Which algorithm is used to shape the bursty
traffic into a fixed rate traffic by averaging
the data rate?
a. solid bucket algorithm
b. spanning tree algorithm
c. hocken helm algorithm
d. leaky bucket algorithm

1 Answer

Answer :

d. leaky bucket algorithm

Related questions

Description : A bridge can use the _________algorithm tocreate aloopless topology. A) binary tree B) spanning tree C) multiway tree D) none of the abov

Last Answer : spanning tree

Description : A subset of a network that includes all the routers but contains no loops is called ________ a. spanning tree b. spider structure c. spider tree d. special tree

Last Answer : a. spanning tree

Description : The subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree

Last Answer : A. spanning tree

Description : One subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree

Last Answer : A. spanning tree

Description : What is Spanning tree?

Last Answer : It is for the bridges to select ports over which they will forward frames. A spanning tree is a subgraph of this graph that covers (spans) all the vertices, but contains no cycles. It keeps all of the vertices of the original graph, but throws out some of the edges.

Description : Data communication system spanning states, countries, or the whole world is ________ a) LAN b) WAN c) MAN d) PAN

Last Answer : b) WAN

Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol

Last Answer : d. routing information protocol

Description : Could it be that the brain arrives at its ideal of facial beauty by averaging?

Last Answer : answer:I think we like symmetry as an indicaton of genetic health. Averaging a lot of pictures, asuming any a-symmetries are random, would lead to symmetric faces with the a-symmetries averaged out. I think that’s the main driver, here.

Description : Which of the following sorting algorithm is in-place a) Counting sort b) Radix sort c) Bucket sort d) None

Last Answer : b) Radix sort

Description : Distance Vector Routing is a……... routing algorithm, it consists of a data structure called a ……… A. Static , routing table B. Dynamic, look-up table C. Dynamic, routing table D. Static, look-up table

Last Answer : C. Dynamic, routing table

Description : The ________ modeprovides synchronizationfor the entire stream of bits must. In other words, it guarantees that the data arrive ata fixed rate. A) synchronous B) asynchronous C) isochronous D) none of the above

Last Answer : isochronous

Description : Inasynchronous transmission, the gap time between bytes is _______. A) fixed B) variable C) afunctionof the data rate D) zero

Last Answer : variable

Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity

Last Answer : b. Traffic control

Description : Buffer overrun can be reduced by using what? a. Traffic control b. Flow control c. Byte orientation d. Data integrity

Last Answer : b. Flow control

Description : Remember Jade Helm 15? It ended, and the southwest is still free! What was the point of all the crazy alarmism?

Last Answer : It was essentially a Texas Militia recruiting tool, and now they can say, “we showed them, they didn’t dare.”

Description : Texans, are you still living free? Has Jade Helm put your town under martial law?

Last Answer :

Description : If you believe that Jade Helm 15 is really about taking over Texas, can you tell me what you think the government's goal (or rationale) would be?

Last Answer : answer:You granted the question for sake of argument, by making it a hypothetical. But in the end you invited only those who think it is real to answer, after you labeled such folks right wing crazies. ... be crazy to play along with the hypothetical at that point. Too bad. It might have been fun.

Description : Because of the reaction of some toward Operation Jade Helm 15 do you think some in government would like to remove private gun ownership from US citizens?

Last Answer : answer:Really How many school children have been murdered in their classrooms in the last 20 years? Nothing has been done. Your guns are safe but your children aren't. And this Texas thing.. ... Texas. Secede already so the nation can move up in the ranks of standardized testing. Fucking idiots.

Description : Why doesn't Hades tell the other gods about the missing helm of darkness?

Last Answer : how about you read the book cheater

Description : Why doesn't Hades tell the other gods about the missing helm of darkness?

Last Answer : how about you read the book cheater

Description : If the steering stand selector switch is allowed to remain in the 'Non-Followup' mode after testing of the steering gear, the rudder will _____________. EL-0097 A. not respond to commands from the ... actuator D. stop moving only when the helm is counter-rotated to put the pump at neutral stroke

Last Answer : Answer: A

Description : Which of the following connected simple graph has exactly one spanning tree? (A) Complete graph (B) Hamiltonian graph (C) Euler graph (D) None of the above

Last Answer : (D) None of the above

Description : __________ conveyor is the most suitable for long distance transportation of cold, non-abrasive granular/irregular shape/fine materials. (A) Bucket (B) Belt (C) Screw (D) Apron

Last Answer : (B) Belt

Description : __________ augments the CSMA algorithm todetect collision. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b

Last Answer : CSMA/CD

Description : The _________ routing uses the Dijkstra algorithm to build aroutingtable. A) distancevector B) link state C) path vector D) none of the above

Last Answer : link state

Description : If delaysare recorded as 10 bit numbers in a 50 router network, and delay vectorsare exchanged twicea second,how muchbandwidth per fill duplex line is occupied by the distributedrouting algorithm? A. 500 bps B. 1500 bps C. 5 bps D. 1000 bps

Last Answer : 1000 bps

Description : A station in a network forwards incoming packets byplacing them on its shortest output queue. Whatrouting algorithm is being used? A. hot potatorouting B. flooding C. static routing D. delta routing E. None of the above

Last Answer : hot potatorouting

Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially

Last Answer : d. increases exponentially

Description : Consider an instance of TCP's Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is ... the end of the tenth transmission. a. 8 MSS b. 14 MSS c. 7 MSS d. 12 MSS

Last Answer : c. 7 MSS

Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm

Last Answer : a. Flow Control Policy

Description : Which of the following routing algorithms can be used for network layer design? a. shortest path algorithm b. distance vector routing c. link state routing d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Flooding is also a……... algorithm, usually generates ………... of duplicate packets. A. Static, vast number B. dynamic , vast number C. Static, less number D. dynamic , less number

Last Answer : A. Static, vast number

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above

Last Answer : A. slow-start

Description : Explain about RSA algorithm.

Last Answer : ∙ Public key Encryption technique. ∙ Encryption algorithm ∙ Decryption algorithm ∙ Security in RSA

Description : Dry powdery solid materials are transported by a __________ conveyor. (A) Belt (B) Bucket (C) Screw (D) None of these

Last Answer : (C) Screw

Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive

Last Answer : c. Congestive collapse

Description : What does PPTP stand for ? Point to Point Transmission Protocol Point to Point Transfer Protocol Point to Point Tunneling Protocol Point to Point Traffic Protoco

Last Answer : Point to Point Tunneling Protocol

Description : Which of the following communication modes support two-way traffic but in only one direction at a time? a. simplex b. half duplex c. three-quarters duplex d. all of the above e. none of the above

Last Answer : half duplex

Description : VLANs can_________. A) reduce network traffic B) provide anextra measure of security C) either (a)or (b) D) both (a) and (b)

Last Answer : both (a) and (b)

Description : In ATM, the ______ layerprovides routing, traffic management, switching, and multiplexing services. A) physical B) ATM C) AAL D) none of the above

Last Answer : ATM

Description : The communication modethat supports two-way traffic but only one direction at atime is A. simplex B. duplex C. half duplex D. multiplex E. None of the above

Last Answer : half duplex

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the bus speed. ii) It is multipoint configuration. A) True, True B) B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex

Last Answer : B) Half-duplex

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : __________ do not take their decisions on measurements or estimates of the current traffic and topology. a. Static algorithms b. Adaptive algorithms c. Non - adaptive algorithms d. Recursive algorithms

Last Answer : c. Non - adaptive algorithms

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : Which type of channel it is where the number of users are stable and the traffic is not bursts? A. static channel B. dynamic channel C. free channel D. both a and c

Last Answer : A. static channel