Question
a.
Sliding Window Protocol
b.
TCP
c.
UDP
d.
HDLC
Posted under GATE cse question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of the following protocol is called as byte-oriented protocol?
Similar Questions
Discover Related MCQs
Q. If syn = 0 and ack = 1, it indicates
View solution
Q. A DNS.....................server gets its data from another DNS server.
View solution
Q. The .............................field in the MIME header describes the method used to encode the data.
View solution
Q. A client message usually needs ........................ to send mail.
View solution
Q. Which one is not a method of HTTP?
View solution
Q. Which one of the following is a communication protocol used for email?
View solution
Q. Which one of the following statement about email is false?
View solution
Q. Which one of the following can be used on the IP network to monitor a router?
View solution
Q. Which of the following is true?
View solution
Q. Which of the following is not a Block cipher?
View solution
Q. In a ................................attack, an intruder comes between two communicating parties, Intercepting and replying to their messages.
View solution
Q. A computer crime is
View solution
Q. A program that migrates through networks and operating systems by attaching itself to different Programs and databases is a
View solution
Q. In RSA.............................in the common factor in both keys?
View solution
Q. Programs that come into a computer system disguised as something else are called
View solution
Q. Having a(n) .....................................is important to help large Organization continue operating until Normal computer operations.
View solution
Q. In what way does a firewall increase the securities of a VPN?
View solution
Q. Choose the false one.
View solution
Q. There are 15 users communicating to each other. How many pairs of keys are required to authenticate the communications if the symmetric key is used?
View solution
Q. Let the value of the RTT(Round-Trip-Time)is to be measure (d). The value of the previous RTT be 350μs. Let the value of α be 90% the new RTT, hence the retransmission time is ______ .(Assume it takes a segment at this moment to be acknowledged in 90μs)
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!