大连交通大学计算机网络,计算机网络题库(大连交通大学)chapter.doc

a7f4a3f590493a1e451dd952a488fd7c.gif 计算机网络题库(大连交通大学)chapter.doc

(16页)

3f49621fa1339aaf9fd9599ee4ea7985.gif

本资源提供全文预览,点击全文预览即可全文预览,如果喜欢文档就下载吧,查找使用更方便哦!

9.90 积分

Chapter 3 Transport Layer1. A transport-layer protocol provides for logical communication between ____.A Application processesB HostsC RoutersD End systems2. Transport-layer protocols run in ____.A ServersBClientsCRoutersDEnd systems3. In transport layer, the send side breaks application messages into ____, passes to network layer.b5E2RGbCAPA FramesB SegmentsC Data-grams D bit streams4. Services provided by transport layer include ____.p1EanqFDPwA HTTP and FTPB TCP and IPC TCP and UDPD SMTP5. Which of the following services is not provided by TCP? DXDiTa9E3dA Delay guarantees and bandwidth guaranteesB Reliable data transfers and flow controlsC Congestion controlsD In-order data transfers6. These two minimal transport-layer services----____ and ____----are the only two services that UDP provides! RTCrpUDGiTA process-to-process data delivery, error checkingB congestion control, reliable data transferC flow control, congestion controlD In-order data transfer, error checking7. Port number’s scope is ____ to ____. A 0, 1023B 0, 65535C 0, 127D 0,2558. The port numbers ranging from ____to ____ are called well-known port number and are restricted.5PCzVD7HxAA 0, 1023B 0, 65535C 0, 127D 0,2559. UDP socket identified by two components, they are____.jLBHrnAILgA source IP addresses and source port numbersB source IP addresses and destination IP addressesC destination IP address and destination port numbersxHAQX74J0XD destination port numbers and source port numbers10. TCP socket identified by a (an> ____. A 1-tupleB 2-tupleC 3-tupleD 4-tuple11. Which of the following applications normally uses UDP services? LDAYtRyKfEA SMTPB Streaming multimediaC FTPD HTTP18. Which of the following about TCP connection is not correct? Zzz6ZB2LtkA It is a broadcast connectionB It is a point-to-point connectionC It is a pipelined connectionD It is a full duplex connection19. The SYN segment is used for____. A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection20. The FIN segment is used for____.A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection21. How does TCP sender perceive congestion? A Through a timeout eventB Through a receiving duplicate ACK-s eventC Both A and BD Either A or B22. Extending host-to-host delivery to process-to-process delivery is called transport-layer____ and . dvzfvkwMI1A multiplexing and de-multiplexingB storing and forwardingC forwarding and filteringD switching and routing23. UDP is a ____ service while TCP is a connection-oriented service. rqyn14ZNXIA ConnectionlessB ReliableC Connection-orientedD In-order24. The UDP header has only four fields, they are____. EmxvxOtOcoA Source port number, destination port number, length and checksumSixE2yXPq5B Source port number, destination po。省略部分。 of windows K=O/ WS>, and there is K-1 stalled state (that is idle time gaps>. Ywuu4FszRT2.Consider the following plot of TCP congestion window size as a function of time.cstDApWA6A14180263000264810121620222402832Congestion window sizeTransmission round481216qotL69pBkhFill in the blanks as follow:a) The initial value of Threshold at the first transmission round is ____.EksTCSTCzXb) The value of Threshold at the 11st transmission round is ____.Sgs28CnDOEc) The value of Threshold at the 21st transmission round is ____.6craEmRE2kd) After the 9th transmission round, segment loss detected by ____.k8qia6lFh1(A) Timeout (B) Triple duplicate ACKe) After the 19th transmission round, segment loss detected by ____.y3qrGQOGwI(A) Timeout (B) Triple duplicate ACKf) During ____ transmission round, the 18th segment is sent. MZpzcAiHKo3.Consider the TCP reliable data transfer in the given graph. If in Segment 1’s Sequence number =10,data=“AC”, please fill in the following blanks.0VoHIjMIZ5a) In Segment 2, ACK number=____。b) In Segment 3, Sequence number =____。 data=“0123456789”dRoQe3gJeMc) If there are some bits corrupted in segment 3 when it arrives Host B, then the ACK number in Segment 5 is ____。 and the ACK number in Segment 6 is ____.rNnYJNKKts 1 3 4 6 2 5 74. The client A wants to request a Web page from Server B. Suppose the URL of the page is 172.16.0.200/experiment, and also it wants to receive French version of object. The time-sequence diagram is shown below, please fill in the blanks. FJn6fxdLH912345Packet① to Packet③ are TCP connection’s segment, then:TFmfLhHMWPPacket ①: SYN flag bit= a ACK flag bit= b Sequence number= 92Packet ②: SYN flag bit=1 ACK flag bit= c Sequence number=100Packet ③: SYN flag bit= d ACK flag bit=1 Sequence number= e 5. Consider sending an object of size O=100 Kbytes from server to client. Let S=536 bytes and RTT=100msec. Suppose the transport protocol uses static windows with window size W. 7Blnh0bNbw(1> For a transmission rate of 25 kbps, determine the minimum possible latency. Determine the minimum window size that achieves this latency. lxlvNKFOpd(2> Repeat (1> for 100 kbps.6. Consider the following plot of TCP congestion window size as a function of time. Please fill in the blanks as below.ztkEju9PET14182630026481012162022242832Congestion window sizeTransmission round481216NpjMPeCQTAa> The initial value of Threshold at the first transmission round is____.1ljUlY6R8hb> The value of Threshold at the 11th transmission round is_____.fhi3RIASmXc> The value of Threshold at the 21st transmission round is_____.scibnr4TBEd> After the 9th transmission round, _____ occurs.G8hjTbyUQke> After the 19th transmission round, ____ are detected.U4gspV1V41申明:所有资料为本人收集整理,仅限个人学习使用,勿做商业用途。16 / 16 关 键 词: chapter 交通大学 题库 大连 计算机网络

4d91c43bfc72ca913299809b07b4968f.gif  天天文库所有资源均是用户自行上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作他用。

关于本文

  • 2
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值