What are the functions of the transport
layer?
a. Multiplexing/ Demultiplexing
b. Connection less Services
c. Connection oriented service
d. Congestion control

1 Answer

Answer :

a. Multiplexing/ Demultiplexing

Related questions

Description : Which services are provided by transport layer? a. Error control b. Connection service c. Connection less service d. Congestion control

Last Answer : a. Error control

Description : The types of data services offered by an LLC (Logical Link Control) layer are a. Connectionless which is fast and unreliable b. Connection Oriented which is slow and reliable c. Both A and B d. None

Last Answer : c. Both A and B

Description : The receive GCE system in an earth station performs what function(s)? A. Modulation and multiplexing B. Up conversion C. Demodulation and demultiplexing D. Down conversion

Last Answer : C. Demodulation and demultiplexing

Description : Transmission control protocol ___________ a) is a connection-oriented protocol b) is a connectionless protocol c) is a protocol working on application layer d) all of the mentioned

Last Answer : a) is a connection-oriented protoco

Description : Services provided by application layer? A. Web chat B. Error control C. Connection services D. Congestion control

Last Answer : A. Web chat 

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive

Last Answer : c. Congestive collapse

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm

Last Answer : a. Flow Control Policy

Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro

Last Answer : d. error control

Description : Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control

Last Answer : d) error control

Description : The functions of a Logical Link Layer (LLC) are a. Error control b. Flow control c. Creating and managing the communication link between two devices with the help of the Transport layer. d. All the above

Last Answer : d. All the above

Description : The functions of a Logical Link Layer (LLC) are ___. A. Error control B. Flow control C. Creating and managing the communication link between two devices with the help of the Transport layer. D. All the above

Last Answer : D. All the above

Description : What are the problems involved in an IP Fragmentation Process? A. Loss of any fragment results in rejection of all datagrams B. Management of buffer space is essential to handle reassembly process C. No necessity of initializing ... -oriented IP service a. A & B b. C & D c. B& C d. A & D

Last Answer : a. A & B

Description : . ________ is the process in which the receiver tries to guess the message by using redundant bits A. Connection-Oriented Service B. Forward error correction C. both a and b D. Confirm

Last Answer : B. Forward error correction

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Transmission control protocol is a) connection oriented protocol b) uses a three way handshake to establish a connection c) recievs data from application as a single stream d) all of the mentioned

Last Answer : d) all of the mentioned

Description : Security based connection is provided by which layer? a. Network layer b. Session layer c. Application layer d. Transport layer

Last Answer : d. Transport layer

Description : In ATM, the ______ layerprovides routing, traffic management, switching, and multiplexing services. A) physical B) ATM C) AAL D) none of the above

Last Answer : ATM

Description : The routing processor of arouter performs the ________ layer functions of therouter. A) physical and data link B) network C) transport D) none of the above

Last Answer : network

Description : The inputand output portsof a router perform the ________ layer functions of therouter. A) physical and data link B) network C) transport D) none of the above

Last Answer : physical and data link

Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation

Last Answer : d. presentation

Description : The term ________ means that IP provides no error checking or tracking. IP assumes the unreliabilityof the underlying layers and does its best to get a transmission throughto its destination,but with ... ) reliable delivery B) connection-oriented delivery C) best-effort delivery D) noneof the above

Last Answer : best-effort delivery

Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B

Last Answer : a. A & B

Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially

Last Answer : d. increases exponentially

Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol

Last Answer : d. routing information protocol

Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets

Last Answer : C. Prevent before congestion occurs

Description : Explain about congestion control

Last Answer : Congestion avoidance ∙ BECN ∙ FECN ∙ Four situations ∙ Discarding

Description : Define Congestion Control.

Last Answer : It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above

Last Answer : session layer

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ? a. Session Maintenance Protocol b. Real - time Streaming Protocol c. Real - time Transport Control Protocol d. Session Initiation Protocol

Last Answer : d. Session Initiation Protocol

Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity

Last Answer : b. Traffic control

Description : Which of the following is a transport layer protocol? a. stream control transmission protocol b. internet control message protocol c. neighbor discovery protocol d. dynamic host configuration protocol

Last Answer : a. stream control transmission protocol

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : The portion of physical layer that interfaces with the media access control sublayer is called ___________ a. physical signalling sublayer b. physical data sublayer c. physical address sublayer d. physical transport sublayer

Last Answer : a. physical signalling sublayer

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer

Last Answer : a. session layer

Description : Data Link Control Protocol (HDLC) is implemented at the ……… A. Data link layer B. Network layer C. transport layer D. Physical layer

Last Answer : A. receive sliding window.

Description : Which of the following is a transport layer protocol? A. stream control transmission protocol B. internet control message protocol C. neighbor discovery protocol D. dynamic host configuration protocol

Last Answer : A. stream control transmission protocol

Description : Which layer has access to particular network services, billing functions etc: a) Session Layer b) Presentation Layer c) Transport Layer d) None of These

Last Answer : a) Session Layer

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer

Last Answer : b. media access control sublayer

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer

Last Answer : B. media access control sublayer

Description : _______ is designed to be usedin wirelessapplications in which stations must be ableto sharethe medium without interception by an eavesdropperand without beingsubject tojamming from a malicious intruder. A) Spread spectrum B) Multiplexing C) Modulation D) None of the above

Last Answer : Spread spectrum

Description : _____ isa digital multiplexing technique for combiningseveral low-ratechannels into onehigh-rate one. A) FDM B) TDM C) WDM D) None of the above

Last Answer : TDM

Description : _____ isan analog multiplexing technique to combine optical signals. A) FDM B) TDM C) WDM D) None of the above

Last Answer : WDM

Description : ________is the set of techniques that allows the simultaneous transmission of multiple signalsacrossa single data link. A) Demodulating B) Multiplexing C) Compressing D) None of the above

Last Answer : Multiplexing

Description : ________ can beachievedbyusing multiplexing; ______ canbe achieved by using spreading. A) Efficiency; privacy and antijamming B) Privacyand antijamming;efficiency C) Privacyand efficiency; antijamming D) Efficiency and antijamming; privacy

Last Answer : Efficiency; privacy and antijammin