Deck 10: TCP and Application Layer Protocols

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is false with respect to TCP?

A)connection-oriented
B)process-to-process
C)transport layer protocol
D)unreliable
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
TCP groups a number of bytes together into a packet called                

A)packet
B)buffer
C)segment
D)stack
سؤال
The value of acknowledgement field in a segment defines                

A)sequence number of the byte received previously
B)total number of bytes to receive
C)sequence number of the next byte to be received
D)sequence of zeros and ones
سؤال
Two broad categories of congestion control are

A)open-loop and closed-loop
B)open-control and closed-control
C)active control and passive control
D)active loop and passive loop
سؤال
Retransmission of packets must not be done when                

A)packet is lost
B)packet is corrupted
C)packet is needed
D)packet is error-free
سؤال
In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends                        

A)packet which are not lost
B)only those packets which are lost or corrupted
C)packet from starting
D)all the packets
سؤال
Closed-Loop control mechanisms try to

A)remove after congestion occurs
B)remove after sometime
C)prevent before congestion occurs
D)prevent before sending packets
سؤال
The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as                

A)admission policy
B)backpressure
C)forward signaling
D)backward signaling
سؤال
The packet sent by a node to the source to inform it of congestion is called                

A)explicit
B)discard
C)choke
D)backpressure
سؤال
In the slow-start algorithm, the size of the congestion window increases------------ until it reaches a threshold.

A)exponentially
B)additively
C)multiplicatively
D)suddenly
سؤال
The packet of information at the application layer is called                      

A)packet
B)message
C)segment
D)frame
سؤال
Which one of the following is an architecture paradigms?

A)peer to peer
B)client-server
C)http
D)both peer-to-peer & client-server
سؤال
Application layer offers --------------  service.

A)end to end
B)process to process
C)both end to end and process to process
D)none of the mentioned
سؤال
E-mail is                    

A)loss-tolerant application
B)bandwidth-sensitive application
C)elastic application
D)none of the mentioned
سؤال
Pick the odd one out.

A)file transfer
B)file download
C)e-mail
D)interactive games
سؤال
Which of the following is an application layer service?

A)network virtual terminal
B)file transfer, access, and management
C)mail service
D)all of the mentioned
سؤال
Which is a time-sensitive service?

A)file transfer
B)file download
C)e-mail
D)internet telephony
سؤال
Transport services available to applications in one or another form

A)reliable data transfer
B)timing
C)security
D)all of the mentioned
سؤال
Electronic mail uses which Application layer protocol?

A)smtp
B)http
C)ftp
D)sip
سؤال
RMI stands for?

A)remote mail invocation
B)remote message invocation
C)remaining method invocation
D)remote method invocation
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: TCP and Application Layer Protocols
1
Which of the following is false with respect to TCP?

A)connection-oriented
B)process-to-process
C)transport layer protocol
D)unreliable
unreliable
2
TCP groups a number of bytes together into a packet called                

A)packet
B)buffer
C)segment
D)stack
segment
3
The value of acknowledgement field in a segment defines                

A)sequence number of the byte received previously
B)total number of bytes to receive
C)sequence number of the next byte to be received
D)sequence of zeros and ones
sequence number of the next byte to be received
4
Two broad categories of congestion control are

A)open-loop and closed-loop
B)open-control and closed-control
C)active control and passive control
D)active loop and passive loop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
Retransmission of packets must not be done when                

A)packet is lost
B)packet is corrupted
C)packet is needed
D)packet is error-free
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends                        

A)packet which are not lost
B)only those packets which are lost or corrupted
C)packet from starting
D)all the packets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
Closed-Loop control mechanisms try to

A)remove after congestion occurs
B)remove after sometime
C)prevent before congestion occurs
D)prevent before sending packets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as                

A)admission policy
B)backpressure
C)forward signaling
D)backward signaling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
The packet sent by a node to the source to inform it of congestion is called                

A)explicit
B)discard
C)choke
D)backpressure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
In the slow-start algorithm, the size of the congestion window increases------------ until it reaches a threshold.

A)exponentially
B)additively
C)multiplicatively
D)suddenly
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
The packet of information at the application layer is called                      

A)packet
B)message
C)segment
D)frame
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which one of the following is an architecture paradigms?

A)peer to peer
B)client-server
C)http
D)both peer-to-peer & client-server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
Application layer offers --------------  service.

A)end to end
B)process to process
C)both end to end and process to process
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
E-mail is                    

A)loss-tolerant application
B)bandwidth-sensitive application
C)elastic application
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
Pick the odd one out.

A)file transfer
B)file download
C)e-mail
D)interactive games
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is an application layer service?

A)network virtual terminal
B)file transfer, access, and management
C)mail service
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which is a time-sensitive service?

A)file transfer
B)file download
C)e-mail
D)internet telephony
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
Transport services available to applications in one or another form

A)reliable data transfer
B)timing
C)security
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
Electronic mail uses which Application layer protocol?

A)smtp
B)http
C)ftp
D)sip
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
RMI stands for?

A)remote mail invocation
B)remote message invocation
C)remaining method invocation
D)remote method invocation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.