Computer Networking What is the purpose of flow control? To reassemble segments in the correct order at the destination device. To regulate the size of each segment. To ensure that data is retransmitted if an acknowledgment is not received. To provide a means for the receiver to govern the amount of data sent by the sender. To reassemble segments in the correct order at the destination device. To regulate the size of each segment. To ensure that data is retransmitted if an acknowledgment is not received. To provide a means for the receiver to govern the amount of data sent by the sender. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at a data link level is achieved by bit stuffing equalization cyclic redundancy codes Hamming codes None of these bit stuffing equalization cyclic redundancy codes Hamming codes None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Interconnected networks need communication processors such as switches, routers, hubs, and gateways. Select the best fit for answer: Open Systems Internetwork processor TCP/IP Protocol Open Systems Internetwork processor TCP/IP Protocol ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which three statements are true about the operation of a full-duplex Ethernet network?1. There are no collisions in full-duplex mode.2. A dedicated switch port is required for each full-duplex node.3. Ethernet hub ports are preconfigured for full-duplex mode.4. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.5. The host network card and the switch port must be capable of operating in full-duplex mode. 1, 2, and 5 5 only 2, 3 and 4 2 and 4 1, 2, and 5 5 only 2, 3 and 4 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length. (2m - l)/mJ 2 (m - 2) m - 1 2 (2m - 1) (2m - l)/mJ 2 (m - 2) m - 1 2 (2m - 1) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which protocol is used to send a destination network unknown message back to originating hosts? TCP ICMP BootP ARP TCP ICMP BootP ARP ANSWER DOWNLOAD EXAMIANS APP