In open-loop control, policies are applied to __________
A. Remove after congestion occurs
B. Remove after sometime
C. Prevent before congestion occurs
D. Prevent before sending packets

1 Answer

Answer :

C. Prevent before congestion occurs

Related questions

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : Which of the following system calls results in the sending of SYN packets? a. socket b. bind c. listen d. connect

Last Answer : d. connect

Description : Consider an instance of TCP's Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is ... the end of the tenth transmission. a. 8 MSS b. 14 MSS c. 7 MSS d. 12 MSS

Last Answer : c. 7 MSS

Description : Congestion in a network or internetwork occurs because routers and switches have _______. A. tables B. queues C. crosspoints D. none of the above

Last Answer : B. queues

Description : What is meant by congestion? Why the congestion occurs in network?

Last Answer : Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially

Last Answer : d. increases exponentially

Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive

Last Answer : c. Congestive collapse

Description : Which services are provided by transport layer? a. Error control b. Connection service c. Connection less service d. Congestion control

Last Answer : a. Error control

Description : What are the functions of the transport layer? a. Multiplexing/ Demultiplexing b. Connection less Services c. Connection oriented service d. Congestion control

Last Answer : a. Multiplexing/ Demultiplexing

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm

Last Answer : a. Flow Control Policy

Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol

Last Answer : d. routing information protocol

Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro

Last Answer : d. error control

Description : Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control

Last Answer : d) error control

Description : Explain about congestion control

Last Answer : Congestion avoidance ∙ BECN ∙ FECN ∙ Four situations ∙ Discarding

Description : Define Congestion Control.

Last Answer : It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.

Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes

Last Answer : c. packets

Description : The network layer is concerned with __________ of data. a) bits b) frames c) packets d) bytes

Last Answer : c) packets

Description : A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub

Last Answer : c) router

Description : In ATM,______ is for packets requiring no sequencing and noerror control mechanism. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5

Last Answer : AAL5

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above

Last Answer : A. slow-start

Description : The packet sent by a node to the source to inform it of congestion is called _______ A. Explicit B. Discard C. Choke D. Backpressure

Last Answer : C. Choke

Description : Explain the Congestion Avoidance techniques in detail.

Last Answer : _ Leaky bucket algorithm _ Token bucket algorithm _ Switch controlling the output rate _ Flowchart

Description : ________ requires that each station first listento the medium before sending. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : Which command does not show that two devices are failing to route packets between them successfully? A. show interface B. trace C. telnet D. ping

Last Answer : show interface

Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed. A) exactly 10 B) less than10 C) more than 10 D) none of the above

Last Answer : exactly 10

Description : A ________ switch is a multistageswitch with microswitches at each stagethat route the packets based on theoutput port representedas a binary string. A) crossbar B) TSI C) banyan D) none of the above

Last Answer : banyan

Description : In ATM,_______is for short packets. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5

Last Answer : AAL2

Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove

Last Answer : ATM

Description : The packets switching concept was first proposed A. in the late1980s for the Defense Ministry of US. B. in the early 1960s for military communication systems, mainly to handle speech C. in the late 1950s for Defense Ministry of US D. All of theabove E. None of the above

Last Answer : in the early 1960s for military communication systems, mainly to handle speech

Description : Which of the following condition is usedto transmit two packets overa medium at the same time? A. Contention B. Collision C. Synchronous D. Asynchronous E. None of the above

Last Answer : Collision

Description : A station in a network forwards incoming packets byplacing them on its shortest output queue. Whatrouting algorithm is being used? A. hot potatorouting B. flooding C. static routing D. delta routing E. None of the above

Last Answer : hot potatorouting

Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B

Last Answer : a. A & B

Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams

Last Answer : d. Datagrams

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : Packets will be transferred in how many types? a. 5 types b. 4 types c. 2 types d. 3 types

Last Answer : d. 3 types

Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges

Last Answer : a. Host

Description : Which of the following is not correct in relation to multi-destination routing? a. is same as broadcast routing b. contains the list of all destinations c. data is not sent by packets d. there are multiple receivers

Last Answer : c. data is not sent by packets

Description : Consider a link with packet loss probability of 0.2. What is the expected number of transmissions it would take to transfer 200 packets given that the stop and wait protocol is used? a. 125 b. 250 c. 225

Last Answer : b. 250

Description : Which of the following statement is False about the efficiency of the given channel? a. If we want to send big packets on the channel, then Stop and Wait is good choice. b. If length ... is directly proportional to efficiency of channel. d. Efficient might be less if capacity of channel is high

Last Answer : Distance between sender and receiver is directly proportional to efficiency of channel.

Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320

Last Answer : b. 40

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true