Station A is transmitting data to station B, and expects an
acknowledgment after every 400 bytes. After transmitting
data for a
while, the two stations determine the line is reliable and
change to
expecting and acknowledgement every 600 bytes.
This is an example of (pick the best answer only):
A.) BECN
B.) Sliding Windows
C.) Poison Reverse
D.) Countdown timers
E.) Split Horizon
F.) Count to infinity
Answer / guest
Answer: B
A TCP/IP 'window' is the amount of data (number of bytes)
that the
sending station will transmit before expecting an
acknowledgement back.
If the stations can change that window size on the fly, that
is called a
sliding window. This is done to optimize performance.
Is This Answer Correct ? | 0 Yes | 0 No |
How network gateway is different from routers?
In stp which protocol is used for detrming root port root bridge ,forwarding port and blocking port
The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC
Can you explain static and dynamic tunnels?
What is the standard ISDN term for a native ISDN modem? A.) ET B.) LE C.) TE2 D.) TE3 E.) TA
Identify the default encapsulation on serial interfaces? A.) ISDN B.) HDLC C.) SDLC D.) Frame Relay E.) PPP
What is a switch and why we are using switches?
What is the distance limitation for 100BaseT? A. 607 ft B. 25 Meters C. 1,000 ft D. 185 Meters
take a pen and copy before solving that question there is a router name Ra there is two switch sw1 and sw2 sw1 is coneceted through fa0/1 interface of router Ra sw2 is conected through the fa1/1 serai interface of router s0/1 conected through the isp with it ip address 192.168.1.1 now therer are three host conexted through the sw1 and having ip host1=10.1.2.1 host2=10.1.2.2 host3=10.1.2.3 now there is also 3ree host conected through switch 2 i.e sw2 having ip host4=10.1.1.1 host 5=10.1.1.2 host 6=10.1.1.3 now i think u have made corect confrigation.now questios is started network admin configure the Ra router in that fassion Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255 Ra(config)#line vty 0 4 ra(config)#access-class 2 in now question is that why should network admnistratoe do it in this maneer A to give access sw1 host to acess internet B to prevent sw1 host from acessing comand promt c to prevent sw2 host from accessing console of router ra D to give sw2 host access to the enternet e prevent sw1 host from accessing internet f to prevent sw1 host from acessing the sw2 host network isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6) | | (sw1)------host 1,2,3 this is not exect digarm but help to derive the diagram plz answer as soon as possible
hi im ccna certified im searching 4 job in networking domain can any guide wats the rite way of job approach ,wat r the rite sites for searching job im eagerly 4 ur replies
Differentiate User Mode from Privileged Mode?
Given an IP host address of 172.16.2.160 and a shored mask of 255.255.255.192 to which shored does the host belong? A. 172.16.2.32 B. 172.16.2.64 C. 172.16.2.96 D. 172.16.2.128 E. 172.16.2.192