Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
In serial data transmission, every byte of data is padded with a ‘0’ in thebeginning and one or two ‘1’ s at the end of byte because
A. Receiver is to be synchronized for byte reception
A. Receiver is to be synchronized for byte reception
See lessLet G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error?
C. 1+x is a factor of G(x)
C. 1+x is a factor of G(x)
See lessDetermine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s
B. 2
B. 2
See lessStation A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what isthe number of packets that A will transmit for sending the message to B?
C. 16
C. 16
See lessIn Ethernet when Manchester encoding is used, the bit rate is:
A. Half the baud rate.
A. Half the baud rate.
See lessA computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2Mbps. It is initially filled to capacity with 16Megabits. What is the maximum duration for which the computer can transmit at the full 10Mbps?
B. 2 seconds
B. 2 seconds
See lessWhat is the maximum size of data that the application layer can pass on tothe TCP layer below?
A. Any size
A. Any size
See lessIn the slow start phase of the TCP congestion control algorithm, the size ofthe congestion window
D. increases exponentially
D. increases exponentially
See lessWhich of the following system calls results in the sending of SYNpackets?
D. connect
D. connect
See lessOne of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field?
D. It can be used to prevent packet looping
D. It can be used to prevent packet looping
See less