Deck 2: Networking and Congestion Control

ملء الشاشة (f)
exit full mode
سؤال
The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called …………….

A)migratory hosts
B)stationary hosts
C)mobile hosts
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The hosts who compute on the run and want to maintain their connections as they move around ……………

A)migratory hosts
B)stationary hosts
C)mobile hosts
سؤال
What is the type of network in which the routers themselves are mobile?

A)wide area network
B)mobile ad hoc network
C)mobile network
سؤال
In open loop congestion control techniques, the decisions are based on the ……………

A)without regard to the current state of the network
B)with regard to the current state of the network
C)with regard to the choice of the host
سؤال
In closed loop congestion control techniques, the decisions are based on the ……………..

A)concept of a feedback loop
B)concept of a forward loop
C)concept of current state of network
سؤال
..………..is used to validate the identity of the message sender to the recipient

A)encryption
B)decryption
C)digital certificate
سؤال
When too many packets are present in the subnet, and performance degrades then it leads to ………………..

A)ingestion
B)congestion
C)digestion
سؤال
What is it goal of congestion control?

A)making sure that subnet is not able to carry the offered traffic
B)making sure that subnet will allow more than the offered packets
C)making sure that subnet is able to carry the offered traffic
سؤال
The service of open loop congestion control technique is …………………..

A)monitor the system to detect when and where congestion occurs
B)when to accept new traffic
C)pass the information to places where action can be taken
سؤال
In …………… case higher bandwidth can be achieved.

A)connectionless networks
B)connection oriented networks
C)virtual circuit networks
سؤال
In transport layer, End to End delivery is the movement of data from ……………….

A)one station to the next station
B)one network to the other network
C)source to destination
سؤال
The service of closed loop congestion control technique is ………………

A)when to accept new traffic
B)when to discard the packets
C)monitor the system to detect when and where congestion occurs
سؤال
The solution to increase the capacity when congestion occurs is …………………

A)denying service to the users
B)degrading the service to the users
C)splitting traffic over multiple routes
سؤال
When the source host receives the choke packet, then the source ………………

A)reduces the capacity of the line
B)reduces the line utilization factor
C)reduces the traffic generation
سؤال
If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called ………………..

A)priority dropping
B)tail dropping
C)age based dropping
سؤال
Flow control policy is implemented in ………………….

A)network layer
B)transport layer
C)application layer
سؤال
For applications such as audio and video streaming, the variation in the packet arrival times is called ……………..

A)random early detection
B)jitter
C)delay difference
سؤال
The first collision free protocol is ……………….

A)binary countdown
B)basic bitmap
C)reservation protocol
سؤال
Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called ………………

A)tunnelling
B)routing
C)diverting
سؤال
FDDI is an acronym for ……………

A)fast data delivery interface
B)fiber distributed data interface
C)fiber distributed digital interface
سؤال
The address field of a frame in HDLC protocol contains the address of the ……………… station.

A)primary
B)secondary
C)tertiary
سؤال
In ………………. transmission, the channel capacity is shared by both communicating devices at all times.

A)simplex
B)half-duplex
C)full-duplex
سؤال
Source routing bridges in the same LANs must have …………… bridge Number.

A)same
B)different
C)source
سؤال
A repeater takes a weakened or corrupted signal and …………… it.

A)amplifies
B)regenerates
C)resample
سؤال
The PSTN is an example of …………….. network.

A)packet-switched
B)circuit-switched
C)message-switched
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Networking and Congestion Control
1
The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called …………….

A)migratory hosts
B)stationary hosts
C)mobile hosts
migratory hosts
2
The hosts who compute on the run and want to maintain their connections as they move around ……………

A)migratory hosts
B)stationary hosts
C)mobile hosts
mobile hosts
3
What is the type of network in which the routers themselves are mobile?

A)wide area network
B)mobile ad hoc network
C)mobile network
mobile ad hoc network
4
In open loop congestion control techniques, the decisions are based on the ……………

A)without regard to the current state of the network
B)with regard to the current state of the network
C)with regard to the choice of the host
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
In closed loop congestion control techniques, the decisions are based on the ……………..

A)concept of a feedback loop
B)concept of a forward loop
C)concept of current state of network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
..………..is used to validate the identity of the message sender to the recipient

A)encryption
B)decryption
C)digital certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
When too many packets are present in the subnet, and performance degrades then it leads to ………………..

A)ingestion
B)congestion
C)digestion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is it goal of congestion control?

A)making sure that subnet is not able to carry the offered traffic
B)making sure that subnet will allow more than the offered packets
C)making sure that subnet is able to carry the offered traffic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
The service of open loop congestion control technique is …………………..

A)monitor the system to detect when and where congestion occurs
B)when to accept new traffic
C)pass the information to places where action can be taken
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
In …………… case higher bandwidth can be achieved.

A)connectionless networks
B)connection oriented networks
C)virtual circuit networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
In transport layer, End to End delivery is the movement of data from ……………….

A)one station to the next station
B)one network to the other network
C)source to destination
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
The service of closed loop congestion control technique is ………………

A)when to accept new traffic
B)when to discard the packets
C)monitor the system to detect when and where congestion occurs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
The solution to increase the capacity when congestion occurs is …………………

A)denying service to the users
B)degrading the service to the users
C)splitting traffic over multiple routes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
When the source host receives the choke packet, then the source ………………

A)reduces the capacity of the line
B)reduces the line utilization factor
C)reduces the traffic generation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called ………………..

A)priority dropping
B)tail dropping
C)age based dropping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
Flow control policy is implemented in ………………….

A)network layer
B)transport layer
C)application layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
For applications such as audio and video streaming, the variation in the packet arrival times is called ……………..

A)random early detection
B)jitter
C)delay difference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
The first collision free protocol is ……………….

A)binary countdown
B)basic bitmap
C)reservation protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called ………………

A)tunnelling
B)routing
C)diverting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
FDDI is an acronym for ……………

A)fast data delivery interface
B)fiber distributed data interface
C)fiber distributed digital interface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
The address field of a frame in HDLC protocol contains the address of the ……………… station.

A)primary
B)secondary
C)tertiary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
In ………………. transmission, the channel capacity is shared by both communicating devices at all times.

A)simplex
B)half-duplex
C)full-duplex
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
Source routing bridges in the same LANs must have …………… bridge Number.

A)same
B)different
C)source
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
A repeater takes a weakened or corrupted signal and …………… it.

A)amplifies
B)regenerates
C)resample
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
The PSTN is an example of …………….. network.

A)packet-switched
B)circuit-switched
C)message-switched
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.