0% found this document useful (0 votes)
37 views4 pages

Sheet 3-Transport Layer

Uploaded by

wmostafa392
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views4 pages

Sheet 3-Transport Layer

Uploaded by

wmostafa392
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Misr International University

Faculty of Computer Science


CSC355 Computer Networks I

Sheet (3)
Transport Layer

Q1) Choose the correct answer

1. Transport layer provides which of the following service


a. END TO END
b. Process to process
c. None of the above
d. Both a and b

2. In transport layer the sender side is responsible for


a. reassembles segments into messages, passes to app layer
b. breaks app messages into segments, passes to network layer
c. Routing the packets to the correct destination
d. None of the above

3. The internet uses the following transport layer protocols


a. TCP
b. UDP
c. TCP AND UDP
d. TCP AND UDP AND HTTP

4. The handling of data from multiple sockets, add transport header occurs at
a. multiplexing at sender
b. demultiplexing at receiver
c. Both a and b
d. None of the above

5. Host uses _____ to direct segment to appropriate socket


a. IP address and Mac address
b. Port address and mac address
c. IP address and port address
d. Mac address and Port address

6. non-persistent HTTP will have ____ socket for each request


a. Same
b. Different

Page 1 | 4
Fall 2020
Misr International University
Faculty of Computer Science
CSC355 Computer Networks I

7. Mention 3 reasons on why we use UDP

8. The goal of the UDP Checksum is to


a. Detect errors
b. Correct errors
c. Detect and correct errors
d. None of the above

9. UDP Checksum uses _____ to deal with errors


a. 2s complement
b. 1s complement
c. Both a and b are correct
d. None of the above

10.RDT 1.0 uses ____ between sender and receiver to transfer data

a. Same FSM
b. Separate FSM
c. Both a and b
d. None of the above

11.The RDT version which introduced checksum for error detection is


a. RDT 1.0
b. RDT 2.0
c. RDT 3.0
d. RDT 2.1

12.The RDT version which introduced that, The sender waits “reasonable”
amount of time for ACK retransmits if no ACK received in this time
a. RDT 1.0
b. RDT 2.0
c. RDT 3.0
d. RDT 2.1

13. In Pipelined protocols the GO-back n approach receiver sends


a. cumulative ack
b. individual ack
c. No ack
d. A and B

Page 2 | 4
Fall 2020
Misr International University
Faculty of Computer Science
CSC355 Computer Networks I

14. In Pipelined protocols the Selective Repeat approach, The sender


maintains timer for each unacked packet
a. When timer expires, retransmit all unacked packets
b. When timer expires, retransmit only that unacked packet
c. No retransmission occurs
d. A and B

15.Which of the following functionalities must be implemented by a transport


protocol over and above the network protocol?
a. Recovery from packet losses
b. Detection of duplicate packets
c. Packet delivery in the correct order
d. End to end connectivity

16.Which of the following is NOT true about User Datagram Protocol in


transport layer?
a. Works well in unidirectional communication, suitable for broadcast
information.
b. It does three way handshake before sending datagrams
c. It provides datagrams, suitable for modeling other protocols such as
in IP tunneling or Remote Procedure Call and the Network File
System
d. The lack of retransmission delays makes it suitable for real-time
applications

17.Suppose you are browsing the world wide web using a web browser and
trying to access the web servers. What is the underlying protocol and port
number that are being used?
a. UDP, 80
b. TCP, 80
c. TCP, 25
d. UDP, 25

Q2) True or False


1. Transport services and protocols provide logical communication between hosts.
2. Suppose Client A initiates a Telnet session with Server S. At about the same time, Client
B also initiates a Telnet session with Server S. If A and B are different hosts, is it
permissible that the source port number in the segments from A to S is the same as
that from B to S.
3. Both UDP and TCP require that the applications recognize their own data formats.
4. A TCP transmitter normally interprets three duplicate ACKs to mean that, while data
packets have been received out of order, all data is successfully being delivered.

Page 3 | 4
Fall 2020
Misr International University
Faculty of Computer Science
CSC355 Computer Networks I

5. A transport protocol can be either connection oriented, such as UDP, or connectionless,


such as TCP.
6. There is not a need for connection establishment and termination procedures to
support connection-oriented service with a reliable network service.
7. Connection establishment in TCP always uses a three-way handshake.
8. At the sender side, transport layer aggregates data from different applications into a
single stream before passing it to network layer
9. TCP groups a number of bytes together into a packet called packet.

Page 4 | 4
Fall 2020

You might also like