Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320
Last Answer : b. 40
Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D
Last Answer : c. C
Description : Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ? (A) 4 (B) 8 (C) 15 (D) 16
Last Answer : (C) 15
Description : Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is (1) 20 (2) 10 (3) 30 (4) 40
Last Answer : (2) 10
Description : the maximum window size for data transmission using the selective reject protocol with n-bit frame sequence numbers is: a. 2^n b. 2^(n-1) c. 2^n – 1 d. 2^(n-2)
Last Answer : b. 2^(n-1)
Description : The TCP sliding window a. can be used to control the flow of information b. always occurs when the field value is 0 c. always occurs when the field value is 1 d. occurs horizontally
Last Answer : a. can be used to control the flow of information
Description : Which feature of Go Back N ARQ mechanism possesses an ability to assign the sliding window in the forward direction? a. Control Variables b. Sender Sliding Window c. Receiver Sliding Window d. Resending of frames
Last Answer : b. Sender Sliding Window
Description : The range of sequence number which is the concern of the receiver is called the receive sliding window. A. receive sliding window. B. sliding window C. frame buffer D. both a and b
Last Answer : A. receive sliding window.
Description : Which feature of Go-Back-N ARQ mechanism possesses an ability to assign the sliding window in the forward diretion? A. Control Variables B. Sender Sliding Window C. Receiver Sliding Window D. Resending of frames
Last Answer : B. Sender Sliding Window
Description : Four bits are used for packet sequence numbering in a sliding window protocol used in computer network. What is maximum window size? A) 4 B) 8 C) 15 D) 16
Last Answer : Four bits are used for packet sequence numbering in a sliding window protocol used in computer network. What is maximum window size? 15
Description : Silly Window Syndrome is related to a. Error during transmission b. File transfer protocol c. Degrade in TCP performance d. Interface problem
Last Answer : c. Degrade in TCP performance
Description : In Selective Repeat ARQ, if 5 is the number ofbits for the sequence number, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1
Last Answer : 16
Description : In Selective Repeat ARQ, if 5 is the number ofbits for the sequence number, then the maximum size of the send window must be _____ A) 15 B) 16 C) 31 D) 1
Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1
Last Answer : 1
Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the send window must be _____ A) 15 B) 16 C) 31 D) 1
Last Answer : 31
Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above
Last Answer : bit-oriented
Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above
Last Answer : 2
Description : _______ isa dynamic mapping protocol in which a physical address is found for agiven logicaladdress. A) ARP B) RARP C) botha and b D) noneof the above
Last Answer : ARP
Description : _______ is an implementation of multicast distance vector routing. It is asource-based routing protocol, based on RIP. A) MOSPF B) DVMRP C) CBT D) none of the above
Last Answer : DVMRP
Description : MOSPF is a _______ protocol. A) data-driven B) command-driven C) both a and b D) none of the above
Last Answer : data-driven
Description : The Multicast Open Shortest Path First (MOSPF)protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is basedon _______ routing. A) distancevector B) link state C) path vector D) none of the above
Last Answer : link state
Description : The _______ protocol allows the administrator toassign acost, called the metric, to each route. A) OSPF B) RIP C) BGP D) none of the above
Last Answer : OSPF
Description : The Open Shortest Path First (OSPF)protocol is an intradomain routing protocolbased on _______ routing. A) distancevector B) link state C) path vector D) none of the above
Description : _______ is the protocol suite for thecurrent Internet. A) TCP/IP B) NCP C) UNIX D) ACM
Last Answer : TCP/IP
Description : The _______ is thephysicalpath over which a message travels. A) Protocol B) Medium C) Signal D) All the above
Last Answer : Medium
Description : The _______ is a unidirectional protocol that has no flow or error control. A. Simplest B. Simplex C. TCP/IP protocol D. Simplest or Simplex
Last Answer : D. Simplest or Simplex
Description : The Aloha protocol is an OSI _______ protocol for LAN networks with broadcast topology A. layer 1 B. layer 4 C. layer 2 D. layer 3
Last Answer : C. layer 2
Description : The _______ is a dynamic mapping protocol in which a physical address is found for a given logical address. A. ARP B. RARP C. both a and b D. none of the above
Last Answer : B. RARP
Description : In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments. A. CSMA/CA B. CSMA/CD C. either (a) or (b) D. both (a) and (b)
Last Answer : A. CSMA/CA
Description : Both Go-Back-N and Selective-Repeat Protocols use a_________. A) sliding frame B) sliding window C) sliding packet D) none of the above
Last Answer : sliding window
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500
Last Answer : a. 2500
Description : In a Go-Back-N ARQ, if the window size is 63,what is the range of sequence numbers? A) 0to 63 B) 0to 64 C) 1to 63 D) 1to 64
Last Answer : 0to 63
Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size
Last Answer : b. Fragment offset
Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially
Last Answer : d. increases exponentially
Description : Consider an instance of TCP's Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is ... the end of the tenth transmission. a. 8 MSS b. 14 MSS c. 7 MSS d. 12 MSS
Last Answer : c. 7 MSS
Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above
Last Answer : A. slow-start
Description : In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? A. 0 to 63 B. 0 to 64 C. 1 to 63 D. 1 to 64
Last Answer : A. 0 to 63
Description : The minimum distance required for an echo to occur is _______. a)30m b)17.2m c)100m d)20m
Last Answer : b)17.2m
Description : The IPv4header size _______. A) is 20 to 60 bytes long B) is 20 bytes long C) is 60 bytes long D) noneof the above
Last Answer : is 20 to 60 bytes long
Description : The IPv4header size _______. A) is 20 to 60 bytes long B) is always 20bytes long C) is always 60bytes long D) depends on the MTU
Description : In IPv4, if the fragment offset hasa value of 100, it means that _______. A) thedatagram has notbeen fragmented B) thedatagram is 100 bytes in size C) thefirst byte of the datagram is byte100 D) the first byteof the datagram is byte800
Last Answer : the first byteof the datagram is byte800
Description : The IPv4 header size _______ A. is 20 to 60 bytes long B. is always 20 bytes long C. is always 60 bytes long D. depends on the MTU
Last Answer : A. is 20 to 60 bytes long
Description : In _______ framing, there is no need for defining the boundaries of frames. A. fixed-size B. variable-size C. standard D. none of the above
Last Answer : A. fixed-size
Description : DTP computer abbreviation usually means ? DeskTop Publishing Data Type Programming Digital Transmission Protocol None Of above
Last Answer : Data Type Programming
Description : What does PPTP stand for ? Point to Point Transmission Protocol Point to Point Transfer Protocol Point to Point Tunneling Protocol Point to Point Traffic Protoco
Last Answer : Point to Point Tunneling Protocol
Description : A protocol is a set of rules governing a time sequence of events that must take place a. between peers b. between an interface c. between modems d. across an interface
Last Answer : between peers
Description : Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium
Last Answer : all of above including access to transmission medium
Description : Which of the following statement is incorrect? a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line b. HDLC is a standard ... indicates that it is ready to accept data d. RTS/CTS is the way the terminal indicates ringing
Last Answer : RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data