Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Station A is transmitting data to station B, and expects an

acknowledgment after every 400 bytes. After transmitting
data for a

while, the two stations determine the line is reliable and
change to

expecting and acknowledgement every 600 bytes.

This is an example of (pick the best answer only):

A.) BECN

B.) Sliding Windows

C.) Poison Reverse

D.) Countdown timers

E.) Split Horizon

F.) Count to infinity



Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes...

Answer / guest

Answer: B

A TCP/IP 'window' is the amount of data (number of bytes)
that the

sending station will transmit before expecting an
acknowledgement back.

If the stations can change that window size on the fly, that
is called a

sliding window. This is done to optimize performance.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which defined peer ip address an local subnet belong to crete?

0 Answers  


What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.

1 Answers  


Why do we have a Layered Model? 1) It reduces complexity 2) Allows for a standardized interface 3) Facilitates modular engineering 4) Ensures interoperable technology 5) Accelerates evolution 6) Simplifies teaching and learning

1 Answers  


Which of the following use PVCs at layer 2? A.) X.25 B.) HDLC C.) Frame relay D.) ISDN

1 Answers  


1>What do you mean by Networks and Networking? 2>Difference between Vlan And Sub Interface Vlan? 3>What is Fiber Optic Media Converter? 4>What is Firewall? 5>Difference Between Layer2 and Layer3 Switch? 6>What is the function of Multilayer Switch? 7>Expalin STP? What is the Difference between STP and MST? 8>What is the Function of VTP?Explain the modes of VTP? 9>What kind of Message VTp will Send? 10>What is the Difference between Normal and Manageable Switch? 11>Difference between Local Vlan and End to End Vlan? 12>Difference between Distance Vector and Link State Routing protocol? 13>What do you mean by Backbone Fast Port? 14>what is Root Guard and BPDU Guard?

0 Answers   Gemini, SpectraNet,


Name the command we use for ping in ipv6?

0 Answers  


What is Phase od VPN in site to site and what information you will require to configure a SITE to SITE VPN

0 Answers   Infosys,


Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to deliver the frame to the end device E.) Contains a network portion and a host portion

2 Answers  


Which ISDN specification deals with call Setup and Teardown? A.) Q-Series B.) J-Series C.) I- Series D.) C- Series E.) F-Series

1 Answers  


Port selection is done at which layer of OSI reference model?????

4 Answers  


Which command can verify only Network layer connectivity between 2 hosts? A.) ping B.) e-mail C.) plp D.) arp E.) telnet

4 Answers  


Which addresses are valid host addresses? A. 201.222.5.17 B. 201.222.5.18 C. 201.222.5.16 D. 201.222.5.19 E. 201.222.5.31

2 Answers   VGH,


Categories