Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm
Last Answer : a. Flow Control Policy
Description : The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as _______ A. Admission policy B. Backpressure C. Forward signaling D. Backward signaling
Last Answer : B. Backpressure
Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm
Last Answer : (A) Flow Control Policy
Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect
Last Answer : b. Communication Administratively Prohibited
Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c
Last Answer : A. Flooding
Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.
Last Answer : c. Prevent packets from looping indefinitely
Description : The number of network segments on which the datagram is allowed to travel before a router should discard it is called _______. A. Time to Live (TTL) B. Time to Die(TTD) C. self recognition D. both a and b
Last Answer : A. Time to Live (TTL)
Description : The _______ address in theheader ofa packet in adatagram network normally remains thesame during the entire journeyof the packet. A) source B) destination C) local D) none of the above
Last Answer : destination
Description : Congestion in a network or internetwork occurs because routers and switches have _______. A. tables B. queues C. crosspoints D. none of the above
Last Answer : B. queues
Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above
Last Answer : Down through thelayers of the IP architecture and then up thelayers again
Description : In datagram subnet new route is chosen ………………… (A) for every packet sent (B) for first and last packet sent (C) only for the first packet (D) for the packet which is not transmitted
Last Answer : (A) for every packet sent
Description : Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address ? a. Hub b. Modem c. Switch d. Gateway
Last Answer : c. Switch
Description : Network layer at source is responsible for creating a packet from data coming from another ________ a) Station b) Link c) Node d) Protocol
Last Answer : d) Protocol
Description : We cansay thata packet switchhas _______ typesof components. A) two B) three C) four D) none of the above
Last Answer : four
Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above
Last Answer : 2
Description : In _______, the router may forwardthereceived packet through several of its interfaces. A) unicasting B) multicasting C) broadcasting D) none of the above
Last Answer : multicasting
Description : .In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______ a. Added b. Removed c. Rearranged d. Randomized
Last Answer : b. Removed
Description : Application layer is implemented in _______ a. End system b. NIC c. Ethernet d. Packet transport
Last Answer : a. End system
Description : A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched
Last Answer : b) Circuit switched
Description : In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______ a) Added b) Removed c) Rearranged d) Randomized
Last Answer : b) Removed
Description : Another name for the cable TV office is the _______. A) splitter B) fiber node C) combiner D) head end
Last Answer : head end
Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec
Last Answer : a. 2 sec
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : In virtual circuit network each packet contains ___________ a. full source and destination address b. a short VC number c. only source address d. only destination address
Last Answer : b. a short VC number
Description : In virtual circuit network each packet contains ___________ A. full source and destination address B. a short VC number C. only source address D. only destination address
Last Answer : B. a short VC number
Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b
Last Answer : C. Congestion
Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed. A) exactly 10 B) less than10 C) more than 10 D) none of the above
Last Answer : exactly 10
Description : f four hosts on anetworkbelong tothesame group, a totalof _______ sent inresponse to a general query message. A) one membership report is B) two membership reports are C) three membership reports are D) noneof the above
Last Answer : two membership reports are
Description : A multicast message is sent from _______ to _______. A) onesource; one destination B) onesource; multiple destinations C) multiple sources; onedestination D) noneof the above
Last Answer : onesource; multiple destinations
Description : An IGMP query is sent from a _______to a _______. A) host; host B) host; router C) router; hostor router D) noneof the above
Last Answer : router; hostor router
Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed A. exactly 10 B. less than 10 C. more than 10 D. none of the above
Last Answer : B. High-level data link control
Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially
Last Answer : d. increases exponentially
Description : Consider an instance of TCP's Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is ... the end of the tenth transmission. a. 8 MSS b. 14 MSS c. 7 MSS d. 12 MSS
Last Answer : c. 7 MSS
Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive
Last Answer : c. Congestive collapse
Description : Which services are provided by transport layer? a. Error control b. Connection service c. Connection less service d. Congestion control
Last Answer : a. Error control
Description : What are the functions of the transport layer? a. Multiplexing/ Demultiplexing b. Connection less Services c. Connection oriented service d. Congestion control
Last Answer : a. Multiplexing/ Demultiplexing
Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol
Last Answer : a. datagram congestion control protocol
Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol
Last Answer : d. routing information protocol
Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro
Last Answer : d. error control
Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above
Last Answer : A. slow-start
Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets
Last Answer : C. Prevent before congestion occurs
Description : Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control
Last Answer : d) error control
Description : Explain the Congestion Avoidance techniques in detail.
Last Answer : _ Leaky bucket algorithm _ Token bucket algorithm _ Switch controlling the output rate _ Flowchart
Description : Explain about congestion control
Last Answer : Congestion avoidance ∙ BECN ∙ FECN ∙ Four situations ∙ Discarding
Description : Define Congestion Control.
Last Answer : It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.
Description : What is meant by congestion? Why the congestion occurs in network?
Last Answer : Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.
Description : The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ . (1) Access control (2) Congestion (3) Error propagation (4) Deadlock
Last Answer : Congestion
Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above
Last Answer : token passing: token
Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin
Last Answer : Watchdog packet