Deck 2: Networking and Congestion Control
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 2: Networking and Congestion Control
1
The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called …………….
A)migratory hosts
B)stationary hosts
C)mobile hosts
A)migratory hosts
B)stationary hosts
C)mobile hosts
migratory hosts
2
The hosts who compute on the run and want to maintain their connections as they move around ……………
A)migratory hosts
B)stationary hosts
C)mobile hosts
A)migratory hosts
B)stationary hosts
C)mobile hosts
mobile hosts
3
What is the type of network in which the routers themselves are mobile?
A)wide area network
B)mobile ad hoc network
C)mobile network
A)wide area network
B)mobile ad hoc network
C)mobile network
mobile ad hoc network
4
In open loop congestion control techniques, the decisions are based on the ……………
A)without regard to the current state of the network
B)with regard to the current state of the network
C)with regard to the choice of the host
A)without regard to the current state of the network
B)with regard to the current state of the network
C)with regard to the choice of the host
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
In closed loop congestion control techniques, the decisions are based on the ……………..
A)concept of a feedback loop
B)concept of a forward loop
C)concept of current state of network
A)concept of a feedback loop
B)concept of a forward loop
C)concept of current state of network
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
..………..is used to validate the identity of the message sender to the recipient
A)encryption
B)decryption
C)digital certificate
A)encryption
B)decryption
C)digital certificate
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
When too many packets are present in the subnet, and performance degrades then it leads to ………………..
A)ingestion
B)congestion
C)digestion
A)ingestion
B)congestion
C)digestion
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
What is it goal of congestion control?
A)making sure that subnet is not able to carry the offered traffic
B)making sure that subnet will allow more than the offered packets
C)making sure that subnet is able to carry the offered traffic
A)making sure that subnet is not able to carry the offered traffic
B)making sure that subnet will allow more than the offered packets
C)making sure that subnet is able to carry the offered traffic
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
The service of open loop congestion control technique is …………………..
A)monitor the system to detect when and where congestion occurs
B)when to accept new traffic
C)pass the information to places where action can be taken
A)monitor the system to detect when and where congestion occurs
B)when to accept new traffic
C)pass the information to places where action can be taken
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
In …………… case higher bandwidth can be achieved.
A)connectionless networks
B)connection oriented networks
C)virtual circuit networks
A)connectionless networks
B)connection oriented networks
C)virtual circuit networks
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
In transport layer, End to End delivery is the movement of data from ……………….
A)one station to the next station
B)one network to the other network
C)source to destination
A)one station to the next station
B)one network to the other network
C)source to destination
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
The service of closed loop congestion control technique is ………………
A)when to accept new traffic
B)when to discard the packets
C)monitor the system to detect when and where congestion occurs
A)when to accept new traffic
B)when to discard the packets
C)monitor the system to detect when and where congestion occurs
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The solution to increase the capacity when congestion occurs is …………………
A)denying service to the users
B)degrading the service to the users
C)splitting traffic over multiple routes
A)denying service to the users
B)degrading the service to the users
C)splitting traffic over multiple routes
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
When the source host receives the choke packet, then the source ………………
A)reduces the capacity of the line
B)reduces the line utilization factor
C)reduces the traffic generation
A)reduces the capacity of the line
B)reduces the line utilization factor
C)reduces the traffic generation
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called ………………..
A)priority dropping
B)tail dropping
C)age based dropping
A)priority dropping
B)tail dropping
C)age based dropping
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Flow control policy is implemented in ………………….
A)network layer
B)transport layer
C)application layer
A)network layer
B)transport layer
C)application layer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
For applications such as audio and video streaming, the variation in the packet arrival times is called ……………..
A)random early detection
B)jitter
C)delay difference
A)random early detection
B)jitter
C)delay difference
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
The first collision free protocol is ……………….
A)binary countdown
B)basic bitmap
C)reservation protocol
A)binary countdown
B)basic bitmap
C)reservation protocol
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called ………………
A)tunnelling
B)routing
C)diverting
A)tunnelling
B)routing
C)diverting
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
FDDI is an acronym for ……………
A)fast data delivery interface
B)fiber distributed data interface
C)fiber distributed digital interface
A)fast data delivery interface
B)fiber distributed data interface
C)fiber distributed digital interface
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
The address field of a frame in HDLC protocol contains the address of the ……………… station.
A)primary
B)secondary
C)tertiary
A)primary
B)secondary
C)tertiary
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
In ………………. transmission, the channel capacity is shared by both communicating devices at all times.
A)simplex
B)half-duplex
C)full-duplex
A)simplex
B)half-duplex
C)full-duplex
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Source routing bridges in the same LANs must have …………… bridge Number.
A)same
B)different
C)source
A)same
B)different
C)source
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
A repeater takes a weakened or corrupted signal and …………… it.
A)amplifies
B)regenerates
C)resample
A)amplifies
B)regenerates
C)resample
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
The PSTN is an example of …………….. network.
A)packet-switched
B)circuit-switched
C)message-switched
A)packet-switched
B)circuit-switched
C)message-switched
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck