Deck 2: Networking and Congestion Control

Full screen (f)
exit full mode
Question
The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called …………….

A)migratory hosts
B)stationary hosts
C)mobile hosts
Use Space or
up arrow
down arrow
to flip the card.
Question
The hosts who compute on the run and want to maintain their connections as they move around ……………

A)migratory hosts
B)stationary hosts
C)mobile hosts
Question
What is the type of network in which the routers themselves are mobile?

A)wide area network
B)mobile ad hoc network
C)mobile network
Question
In open loop congestion control techniques, the decisions are based on the ……………

A)without regard to the current state of the network
B)with regard to the current state of the network
C)with regard to the choice of the host
Question
In closed loop congestion control techniques, the decisions are based on the ……………..

A)concept of a feedback loop
B)concept of a forward loop
C)concept of current state of network
Question
..………..is used to validate the identity of the message sender to the recipient

A)encryption
B)decryption
C)digital certificate
Question
When too many packets are present in the subnet, and performance degrades then it leads to ………………..

A)ingestion
B)congestion
C)digestion
Question
What is it goal of congestion control?

A)making sure that subnet is not able to carry the offered traffic
B)making sure that subnet will allow more than the offered packets
C)making sure that subnet is able to carry the offered traffic
Question
The service of open loop congestion control technique is …………………..

A)monitor the system to detect when and where congestion occurs
B)when to accept new traffic
C)pass the information to places where action can be taken
Question
In …………… case higher bandwidth can be achieved.

A)connectionless networks
B)connection oriented networks
C)virtual circuit networks
Question
In transport layer, End to End delivery is the movement of data from ……………….

A)one station to the next station
B)one network to the other network
C)source to destination
Question
The service of closed loop congestion control technique is ………………

A)when to accept new traffic
B)when to discard the packets
C)monitor the system to detect when and where congestion occurs
Question
The solution to increase the capacity when congestion occurs is …………………

A)denying service to the users
B)degrading the service to the users
C)splitting traffic over multiple routes
Question
When the source host receives the choke packet, then the source ………………

A)reduces the capacity of the line
B)reduces the line utilization factor
C)reduces the traffic generation
Question
If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called ………………..

A)priority dropping
B)tail dropping
C)age based dropping
Question
Flow control policy is implemented in ………………….

A)network layer
B)transport layer
C)application layer
Question
For applications such as audio and video streaming, the variation in the packet arrival times is called ……………..

A)random early detection
B)jitter
C)delay difference
Question
The first collision free protocol is ……………….

A)binary countdown
B)basic bitmap
C)reservation protocol
Question
Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called ………………

A)tunnelling
B)routing
C)diverting
Question
FDDI is an acronym for ……………

A)fast data delivery interface
B)fiber distributed data interface
C)fiber distributed digital interface
Question
The address field of a frame in HDLC protocol contains the address of the ……………… station.

A)primary
B)secondary
C)tertiary
Question
In ………………. transmission, the channel capacity is shared by both communicating devices at all times.

A)simplex
B)half-duplex
C)full-duplex
Question
Source routing bridges in the same LANs must have …………… bridge Number.

A)same
B)different
C)source
Question
A repeater takes a weakened or corrupted signal and …………… it.

A)amplifies
B)regenerates
C)resample
Question
The PSTN is an example of …………….. network.

A)packet-switched
B)circuit-switched
C)message-switched
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Networking and Congestion Control
1
The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called …………….

A)migratory hosts
B)stationary hosts
C)mobile hosts
migratory hosts
2
The hosts who compute on the run and want to maintain their connections as they move around ……………

A)migratory hosts
B)stationary hosts
C)mobile hosts
mobile hosts
3
What is the type of network in which the routers themselves are mobile?

A)wide area network
B)mobile ad hoc network
C)mobile network
mobile ad hoc network
4
In open loop congestion control techniques, the decisions are based on the ……………

A)without regard to the current state of the network
B)with regard to the current state of the network
C)with regard to the choice of the host
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
In closed loop congestion control techniques, the decisions are based on the ……………..

A)concept of a feedback loop
B)concept of a forward loop
C)concept of current state of network
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
..………..is used to validate the identity of the message sender to the recipient

A)encryption
B)decryption
C)digital certificate
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
When too many packets are present in the subnet, and performance degrades then it leads to ………………..

A)ingestion
B)congestion
C)digestion
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
What is it goal of congestion control?

A)making sure that subnet is not able to carry the offered traffic
B)making sure that subnet will allow more than the offered packets
C)making sure that subnet is able to carry the offered traffic
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
The service of open loop congestion control technique is …………………..

A)monitor the system to detect when and where congestion occurs
B)when to accept new traffic
C)pass the information to places where action can be taken
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
In …………… case higher bandwidth can be achieved.

A)connectionless networks
B)connection oriented networks
C)virtual circuit networks
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
In transport layer, End to End delivery is the movement of data from ……………….

A)one station to the next station
B)one network to the other network
C)source to destination
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
The service of closed loop congestion control technique is ………………

A)when to accept new traffic
B)when to discard the packets
C)monitor the system to detect when and where congestion occurs
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The solution to increase the capacity when congestion occurs is …………………

A)denying service to the users
B)degrading the service to the users
C)splitting traffic over multiple routes
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
When the source host receives the choke packet, then the source ………………

A)reduces the capacity of the line
B)reduces the line utilization factor
C)reduces the traffic generation
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called ………………..

A)priority dropping
B)tail dropping
C)age based dropping
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Flow control policy is implemented in ………………….

A)network layer
B)transport layer
C)application layer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
For applications such as audio and video streaming, the variation in the packet arrival times is called ……………..

A)random early detection
B)jitter
C)delay difference
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
The first collision free protocol is ……………….

A)binary countdown
B)basic bitmap
C)reservation protocol
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called ………………

A)tunnelling
B)routing
C)diverting
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
FDDI is an acronym for ……………

A)fast data delivery interface
B)fiber distributed data interface
C)fiber distributed digital interface
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
The address field of a frame in HDLC protocol contains the address of the ……………… station.

A)primary
B)secondary
C)tertiary
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
In ………………. transmission, the channel capacity is shared by both communicating devices at all times.

A)simplex
B)half-duplex
C)full-duplex
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Source routing bridges in the same LANs must have …………… bridge Number.

A)same
B)different
C)source
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
A repeater takes a weakened or corrupted signal and …………… it.

A)amplifies
B)regenerates
C)resample
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
The PSTN is an example of …………….. network.

A)packet-switched
B)circuit-switched
C)message-switched
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.