Congestion in a network or internetwork occurs because routers and switches have _______.
A. tables
B. queues
C. crosspoints
D. none of the above

1 Answer

Answer :

B. queues

Related questions

Description : Congestion in a network or internetwork occurs because routers and switches have _______

Last Answer : queues

Description : The network layer contains which hardware device? a. Routers, Bridges b. Bridges only c. Bridges and switches d. Routers, Bridges and Switches

Last Answer : d. Routers, Bridges and Switches

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : Based onthe Clos criteria, if N = 200, then the minimum number of crosspoints isgreater thanor equal to _______. A) 15,200 B) 18,000 C) 42,000 D) 20,000

Last Answer : 15,200

Description : What is meant by congestion? Why the congestion occurs in network?

Last Answer : Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.

Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : B. 1. true, 2. false, 3.true

Description : In a three-stage space division switch, if N = 200, the number of crosspoints is ______. A) 40,000 B) greater than 40,000 C) less than40,000 D) greater than 100,000

Last Answer : ess than40,00

Description : In a one-stage space division switch, if N = 200, the number of crosspoints is ______. A) 10,000 B) 20,000 C) 40,000 D) 30,000

Last Answer : 40,000

Description : In the original ARPANET,_______ were directly connected together. A) IMPs B) host computers C) networks D) routers

Last Answer : IMPs

Description : The packet sent by a node to the source to inform it of congestion is called _______ A. Explicit B. Discard C. Choke D. Backpressure

Last Answer : C. Choke

Description : Consider an instance of TCP's Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is ... the end of the tenth transmission. a. 8 MSS b. 14 MSS c. 7 MSS d. 12 MSS

Last Answer : c. 7 MSS

Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets

Last Answer : C. Prevent before congestion occurs

Description : _______address is an internetwork address withuniversal jurisdiction. A) physical B) logical C) a and b D) noneof the above

Last Answer : logical

Description : Which of the following is not the layer of TCP/IP protocol? a. Application Layer b. Session Layer c. Transport Layer d. Internetwork layer

Last Answer : b. Session Layer

Description : Four routers haveto be interconnected in a point-to-point Network. Each pair of root us may connect by a high-speed line, a medium speed line ora low speed line. Find the total number of topologies. A. 12 B. 81 C. 48 D. 729

Last Answer : 729

Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive

Last Answer : c. Congestive collapse

Description : Dynamic routing protocol enable routers to a. Dynamically discover and maintain routes b. Distribute routing updates to other routers c. Reach agreement with other routers about the network topology d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm

Last Answer : a. Flow Control Policy

Description : What are called routers? a. The devices that operates at session layer b. The devices that operates at data layer c. The devices that operates at application layer d. The devices that operates at network

Last Answer : d. The devices that operates at network

Description : A subset of a network that includes all the routers but contains no loops is called ________ a. spanning tree b. spider structure c. spider tree d. special tree

Last Answer : a. spanning tree

Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro

Last Answer : d. error control

Description : The subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree

Last Answer : A. spanning tree

Description : One subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree

Last Answer : A. spanning tree

Description : Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control

Last Answer : d) error control

Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : b. Packet sniffer

Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges

Last Answer : a. Host

Description : A network router joins two _________ together? A. Computers B. Switches C. Networks D. Gateway

Last Answer : C. Networks

Description : In the group-shared tree approach,_________ involved in multicasting. A) only the core router is B) all routers are C) only some routers are D) none of the above

Last Answer : only the core router is

Description : In OSPF, when the link between two routers is broken, the administration may create a _________ link between them usinga longer paththat probably goes throughseveral routers. A) point-to-point B) transient C) stub D) none of the above

Last Answer : none of the above

Description : In OSPF, a ________ link connects two routers without anyother host or router in between. A) point-to-point B) transient C) stub D) none of the above

Last Answer : point-to-point

Description : __________ is agroup ofnetworksand routers under theauthorityof a singleadministration. A) An autonomous system B) An area C) a and b D) none of the above

Last Answer : An autonomous system

Description : When data moves from one set of major connections to another on theInternet, we call theseconnections the Internet _____. A) Pathway B) Backbone C) Communications system D) Routers

Last Answer : Backbone

Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially

Last Answer : d. increases exponentially

Description : Which services are provided by transport layer? a. Error control b. Connection service c. Connection less service d. Congestion control

Last Answer : a. Error control

Description : What are the functions of the transport layer? a. Multiplexing/ Demultiplexing b. Connection less Services c. Connection oriented service d. Congestion control

Last Answer : a. Multiplexing/ Demultiplexing

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol

Last Answer : d. routing information protocol

Description : State weather the following statement is true or false for Hierarchical Routing 1). In hierarchical routing, the routers are divided into regions. 2) Each router is having the idea about internal structure of other regions 3). ... C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true

Last Answer : D. 1. true, 2. false, 3. true

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above

Last Answer : A. slow-start

Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls

Last Answer : B. Unix

Description : Explain the Congestion Avoidance techniques in detail.

Last Answer : _ Leaky bucket algorithm _ Token bucket algorithm _ Switch controlling the output rate _ Flowchart

Description : Explain about congestion control

Last Answer : Congestion avoidance ∙ BECN ∙ FECN ∙ Four situations ∙ Discarding

Description : Define Congestion Control.

Last Answer : It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.

Description : A ________ switch combines crossbar switches inseveral (normally three) stages. A) multistage B) multiple crossbar C) multiple path D) none of the above

Last Answer : multistag

Description : A ________network is made of a set of switches connected by physical links, in which each link is divided into nchannels. A) line-switched B) frame-switched C) circuit-switched D) none of the above

Last Answer : circuit-switched