The packet sent by a node to the source to inform it of congestion is called _______
A. Explicit
B. Discard
C. Choke
D. Backpressure

1 Answer

Answer :

C. Choke

Related questions

Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm

Last Answer : a. Flow Control Policy

Description : The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as _______ A. Admission policy B. Backpressure C. Forward signaling D. Backward signaling

Last Answer : B. Backpressure

Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm

Last Answer : (A) Flow Control Policy

Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect

Last Answer : b. Communication Administratively Prohibited

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : The number of network segments on which the datagram is allowed to travel before a router should discard it is called _______. A. Time to Live (TTL) B. Time to Die(TTD) C. self recognition D. both a and b

Last Answer : A. Time to Live (TTL)

Description : The _______ address in theheader ofa packet in adatagram network normally remains thesame during the entire journeyof the packet. A) source B) destination C) local D) none of the above

Last Answer : destination

Description : Congestion in a network or internetwork occurs because routers and switches have _______. A. tables B. queues C. crosspoints D. none of the above

Last Answer : B. queues

Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above

Last Answer : Down through thelayers of the IP architecture and then up thelayers again

Description : In datagram subnet new route is chosen ………………… (A) for every packet sent (B) for first and last packet sent (C) only for the first packet (D) for the packet which is not transmitted

Last Answer : (A) for every packet sent

Description : Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address ? a. Hub b. Modem c. Switch d. Gateway

Last Answer : c. Switch

Description : Network layer at source is responsible for creating a packet from data coming from another ________ a) Station b) Link c) Node d) Protocol

Last Answer : d) Protocol

Description : We cansay thata packet switchhas _______ typesof components. A) two B) three C) four D) none of the above

Last Answer : four

Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above

Last Answer : 2

Description : In _______, the router may forwardthereceived packet through several of its interfaces. A) unicasting B) multicasting C) broadcasting D) none of the above

Last Answer : multicasting

Description : .In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______ a. Added b. Removed c. Rearranged d. Randomized

Last Answer : b. Removed

Description : Application layer is implemented in _______ a. End system b. NIC c. Ethernet d. Packet transport

Last Answer : a. End system

Description : A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched

Last Answer : b) Circuit switched

Description : In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______ a) Added b) Removed c) Rearranged d) Randomized

Last Answer : b) Removed

Description : Another name for the cable TV office is the _______. A) splitter B) fiber node C) combiner D) head end

Last Answer : head end

Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec

Last Answer : a. 2 sec

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : In virtual circuit network each packet contains ___________ a. full source and destination address b. a short VC number c. only source address d. only destination address

Last Answer : b. a short VC number

Description : In virtual circuit network each packet contains ___________ A. full source and destination address B. a short VC number C. only source address D. only destination address

Last Answer : B. a short VC number

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed. A) exactly 10 B) less than10 C) more than 10 D) none of the above

Last Answer : exactly 10

Description : f four hosts on anetworkbelong tothesame group, a totalof _______ sent inresponse to a general query message. A) one membership report is B) two membership reports are C) three membership reports are D) noneof the above

Last Answer : two membership reports are

Description : A multicast message is sent from _______ to _______. A) onesource; one destination B) onesource; multiple destinations C) multiple sources; onedestination D) noneof the above

Last Answer : onesource; multiple destinations

Description : An IGMP query is sent from a _______to a _______. A) host; host B) host; router C) router; hostor router D) noneof the above

Last Answer : router; hostor router

Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed A. exactly 10 B. less than 10 C. more than 10 D. none of the above

Last Answer : B. High-level data link control

Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially

Last Answer : d. increases exponentially

Description : Consider an instance of TCP's Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is ... the end of the tenth transmission. a. 8 MSS b. 14 MSS c. 7 MSS d. 12 MSS

Last Answer : c. 7 MSS

Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive

Last Answer : c. Congestive collapse

Description : Which services are provided by transport layer? a. Error control b. Connection service c. Connection less service d. Congestion control

Last Answer : a. Error control

Description : What are the functions of the transport layer? a. Multiplexing/ Demultiplexing b. Connection less Services c. Connection oriented service d. Congestion control

Last Answer : a. Multiplexing/ Demultiplexing

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol

Last Answer : d. routing information protocol

Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro

Last Answer : d. error control

Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above

Last Answer : A. slow-start

Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets

Last Answer : C. Prevent before congestion occurs

Description : Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control

Last Answer : d) error control

Description : Explain the Congestion Avoidance techniques in detail.

Last Answer : _ Leaky bucket algorithm _ Token bucket algorithm _ Switch controlling the output rate _ Flowchart

Description : Explain about congestion control

Last Answer : Congestion avoidance ∙ BECN ∙ FECN ∙ Four situations ∙ Discarding

Description : Define Congestion Control.

Last Answer : It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.

Description : What is meant by congestion? Why the congestion occurs in network?

Last Answer : Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.

Description : The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ . (1) Access control (2) Congestion (3) Error propagation (4) Deadlock

Last Answer : Congestion

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet