Four bits are used for packet sequence numbering in a sliding window protocol used in computer network. What is maximum window size?
15
Description : Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ? (A) 4 (B) 8 (C) 15 (D) 16
Last Answer : (C) 15
Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D
Last Answer : c. C
Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320
Last Answer : b. 40
Description : The maximum size of the window in a Sliding Window Protocol is _______ A. 2m – 1 B. 2m + 1 C. 2m D. 2m-1
Last Answer : A. 2m – 1
Description : Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is (1) 20 (2) 10 (3) 30 (4) 40
Last Answer : (2) 10
Description : The range of sequence number which is the concern of the receiver is called the receive sliding window. A. receive sliding window. B. sliding window C. frame buffer D. both a and b
Last Answer : A. receive sliding window.
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : It is a protocol used to connect the other packet witching network A. X.25 B. X.50 C. X.10 D. X.75
Last Answer : D. X.75
Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These
Last Answer : a) Internet Control Message Protocol
Description : Network layer at source is responsible for creating a packet from data coming from another ________ a) Station b) Link c) Node d) Protocol
Last Answer : d) Protocol
Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.
Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.
Description : the maximum window size for data transmission using the selective reject protocol with n-bit frame sequence numbers is: a. 2^n b. 2^(n-1) c. 2^n – 1 d. 2^(n-2)
Last Answer : b. 2^(n-1)
Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec
Last Answer : a. 2 sec
Description : Transport layer receives data in the form of? A. Packets B. Byte streams C. Bits stream D. both packet and Byte stream
Last Answer : B. Byte streams
Description : The TCP sliding window a. can be used to control the flow of information b. always occurs when the field value is 0 c. always occurs when the field value is 1 d. occurs horizontally
Last Answer : a. can be used to control the flow of information
Description : Which feature of Go Back N ARQ mechanism possesses an ability to assign the sliding window in the forward direction? a. Control Variables b. Sender Sliding Window c. Receiver Sliding Window d. Resending of frames
Last Answer : b. Sender Sliding Window
Description : Which feature of Go-Back-N ARQ mechanism possesses an ability to assign the sliding window in the forward diretion? A. Control Variables B. Sender Sliding Window C. Receiver Sliding Window D. Resending of frames
Last Answer : B. Sender Sliding Window
Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above
Last Answer : 2
Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.
Last Answer : c. Prevent packets from looping indefinitely
Description : Consider a link with packet loss probability of 0.2. What is the expected number of transmissions it would take to transfer 200 packets given that the stop and wait protocol is used? a. 125 b. 250 c. 225
Last Answer : b. 250
Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above
Last Answer : only when no error occurs at the transmission level
Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : A. 1. True, 2. true, 3. true
Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP
Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).
Description : Transmission protocol, PRMA stands for _________ a) Pocket reservation multiple access b) Packet register multiple access c) Pocket register multiple access d) Packet reservation multiple access
Last Answer : d) Packet reservation multiple access
Description : In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________ A ... lost B. Only those packets which are lost or corrupted C. Packet from starting D. All the packets
Last Answer : B. Only those packets which are lost or corrupted
Description : How many bits are required to represent one nibble ?
Last Answer : 4-bits are required to represent one nibble.
Description : How many bits Internet address is assigned to each host on a TCP/IP Internet which is used in all communications with host? A) 16 bits B) 32 bits C) 48 bits D) 64 bits
Last Answer : How many bits Internet address is assigned to each host on a TCP/IP Internet which is used in all communications with host? 32 bits
Description : How many characters per sec (7 bits + 1 parity) can be transmitted over a 2400 bps line if the transfer is synchronous (1 start bit and 1 stop bit)? A) 300 B) 240 C) 250 D) 275
Last Answer : How many characters per sec (7 bits + 1 parity) can be transmitted over a 2400 bps line if the transfer is synchronous (1 start bit and 1 stop bit)? 300
Description : When we move from the outermost track to the innermost track in a magnetic disk, then density (bits per linear inch) (1) decreases (2) increases (3) remains the same (4) either remains constant or decreases
Last Answer : increases
Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500
Last Answer : a. 2500
Description : Classification of protocol that interprets a frame of data as a group of successive bit combined into predetermined pattern of fixed length, usually 8 bits each.
Last Answer : Character and Byte-oriented protocols
Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? (a) FTP (b) SNMP (c) SMTP (d) RPC
Last Answer : SMTP is used for transferring electronic mail messages from one machine to another.
Description : X.25 protocol is a structured protocol that has
Last Answer : X.25 protocol is a structured protocol that has 3 layers
Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1
Last Answer : 1
Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the send window must be _____ A) 15 B) 16 C) 31 D) 1
Last Answer : 31
Description : What is the connotation or origin of using the numerical symbols we use for our English numbering system? of using the?
Last Answer : They are actually the Arabic numerals. More here
Description : What is the best system &/or software for naming/numbering JPEG files & their folders of fine art photography?
Last Answer : I found this but still could use the collectives further input.
Description : It seems to me that when I choose my size at their market so it's smaller.
Last Answer : Vietnamese have goods from all over the world. From China as well as from Turkey. All those Oriental and Asian countries generally have smaller and slimmer people. So yes, you are right numbering a customer in the marketplace cannot drive.
Description : What is a summary of numbering all the bones Chapter 1?
Last Answer : You need to do this question.We don't do homework and yourteacher is looking for your critical thinking skills and how wellyou understood the lesson.
Description : What are the computers called that performs calculations and comparisons usually in the binary numbering system? A) Analog Computers B) Digital Computers C) Hybrid Computers D) None of above
Last Answer : Answer : B
Description : ENIAC uses A) Decimal Numbering System B) Octal Numbering System C) Binary Numbering System D) Hexadecimal Numbering System
Last Answer : Answer : A
Description : In a telephone system, the customer’s telephone directory numbering is from 000 to 999, what is the capacity of the system? A. 1000 lines B. 100,000 lines C. 10,000 lines D. 100 lines
Last Answer : A. 1000 lines
Description : The numbering of the nodes in A-O-A is done A.From left to right B.From Right to Left C.Randomly D.On the basis of the duration of the activity
Last Answer : A.From left to right
Description : The vagus nerve is the cranial nerve numbering (a) 7 (b) 5 (c) 10 (d) 9.
Last Answer : c) 10
Description : ________data is generally used in labeling goods, numbering of books etc: a) OCR coded Data b) Bar Coded Data c) OMR data d) None of These
Last Answer : b) Bar Coded Data
Description : What do you mean by numbering and addressing? Draw the ISDN address structure and explain how the addressing works?
Last Answer : Numbering and Addressing: In telephone and data networks, the end equipments are more often single units than multiple devices units like PABX or LAN. Historically, a telephone, a computer, or a ... as reference point may also be addressed by using direct inward dialing (DID) feature.
Description : How numbering plan is achieved in modern telephony? Give the structure with example.
Last Answer : The objective of numbering plan is to uniquely identify every subscriber connected to a telecommunication network. A numbering plan may be open, semiopen or closed. An open-numbering plan permits wide ... known as the subscriber number which is the number listed in the telephone directory.
Description : Which numbering formats are really codes rather than true number systems? 96) A) hexadecimal and octal B) binary and octal C) decimal and binary D) BCD and ASCII
Last Answer : Which numbering formats are really codes rather than true number systems?