单选题A TCP/IP application is transferring files from a personal machine to a remote machine.  The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size.  Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A Increase the size of thewallB Increase the size of sb_maxC Increase the size of tcp_recvspaceD Increase the size of tcp_sendspace

单选题
A TCP/IP application is transferring files from a personal machine to a remote machine.  The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size.  Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()
A

 Increase the size of thewall

B

 Increase the size of sb_max

C

 Increase the size of tcp_recvspace

D

 Increase the size of tcp_sendspace


参考解析

解析: 暂无解析

相关考题:

在CDMA20001X数据业务的分层结构中,不同层之间依次排列,下面正确的是() A.Application Layer、PPP、TCP/IP、RLP,Physical LayerB.Application Layer、PPP、RLP、TCP/IP、Physical LayerC.Application Layer、RLP、PhysicalLayer、TCP/IP、PPPD.Physical Layer、RLP、PPP、TCP/IP、Application Layer

TCP/IP(71)layer protocols provide services to the application(72)running on a computer. The application layer does not define the application itself, but rather it defines(73)that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an(74)between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP(75)layer consists of two main protocol options--the Transmission Control Protocol(TCP) and the User Datagram Protocol(UDP).A.applicationB.transportC.linkD.network

● TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.(71)A.network interface layer, internet layer, transport layer and application layerB.internet layer, network interface layer, transport layer and application layerC.network interface layer, transport layer, network interface layer and application layerD.application layer, transport layer, internet layer and network interface layer

( )is a client/server protocol for transferring files across the Internet.A.POP3B.IMAPC.FTPD.HTTP

TCP/IP is a communication protocol, which provides many different networking services. The TCP/IP Internet protocol suite is formed from two standards: the TCP (Transmission Control Protocol) and the IP(Internet Protocol).(72) means it is on the transport layer.A.ISOB.IPC.OSID.TCP

● TCP/IP (71) layer protocols provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need—like the ability to transfer a file in the case of HTTP. In short, the application layer provides an (74) between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options—the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).

is a TCP/IP application service that converts user-friendly names to IP address.A.ARPB.RARPC.WWWD.DNS

TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.A.network interface layer, internet layer, transport layer and application layerB.internet layer, network interface layer, transport layer and application layerC.network interface layer, transport layer, network interface layer and application layerD.application layer, transport layer, internet layer and network interface layer

The TCP/IP network model differs from the more popular OSI model. Which of the layers below belong to the TCP/IP model?() A. application layerB. session layerC. transport layerD. internet layerE. network layerF. data link layerG. physical layer

TCP/IP ( )layer protocols provide services to the application(请作答此空)running on a computer. The application layer does not define the application itself, but rather it defines( )that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an( )between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP( )layer consists of two main protocol options--the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).A.hardware]B.software]C.packetD.equipment

A TCP/IP application receives files from a remote machine.  The application reads 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size. Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A、 Increase the size of thewallB、 Increase the size of sb_maxC、 Increase the size of tcp_recvspaceD、 Increase the size of tcp_sendspace

A TCP/IP application is transferring files from a personal machine to a remote machine.  The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size.  Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A、 Increase the size of thewallB、 Increase the size of sb_maxC、 Increase the size of tcp_recvspaceD、 Increase the size of tcp_sendspace

Which layer in the TCP/IP model is responsible for delivering packets to their destination?()A、Application LayerB、Transport LayerC、Internet LayerD、Network Access Layer

下面TCP/IP的哪一层最难去保护()A、PhysicalB、NetworkC、TransportD、Application

在CDMA20001X数据业务的分层结构中,不同层之间依次排列,下面正确的是()A、Application Layer、PPP、TCP/IP、RLP,Physical LayerB、Application Layer、PPP、RLP、TCP/IP、Physical LayerC、Application Layer、RLP、PhysicalLayer、TCP/IP、PPPD、Physical Layer、RLP、PPP、TCP/IP、Application Layer

The TCP/IP network model differs from the more popular OSI model. Which of the layers below belong to the TCP/IP model?()A、application layerB、session layerC、transport layerD、internet layerE、network layerF、data link layerG、physical layer

A server is connected to a gigabit Ethernet switch and has negotiated 1Gbps / Full Duplex. When transferring large files to and from other servers on the segment via FTP slow performance is noticed.All network cabling,network hardware and server hardware were verified to be working correctly.  Which of the following could be done to improve performance?()A、 Decrease the TCP window size.B、 Increase the UDP window size.C、 Increase the TCP window size.D、 Decrease the UDP window size.

Company.com is implementing an HACMP solution. The application ahs a license key based on  The hostname. The hostname is also the name used for one of the TCP/IP interfaces. The application vendor has worked with HACMP systems before and is aware of the issue. The preferred method for resolving this issue is to:()  A、 include the hostname in the resource group definition.B、 include the license key in the resource group definition.C、 obtain a second license key for a "standby" system from the application vendor.D、 Set the hostname to be one of the TCP/IP interface included in a resource group.

You work as an application developer at Certkiller .com. You are required to dynamically load assemblies into an application domain. You are using the Load method of the AppDomain class. What types of files can you this use method for?()A、 Library application files (.dll).B、 All assembly files, no matter what there file extensions are.C、 Application configuration files (.config).D、 Standalone application files (.exe).

You are planning the migration of an existing application to Windows Azure.  The application includes a trace listener that produces log files.   The log files must be transferred to the Windows Azure Storage service each day with the minimum amount of effort.   You need to recommend an approach for transferring the log files.  What should you recommend?()A、 Perform on-demand transfers of custom error logs.B、 Perform on-demand transfers of Windows Azure logs.C、 Configure scheduled transfers of custom error logs.D、 Configure scheduled transfers of Windows event logs.

You are developing and XBAP application for your company intranet. During several development iterations, you manually executable, application, and deployement manifest to the test Web Server. You create an HTML file that has a manifest that you use for testing. During the next iteration, you enchance the XBAP application by making changes. When you use the hyperlink to the deployment manifest to test the deployment, you do not see the changes. You need to ensure that the changes you make are visible when you test the deployment from your machine. What should you do ?()A、Restart Microsoft Internet Information Services (IIS). Then click the Install hyperlink again.B、Open Visual Studio command prompt and run mage -cc. Then click the Install hyperlink again.C、Delete the application, deployment, and executable files from Web Server. Then rebuild the XBAP solution files from the project bin directory to the Web Server and click the Install hyperlink againD、Delete the application, deployment, and executable files from Web Server. Then recopy the same files to the Web Server, restart IIS and click the Install hyperlink again

单选题在CDMA20001X数据业务的分层结构中,不同层之间依次排列,下面正确的是()AApplication Layer、PPP、TCP/IP、RLP,Physical LayerBApplication Layer、PPP、RLP、TCP/IP、Physical LayerCApplication Layer、RLP、PhysicalLayer、TCP/IP、PPPDPhysical Layer、RLP、PPP、TCP/IP、Application Layer

单选题Company.com is implementing an HACMP solution. The application ahs a license key based on  The hostname. The hostname is also the name used for one of the TCP/IP interfaces. The application vendor has worked with HACMP systems before and is aware of the issue. The preferred method for resolving this issue is to:()A include the hostname in the resource group definition.B include the license key in the resource group definition.C obtain a second license key for a standby system from the application vendor.D Set the hostname to be one of the TCP/IP interface included in a resource group.

单选题You work as an application developer at Certkiller .com. You are required to dynamically load assemblies into an application domain. You are using the Load method of the AppDomain class. What types of files can you this use method for?()A Library application files (.dll).B All assembly files, no matter what there file extensions are.C Application configuration files (.config).D Standalone application files (.exe).

单选题You configure a new file server that runs Windows Server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files. The TCP/IP properties for the file server are configured as shown in the following exhibit.(exhibit not there again wtf!) You need to ensure that users are able to access the shared files. How should you configure the TCP/IP properties in the file server?()AConfigure a static IP addressBConfigure the default gatewayCConfigure the DNS server addressDAdd the domain to the DNS suffix on the network interface

单选题A TCP/IP application receives files from a remote machine.  The application reads 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size. Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A Increase the size of thewallB Increase the size of sb_maxC Increase the size of tcp_recvspaceD Increase the size of tcp_sendspace

单选题You are planning the migration of an existing application to Windows Azure.  The application includes a trace listener that produces log files.   The log files must be transferred to the Windows Azure Storage service each day with the minimum amount of effort.   You need to recommend an approach for transferring the log files.  What should you recommend?()A Perform on-demand transfers of custom error logs.B Perform on-demand transfers of Windows Azure logs.C Configure scheduled transfers of custom error logs.D Configure scheduled transfers of Windows event logs.