In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three layer hierarchy? (A) 10 clusters, 24 regions and 20 routers (B) 12 clusters, 20 regions and 20 routers (C) 16 clusters, 12 regions and 25 routers (D) 15 clusters, 16 regions and 20 routers

1 Answer

Answer :

(D) 15 clusters, 16 regions and 20 routers

Rooters minimum, then regions minimum, then clusters minimum.

Related questions

Description : Consider a subnet with 720 routers. If a three-level hierarchy is choosen with eight clusters, each containing 9 regions of 10 routers, then total number of entries in the routing table is ................... (A) 25 (B) 27 (C) 53 (D) 72

Last Answer : Answer: A  Explanation: Each router needs 10 entries for local routers, 8 entries for routing to other regions within its own cluster, and 7 entries for distant clusters, for a total of 25 entries.

Description : State weather the following statement is true or false for Hierarchical Routing 1). In hierarchical routing, the routers are divided into regions. 2) Each router is having the idea about internal structure of other regions 3). ... C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true

Last Answer : D. 1. true, 2. false, 3. true

Description : The virtual address generated by a CPU is 32 bits. The Translation Lookaside Buffer (TLB) can hold total 64 page table entries and a 4-way set associative (i.e. with 4- cache lines in the set). The page size is 4 KB. The minimum size of TLB tag is (A) 12 bits (B) 15 bits (C) 16 bits (D) 20 bits

Last Answer : (C) 16 bits Explanation: VirtualAddress = 32 bits PageSize = 4KB = 12 bits therefore : VPNTag = 20 bits, OffsetTag = 12 bits TLBEntryLength = VPNTag = 20 bits TotalTLBEntries = 64, 4-way implies ... therefore : TLBIndex = 4 bits TLBTag = TLBEntryLength - TLBIndex = 20 - 4 = 16 bits

Description : How many committees of five people can be chosen from 20 men and 12 women such that each committee contains at least three women? (A) 75240 (B) 52492 (C) 41800 (D) 9900

Last Answer : (B) 52492

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n ≤ m, the expected number of collisions involving a particular key K is (A) less than 1 (B) less than lg n (C) greater than 1 (D) greater than lg n

Last Answer : (A) less than 1

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n≤m, the expected number of collisions involving a particular key x is less than ................... (1) 1 (2) 1/n (3) 1/m (4) n/m

Last Answer : Answer: 1

Description : 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50'. What number is missing? -Riddles

Last Answer : 22

Description : The use of hierarchy in routing tables can ________ the size of the routing tables A. reduce B. increase C. multiply D. retain

Last Answer : A. reduce

Description : Which is the main function of transport layer? A) Node to node delivery B) End to end delivery C) Synchronization d) Updating and maintaining routing tables

Last Answer : B) End to end delivery

Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm

Last Answer : (A) Flow Control Policy

Description : A tree topology (hierarchical topology) can be viewed as a collection of _______in a hierarchy: a) Bus Networks b) Star Networks c) Both of Above d) None of These

Last Answer : b) Star Networks

Description : Which is safer on the freeway: Merging into a cluster of tightly packed cars at the cluster's speed of 60 MPH? Or going around the entire cluster at 80 MPH and then pulling into a clear spot?

Last Answer : answer:What is the speed limit? What kind of roadway? What are the driving conditions? These all play a factor.

Description : A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are assembled from a device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing instructions at an average ... of the DMA transfer? (A) 0.06% (B) 0.12% (C) 1.2% (D) 2.5%

Last Answer : Answer: B

Description : Explain the CCITT hierarchical structure of switching and routing using block schematic.

Last Answer : Hierarchical network are capable of handing heavy traffic where required, and at the same time use minimal number of trunk groups. A 5-level switching hierarchy is recommended by CCITT as ... A strictly hierarchical network suffers from serious drawback i.e. its poor fault tolerance future.

Description : What will be the values of x, m and n after execution of the following statements? Int x, m, n; m=10; n=15; x= ++m + n++; A) x=25, m=10, n=15 B) x=27, m=10, n=15 C) x=26, m=11, n=16 D) x=27, m=11, n=16

Last Answer : C) x=26, m=11, n=16

Description : Dynamic routing protocol enable routers to a. Dynamically discover and maintain routes b. Distribute routing updates to other routers c. Reach agreement with other routers about the network topology d. All of the above

Last Answer : d. All of the above

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1) Transport 2) Network 3) Presentation 4) Session

Last Answer : 2) Network

Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1 Transport 2 Network 3 Presentation 4 Session

Last Answer : 2 Network

Description : What is the function of DDR on Cisco routers? * DDR is dial-on-demand routing. It provides a continuous LAN only connection. * DDR is dial-on-demand routing. It provides routing for high volume ... connection. * DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic.

Last Answer : Correct answer: D DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic. It initiates a call to a remote site when there is traffic to transmit

Description : Let A and B be two fuzzy integers defined as: A={(1,0.3), (2,0.6), (3,1), (4,0.7), (5,0.2)} B={(10,0.5), (11,1), (12,0.5)} Using fuzzy arithmetic operation given by (A) {(11,0.8), (13,1), (15,1)} ( ... ,0.2)} (D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}

Last Answer : (D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}

Description : Seed rate of cluster bean? a 25-30 kg/ha b 15-18 kg/ha c 20-22 kg/ha d 18-20 kg/ha

Last Answer : a 25-30 kg/ha

Description : A top-to-bottom relationship among the items in a database is established by a A) Hierarchical schema B) Network schema C) Relational Schema D) All of the above

Last Answer : A) Hierarchical schema

Description : Which of the following is not a type of Database Management System? (A) Hierarchical (B) Network (C) Relational (D) Sequential 

Last Answer : (D) Sequential

Description : The directory structure used in Unix file system is called (A) Hierarchical directory (B) Tree structured directory (C) Directed acyclic graph (D) Graph structured directory

Last Answer : (C) Directed acyclic graph

Description : In a demand paging memory system, page table is held in registers. The time taken to service a page fault is 8 m.sec. if an empty frame is available or if the replaced page is not modified, and it takes 20 m.secs., if the replaced ... ? (A) 11.6 m.sec. (B) 16.4 m.sec. (C) 28 m.sec. (D) 14 m.sec.

Last Answer : (B) 16.4 m.sec. 

Description : A primary goal of routing and scheduling decisions is to A)determine the sequence in which customers will be called on. B)use existing transportation facilities. C)minimize nonselling time. D)determine frequency and duration of calls.

Last Answer : C)minimize nonselling time.

Description : Float a[15], what is the size of array? A) 17 B) 14 C) 15 D) 16

Last Answer : 16

Description : Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ?  (A) 4 (B) 8 (C) 15 (D) 16

Last Answer : (C) 15 

Description : A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32 page frames. Number of bits required in logical and physical address are respectively: (1) 14 and 15 (2) 14 and 29 (3) 15 and 14 (4) 16 and 32

Last Answer : (3) 15 and 14

Description : Compute the value of adding the following two fuzzy integers: A = {(0.3,1), (0.6,2), (1,3), (0.7,4), (0.2,5)} B = {(0.5,11), (1,12), (0.5,13)} Where fuzzy addition is defined as μA+B(z) = maxx+y=z (min(μA(x), μB( ... ,18)} (D) {(0.3,12), (0.5,13), (0.6,14), (1,15), (0.7,16), (0.5,17), (0.2,18)}

Last Answer : (D) {(0.3,12), (0.5,13), (0.6,14), (1,15), (0.7,16), (0.5,17), (0.2,18)} 

Description : Find the range of the given data : 25, 18, 20, 22, 16, 6, 17, 15, 12, 30, 32, 10, 19, 8, 11, 20 -Maths 9th

Last Answer : Here, the minimum and maximum values of given data are 6 and 32 respectively. Range = 32 – 6 = 26

Description : Find the range of the given data : 25, 18, 20, 22, 16, 6, 17, 15, 12, 30, 32, 10, 19, 8, 11, 20 -Maths 9th

Last Answer : Here, the minimum and maximum values of given data are 6 and 32 respectively. Range = 32 – 6 = 26

Description : The range of the data 25, 18, 20, 22, 16, 6, 17, 15, 12, 30, 32, 10, 19, 8, 11 and 20 is -Maths 9th

Last Answer : In conclusion, the range of data 25, 18, 20, 22, 16, 6, 17, 15, 12, 30, 32, 10, 19, 8, 11, and 20 is 26.

Description : The range of the data 25, 18, 20, 22, 16, 6, 17, 15, 12, 30, 32, 10, 19, 8, 11 and 20 is -Maths 9th

Last Answer : (d) In a given data, maximum value = 32 and minimum value = 6 We know, range of the data = maximum value – minimum value = 32 – 6 = 26 Hence, the range of the given data is 26.

Description : Which of the following types of sampling involves the researcher determining the appropriate sample sizes for the groups identified as important, and then taking convenience samples from those groups? a. ... sampling b. Quota sampling c. One-stage cluster sampling d. Two-stage cluster sampling

Last Answer : b. Quota sampling

Description : The class at the top of exception class hierarchy is .......................... A) ArithmeticException B) Throwable C) Class D) Exception

Last Answer : B) Throwable

Description : Hierarchy decides which operator A) is most important B) is used first C) is fastest D) Operates on largest numbers

Last Answer : B) is used first

Description : HIPO stand for A) Hierarchy input process output B) Hierarchy input plus output C) Hierarchy plus input process output D) Hierarchy input output Process

Last Answer : A) Hierarchy input process output

Description : ormal size of brick used in India is a) 22 x 11.2 x 7 cm* b) 25 x 16 x 8 cm c) 19 x 12 x 9 cm d) 20 x 10 x 5 cm

Last Answer : a) 22 x 11.2 x 7 cm*

Description : During September, 300 labour hours were worked for a total cost of Rs 4800. The variable  overhead expenditure variance was Rs 600 (A). Overheads are assumed to be related to direct labour  hours of active working. What was the standard cost per labour hour? (a) Rs 14 (b) Rs 16.50 (c) Rs 17.50

Last Answer : (a) Rs 14

Description : How many different equivalence relations with exactly three different equivalence classes are there on a set with five elements? (A) 10 (B) 15 (C) 25 (D) 30

Last Answer : (C) 25

Description : Module design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement this rule? (A) Inheritance (B) Polymorphism (C) Encapsulation (D) Abstraction

Last Answer : (C) Encapsulation

Description : Five jobs A, B, C, D and E are waiting in Ready Queue. Their expected runtimes are 9, 6, 3, 5 and x respectively. All jobs entered in Ready queue at time zero. They must run in ............. order to minimize average response time if 3 < ... , C (B) C, E, D, B, A (C) E, D, C, B, A (D) C, B, A, E, D

Last Answer : (B) C, E, D, B, A

Description : A barrier has four inlets A, B, C and D. The barrier can be filled in 24 minutes through the first three inlets and it can be filled in 30 minutes through the second, the third and fourth inlet also it can be ... all the four inlets? A) 10 mins B) 15 mins C) 20 mins D) 25 mins E) None of the Above

Last Answer : C (1/A + 1/B + 1/C) = 1/24 …(i) (1/B + 1/C + 1/D) = 1/30 …(ii) (1/A + 1/D) = 1/40…(iii) From eqn (i) and (ii) (1/A – 1/D) = 1/120…(iv) From eqn (iii) and (iv) A=60,D=120. Let the time taken to full the tank = s S(1/A + 1/B +1/C +1/D)= 1 S(1/24+1/120) = 1 S= 20 mins

Description : Taper on Cotter is varies from A. 1 in 15 to 1 in 12 B. 1 in 20 to 1 in 15 C. 1 in 25 to 1 in 20 D. 1 in 48 to 1 in 24

Last Answer : D. 1 in 48 to 1 in 24

Description : Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as................. (A) handoff (B) mobile switching (C) mobile routing (D) cell switching

Last Answer : (A) handoff 

Description : Which of the following is used in the options field of IPv4 ? (A) Strict source routing (B) Loose source routing (C) time stamp (D) All of the above

Last Answer : (D) All of the above