|
1 | | In ________ we try to avoid traffic congestion. |
|
| | A) | congestion control |
| | B) | quality of service |
| | C) | either (a) or (b) |
| | D) | both (a) and (b) |
|
2 | | In _________, we try to create an appropriate environment for the traffic. |
|
| | A) | congestion control |
| | B) | quality of service |
| | C) | either (a) or (b) |
| | D) | both (a) and (b) |
|
3 | | Traffic ______ are qualitative values that represent a data flow. |
|
| | A) | controls |
| | B) | descriptors |
| | C) | values |
| | D) | none of the above |
|
4 | | The _______ defines the maximum data rate of the traffic. |
|
| | A) | peak data rate |
| | B) | maximum burst size |
| | C) | effective bandwidth |
| | D) | none of the above |
|
5 | | The________ normally refers to the maximum length of time the traffic is generated at the peak rate. |
|
| | A) | peak data rate |
| | B) | maximum burst size |
| | C) | effective bandwidth |
| | D) | none of the above |
|
6 | | The ________ is a function of three values: average data rate, peak data rate, and maximum burst size. |
|
| | A) | peak data rate |
| | B) | maximum burst size |
| | C) | effective bandwidth |
| | D) | none of the above |
|
7 | | A _________ traffic model has a data rate that does not change. |
|
| | A) | constant bit rate |
| | B) | variable bit rate |
| | C) | bursty |
| | D) | none of the above |
|
8 | | In the ________ traffic model, the rate of the data flow changes in time, with the changes smooth instead of sudden and sharp. |
|
| | A) | constant bit rate |
| | B) | variable bit rate |
| | C) | bursty |
| | D) | none of the above |
|
9 | | In the ______ traffic model, the data rate changes suddenly in a very short time. |
|
| | A) | constant bit rate |
| | B) | variable bit rate |
| | C) | bursty |
| | D) | none of the above |
|
10 | | _______ happens in any system that involves waiting. |
|
| | A) | Congestion |
| | B) | Jamming |
| | C) | Error |
| | D) | none of the above |
|
11 | | Congestion in a network or internetwork occurs because routers and switches have _______. |
|
| | A) | tables |
| | B) | queues |
| | C) | crosspoints |
| | D) | none of the above |
|
12 | | In a network, when the load is much less than the capacity of the network, the delay is _________. |
|
| | A) | at a maximum |
| | B) | at a minimum |
| | C) | constant |
| | D) | none of the above |
|
13 | | In a network, when the load reaches the network capacity, the delay _______. |
|
| | A) | increases sharply |
| | B) | decreases sharply |
| | C) | remains constant |
| | D) | cannot be predicted |
|
14 | | In a network, when the load is below the capacity of the network, the throughput ______________. |
|
| | A) | increases sharply |
| | B) | increases proportionally with the load |
| | C) | declines sharply |
| | D) | declines proportionally with the load |
|
15 | | In a network, after the load reaches the capacity, throughput _______. |
|
| | A) | increases sharply |
| | B) | increases proportionally with the load |
| | C) | declines sharply |
| | D) | declines proportionally with the load |
|
16 | | In ________ congestion control, policies are applied to prevent congestion before it happens. |
|
| | A) | open-loop |
| | B) | closed-loop |
| | C) | either (a) or (b) |
| | D) | neither (a) nor (b) |
|
17 | | In _______ congestion control, mechanisms are used to alleviate congestion after it happens. |
|
| | A) | open-loop |
| | B) | closed-loop |
| | C) | either (a) or (b) |
| | D) | neither (a) nor (b) |
|
18 | | The technique of ________refers to a congestion control mechanism in which a congested node stops receiving data from the immediate upstream node or nodes. |
|
| | A) | backpressure |
| | B) | choke packet |
| | C) | implicit signaling |
| | D) | explicit signaling |
|
19 | | A ___________ is a packet sent by a node to the source to inform it of congestion. |
|
| | A) | backpressure |
| | B) | choke packet |
| | C) | implicit signaling |
| | D) | explicit signaling |
|
20 | | In __________, there is no communication between the congested node or nodes and the source. The source guesses that there is a congestion somewhere in the network from other symptoms. |
|
| | A) | backpressure |
| | B) | choke packet |
| | C) | implicit signaling |
| | D) | explicit signaling |
|
21 | | In the __________ method, the signal is included in the packets that carry data. |
|
| | A) | backpressure |
| | B) | choke packet |
| | C) | implicit signaling |
| | D) | explicit signaling |
|
22 | | In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold. |
|
| | A) | slow-start |
| | B) | congestion avoidance |
| | C) | congestion detection |
| | D) | none of the above |
|
23 | | In the _________ algorithm of TCP, the size of the congestion window increases additively until congestion is detected. |
|
| | A) | slow-start |
| | B) | congestion avoidance |
| | C) | congestion detection |
| | D) | none of the above |
|
24 | | In the ___________ algorithm of TCP, the size of the threshold is dropped to one-half, a multiplicative decrease. |
|
| | A) | slow-start |
| | B) | congestion avoidance |
| | C) | congestion detection |
| | D) | none of the above |
|
25 | | In Frame Relay, the ________ bit warns the sender of congestion in the network. |
|
| | A) | BECN |
| | B) | FECN |
| | C) | either (a) or (b) |
| | D) | neither (a) nor (b) |
|
26 | | In Frame Relay, the ________ bit is used to warn the receiver of congestion in the network. |
|
| | A) | BECN |
| | B) | FECN |
| | C) | either (a) or (b) |
| | D) | neither (a) nor (b) |
|
27 | | Traditionally, ________types of characteristics are attributed to a flow. |
|
| | A) | two |
| | B) | three |
| | C) | four |
| | D) | five |
|
28 | | _________ is a characteristic that a flow needs. Lack of it means losing a packet or acknowledgment, which entails retransmission. |
|
| | A) | Reliability |
| | B) | Delay |
| | C) | Jitter |
| | D) | Bandwidth |
|
29 | | _______ is a flow characteristic that applications can tolerate in different degrees. |
|
| | A) | Reliability |
| | B) | Delay |
| | C) | Jitter |
| | D) | Bandwidth |
|
30 | | ________ is the variation in delay for packets belonging to the same flow. |
|
| | A) | Reliability |
| | B) | Delay |
| | C) | Jitter |
| | D) | Bandwidth |
|
31 | | In ________, queuing packets wait in a buffer (queue) until the node (router or switch) is ready to process them. |
|
| | A) | FIFO |
| | B) | priority |
| | C) | weighted fair |
| | D) | none of the above |
|
32 | | In ________ queuing, packets are first assigned to a priority class. Each class has its own queue. |
|
| | A) | FIFO |
| | B) | priority |
| | C) | weighted fair |
| | D) | none of the above |
|
33 | | In _________ queuing, the packets are assigned to different classes and admitted to different queues. The queues, however, are weighted based on the priority of the queues; higher priority means a higher weight. The system processes packets in each queue in a round-robin fashion with the number of packets selected from each queue based on the corresponding weight. |
|
| | A) | FIFO |
| | B) | priority |
| | C) | weighted fair |
| | D) | none of the above |
|
34 | | In the ______ bucket algorithm, bursty chunks are stored in the bucket and sent out at an average rate. |
|
| | A) | leaky |
| | B) | token |
| | C) | either (a) or (b) |
| | D) | neither (a) nor (b) |
|
35 | | The _______ bucket algorithm allows idle hosts to accumulate credit for the future in the form of tokens. |
|
| | A) | leaky |
| | B) | token |
| | C) | either (a) or (b) |
| | D) | neither (a) nor (b) |
|
36 | | In _________, when a source makes a reservation, it needs to define a flow specification. |
|
| | A) | Integrated Services |
| | B) | Differentiated Services |
| | C) | Connectionless |
| | D) | Connection-Oriented |
|
37 | | _________ is a class-based QoS model designed for IP. |
|
| | A) | Integrated Services |
| | B) | Differentiated Services |
| | C) | Connectionless |
| | D) | Connection-Oriented |
|
38 | | In Frame Relay, the user can never exceed the_________. |
|
| | A) | access rate |
| | B) | committed burst size |
| | C) | committed information rate |
| | D) | excess burst size |
|
39 | | In Frame Relay, a ___________ is the maximum number of bits in a predefined time that the network is committed to transfer without discarding any frame or setting the DE bit. |
|
| | A) | access rate |
| | B) | committed burst size |
| | C) | committed information rate |
| | D) | excess burst size |
|
40 | | In Frame Relay, the _____________ defines an average rate in bits per second. |
|
| | A) | access rate |
| | B) | committed burst size |
| | C) | committed information rate |
| | D) | excess burst size |
|
41 | | In Frame Relay, the ___________ is the maximum number of bits in excess of Bc that a user can send during a predefined time. |
|
| | A) | access rate |
| | B) | committed burst size |
| | C) | committed information rate |
| | D) | excess burst size |
|
42 | | In ATM, the _________ class is designed for customers who need real-time audio or video services. The service is similar to that provided by a dedicated line such as a T line. |
|
| | A) | CBR |
| | B) | VBR |
| | C) | ABR |
| | D) | UBR |
|
43 | | In ATM, the _________ class is divided into two subclasses: real-time (VBR-RT) and non-real-time (VBR-NRT). VBR-RT is designed for those users who need real-time services (such as voice and video transmission) and use compression techniques to create a variable bit rate. VBR-NRT is designed for those users who do not need real-time services but use compression techniques to create a variable bit rate. |
|
| | A) | CBR |
| | B) | VBR |
| | C) | ABR |
| | D) | UBR |
|
44 | | In ATM, the _________ class delivers cells at a minimum rate. If more network capacity is available, this minimum rate can be exceeded. |
|
| | A) | CBR |
| | B) | VBR |
| | C) | ABR |
| | D) | UBR |
|
45 | | In ATM, the _________ class is a best-effort delivery service that does not guarantee anything. |
|
| | A) | CBR |
| | B) | VBR |
| | C) | ABR |
| | D) | UBR |