Congestion control can control traffic entry
into a telecommunications network, so to
avoid _________
a. Congestive connection
b. Connection collapse
c. Congestive collapse
d. Collapse congestive

1 Answer

Answer :

c. Congestive collapse

Related questions

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol

Last Answer : d. routing information protocol

Description : Which services are provided by transport layer? a. Error control b. Connection service c. Connection less service d. Congestion control

Last Answer : a. Error control

Description : What are the functions of the transport layer? a. Multiplexing/ Demultiplexing b. Connection less Services c. Connection oriented service d. Congestion control

Last Answer : a. Multiplexing/ Demultiplexing

Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm

Last Answer : a. Flow Control Policy

Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro

Last Answer : d. error control

Description : Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control

Last Answer : d) error control

Description : Congestion in a network or internetwork occurs because routers and switches have _______. A. tables B. queues C. crosspoints D. none of the above

Last Answer : B. queues

Description : What is meant by congestion? Why the congestion occurs in network?

Last Answer : Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.

Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity

Last Answer : b. Traffic control

Description : Acute renal failure (ARF) may be caused by all of the following except (a) Acute tubular necrosis (ATN) due to drug therapy (e.g., aminoglycosides, contrast media) (b) Severe hypotension ... (c) Decreased cardiac output, as from congestive heart failure (d) Hemolysis, myoglobinuria (e) Hyperkalemia

Last Answer : Ans: E

Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially

Last Answer : d. increases exponentially

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets

Last Answer : C. Prevent before congestion occurs

Description : Explain about congestion control

Last Answer : Congestion avoidance ∙ BECN ∙ FECN ∙ Four situations ∙ Discarding

Description : Define Congestion Control.

Last Answer : It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.

Description : Which of the following statement is incorrect? a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission. b. Half ... in online activities d. Batch processing is the prefered processing mode for telecommunication operation.

Last Answer : Batch processing is the prefered processing mode for telecommunication operation.

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : Services provided by application layer? A. Web chat B. Error control C. Connection services D. Congestion control

Last Answer : A. Web chat 

Description : In ATM,a virtual connection is definedby _________. A) VPI B) VCI C) DLCI D) acombination of (a) and (b)

Last Answer : acombination of (a) and (b)

Description : Consider an instance of TCP's Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is ... the end of the tenth transmission. a. 8 MSS b. 14 MSS c. 7 MSS d. 12 MSS

Last Answer : c. 7 MSS

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above

Last Answer : A. slow-start

Description : The packet sent by a node to the source to inform it of congestion is called _______ A. Explicit B. Discard C. Choke D. Backpressure

Last Answer : C. Choke

Description : Explain the Congestion Avoidance techniques in detail.

Last Answer : _ Leaky bucket algorithm _ Token bucket algorithm _ Switch controlling the output rate _ Flowchart

Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm

Last Answer : (A) Flow Control Policy

Description : The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ . (1) Access control (2) Congestion (3) Error propagation (4) Deadlock

Last Answer : Congestion

Description : Should there be a 4 day weekwork in US to save on gas and traffic congestion on freeways?

Last Answer : There should be a 4-day work week for sanity sake.

Description : People who live in Los Angeles... how much worse is the traffic/congestion on an in-person event weekend like Superbowl Sunday?

Last Answer : Not too bad for big events, but I've never seen a Super Bowl in LA before. Presidential motorcades are the big disruptor in my experience. Obama came to LA to fundraise and meet with supporters a lot when he was in office, and the traffic impact was always super noticeable.

Description : In mountainous areas a natural cause for road blocks is often : (1) road repairs and construction (2) land slides (3) tree felling (4) traffic congestion

Last Answer : (2) land slides Explanation: Heavy rainfall often causes landslides in hilly regions blocking roads as a result and cutting off towns Huge amounts of debris block access, hampering traffic and affecting businesses.

Description : In mountainous areas a natural cause for road blocks is often : (1) road repairs and construction (2) land slides (3) tree felling (4) traffic congestion

Last Answer : land slides

Description : VLANs can_________. A) reduce network traffic B) provide anextra measure of security C) either (a)or (b) D) both (a) and (b)

Last Answer : both (a) and (b)

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the bus speed. ii) It is multipoint configuration. A) True, True B) B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer

Last Answer : a) network layer

Description : It is proposed network designed by major telephone companies in conjunction with the ITU-T with the intent of providing worldwide telecommunications support for voice, data, video and facsimile information within the same networ

Last Answer : ISDN

Description : Select a travel lane with the least amount of congestion and stay in the lane you have chosen until you need to turn, __________, or avoid a hazard.?

Last Answer : pass another vehicle

Description : What type of network device allows youto share your connection to the Internet with other computers in your home? A) Ethernet card B) NIC C) Router D) Cat 5

Last Answer : Router

Description : What term is used to describe two or more computers that are linkedto eachother? A) Star connection B) Computer system C) Computer network D) Net

Last Answer : Computer network

Description : Carrier is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : a continuous frequency capableof being modulated or impressed witha second signa

Description : Contention is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : the condition whentwo or more stations attempt to use the same channel at the same time

Description : Security based connection is provided by which layer? a. Network layer b. Session layer c. Application layer d. Transport layer

Last Answer : d. Transport layer

Description : In Bluetooth, multiple ________ form a network called a _________. A) scatternet; piconets B) piconets: scatternet C) piconets:bluenet D) bluenet; scatternet

Last Answer : piconets: scatternet

Description : Touse a cable network for data transmission, we needtwo keydevices:a ______ and a _________ A) CM; CMS B) CT; CMTS C) CM; CMTS D) none of the above

Last Answer : CM; CMS

Description : The secondgeneration of cable networks is called a(n) _________ network. A) HFC B) HCF C) CFH D) none of the above

Last Answer : HFC

Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above

Last Answer : virtual-circui

Description : A ring SONET network can be _________. A) unidirectional B) bidirectional. C) either (a) or (b) D) neither (a) nor (b)

Last Answer : bidirectional.

Description : ICMP is a _________ layer protocol. A) datalink B) transport C) network D) noneof the above

Last Answer : network

Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges

Last Answer : a. Host