Station A is transmitting data to station B, and expects an
acknowledgment after every 400 bytes. After transmitting
data for a
while, the two stations determine the line is reliable and
change to
expecting and acknowledgement every 600 bytes.
This is an example of (pick the best answer only):
A.) BECN
B.) Sliding Windows
C.) Poison Reverse
D.) Countdown timers
E.) Split Horizon
F.) Count to infinity
Answer / guest
Answer: B
A TCP/IP 'window' is the amount of data (number of bytes)
that the
sending station will transmit before expecting an
acknowledgement back.
If the stations can change that window size on the fly, that
is called a
sliding window. This is done to optimize performance.
| Is This Answer Correct ? | 0 Yes | 0 No |
Which defined peer ip address an local subnet belong to crete?
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
Why do we have a Layered Model? 1) It reduces complexity 2) Allows for a standardized interface 3) Facilitates modular engineering 4) Ensures interoperable technology 5) Accelerates evolution 6) Simplifies teaching and learning
Which of the following use PVCs at layer 2? A.) X.25 B.) HDLC C.) Frame relay D.) ISDN
1>What do you mean by Networks and Networking? 2>Difference between Vlan And Sub Interface Vlan? 3>What is Fiber Optic Media Converter? 4>What is Firewall? 5>Difference Between Layer2 and Layer3 Switch? 6>What is the function of Multilayer Switch? 7>Expalin STP? What is the Difference between STP and MST? 8>What is the Function of VTP?Explain the modes of VTP? 9>What kind of Message VTp will Send? 10>What is the Difference between Normal and Manageable Switch? 11>Difference between Local Vlan and End to End Vlan? 12>Difference between Distance Vector and Link State Routing protocol? 13>What do you mean by Backbone Fast Port? 14>what is Root Guard and BPDU Guard?
Name the command we use for ping in ipv6?
What is Phase od VPN in site to site and what information you will require to configure a SITE to SITE VPN
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to deliver the frame to the end device E.) Contains a network portion and a host portion
Which ISDN specification deals with call Setup and Teardown? A.) Q-Series B.) J-Series C.) I- Series D.) C- Series E.) F-Series
Port selection is done at which layer of OSI reference model?????
Which command can verify only Network layer connectivity between 2 hosts? A.) ping B.) e-mail C.) plp D.) arp E.) telnet
Which addresses are valid host addresses? A. 201.222.5.17 B. 201.222.5.18 C. 201.222.5.16 D. 201.222.5.19 E. 201.222.5.31