Four bits are used for packet sequence numbering in a sliding window protocol used in computer network. What is maximum window size? 

A) 4 B) 8 C) 15 D) 16

1 Answer

Answer :

Four bits are used for packet sequence numbering in a sliding window protocol used in computer network. What is maximum window size? 

15

Related questions

Description : Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ?  (A) 4 (B) 8 (C) 15 (D) 16

Last Answer : (C) 15 

Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D

Last Answer : c. C

Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320

Last Answer : b. 40

Description : The maximum size of the window in a Sliding Window Protocol is _______ A. 2m – 1 B. 2m + 1 C. 2m D. 2m-1

Last Answer : A. 2m – 1

Description : Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is (1) 20 (2) 10 (3) 30 (4) 40

Last Answer : (2) 10

Description : The range of sequence number which is the concern of the receiver is called the receive sliding window. A. receive sliding window. B. sliding window C. frame buffer D. both a and b

Last Answer : A. receive sliding window.

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : It is a protocol used to connect the other packet witching network A. X.25 B. X.50 C. X.10 D. X.75

Last Answer : D. X.75

Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These

Last Answer : a) Internet Control Message Protocol

Description : Network layer at source is responsible for creating a packet from data coming from another ________ a) Station b) Link c) Node d) Protocol

Last Answer : d) Protocol

Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Description : the maximum window size for data transmission using the selective reject protocol with n-bit frame sequence numbers is: a. 2^n b. 2^(n-1) c. 2^n – 1 d. 2^(n-2)

Last Answer : b. 2^(n-1)

Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec

Last Answer : a. 2 sec

Description : Transport layer receives data in the form of? A. Packets B. Byte streams C. Bits stream D. both packet and Byte stream

Last Answer : B. Byte streams 

Description : The TCP sliding window a. can be used to control the flow of information b. always occurs when the field value is 0 c. always occurs when the field value is 1 d. occurs horizontally

Last Answer : a. can be used to control the flow of information

Description : Which feature of Go Back N ARQ mechanism possesses an ability to assign the sliding window in the forward direction? a. Control Variables b. Sender Sliding Window c. Receiver Sliding Window d. Resending of frames

Last Answer : b. Sender Sliding Window

Description : Which feature of Go-Back-N ARQ mechanism possesses an ability to assign the sliding window in the forward diretion? A. Control Variables B. Sender Sliding Window C. Receiver Sliding Window D. Resending of frames

Last Answer : B. Sender Sliding Window

Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above

Last Answer : 2

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : Consider a link with packet loss probability of 0.2. What is the expected number of transmissions it would take to transfer 200 packets given that the stop and wait protocol is used? a. 125 b. 250 c. 225

Last Answer : b. 250

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Transmission protocol, PRMA stands for _________ a) Pocket reservation multiple access b) Packet register multiple access c) Pocket register multiple access d) Packet reservation multiple access

Last Answer : d) Packet reservation multiple access

Description : In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________ A ... lost B. Only those packets which are lost or corrupted C. Packet from starting D. All the packets

Last Answer : B. Only those packets which are lost or corrupted

Description : How many bits are required to represent one nibble ?

Last Answer : 4-bits are required to represent one nibble.

Description : How many bits Internet address is assigned to each host on a TCP/IP Internet which is used in all communications with host?  A) 16 bits B) 32 bits C) 48 bits D) 64 bits

Last Answer : How many bits Internet address is assigned to each host on a TCP/IP Internet which is used in all communications with host?  32 bits

Description : How many characters per sec (7 bits + 1 parity) can be transmitted over a 2400 bps line if the transfer is synchronous (1 start bit and 1 stop bit)?  A) 300 B) 240 C) 250 D) 275

Last Answer : How many characters per sec (7 bits + 1 parity) can be transmitted over a 2400 bps line if the transfer is synchronous (1 start bit and 1 stop bit)?  300

Description : When we move from the outermost track to the innermost track in a magnetic disk, then density (bits per linear inch)  (1) decreases (2) increases (3) remains the same (4) either remains constant or decreases

Last Answer : increases

Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500

Last Answer : a. 2500

Description : Classification of protocol that interprets a frame of data as a group of successive bit combined into predetermined pattern of fixed length, usually 8 bits each.

Last Answer : Character and Byte-oriented protocols

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?  (a) FTP (b) SNMP (c) SMTP (d) RPC

Last Answer : SMTP is used for transferring electronic mail messages from one machine to another.

Description : X.25 protocol is a structured protocol that has 

Last Answer : X.25 protocol is a structured protocol that has 3 layers

Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 1

Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the send window must be _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 31

Description : What is the connotation or origin of using the numerical symbols we use for our English numbering system? of using the?

Last Answer : They are actually the Arabic numerals. More here

Description : What is the best system &/or software for naming/numbering JPEG files & their folders of fine art photography?

Last Answer : I found this but still could use the collectives further input.

Description : It seems to me that when I choose my size at their market so it's smaller.

Last Answer : Vietnamese have goods from all over the world. From China as well as from Turkey. All those Oriental and Asian countries generally have smaller and slimmer people. So yes, you are right numbering a customer in the marketplace cannot drive.

Description : What is a summary of numbering all the bones Chapter 1?

Last Answer : You need to do this question.We don't do homework and yourteacher is looking for your critical thinking skills and how wellyou understood the lesson.

Description : What are the computers called that performs calculations and comparisons usually in the binary numbering system? A) Analog Computers B) Digital Computers C) Hybrid Computers D) None of above

Last Answer : Answer : B

Description : ENIAC uses A) Decimal Numbering System B) Octal Numbering System C) Binary Numbering System D) Hexadecimal Numbering System

Last Answer : Answer : A

Description : In a telephone system, the customer’s telephone directory numbering is from 000 to 999, what is the capacity of the system? A. 1000 lines B. 100,000 lines C. 10,000 lines D. 100 lines

Last Answer : A. 1000 lines

Description : The numbering of the nodes in A-O-A is done  A.From left to right B.From Right to Left  C.Randomly  D.On the basis of the duration of the activity

Last Answer : A.From left to right

Description : The vagus nerve is the cranial nerve numbering (a) 7 (b) 5 (c) 10 (d) 9.

Last Answer : c) 10

Description : ________data is generally used in labeling goods, numbering of books etc: a) OCR coded Data b) Bar Coded Data c) OMR data d) None of These

Last Answer : b) Bar Coded Data

Description : What do you mean by numbering and addressing? Draw the ISDN address structure and explain how the addressing works?

Last Answer :  Numbering and Addressing: In telephone and data networks, the end equipments are more often single units than multiple devices units like PABX or LAN. Historically, a telephone, a computer, or a ... as reference point may also be addressed by using direct inward dialing (DID) feature.  

Description : How numbering plan is achieved in modern telephony? Give the structure with example.

Last Answer :  The objective of numbering plan is to uniquely identify every subscriber connected to a telecommunication network. A numbering plan may be open, semiopen or closed. An open-numbering plan permits wide ... known as the subscriber number which is the number listed in the telephone directory.   

Description : Which numbering formats are really codes rather than true number systems? 96) A) hexadecimal and octal B) binary and octal C) decimal and binary D) BCD and ASCII

Last Answer : Which numbering formats are really codes rather than true number systems?