Description : Congestion in a network or internetwork occurs because routers and switches have _______
Last Answer : queues
Description : The network layer contains which hardware device? a. Routers, Bridges b. Bridges only c. Bridges and switches d. Routers, Bridges and Switches
Last Answer : d. Routers, Bridges and Switches
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : Based onthe Clos criteria, if N = 200, then the minimum number of crosspoints isgreater thanor equal to _______. A) 15,200 B) 18,000 C) 42,000 D) 20,000
Last Answer : 15,200
Description : What is meant by congestion? Why the congestion occurs in network?
Last Answer : Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.
Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : B. 1. true, 2. false, 3.true
Description : In a three-stage space division switch, if N = 200, the number of crosspoints is ______. A) 40,000 B) greater than 40,000 C) less than40,000 D) greater than 100,000
Last Answer : ess than40,00
Description : In a one-stage space division switch, if N = 200, the number of crosspoints is ______. A) 10,000 B) 20,000 C) 40,000 D) 30,000
Last Answer : 40,000
Description : In the original ARPANET,_______ were directly connected together. A) IMPs B) host computers C) networks D) routers
Last Answer : IMPs
Description : The packet sent by a node to the source to inform it of congestion is called _______ A. Explicit B. Discard C. Choke D. Backpressure
Last Answer : C. Choke
Description : Consider an instance of TCP's Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is ... the end of the tenth transmission. a. 8 MSS b. 14 MSS c. 7 MSS d. 12 MSS
Last Answer : c. 7 MSS
Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets
Last Answer : C. Prevent before congestion occurs
Description : _______address is an internetwork address withuniversal jurisdiction. A) physical B) logical C) a and b D) noneof the above
Last Answer : logical
Description : Which of the following is not the layer of TCP/IP protocol? a. Application Layer b. Session Layer c. Transport Layer d. Internetwork layer
Last Answer : b. Session Layer
Description : Four routers haveto be interconnected in a point-to-point Network. Each pair of root us may connect by a high-speed line, a medium speed line ora low speed line. Find the total number of topologies. A. 12 B. 81 C. 48 D. 729
Last Answer : 729
Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive
Last Answer : c. Congestive collapse
Description : Dynamic routing protocol enable routers to a. Dynamically discover and maintain routes b. Distribute routing updates to other routers c. Reach agreement with other routers about the network topology d. All of the above
Last Answer : d. All of the above
Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm
Last Answer : a. Flow Control Policy
Description : Consider a source computer(S) transmitting a file of size 106 bits to a destination computer (D)over a network of two routers (R1 and R2) and three links(L1, L2, and L3). L1connects S to R1; L2 connects R1 to ... file from S to D? a. 1005 ms b. 1010 ms c. 3000 ms d. 3003 ms Answer: Option(a)
Last Answer : a. 1005 ms
Description : What are called routers? a. The devices that operates at session layer b. The devices that operates at data layer c. The devices that operates at application layer d. The devices that operates at network
Last Answer : d. The devices that operates at network
Description : A subset of a network that includes all the routers but contains no loops is called ________ a. spanning tree b. spider structure c. spider tree d. special tree
Last Answer : a. spanning tree
Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro
Last Answer : d. error control
Description : The subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree
Last Answer : A. spanning tree
Description : One subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree
Description : Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control
Last Answer : d) error control
Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures
Last Answer : b. Packet sniffer
Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges
Last Answer : a. Host
Description : A network router joins two _________ together? A. Computers B. Switches C. Networks D. Gateway
Last Answer : C. Networks
Description : In the group-shared tree approach,_________ involved in multicasting. A) only the core router is B) all routers are C) only some routers are D) none of the above
Last Answer : only the core router is
Description : In OSPF, when the link between two routers is broken, the administration may create a _________ link between them usinga longer paththat probably goes throughseveral routers. A) point-to-point B) transient C) stub D) none of the above
Last Answer : none of the above
Description : In OSPF, a ________ link connects two routers without anyother host or router in between. A) point-to-point B) transient C) stub D) none of the above
Last Answer : point-to-point
Description : __________ is agroup ofnetworksand routers under theauthorityof a singleadministration. A) An autonomous system B) An area C) a and b D) none of the above
Last Answer : An autonomous system
Description : When data moves from one set of major connections to another on theInternet, we call theseconnections the Internet _____. A) Pathway B) Backbone C) Communications system D) Routers
Last Answer : Backbone
Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially
Last Answer : d. increases exponentially
Description : Which services are provided by transport layer? a. Error control b. Connection service c. Connection less service d. Congestion control
Last Answer : a. Error control
Description : What are the functions of the transport layer? a. Multiplexing/ Demultiplexing b. Connection less Services c. Connection oriented service d. Congestion control
Last Answer : a. Multiplexing/ Demultiplexing
Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol
Last Answer : a. datagram congestion control protocol
Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.
Last Answer : c. Prevent packets from looping indefinitely
Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol
Last Answer : d. routing information protocol
Description : State weather the following statement is true or false for Hierarchical Routing 1). In hierarchical routing, the routers are divided into regions. 2) Each router is having the idea about internal structure of other regions 3). ... C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true
Last Answer : D. 1. true, 2. false, 3. true
Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c
Last Answer : A. Flooding
Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b
Last Answer : C. Congestion
Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above
Last Answer : A. slow-start
Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls
Last Answer : B. Unix
Description : Explain the Congestion Avoidance techniques in detail.
Last Answer : _ Leaky bucket algorithm _ Token bucket algorithm _ Switch controlling the output rate _ Flowchart
Description : Explain about congestion control
Last Answer : Congestion avoidance ∙ BECN ∙ FECN ∙ Four situations ∙ Discarding
Description : Define Congestion Control.
Last Answer : It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.
Description : A ________ switch combines crossbar switches inseveral (normally three) stages. A) multistage B) multiple crossbar C) multiple path D) none of the above
Last Answer : multistag
Description : A ________network is made of a set of switches connected by physical links, in which each link is divided into nchannels. A) line-switched B) frame-switched C) circuit-switched D) none of the above
Last Answer : circuit-switched