A. The source device will only retransmit lost packets on the request of the destination device.
B. The source device starts a timer when it sends a segment and retransmits if an acknowledgment is not received before the timer expires.
C. The destination device acknowledges receipt of a segment by sending a packet with a new sequence number and the ACK bit sent.
D. The destination device acknowledges receipt of a segment by sending a packet that indicates the next sequence number it expects.
E. If the destination device does not receive a segment, all segments are retransmitted.
F. The source device keeps a record of all segments sent and expects and acknowledgment of each.
您可能感興趣的試卷
你可能感興趣的試題
A.MTU
B.PDU
C.FCS
D.Flag
E.MAC
F.BRI
A. ERR
B. Flag
C. FCS
D. MTU
E. MAC
F. PDU
A. source and destination MAC address
B. source MAC address and destination network address only
C. source and destination network address only
D. source network address and destination MAC address
E. source and destination MAC address and source and destination network address
A.NT2
B.NT1
C.TE
D.TA
E.TE1
A. Packet Switching
B. Access Layer Security
C. Path Selection.
D. VLAN Membership Assignment.
E. Bridging between LAN segments.
F. Micro-segmentation of Broadcast Domains.
最新試題
Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()
Which connections allow the use of full-duplex Ethernet?()
Which characteristics are representative of a link-state routing protocol?()
A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()
The network 172.12.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP addresses.What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum? ()
What feature of a networks switch allows an administrative to create separate broadcast domains?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
Which command is used to display the placement and direction of an IP access control list on a router?()
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
Which of the following if addresses can be assigned to host devices?()