Transmission control protocol is
a) connection oriented protocol
b) uses a three way handshake to establish a connection
c) recievs data from application as a single stream
d) all of the mentioned

1 Answer

Answer :

d) all of the mentioned

Related questions

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Transmission control protocol ___________ a) is a connection-oriented protocol b) is a connectionless protocol c) is a protocol working on application layer d) all of the mentioned

Last Answer : a) is a connection-oriented protoco

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : Which of the following is a transport layer protocol? a. stream control transmission protocol b. internet control message protocol c. neighbor discovery protocol d. dynamic host configuration protocol

Last Answer : a. stream control transmission protocol

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which of the following is a transport layer protocol? A. stream control transmission protocol B. internet control message protocol C. neighbor discovery protocol D. dynamic host configuration protocol

Last Answer : A. stream control transmission protocol

Description : Explain how TCP connections are established using the 3 way handshake. What happens when 2 hosts simultaneously try to establish a connection?

Last Answer : If 2 host Simultaneously try to establish connection: Simultaneous Open: * It's possible for two applications to send a SYN to each other to start a TCP connection, although the possibility is small, ... . * The CLOSING state takes the place of FIN-WAIT-2 or CLOSEWAIT in a common scenario.

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : The types of data services offered by an LLC (Logical Link Control) layer are a. Connectionless which is fast and unreliable b. Connection Oriented which is slow and reliable c. Both A and B d. None

Last Answer : c. Both A and B

Description : The term ________ means that IP provides no error checking or tracking. IP assumes the unreliabilityof the underlying layers and does its best to get a transmission throughto its destination,but with ... ) reliable delivery B) connection-oriented delivery C) best-effort delivery D) noneof the above

Last Answer : best-effort delivery

Description : Which of the following statement is incorrect? a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line b. HDLC is a standard ... indicates that it is ready to accept data d. RTS/CTS is the way the terminal indicates ringing

Last Answer : RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer

Last Answer : a. network layer

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer

Last Answer : a. network layer

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ A. network layer B. data link layer C. application layer D. physical layer

Last Answer : A. network layer

Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500

Last Answer : a. 2500

Description : What are the functions of the transport layer? a. Multiplexing/ Demultiplexing b. Connection less Services c. Connection oriented service d. Congestion control

Last Answer : a. Multiplexing/ Demultiplexing

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned

Last Answer : d.all of the mentioned

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : When displaying a web page, the application layer uses the _____________ A. HTTP protocol B. FTP protocol C. SMTP protocol D. TCP protocol

Last Answer : A. HTTP protocol

Description : Electronic mail uses which Application layer protocol? A. SMTP B. HTTP C. FTP D. SIP

Last Answer : A. SMTP

Description : The most common protocol for point-to-pointaccess is the Point-to-Point Protocol (PPP), which is a _________protocol. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : byte-oriented

Description : Explain the TCP connection establishment using a three way handshake mechanism.

Last Answer : Connection Establishment TCP uses a Three way handshaking mechanism to establish a connection between client and server machines. The three steps in three way handshaking mechanism are as follows.  SYN: ... This is just an ACK segment. It guarantees the completion of three way handshaking.

Description : DTP computer abbreviation usually means ? DeskTop Publishing Data Type Programming Digital Transmission Protocol None Of above

Last Answer : Data Type Programming

Description : The information tobe communicated ina data communications system is the_______. A) Medium B) Protocol C) Message D) Transmission

Last Answer : Message

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : the maximum window size for data transmission using the selective reject protocol with n-bit frame sequence numbers is: a. 2^n b. 2^(n-1) c. 2^n – 1 d. 2^(n-2)

Last Answer : b. 2^(n-1)

Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B

Last Answer : a. A & B

Description : What are the problems involved in an IP Fragmentation Process? A. Loss of any fragment results in rejection of all datagrams B. Management of buffer space is essential to handle reassembly process C. No necessity of initializing ... -oriented IP service a. A & B b. C & D c. B& C d. A & D

Last Answer : a. A & B

Description : . ________ is the process in which the receiver tries to guess the message by using redundant bits A. Connection-Oriented Service B. Forward error correction C. both a and b D. Confirm

Last Answer : B. Forward error correction

Description : State whether true or false. i) A connection oriented protocol can only use unicast addresses. ii) The anycast service is included in IPV6. A) True, True B) True, False

Last Answer : i) A connection oriented protocol can only use unicast addresses.

Description : State whether true or false. i) A connection oriented protocol can only use unicast addresses. ii) The any cast service is included in IPV6. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : UDP is a (1) connection oriented protocol (2) connectionless protocol (3) userdefined protocol (4) security protocol 

Last Answer : connectionless protocol

Description : Explain connectionless and connection oriented protocol. Give the example for each type.

Last Answer : Connection less protocol: These protocols do not establish a connection between devices. It is manually achieved by transmitting information in one direction, from source to destination without checking to ... SMTP establish a TCP connection between Sender And port number 25 of receiver

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Which of the following is a data link protocol? a. ethernet b. point to point protocol c. hdlc d. all of the mentioned

Last Answer : d. all of the mentioned

Description : In indication signal for a handshake form the DCE to the DTE in response to an active condition for the request to send a signal. A. Data transmission B. Clear to send C. Receive data D. Data set ready

Last Answer : B. Clear to send

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ? a. Session Maintenance Protocol b. Real - time Streaming Protocol c. Real - time Transport Control Protocol d. Session Initiation Protocol

Last Answer : d. Session Initiation Protocol

Description : Which application-level protocol plays a crucial role in carrying out the data definition and manipulation in addition to X-500 features? a. TCP b. LDAP c. FTP d. None of the above

Last Answer : b. LDAP

Description : The protocol data unit (PDU) for the application layer in the Internet stack is? a. Datagram b. Frame c. Message d. Segment

Last Answer : c. Message

Description : The protocol data unit(PDU) for the application layer in the Internet stack is (A) Segment (B) Datagram (C) Message/Data (D) Frame

Last Answer : (C) Message/Data