four fields, they are____.

A Source port number, destination port number, length and checksum

B Source port number, destination port number, source IP and destination IP C source IP, destination IP, source MAC address and destination MAC address D source IP, destination IP, sequence number and ACK sequence number

25. There are two 16-bit integers: 1110 0110 0110 0110, 1101 0101 0101 0101. Their checksum is____. A 0100010001000011 B 1011101110111100 C 1111111111111111 D 1000000000000000

26. The maximum amount of data that can be grabbed and placed in a segment is limited by the____.

A Maximum segment size (MSS) B MTU

C Checksum

D Sequence number

27. The MSS is typically set by first determining the length of the largest link-layer frame that can be sent by the local sending host----the so-called____. A Maximum transmission unit (MTU) B MSS

C Checksum

D Sequence number

28. A File size of 500,000bytes, MSS equals 1000bytes. When we want to transmit this file with TCP, the sequence number of the first segment is 0, and the sequence number of the second segment is ____. A 1000 B 999 C 1001 D 500000

29. Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP is said to provide____.

A Cumulative acknowledgements B Selective acknowledgements C 3 duplicate ACKs D positive ACKs

30. Provided α=0.125, current value of Estimated-RTT is 0.4s, Sample-RTT is 0.8s, then the new value of Estimated-RTT is ____s. A 0.45 B 0.6 C 0.7 D 0.8

31. Provided RcvBuffer=20,LastByteRcvd=20,LastByteRead=15, then RcvWindow=____. A 14 B 15 C 16 D 10

32. TCP service does not provide____.

A Reliable data transfer B Flow control

C Delay guarantee D Congestion control 33. There are two states in TCP congestion control, which are ____. A slow start and congestion avoidance B safe start and congestion avoidance C slow start and congestion abandon D safe start and congestion abandon

34. The transport-layer protocol provides logical communication between ____, and the network-layer protocol provides logical communication ____. A hosts, processes B processes, hosts

C threads, processes

D processes, threads

35. To implement the multicast services the Internet employs the ____ protocol. A FTP B TCP C IGMP D UDP

36. If an application developer chooses ____ protocol, then the application process is almost directly talking with IP. A HTTP B RIP

C CSMA/CD D UDP

37. ____ maintains connection-state in the end systems. This connection state includes receive and send buffers, congestion-control parameters, and sequence and acknowledgment number parameters. A UDP B TCP C DNS D HTTP

38. The host that initiates the session in the Internet is labeled as ____. A server B user agent C client D router

39. With TCP there is no _____ between sending and receiving transport-layer entities.

A flow control B handshaking C. congestion control D VC setup

40. The Internet’s ____ service helps prevent the Internet from entering a state of gridlock.

A datagram B congestion control C sliding window D timeout event

41. Connection setup at the transport layer involves ____. A server B only the two end systems C client D router

42. A ____layer protocol provides for logical communication between applications. A transport B application C networking D MAC

43. In static congestion window, if it satisfies W*S/R > RTT + S/R, the Latency is ____.

A W*S/R – ( RTT+ S/R) B 2RTT + O/R

C 2RTT + O/R + (k-1)[W* S/R- (RTT + S/R)] D 2RTT + S/R

44. The receive side of transport layer reassembles segments into messages, passes to ____layer. A Application B Networking C Physical D MAC

45. In the following four options, which one is correct?


计算机网络英文题库(附答案)chapter3.doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:2011年广州七月建材展最新参展商名录

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: