Explain the Congestion Avoidance techniques in detail.

1 Answer

Answer :

_ Leaky bucket algorithm  
_ Token bucket algorithm
_ Switch controlling the output rate  
_ Flowchart

Related questions

Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above

Last Answer : A. slow-start

Description : Explain about congestion control

Last Answer : Congestion avoidance ∙ BECN ∙ FECN ∙ Four situations ∙ Discarding

Description : In IEEE 802.11, the ______ is a timerused for collision avoidance. A) NAV B) BSS C) ESS D) none of the above

Last Answer : NAV

Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially

Last Answer : d. increases exponentially

Description : Consider an instance of TCP's Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is ... the end of the tenth transmission. a. 8 MSS b. 14 MSS c. 7 MSS d. 12 MSS

Last Answer : c. 7 MSS

Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive

Last Answer : c. Congestive collapse

Description : Which services are provided by transport layer? a. Error control b. Connection service c. Connection less service d. Congestion control

Last Answer : a. Error control

Description : What are the functions of the transport layer? a. Multiplexing/ Demultiplexing b. Connection less Services c. Connection oriented service d. Congestion control

Last Answer : a. Multiplexing/ Demultiplexing

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm

Last Answer : a. Flow Control Policy

Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol

Last Answer : d. routing information protocol

Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro

Last Answer : d. error control

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : Congestion in a network or internetwork occurs because routers and switches have _______. A. tables B. queues C. crosspoints D. none of the above

Last Answer : B. queues

Description : The packet sent by a node to the source to inform it of congestion is called _______ A. Explicit B. Discard C. Choke D. Backpressure

Last Answer : C. Choke

Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets

Last Answer : C. Prevent before congestion occurs

Description : Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control

Last Answer : d) error control

Description : Define Congestion Control.

Last Answer : It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.

Description : What is meant by congestion? Why the congestion occurs in network?

Last Answer : Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.

Description : Explain the WWW in detail

Last Answer : ∙ Hypertext & Hypermedia ∙ Browser Architecture ∙ Categories of Web Documents ∙ HTML ∙ CGI ∙ Java

Description : Draw the Internet architecture [TCP/IP architecture] and explain the functionalities of each layer in detail.

Last Answer : ∙ NET1, NET2, and so on. combination of hardware (e.g., a network adaptor) and software(e.g., a network device driver). Ethernet or Fiber Distributed Data Interface (FDDI) ... ), and SMTP (Simple Mail Transfer Protocol, or electronic mail), enable interoperation of popular applications.

Description : Draw the OSI Network architecture and explain the functionalities of each layer in detail.

Last Answer : Physical layer ∙ Data link layer ∙ Network layer ∙ Transport layer ∙ Session layer ∙ Presentation layer ∙ Application layer

Description : Explain the two approaches of packet switching techniques.

Last Answer : _ Datagram approach _ Virtual circuit approach _ Switched virtual circuit(SVC) _ Permanent virtual circuit(PVC) _ Circuit – switched connection versus virtual – circuit connection _ Path versus route _ Dedicated versus shared

Description : List free space management techniques? Describe any one in detail.

Last Answer : A file system is responsible to allocate the free blocks to the file therefore it has to keep track of all the free blocks present in the disk. There are mainly four approaches by using which, the free ... block. This block contains a pointer to the next free disk block, and so on.

Description : Discuss DHCP in detail.

Last Answer : Dynamic Host Configuration Protocol. A protocol used by a host, as it boots, to learn various network information, such as its IP address. - relies on the existence of a DHCP ... receives a broadcast DHCPDISCOVER message from a host - sends a unicast DHCPDISCOVER message to the DHCP server

Description : Which of the following statement is incorrect? a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission. b. Half ... in online activities d. Batch processing is the prefered processing mode for telecommunication operation.

Last Answer : Batch processing is the prefered processing mode for telecommunication operation.

Description : ________is the set of techniques that allows the simultaneous transmission of multiple signalsacrossa single data link. A) Demodulating B) Multiplexing C) Compressing D) None of the above

Last Answer : Multiplexing

Description : __________ conversion involves three techniques: line coding,block coding, and scrambling. A) Analog-to-digital B) Digital-to-analog C) Analog-to-analog D) Digital-to-digital

Last Answer : Digital-to-digital

Description : Which of the following routing technique / techniques is / are used in distributed systems ? A. Fixed Routing B. Virtual Routing C. Dynamic Routing a. A Only b. A and B only c. C only d. All A,B,C

Last Answer : a. A Only

Description : Write about Channel Access on links. Multiple Access Techniques Frequency Division Multiple Access

Last Answer : ∙ In frequency-division multiple access (FDMA), the available bandwidth is divided into frequency bands. ∙ Each station is allocated a band to send its data. ∙ When any one frequency level is ... called chips. ∙ Chips will be added with the original data and it can be transmitted through same

Description : Explain with reference to its location, how Haldia Port has helped release congestion at Kolkata Port. -Geography

Last Answer : Haldia Port has been developed to release congestion at Kolkata Port. This port is located at the confluence of river Hugli about 105 km. downstream from Kolkata. It receives larger vessels ... covers a vast area which includes almost the whole of eastern and northeastern parts of the country.

Description : Are pain and suffering positive values, to be regarded as opportunities to display virtue and in accordance to the nature of humanity, and is the avoidance of pain and the pursuit of pleasure a vice?

Last Answer : I think - in my two months' study of Buddhism - that pain and suffering just are. They don't have intrinsic value but are part of the human condition that we have to accept. On the other hand, ... knowing that and accepting doesn't mean that there's anything wrong in avoiding some of it if you can.

Description : How not to have a divorce, what is the secret of avoidance?

Last Answer : The secret is to evolve together.

Description : What are the advantages of risk avoidance?

Last Answer : Need answer

Description : Paraellel economy emerges due to - (1) Tax Avoidance (2) Tax Evasion (3) Tax Compliance (4) Tax Estimation

Last Answer : (2) Tax Evasion Explanation: Parallel economy (black economy) indicates the functioning of an unsanctioned sector in the economy whose objectives run parallel with the social objectives. Major ... that income from illegal activities that is not reported to the government for tax purposes.

Description : In project management, which of the following is NOT a method of reducing the impact of an unexpected event? (A) Risk avoidance (B) Risk sharing (C) Risk transfer (D) Risk elimination

Last Answer : D) Risk elimination

Description : Which are the method for handling deadlocks. a. Deadlock prevention b. Deadlock avoidance c. Deadlock detection d. Allof these

Last Answer : d. Allof these

Description : Which one is not an appropriate approach to control frost? a. Avoidance b. Reduction of heat loss c. Addition of heat d. Transmittance of control

Last Answer : Avoidance

Description : According to Hofstede, a _____ uncertainty-avoidance culture tries to develop legal institutions that create security. A. Weak B. Strong C. Mixed D. Un-decisive

Last Answer : Strong

Description : According to Hofstede, which dimension of a national culture measures the acceptability of a large difference in status and power among its citizens? A. Individualism versus collectivism B. Masculinity versus femininity C. Uncertainty avoidance D. Power distance

Last Answer : Power distance

Description : According to Hofstede, a _____ uncertainty-avoidance culture tries to develop legal institutions that create security. A. Weak B. Strong C. Mixed D. Un-decisive

Last Answer : Strong

Description : According to Hofstede, which dimension of a national culture measures the acceptability of a large difference in status and power among its citizens? A. Individualism versus collectivism B. Masculinity versus femininity C. Uncertainty avoidance D. Power distance

Last Answer : Power distance

Description : Dimension of culture which defines extent of people how they act as individuals instead of representing as groups is classified as A. orientation distance B. power distance C. individualism D. certainty avoidance

Last Answer : individualism

Description : _____________ is a cultural dimension in which people expect others in their group to look after them and protect them when they are in trouble. A. Power distance B. Collectivism C. Quantity of life D. Uncertainty avoidance

Last Answer : Collectivism

Description : Selection of the routes, of highways depends upon (A) Feasibility of attaining ruling gradient (B) Avoidance of cutting hard rocks (C) Minimum number of bridges (D) All the above

Last Answer : Answer: Option D

Description : Anti-collision system is also known as ______ a) Collision Avoidance System b) Pre-crash System c) Collision Mitigation system d) Forward collision warning system e) All of the above

Last Answer : e) All of the above

Description : During a general briefing at the pre-flight stage, the captain should emphasize: a. The complete delegation of all duties b. The importance of crew coordination c. The priority of departing on schedule d. The avoidance of inadequate handling of controls

Last Answer : b. The importance of crew coordination

Description : The process of communication enhances through: (a) belongings/common (b) Security and freedom to make choices (c) Informality of meeting and avoidance of pressure (d) all of these

Last Answer : (d) all of these