Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching

1 Answer

Answer :

(D) Circuit Switching

Related questions

Description : _____ is used for transmission of packets in the cellular switched architecture. a) Packet switching techniques b) Circuit switching techniques c) Packet and circuit switched technique d) Datagram technique

Last Answer : a) Packet switching techniques

Description : In _______, the router may forwardthereceived packet through several of its interfaces. A) unicasting B) multicasting C) broadcasting D) none of the above

Last Answer : multicasting

Description : In ______, the router forwards thereceived packet through only one of its interfaces. A) unicasting B) multicasting C) broadcasting D) none of the above

Last Answer : unicasting

Description : Which of the following statement is False about the efficiency of the given channel? a. If we want to send big packets on the channel, then Stop and Wait is good choice. b. If length ... is directly proportional to efficiency of channel. d. Efficient might be less if capacity of channel is high

Last Answer : Distance between sender and receiver is directly proportional to efficiency of channel.

Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes

Last Answer : (4) 5 bytes 

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps ? (A) 10 bps (B) 100 bps (C) 1000 bps (D) 10000 bps

Last Answer : (C) 1000 bps 

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________ A ... lost B. Only those packets which are lost or corrupted C. Packet from starting D. All the packets

Last Answer : B. Only those packets which are lost or corrupted

Description : Emulation of ________ through ___________ is notefficientand may create long delays. A) unicasting; multiple unicasting B) multicasting; multiple unicasting C) broadcasting; multicasting D) none of the above

Last Answer : multicasting; multiple unicasting

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as .............. (A) Denial of service attack (B) Masquarade attack (C) Simple attack (D) Complex attack

Last Answer : (A) Denial of service attack 

Description : The term 'duplex' refers to theability of the data receiving stations toecho back aconfirming messageto the sender. Infull duplex data transmission, both the sender and the receiver A. cannot talk at once B. can ... data one ata time D. can do one way data transmission only E. None of the above

Last Answer : can do one way data transmission only

Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway

Last Answer : Answer: 4 

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : The correctness and accuracy of the transmitted message content is A. verified by the modem B. communications system C. determined by the sender and receiver D. ensured by use of digital technique

Last Answer : C. determined by the sender and receiver

Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : VP article received for delivery without VPMO form a) Article will be returned to the sender immediately b) Article will be returned to RLO c) MO form will be filled in with reference to the entries ... will be sent out for delivery d) Article will be kept in deposit till receipt of VPMO form

Last Answer : c) MO form will be filled in with reference to the entries available on the article and the article will be sent out for delivery

Description : If a renter of a PB does not clear the letter for a week a) All the letter s received for delivery through the PB will be returned to sender b) A report will be sent to SP c) The ... will be issued to renter and articles if not collected even after the notice will be delivered through the postman.

Last Answer : d) A notice will be issued to renter and articles if not collected even after the notice will be delivered through the postman.

Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500

Last Answer : a. 2500

Description : A person, group, or organisation that has a meaning it intends and attempts to share with a receiver or an audience is a A)medium of transmission. B)source. C)relay channel. D)decoder. E)sender.

Last Answer : B)source.

Description : Transport layer receives data in the form of? A. Packets B. Byte streams C. Bits stream D. both packet and Byte stream

Last Answer : B. Byte streams 

Description : Undelivered packets containing Registered Newspaper return to sender a) On the same day b) After 7 days c) After 15 days d) After one month

Last Answer : b) After 7 days

Description : In _________, thereis no resource allocation for a packet. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : Which one of the following statements is FALSE? a. Packet switching leads to better utilization of bandwidth resources than circuit switching. b. Packet switching results in less variation ... than circuit switching d. Packet switching can lead to reordering unlike in circuit switching

Last Answer : Packet switching results in less variation in delay than circuit switching.

Description : Which of the following approaches to switching share networks resource? a. Circuit switching b. Packet switching c. Both A and B d. None of these

Last Answer : b. Packet switching

Description : The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method. a) Packet switching b) Circuit switching c) Line switching d) Frequency switching

Last Answer : b) Circuit switching

Description : . Internet works on  packet switching  circuit switching  both packet switching and circuit switching  None of the Above

Last Answer : packet switching

Description : The fundamental approaches to build a point - to - point network is: a) Circuit Switching b) Packet Switching c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : What is the difference between Circuit Switching and Packet Switching?

Last Answer : Ans-Circuit switching is the transmission technology that has been used since the first communication networks in the nineteenth century. In circuit switching, a caller must first establish a ... a flow into packets which are transmitted over a network without any resource being allocated.

Description : What are the advantages and disadvantages of packet switching over circuit switching?

Last Answer : The comparison of packet switching and circuit switching showing advantages and disadvantages of packet switching over circuit switching is given below:

Description : What is circuit switching and packet switching?

Last Answer : Circuit Switching is a strategy for switching data through a network. It involves establishing a dedicated path (circuit) between the source and destination. Packet Switching is also a ... the switch interconnects. It uses store and forward switching of discrete data units called packets.

Description : Circuit switching has more advantage than packet switching for PCS. a) True b) False

Last Answer : b) False

Description : Which type of switching is used in Internet? (1) Circuit (2) Telephone (3) Packet (4) Telex

Last Answer : Packet

Description : Which of the following is not correct in relation to multi-destination routing? a. is same as broadcast routing b. contains the list of all destinations c. data is not sent by packets d. there are multiple receivers

Last Answer : c. data is not sent by packets

Description : RPB guarantees that eachdestinationreceives _________ of the packet. A) one copy B) no copies C) multiplecopies D) none of the above

Last Answer : one copy

Description : RPF guarantees that eachnetwork receives only ____ of the multicast packet. A) one copy B) two copies C) a or b D) none of the above

Last Answer : none of the above

Description : . If there is only one station with a packet to send, this guarantees that there will ………….. For that packet. A. never be a collision B. be a collision C. be an improvement D. direction

Last Answer : A. never be a collision

Description : Semi-join strategies are techniques for query processing in distributed database system. Which of the following is a semi-join technique? (A) Only the joining attributes are sent from one site to ... the attributes are sent from one site to another and then only the required rows are returned.

Last Answer : (C) Only the joining attributes are sent from one site to another and then only the required rows are returned.

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : There are two types of designs for communication subnets: they are ………… A. Point-to-Point channels and Broadcast channels B. packet-switched subnet and store-and-forward C. Multicasting and Broadcasting D. Point-to-Point channels and store-and-forward

Last Answer : A. Point-to-Point channels and Broadcast channels

Description : Which of the following control fields in TCP header is used to specify the sender has no more data to transmit? (A) FIN (B) RST (C) SYN (D) PSH

Last Answer : (A) FIN 

Description : Message can be sent more securely using DES by a. encrypting plain text by a different randomly selected key for each transmission b. encrypting plain text by a different random key for each ... instead of using hardware d. designing DES with high security and not publicizing algorithm used by it  

Last Answer : b. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed. A) exactly 10 B) less than10 C) more than 10 D) none of the above

Last Answer : exactly 10

Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed A. exactly 10 B. less than 10 C. more than 10 D. none of the above

Last Answer : B. High-level data link control

Description : When data and acknowledgement are sent in the same frame, this is called as (A) Piggy packing (B) Piggy backing (C) Back packing (D) Good packing

Last Answer : (B) Piggy backing

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely