Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
In data transfer phase, how many columns does the table contain?
D. 4
D. 4
See lessDelay of the resource allocated during setup phase during data transfer is ________
C. same for each packet
C. same for each packet
See lessWhich of the following is not a phase of virtual circuit network?
C. termination phase
C. termination phase
See lessThe packet sent by a node to the source to inform it of congestion is called ______
C. choke
C. choke
See lessRetransmission of packets must not be done when
D. packet is error-free
D. packet is error-free
See lessTwo broad categories of congestion control are
A. open-loop and closed-loop
A. open-loop and closed-loop
See lessIP Security operates in which layer of the OSI model?
A. network
A. network
See lessThe ______ field is used to detect errors over the entire user datagram
B. checksum
B. checksum
See lessTotal length” field in UDP packet header is the length of _________
D. udp header plus data
D. udp header plus data
See lessReturn value of the UDP port “Chargen” is _______
A. string of characters
A. string of characters
See less