This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Transport Layer”.
1. What are the functions of the transport layer?
a) Multiplexing/ Demultiplexing
b) Connection less Services
c) Connection oriented service
d) Congestion control
Explanation: Transport layer functions are:
–> Multiplexing / DE multiplexing : Normally the transport layer will create distinct network connection for each transport connection required by the session layer.
–> Fragmentation and Re assembly: The data accepted by the transport layer from the session layer is split up into smaller units if needed and then passed to the network layer.
2. Which services are provided by transport layer?
a) Error control
b) Connection service
c) Connection less service
d) Congestion control
Explanation: The transport layer also decides the type of service that should be provided to the session layer. The message may or may not be received in the order in which it was sent. The decision regarding the type of service to be provided is taken at the time when the connection is established.
3. TCP and UDP are called ________
a) Application protocols
b) Session protocols
c) Transport protocols
d) Network protocols
Explanation: Above the network layer, we find TCP and UDP, the two transport protocols. TCP is used for most of our human interactions with the web. UDP is also better suited for real-time data applications such as voice and video.
4. Security based connection is provided by which layer?
a) Network layer
b) Session layer
c) Application layer
d) Transport layer
Explanation: IOT is, of course all about connection to the internet. And even more so, it is about security. Without security and without encrypted communication, anyone can see what I send and receive. So encryption and secure communication are key. The solution is to use a connection that uses the TLS(Transport Layer Security) Protocol.
5. TCP is the standard protocol with std no?
Explanation: TCP is a standard protocol with STD number 7. TCP is described by RFC 793-Transmission Control Protocol. Its status is recommended, but in practice, every TCP/IP implementation that is not used exclusively for routing will include TCP.
6. Using which method in transport layer data integrity can be ensured?
b) Repetition codes
c) Cyclic redundancy checks
d) Error correcting codes
Explanation: Using checksum’s, the data integrity across all the delivery layers can be ensured. These checksum’s guarantee that the data transmitted is the same as the data received through repeated attempts made by other layers to have missing data resent.
7. Buffer overrun can be reduced by using what?
a) Traffic control
b) Flow control
c) Byte orientation
d) Data integrity
Explanation: Devices at each end of a network connection often have no way of knowing each other’s capabilities in terms of data throughput and can therefore send data faster than the receiving devices is able to buffer or process it. In these cases, buffer overruns can cause complete communication breakdowns.
8. Transport layer can identify the symptoms of overload nodes using _________
a) Flow control
b) Traffic control
c) Byte orientation
d) Data integrity
Explanation: Digital communications networks are subject to bandwidth and processing speed restrictions, which can mean a huge amount of potential for data congestion on the network. This network congestion can affect almost every part of a network. The transport layer can identify the symptoms of overload nodes and reduced flow rates.
9. Transport layer receives data in the form of __________
b) Byte streams
c) Bits stream
d) Both packets and Byte stream
Explanation: Some applications prefer to receive byte stream instead of packets; the transport layer allows for the transmission of byte-orientated data stream if required.
10. Transport layer is which layer in OSI model?
a) Fourth layer
b) Third layer
c) Second layer
d) Fifth layer
Explanation: The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message delivery from process.
11. Congestion control can control traffic entry into a telecommunications network, so to avoid _________
a) Congestive connection
b) Connection collapse
c) Congestive collapse
d) Collapse congestive
Explanation: Congestion control can control traffic entry into a telecommunications network, so to avoid Congestive collapse by attempting to avoid oversubscription of any of the processing or link capabilities of the intermediate nodes.
12. FCP stands for _________
a) Fiber Channel Protocol
b) Field Channel Protocol
c) Fast Channel Protocol
d) Fiber Carrying Protocol
Explanation: Fiber Channel Protocol is the SCSI interface protocol utilizing an underlying Fiber channel connection.
13. UDP packets are called as _________
Explanation: UDP is a very simple protocol, and does not provide virtual circuits, nor reliable communication, deleting these functions to the application program. UDP packets are called datagrams, rather than segments.
14. _________ do not provide end to end communication.
c) Both TCP and UDP
d) Neither TCP nor UDP
Explanation: TCP, not UDP, provide end to end communication, i.e. error recovery by means of error detecting code and automatic repeat request protocol.
15. ARQ stands for __________
a) Automatic Repeat Request
b) Automatic Request Repeat
c) Application Repeat Request
d) Application Request Repeat
Explanation: TCP, not UDP, provide end to end communication, i.e. error recovery by means of error detecting code and automatic repeat request protocol. The ARQ protocol also provides flow control, which may be combined with congestion avoidance.
Sanfoundry Global Education & Learning Series – IOT.
To practice all areas of IOT, here is complete set of 1000+ Multiple Choice Questions and Answers.