Data Communication and Networking – Process-to-Process Delivery: UDP, TCP, and SCTP MCQs
In this section of Data Communication and Networking – Process-to-Process Delivery: UDP, TCP, and SCTP MCQ (Multiple Choice) Based Questions and Answers,it cover the below lists of topics.All the Multiple Choice Questions and Answers (MCQs) have been compiled from the book of Data Communication and Networking by The well known author behrouz forouzan.
This Section covers below lists of topics.
- Average data rate, peak data rate, maximum burst size, and effective band-width MCQs.
- Congestion control MCQs.
- Open-loop congestion control MCQs.
- Quality of service (QoS), Scheduling, traffic shaping, resource reservation, and admission control techniques MCQs.
- Scheduling techniques ,FIFO queuing, priority queuing, and weighted fair queuing MCQs.
- traffic shaping techniques ,Leaky bucket and token bucket MCQs
- Resource Reservation Protocol (RSVP)- a signaling protocol MCQs
- Differential Services – a class-based QoS model MCQs
- Attributes to control traffic in Frame Relay,Access rate, committed burst size, committed information rate, and excess burst size MCQs
1. One of the responsibilities of the transport layer protocol is to create a ______ communication.
- host-to-host
- process-to-process
- node-to-node
- none of the above
2. UDP is called a ________________transport protocol.
- connectionless, reliable
- connection-oriented, unreliable
- connectionless, unreliable
- none of the above
3. UDP does not add anything to the services of IP except for providing _______ communication
- node-to-node
- process-to-process
- host-to-host
- none of the above
4. UDP is an acronym for _______
- User Delivery Protocol
- User Datagram Procedure
- User Datagram Protocol
- none of the above
5. Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm
- client-server
- client-client
- server-server
- none of the above
6. The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________
- UDP addresses
- transport addresses
- port addresses
- none of the above
7. The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports
- well-known
- registered
- dynamic
- none of the above
8. In the sending computer, UDP receives a data unit from the _______ layer.
- application
- transport
- IP
- none of the above
9. In the sending computer, UDP sends a data unit to the _______ layer
- application
- transport
- IP
- none of the above
10. UDP and TCP are both _______ layer protocols
- data link
- network
- transport
- none of the above
11. Which of the following functions does UDP perform?
- process-to-process communication
- host-to-host communication
- end-to-end reliable data delivery
- none of the above
12. When the IP layer of a receiving host receives a datagram, _______
- delivery is complete
- a transport layer protocol takes over
- a header is added
- none of the above
13. UDP needs the _______ address to deliver the user datagram to the correct application process
- port
- application
- internet
- none of the above
14. A port address in UDP is _______bits long.
- 8
- 16
- 32
- any of the above
15. Which of the following does UDP guarantee?
- flow control
- connection-oriented delivery
- flow control
- none of the above
16. The source port address on the UDP user datagram header defines _______
- the sending computer
- the receiving computer
- the process running on the sending computer
- none of the above
17. The combination of an IP address and a port number is called a ____________
- transport address
- network address
- socket address
- none of the above
18. To use the services of UDP, we need ________ socket addresses
- four
- two
- three
- none of the above
19. UDP packets are called __________
- user datagrams
- segments
- frames
- none of the above
20. UDP packets have a fixed-size header of _______ bytes
- 6
- 8
- 40
- none of the above
21. UDP packets are encapsulated in ___________
- an Ethernet frame
- an TCP segment
- an IP datagram
- none of the above
22. UDP uses ________ to handle outgoing user datagrams from multiple processes on one host
- flow control
- multiplexing
- demultiplexing
- none of the above
23. UDP uses _______ to handle incoming user datagrams that go to different processes on the same host.
- flow control
- multiplexing
- demultiplexing
- none of the above
24. TCP is a __________protocol
- stream-oriented
- message-oriented
- block-oriented
- none of the above
25. TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes
- message; message
- stream; stream
- block; block
- none of the above
26. Because the sending and the receiving processes may not write or read data at the same speed, TCP ________
- speeds up the slower process
- slows down the faster process
- uses buffers
- none of the above
27. TCP groups a number of bytes together into a packet called a ___________
- user datagram
- segment
- datagram
- none of the above
28. TCP is a ___________ protocol.
- connection-oriented
- connectionless
- both a and b
- none of the above
29. TCP is a(n) _______ transport protocol
- unreliable
- best-effort delivery
- reliable
- none of the above
30. TCP uses _________________ to check the safe and sound arrival of data.
- an acknowledgment mechanism
- out-of-band signalling
- the services of another protocol
- none of the above
31. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________
- 0
- 1
- randomly generated number
- none of the above
32. TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.
- first
- last
- middle
- none of the above
33. Communication in TCP is ___________
- simplex
- half-duplex
- full-duplex
- none of the above
34. The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive
- first
- last
- next
- none of the above
35. The acknowledgment number is ________
- independent
- randomly generated
- cumulative
- none of the above
36. The value of the window size is determined by _________
- the sender
- the receiver
- both the sender and receiver
- none of the above
37. The inclusion of the checksum in the TCP segment is ________
- optional
- mandatory
- at the discretion of the application program
- none of the above
38. A TCP segment is encapsulated in __________
- an IP datagram
- an Ethernet frame
- a UDP user datagram
- none of the above
39. Connection establishment in TCP is called __________ handshaking
- two-way
- four-way
- one-way
- none of the above
40. A SYN segment cannot carry data; it consumes _____ sequence number(s).
- no
- one
- two
- none of the above
41. A SYN + ACK segment cannot carry data; it consumes _____ sequence number(s).
- no
- three
- two
- none of the above
42. An ACK segment, if carrying no data, consumes ______ sequence number(s).
- no
- one
- two
- none of the above
43. The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.
- ACK flooding
- FIN flooding
- SYN flooding
- none of the above
44. The SYN flooding attack belongs to a group of security attacks known as a _____ attack
- denial of service
- replay
- man-in-the middle
- none of the above
45. The FIN segment consumes ____ sequence numbers if it does not carry data.
- two
- three
- no
- none of the above
46. The FIN + ACK segment consumes _____ sequence number(s) if it does not carry data
- two
- three
- one
- none of the above
47. In TCP, one end can stop sending data while still receiving data. This is called a ______.
- half-close
- half-open
- one-way termination
- none of the above
48. A(n) _________ machine is a machine that goes through a limited number of states.
- infinite state
- finite state
- both a and b
- none of the above
49. _____ control regulates the amount of data a source can send before receiving an acknowledgment from the destination.
- Error
- Flow
- Congestion
- none of the above
50. To accomplish flow control, TCP uses a ___________ window protocol
- limited-size
- sliding
- fixed-size
- none of the above
51. TCP sliding windows are __________ oriented
- packet
- segment
- byte
- none of the above
52. ACK segments consume _______ sequence number(s) and _______ acknowledged
- no; are not
- one; are not
- no; are
- none of the above
53. TCP delivers _______ out-of-order segments to the process
- all
- no
- some
- none of the above
54. IP is responsible for _______ communication while TCP is responsible for _______ communication
- host-to-host; process-to-process
- process-to-process; host-to-host
- process-to-process; network-to-network
- none of the above
55. If a segment carries data along with an acknowledgment, this is called _______
- backpacking
- piggybacking
- piggypacking
- none of the above
56. Multiply the header length field by _______ to find the total number of bytes in the TCP header
- 2
- 4
- 6
- none of the above
57. Urgent data requires the urgent pointer field as well as the URG bit in the _______ field
- control
- offset
- sequence number
- none of the above
58. The options field of the TCP header ranges from 0 to _______ bytes.
- 10
- 20
- 40
- none of the above
59. If the ACK value is 200, then byte _______ has been received successfully
- 199
- 200
- 201
- none of the above
60. Stream Control Transmission Protocol (SCTP) is a new _____________protocol.
- reliable, character-oriented
- reliable, message-oriented
- unreliable, message-oriented
- none of the above
61. SCTP allows __________ service in each association
- single stream
- multistream
- double stream
- none of the above
62. SCTP association allows _____________ for each end
- only one IP address
- multiple IP addresses
- only two IP address
- none of the above
63. In SCTP, a data chunk is numbered using ________
- a TSN
- an SI
- an SSN
- none of the above
64. To distinguish between different streams, SCTP uses ___________
- a TSN
- an SI
- an SSN
- none of the above
65. To distinguish between different data chunks belonging to the same stream, SCTP uses ___________
- TSNs
- SIs
- SSNs
- none of the above
66. TCP has ____________; SCTP has ____________
- packets; segments
- segments; packets
- segments; frames
- none of the above
67. The control information in SCTP is included in the ________
- header control field
- control chunks
- data chunks
- none of the above
68. An SCTP packet can carry __________
- only one data chunk
- several data chunks
- no data chunks
- none of the above
69. In SCTP, the acknowledgment number and window size are part of each ________
- data chunk
- control chunk
- a or b
- none of the above
70. There is no need for a header length field in SCTP because ________________
- there are no options in the general header
- the size of the header is fixed
- both a and b
- none of the above
71. The checksum in SCTP is ________ bits.
- 16
- 32
- 64
- none of the above
72. The association identifier in SCTP is __________________
- a unique verification tag
- a combination of logical and port addresses
- either a or b
- none of the above
73. In SCTP, control information and data information are carried in _______ chunks.
- the same chunk
- different chunks
- either a or b
- none of the above
74. In SCTP, acknowledgment numbers are used to acknowledge _____________
- both data chunks and control chunks
- only control chunks
- only data chunks
- none of the above
75. In an SCTP packet, control chunks come ___________ data chunks
- after
- before
- a or b
- none of the above
76. In SCTP, ___________ can be carried in a packet that carries an INIT chunk
- only data chunks
- only control chunks
- no other chunk
- none of the above
77. A connection in SCTP is called an ____________
- negotiation
- association
- transmission
- none of the above