Which provision can resolve / overcome
the shortcomings associated with duplication
or failure condition of Stop and Wait
Automatic Repeat Request protocol especially
due to loss of data frames or non reception of
acknowledgement?
a. Provision of sequence number in the
header of message
b. Provision of checksum computation
c. Both a & b
d. None of the above

1 Answer

Answer :

Provision of sequence number in the
header of message

Related questions

Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500

Last Answer : a. 2500

Description : Inthe _________ protocol weavoid unnecessary transmissionby sending only frames that are corrupted. A) Stop-and-Wait ARQ B) Go-Back-N ARQ C) Selective-Repeat ARQ D) none of the above

Last Answer : Selective-Repeat ARQ

Description : Inthe _____ Protocol, the sender sends its frames oneafter another with noregard to the receiver. A) Stop-and-Wait B) Simplest C) Go-Back-N ARQ D) Selective-Repeat ARQ

Last Answer : Stop-and-Wait B) Simplest

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)

Last Answer : b. ARP (Address Resolution Protocol)

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? A. ARQ Automatic Repeat Request B. ARP Address Resolution Protocol C. SLIP Serial Line Internet Protocol D. PLIP Parallel Line Internet Protocol

Last Answer : B. ARP Address Resolution Protocol

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : Inthe _________Protocol, ifno acknowledgment for aframe has arrived, we resend all outstanding frames. A) Stop-and-Wait ARQ B) Go-Back-N ARQ C) Selective-Repeat ARQ D) none of the above

Last Answer : Go-Back-N ARQ

Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size

Last Answer : b. Fragment offset

Description : Inthe _____ Protocol, the sender sends one frame, stops until it receives confirmation from the receiver, and then sends the next frame. A) Stop-and-Wait B) Simplest C) Go-Back-N ARQ D) Selective-Repeat ARQ

Last Answer : Stop-and-Wait

Description : _________control inthe datalink layer is based on automatic repeat request, which is the retransmission of data. A) Flow B) Error C) Transmission D) none of the above

Last Answer : Transmission

Description : In Stop-and-Wait ARQ, we use sequence numbers to number the frames. The sequence numbers are based on __________arithmetic. A) modulo-2 B) modulo-4 C) modulo-m D) none of the above

Last Answer : modulo-2

Description : What are the problems involved in an IP Fragmentation Process? A. Loss of any fragment results in rejection of all datagrams B. Management of buffer space is essential to handle reassembly process C. No necessity of initializing ... -oriented IP service a. A & B b. C & D c. B& C d. A & D

Last Answer : a. A & B

Description : ARQ stands for _______. A) Automatic repeatquantization B) Automatic repeat request C) Automatic retransmissionrequest D) Acknowledge repeat request

Last Answer : Automatic repeat request

Description : ARQ stands for __________ a. Automatic Repeat Request b. Automatic Request Repeat c. Application Repeat Request d. Application Request Repeat

Last Answer : a. Automatic Repeat Request

Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer

Last Answer : a. logical link control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer

Last Answer : A. logical link control sublayer

Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D

Last Answer : c. C

Description : Consider a link with packet loss probability of 0.2. What is the expected number of transmissions it would take to transfer 200 packets given that the stop and wait protocol is used? a. 125 b. 250 c. 225

Last Answer : b. 250

Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length

Last Answer : b. Source address

Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams

Last Answer : d. Datagrams

Description : Which ARQ mechanism deals with the transmission of only damaged or lost frames despite the other multiple frames by increasing the efficiency & its utility in noisy channels? a. GoBackN ARQ b. Selective Repeat ARQ c. StopandWait ARQ d. All of the above

Last Answer : b. Selective Repeat ARQ

Description : The _________Protocol, addsa simple error control mechanism to the _______Protocol. A) Stop-and-Wait ARQ; Stop-and-Wait B) Go-Back-N ARQ; Stop-and-Wait C) Selective Repeat ARQ; Go-Back-N ARQ D) none of the above

Last Answer : Go-Back-N ARQ; Stop-and-Wait

Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above

Last Answer : Frame check sequence

Description : What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns? a. 20% b. 25% c. 40% d. 66%

Last Answer : b. 25%

Description : Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks

Last Answer : a) collision detection

Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number

Last Answer : d. Destination port number

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : Which consequences are more likely to occur during the frame transmission in StopandWait ARQ mechanism? a. Loss of frame or an acknowledgement b. Delay in an acknowledgement c. Normal operation d. All of the above

Last Answer : d. All of the above

Description : Describe three shortcomings of manuscripts that were overcome by the printing press. -SST 10th

Last Answer : (i) Copying manuscripts by expert handwriters was very time-consuming and cumbersome.The printing press took much less time to produce many copies of books. (ii) Copying manuscripts was an ... risk of getting spoiled or damaged. Printed books could be easily handled, carried and circulated.

Description : The response to general call from ATC is for the aircraft to: a. Respond in alphabetic order b. Respond in numerical order c. Give no response d. Request a repeat of the message

Last Answer : c. Give no response

Description : The response to general call from ATC is for the aircraft to: a. Respond in alphabetic order b. Respond in numerical order c. Give no response d. Request a repeat of the message

Last Answer : c. Give no response

Description : When making a blind transmission you should: a. Transmit the message twice b. Transmit each word twice c. Repeat the message on 121.5 MHz d. Wait for visual signals

Last Answer : a. Transmit the message twice

Description : When making a blind transmission you should: a. Transmit the message twice b. Transmit each word twice c. Repeat the message on 121.5 MHz d. Wait for visual signals

Last Answer : a. Transmit the message twice

Description : In Selective Repeat ARQ, if 5 is the number ofbits for the sequence number, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 16

Description : In Selective Repeat ARQ, if 5 is the number ofbits for the sequence number, then the maximum size of the send window must be _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 16

Description : What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC

Last Answer : DDCMP does not need special hardware to final the beginning of a message

Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : b. content-transfer-encoding

Description : In the SMTP header field_____ is a summary of the message being sent which is specified by the sender. a. Reply-to b. Return-path c. Subject d. From

Last Answer : c. Subject

Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : Truly effective communication: 1. Depends on using multiple channels  2. Depends on selecting the right method for each message and avoiding duplication, since  everyone is overloaded with information  3. ... misunderstood  4. Can only be achieved by communication professional  5. a, b and c

Last Answer : 5. a, b and c

Description : The information tobe communicated ina data communications system is the_______. A) Medium B) Protocol C) Message D) Transmission

Last Answer : Message

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : The protocol data unit (PDU) for the application layer in the Internet stack is? a. Datagram b. Frame c. Message d. Segment

Last Answer : c. Message

Description : The protocol data unit PDU for the Transport layer in the Internet stack is A. Segment B. Datagram C. Message/Data D. Frame

Last Answer : A. Segment

Description : The protocol data unit(PDU) for the application layer in the Internet stack is (A) Segment (B) Datagram (C) Message/Data (D) Frame

Last Answer : (C) Message/Data

Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum

Last Answer : (A) identification