You are on page 1of 8

Chapter -3 Prep

### Transport-Layer Services (3.1):

1. **Question: What is the primary function of transport-layer services? **


- A. Logical communication within a host
- B. Logical communication between app processes on different hosts
- C. Logical communication between network layers
- D. Logical communication between routers

**Answer: B. Logical communication between app processes on different hosts**

2. **Question: In the transport layer, what is responsible for breaking app messages into
segments? **
- A. Network layer
- B. Sender
- C. Receiver
- D. Application layer

**Answer: B. Sender**

3. **Question: Which transport protocols are commonly used in the Internet?**


- A. FTP and SMTP
- B. TCP and UDP
- C. HTTP and DNS
- D. ICMP and IP

**Answer: B. TCP and UDP**

### Multiplexing and Demultiplexing (3.2):

4. **Question: What is the role of the transport protocol in the analogy of "Kids in houses
sending letters"?**
- A. Houses (computers)
- B. Kids (processes)
- C. App messages (letters)
- D. Transport protocol

**Answer: D. Transport protocol**

5. **Question: What does demultiplexing involve in the transport layer?**


- A. Combining segments into messages
- B. Directing segments to the appropriate socket
- C. Logical communication between hosts
- D. Breaking app messages into segments

**Answer: B. Directing segments to the appropriate socket**

6. **Question: In connection-oriented demux, what identifies a TCP socket?**


- A. IP address only
- B. Port number only
- C. 4-tuple: Source IP, Source port, Destination IP, Destination port
- D. Sequence number

**Answer: C. 4-tuple: Source IP, Source port, Destination IP, Destination port**

### Connectionless Transport: UDP (3.3):

7. **Question: What is a characteristic of UDP?**


- A. Reliable, in-order delivery
- B. Connection-oriented with handshaking
- C. Best effort service with no handshaking
- D. Provides delay guarantees

**Answer: C. Best effort service with no handshaking**

8. **Question: Which application is suitable for UDP?**


- A. File transfer
- B. Video streaming
- C. Email communication
- D. Database access

**Answer: B. Video streaming**

### UDP Checksum (3.3):

9. **Question: What is the goal of the UDP checksum?**


- A. Encrypt transmitted segments
- B. Detect errors in transmitted segments
- C. Fragment large segments
- D. Provide flow control

**Answer: B. Detect errors in transmitted segments**

10. **Question: How does the receiver check the UDP checksum?**
- A. Compares it with the source IP address
- B. Compares it with the sequence number
- C. Computes the checksum of received segment and compares
- D. Ignores the checksum

**Answer: C. Computes the checksum of received segment and compares**

Connectionless Transport: UDP (3.3)" and "Principles of Reliable Data Transfer (3.4)":

### Connectionless Transport: UDP (3.3):

1. **Question: What does UDP stand for?**


- A. Universal Datagram Protocol
- B. User Datagram Protocol
- C. Unified Data Processing
- D. Unicast Delivery Protocol

**Answer: B. User Datagram Protocol**

2. **Question: In which scenario is UDP commonly used due to its "best effort" service? **
- A. Reliable file transfer
- B. Video streaming
- C. Email communication
- D. Database synchronization

**Answer: B. Video streaming**

3. **Question: What is a key characteristic of UDP? **


- A. Ordered delivery of segments
- B. Connection setup before data transfer
- C. Error detection in transmitted segments
- D. Flow control mechanisms

**Answer: C. Error detection in transmitted segments**

4. **Question: Why is UDP suitable for streaming multimedia applications? **


- A. Provides delay guarantees
- B. Ensures in-order delivery of segments
- C. Tolerant to loss and rate-sensitive
- D. Implements reliable handshaking

**Answer: C. Tolerant to loss and rate-sensitive**

5. **Question: What is the main advantage of UDP over TCP in certain applications? **
- A. Higher reliability
- B. Lower overhead
- C. Connection-oriented communication
- D. Flow control mechanisms

**Answer: B. Lower overhead**

### Principles of Reliable Data Transfer (3.4):

6. **Question: What determines the complexity of the Reliable Data Transfer (RDT) protocol?
**
- A. The number of hosts in the network
- B. Characteristics of the unreliable channel
- C. The type of application using RDT
- D. The geographic distance between hosts

**Answer: B. Characteristics of the unreliable channel**

7. **Question: What is a feature of rdt2.0 compared to rdt1.0?**


- A. Error detection
- B. Feedback using control messages
- C. Connection setup
- D. Reliable transfer over an unreliable channel

**Answer: A. Error detection**

8. **Question: In rdt2.2, what is used instead of NAK for error recovery? **


- A. Timeout events
- B. Duplicate ACKs
- C. Fast retransmit
- D. Connection setup

**Answer: B. Duplicate ACKs**

9. **Question: What does rdt3.0 assume about the underlying channel?**


- A. No bit errors
- B. No loss of packets
- C. Can also lose packets
- D. Connection-oriented communication

**Answer: C. Can also lose packets**

10. **Question: What is the main drawback of the Rdt3.0 protocol in terms of performance?
**
- A. Low reliability
- B. High complexity
- C. Low throughput
- D. Limited scalability

**Answer: C. Low throughput**


Certainly! Here are 5 multiple-choice questions (MCQs) with answers for each of the topics
"Connection-Oriented Transport: TCP (3.5)," "Principles of Congestion Control (3.6)," and "TCP
Congestion Control (3.7)":

### Connection-Oriented Transport: TCP (3.5):

1. **Question: What does TCP stand for in networking?**


- A. Time Control Protocol
- B. Transmission Control Protocol
- C. Total Connectivity Protocol
- D. Transport Configuration Protocol

**Answer: B. Transmission Control Protocol**

2. **Question: Which feature ensures reliable data transfer in TCP?**


- A. Best-effort service
- B. Pipelining of segments
- C. Cumulative ACKs
- D. No-handshaking approach

**Answer: C. Cumulative ACKs**

3. **Question: What is the purpose of the TCP window size in flow control?**
- A. To set up a connection
- B. To define the segment structure
- C. To limit the amount of unacknowledged data
- D. To identify the source and destination ports

**Answer: C. To limit the amount of unacknowledged data**


4. **Question: How does TCP handle out-of-order segments at the receiver?**
- A. Drops the out-of-order segments
- B. Buffers the out-of-order segments
- C. Sends duplicate ACKs for out-of-order segments
- D. Requests retransmission for out-of-order segments

**Answer: B. Buffers the out-of-order segments**


5. **Question: What is the purpose of the 3-way handshake in TCP connection establishment?
**
- A. To synchronize sequence numbers
- B. To acknowledge received data
- C. To close the connection
- D. To detect congestion

**Answer: A. To synchronize sequence numbers**

### Principles of Congestion Control (3.6):

6. **Question: How is congestion informally defined in networking? **


- A. High data transfer rates
- B. Low latency
- C. Too many sources sending too much data too fast
- D. Reliable data transfer

**Answer: C. Too many sources sending too much data too fast**

7. **Question: What are the manifestations of congestion in a network?**


- A. Low delays
- B. High packet loss
- C. Stable performance
- D. Error-free transmission

**Answer: B. High packet loss**

8. **Question: How is congestion different from flow control in networking?**


- A. Congestion is caused by unreliable channels
- B. Flow control manages the rate of data transmission
- C. Congestion ensures in-order delivery of segments
- D. Flow control is related to the transport layer

**Answer: B. Flow control manages the rate of data transmission**

9. **Question: What is one of the causes of congestion in a network?**


- A. Low traffic
- B. Short propagation delay
- C. Large buffer sizes
- D. High traffic load

**Answer: D. High traffic load**

10. **Question: Why is congestion considered a top-10 networking problem?**


- A. It is easy to detect and resolve
- B. It does not affect performance
- C. It leads to long delays and packet loss
- D. It is unrelated to network efficiency

**Answer: C. It leads to long delays and packet loss**

### TCP Congestion Control (3.7):

11. **Question: What is the initial value of cwnd in TCP's slow start phase?**
- A. 1 MSS (Maximum Segment Size)
- B. 2 MSS
- C. 3 MSS
- D. 0 MSS

**Answer: A. 1 MSS (Maximum Segment Size)**

12. **Question: In TCP, when does the exponential increase switch to linear increase?**
- A. When cwnd ≥ ssthresh
- B. When cwnd < ssthresh
- C. During slow start
- D. After congestion avoidance

**Answer: A. When cwnd ≥ ssthresh**

13. **Question: What does TCP use for congestion avoidance after a loss event?**
- A. Additive increase
- B. Multiplicative decrease
- C. Fast retransmit
- D. Exponential decrease

**Answer: A. Additive increase**

14. **Question: How is the TCP timeout interval set in practice?**


- A. Shorter than RTT
- B. Longer than RTT
- C. Equal to RTT
- D. Dependent on the packet size

**Answer: B. Longer than RTT**

15. **Question: What does TCP throughput depend on in theory and practice? **
- A. Window size and RTT (Round-Trip Time)
- B. Number of segments sent
- C. Type of application
- D. Size of the receiver buffer

**Answer: A. Window size and RTT (Round-Trip Time)**

You might also like