Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Which one of the following routing algorithm can be used for network layer design?
D. all of the mentioned
D. all of the mentioned
See lessIn virtual circuit network each packet contains
B. a short vc number
B. a short vc number
See lessThe 4 byte IP address consists of
C. both (a) and (b)
C. both (a) and (b)
See lessWhich one of the following is not a function of network layer?
D. none of the mentioned
D. none of the mentioned
See lessThe network layer concerns with
C. packets
C. packets
See lessThe technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called
A. piggybacking
A. piggybacking
See lessWhich one of the following is the multiple access protocol for channel access control?
C. both (a) and (b)
C. both (a) and (b)
See lessWhich one of the following is a data link protocol?
D. all of the mentioned
D. all of the mentioned
See lessCRC stands for
A. cyclic redundancy check
A. cyclic redundancy check
See lessWhen 2 or more bits in a data unit has been changed during the transmission, the error is called
B. burst error
B. burst error
See less