The maximum size of the window in a Sliding Window Protocol is _______
A. 2m – 1
B. 2m + 1
C. 2m
D. 2m-1

1 Answer

Answer :

A. 2m – 1

Related questions

Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320

Last Answer : b. 40

Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D

Last Answer : c. C

Description : Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ?  (A) 4 (B) 8 (C) 15 (D) 16

Last Answer : (C) 15 

Description : Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is (1) 20 (2) 10 (3) 30 (4) 40

Last Answer : (2) 10

Description : the maximum window size for data transmission using the selective reject protocol with n-bit frame sequence numbers is: a. 2^n b. 2^(n-1) c. 2^n – 1 d. 2^(n-2)

Last Answer : b. 2^(n-1)

Description : The TCP sliding window a. can be used to control the flow of information b. always occurs when the field value is 0 c. always occurs when the field value is 1 d. occurs horizontally

Last Answer : a. can be used to control the flow of information

Description : Which feature of Go Back N ARQ mechanism possesses an ability to assign the sliding window in the forward direction? a. Control Variables b. Sender Sliding Window c. Receiver Sliding Window d. Resending of frames

Last Answer : b. Sender Sliding Window

Description : The range of sequence number which is the concern of the receiver is called the receive sliding window. A. receive sliding window. B. sliding window C. frame buffer D. both a and b

Last Answer : A. receive sliding window.

Description : Which feature of Go-Back-N ARQ mechanism possesses an ability to assign the sliding window in the forward diretion? A. Control Variables B. Sender Sliding Window C. Receiver Sliding Window D. Resending of frames

Last Answer : B. Sender Sliding Window

Description : Four bits are used for packet sequence numbering in a sliding window protocol used in computer network. What is maximum window size?  A) 4 B) 8 C) 15 D) 16

Last Answer : Four bits are used for packet sequence numbering in a sliding window protocol used in computer network. What is maximum window size?  15

Description : Silly Window Syndrome is related to a. Error during transmission b. File transfer protocol c. Degrade in TCP performance d. Interface problem

Last Answer : c. Degrade in TCP performance

Description : In Selective Repeat ARQ, if 5 is the number ofbits for the sequence number, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 16

Description : In Selective Repeat ARQ, if 5 is the number ofbits for the sequence number, then the maximum size of the send window must be _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 16

Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 1

Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the send window must be _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 31

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above

Last Answer : 2

Description : _______ isa dynamic mapping protocol in which a physical address is found for agiven logicaladdress. A) ARP B) RARP C) botha and b D) noneof the above

Last Answer : ARP

Description : _______ is an implementation of multicast distance vector routing. It is asource-based routing protocol, based on RIP. A) MOSPF B) DVMRP C) CBT D) none of the above

Last Answer : DVMRP

Description : MOSPF is a _______ protocol. A) data-driven B) command-driven C) both a and b D) none of the above

Last Answer : data-driven

Description : The Multicast Open Shortest Path First (MOSPF)protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is basedon _______ routing. A) distancevector B) link state C) path vector D) none of the above

Last Answer : link state

Description : The _______ protocol allows the administrator toassign acost, called the metric, to each route. A) OSPF B) RIP C) BGP D) none of the above

Last Answer : OSPF

Description : The Open Shortest Path First (OSPF)protocol is an intradomain routing protocolbased on _______ routing. A) distancevector B) link state C) path vector D) none of the above

Last Answer : link state

Description : _______ is the protocol suite for thecurrent Internet. A) TCP/IP B) NCP C) UNIX D) ACM

Last Answer : TCP/IP

Description : The _______ is thephysicalpath over which a message travels. A) Protocol B) Medium C) Signal D) All the above

Last Answer : Medium

Description : The _______ is a unidirectional protocol that has no flow or error control. A. Simplest B. Simplex C. TCP/IP protocol D. Simplest or Simplex

Last Answer : D. Simplest or Simplex

Description : The Aloha protocol is an OSI _______ protocol for LAN networks with broadcast topology A. layer 1 B. layer 4 C. layer 2 D. layer 3

Last Answer : C. layer 2

Description : The _______ is a dynamic mapping protocol in which a physical address is found for a given logical address. A. ARP B. RARP C. both a and b D. none of the above

Last Answer : B. RARP

Description : In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments. A. CSMA/CA B. CSMA/CD C. either (a) or (b) D. both (a) and (b)

Last Answer : A. CSMA/CA

Description : Both Go-Back-N and Selective-Repeat Protocols use a_________. A) sliding frame B) sliding window C) sliding packet D) none of the above

Last Answer : sliding window

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500

Last Answer : a. 2500

Description : In a Go-Back-N ARQ, if the window size is 63,what is the range of sequence numbers? A) 0to 63 B) 0to 64 C) 1to 63 D) 1to 64

Last Answer : 0to 63

Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size

Last Answer : b. Fragment offset

Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially

Last Answer : d. increases exponentially

Description : Consider an instance of TCP's Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is ... the end of the tenth transmission. a. 8 MSS b. 14 MSS c. 7 MSS d. 12 MSS

Last Answer : c. 7 MSS

Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above

Last Answer : A. slow-start

Description : In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? A. 0 to 63 B. 0 to 64 C. 1 to 63 D. 1 to 64

Last Answer : A. 0 to 63

Description : The minimum distance required for an echo to occur is _______. a)30m b)17.2m c)100m d)20m

Last Answer : b)17.2m

Description : The IPv4header size _______. A) is 20 to 60 bytes long B) is 20 bytes long C) is 60 bytes long D) noneof the above

Last Answer : is 20 to 60 bytes long

Description : The IPv4header size _______. A) is 20 to 60 bytes long B) is always 20bytes long C) is always 60bytes long D) depends on the MTU

Last Answer : is 20 to 60 bytes long

Description : In IPv4, if the fragment offset hasa value of 100, it means that _______. A) thedatagram has notbeen fragmented B) thedatagram is 100 bytes in size C) thefirst byte of the datagram is byte100 D) the first byteof the datagram is byte800

Last Answer : the first byteof the datagram is byte800

Description : The IPv4 header size _______ A. is 20 to 60 bytes long B. is always 20 bytes long C. is always 60 bytes long D. depends on the MTU

Last Answer : A. is 20 to 60 bytes long

Description : In _______ framing, there is no need for defining the boundaries of frames. A. fixed-size B. variable-size C. standard D. none of the above

Last Answer : A. fixed-size

Description : DTP computer abbreviation usually means ? DeskTop Publishing Data Type Programming Digital Transmission Protocol None Of above

Last Answer : Data Type Programming

Description : What does PPTP stand for ? Point to Point Transmission Protocol Point to Point Transfer Protocol Point to Point Tunneling Protocol Point to Point Traffic Protoco

Last Answer : Point to Point Tunneling Protocol

Description : A protocol is a set of rules governing a time sequence of events that must take place a. between peers b. between an interface c. between modems d. across an interface

Last Answer : between peers

Description : Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium

Last Answer : all of above including access to transmission medium

Description : Which of the following statement is incorrect? a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line b. HDLC is a standard ... indicates that it is ready to accept data d. RTS/CTS is the way the terminal indicates ringing

Last Answer : RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data