Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Communication
Q:
When a router's buffer overflows it discards packets.
Q:
A codepoint is simply a set of state information at a router that expires unless regularly refreshed from the entity that requestedthe codepoint.
Q:
The use of resource reservation can enable routers to decide ahead of time if they can meet the requirement to deliver a multicasttransmission to all designated multicast receivers and to reserve the appropriate resources if possible.
Q:
Interactive applications such as remote logon and Web access are not sensitive to delay.
Q:
The main task of the router is forwarding packets.
Q:
The routers in an internet are responsible for receiving and forwarding packets through the interconnected set of networks.
Q:
In times of congestion elastic traffic will continue to supply a high load and inelastic traffic will be crowded off.
Q:
The guaranteed service is the most demanding service provided by ISA.
Q:
To avoid unnecessary duplication of packets each router must route packets on the basis of both source and multicast destination.
Q:
Inelastic traffic easily adapts to changes in delay and throughput across an internet.
Q:
The __________ is an index that identifies a security context between a pair of nodes which is configured so that the two nodes share a secret key and parameters relevant to this association.
Q:
The ____________ is an Internet protocol, defined in RFC 2131, that enables dynamic allocation of IP addresses to hosts.
Q:
A ________ is a host or router that changes its point of attachment from one network or subnetwork to another.
Q:
A mobile node is assigned to a particular network, known as its ______ .
Q:
The OpenFlow specification defines three types of tables: flow table, group table, and _______ table.
Q:
________ is a consortium of software providers, content delivery networks, and networking equipment vendors whose purpose is to promote software-defined networking.
Q:
PIM defines two modes of operation: dense-mode protocol and ______ protocol.
Q:
______ is a separate routing protocol, independent of any existing unicast routing protocol, and is designed to extract needed routing information from any unicast routing protocol and may work across multiple ASs with a number of different unicast routing protocols.
Q:
A _______ query is used to learn if any attached device desires reception of packets sent to a specified multicast address, from any of a specified list of sources.
Q:
A ________ query is used to learn if a particular group has any members on an attached network.
Q:
The current version of IGMP defines two message types: Membership Query and ________ .
Q:
IGMP, defined in RFC ______ , is used by hosts and routers to exchange multicast group membership information over a LAN.
Q:
One way to assure that the packet is received by all members of the group is to ________ a copy of each packet to each network in the configuration, over the least-cost route for each network.
Q:
The act of sending a packet from a source to the members of a multicast group is referred to as __________ .
Q:
IP addresses that refer to a group of hosts on one or more networks are referred to as __________ addresses.
Q:
A host or a router is a(n) _________ .
A) link
B) node
C) action
D) foreign agent
Q:
The OpenFlow protocol supports ____________ messages.
A) controller-to-switch
B) asynchronous
C) symmetric
D) all of the above
Q:
__________ describe packet forwarding, packet modification, and group table processing operations.
A) Actions
B) Cookies
C) Data planes
D) Flows
Q:
_________ is an opaque data value chosen by the controller and may be used by the controller to filter flow statistics, flow modifications, and flow deletion.
A) Counter
B) Match field
C) Cookie
D) Priority
Q:
The basic building block of the logical switch architecture is the ________.
A) cookie
B) flow table
C) action set
D) all of the above
Q:
A(n) ________ is a sequence of packets traversing a network that share a set of header field values.
A) flow
B) action set
C) API
D) SDN data plane
Q:
________ is a reason for using SDN domains.
A) Scalability
B) Privacy
C) Incremental deployment
D) All of the above
Q:
_________ is a subtype of a membership query message.
A) General query
B) Group-specific query
C) Group-and-source specific query
D) All of the above
Q:
IGMP _____ allows hosts to specify the list of hosts from which they want to receive traffic.
A) v1
B) v2
C) v3
D) v4
Q:
In IGMP _____ hosts could join a multicast group and routers used a timer to unsubscribe group members.
A) v1
B) v2
C) v3
D) v4
Q:
IGMP _____ enabled a host to request to be unsubscribed from a group.
A) v1
B) v2
C) v3
D) v4
Q:
In ordinary ________ transmission over an internet, in which each datagram has a unique destination network, the task of each router is to forward the datagram along the shortest path from that router to the destination network.
A) multicast
B) multimedia
C) unicast
D) teleconferencing
Q:
Files, graphics, and messages exchanged among active group members in real time is _________ .
A) multimedia
B) real-time workgroup
C) teleconferencing
D) distributed computation
Q:
Intermediate results sent to all participants is _________ .
A) real-time workgroup
B) multimedia
C) distributed computation
D) teleconferencing
Q:
A group of workstations that form a multicast group such that a transmission from any member is received by all other group members is _____________.
A) teleconferencing
B) distributed computation
C) real-time workgroup
D) multimedia
Q:
Minimal encapsulation results in less overhead and can be used if the mobile node, home agent, and foreign agent all agree to do so.
Q:
When the mobile node moves its attachment point to another network, that network is considered a foreign network for this host.
Q:
The host portion of an IP address is used by routers to move a datagram from the source computer to the network to which the target computer is attached.
Q:
OpenFlow can be used with network traffic involving a variety of protocols and network services.
Q:
The SDN controller defines the data flows that occur in the SDN data plane.
Q:
The sparse-mode protocol is appropriate for intra-AS multicast routing and may be viewed as a potential alternative to a multicast version of OSPF known as MOSPF.
Q:
A general query is used to learn which groups have members on an attached network.
Q:
A membership query message is sent by a multicast router.
Q:
Spamming of multicast groups is difficult.
Q:
IGMP takes advantage of the broadcast nature of a LAN to provide an efficient technique for the exchange of information among multiple hosts and routers.
Q:
Each router must determine multicast routing paths on the basis of both source and destination addresses.
Q:
With unicast transmission, the router may be required to forward two or more copies of an incoming datagram.
Q:
In a true multicast strategy the packet is replicated by routers only at branch points of the spanning tree.
Q:
In multicasting only a single copy of the packet is ever transmitted.
Q:
A packet with a multicast address is transmitted on a LAN segment.
Q:
An example of _________ signaling is the explicit congestion notification capability provided in IP and TCP and defined in RFC 3168.
Q:
__________ proposed two procedures, called fast retransmit and fast recovery, that under some circumstances improve on the performance provided by RTO.
Q:
The TCP congestion control measure techniques fall into two categories: retransmission timer management and ________ management.
Q:
________ algorithm addresses RTT variance estimation.
Q:
A _________ empties at a constant rate while the bucket is not empty and fills at a rate dictated by the input stream up to the capacity of the bucket.
Q:
A token bucket traffic specification consists of two parameters: a token replenishment rate and a _________ .
Q:
The ________ scheme provides the input parameters to a policing function.
Q:
________ discriminates between incoming packets that conform to QoS agreement and those that don"t.
Q:
________ is aimed at smoothing out traffic flow by reducing packet clumping that leads to fluctuations in buffer occupancy.
Q:
Fairness, QoS, and reservations are all issues related to congestion control that fall into the category of __________ .
Q:
Explicit congestion signaling approaches can be divided into three general categories: Credit based, rate based, and ________ .
Q:
Typically, _______ congestion control techniques operate over connection-oriented networks and control the flow of packets over individual connections.
Q:
________ is an effective congestion control technique in connectionless, or datagram, configurations, such as datagram packet-switching networks and IP-based internets.
Q:
A _______ is a control packet generated at a congested node and transmitted back to a source node to restrict traffic flow.
Q:
_________ occurs when the number of packets being transmitted through a network begins to approach the packet-handling capacity of the network.
Q:
Defined in RFC 4340, __________ is an unreliable connection-oriented protocol that can include mechanisms for detecting congestion by determining round-trip time and packet drop rates.
A) TCP
B) RTT
C) DCCP
D) RTO
Q:
_________ refers to flows that will back off appropriately in the face of congestion.
A) TCP friendly
B) Fast recovery
C) Congestion collapse
D) Backpressure
Q:
The purpose of the ________ mechanism is to gradually expand the window until acknowledgments are received.
A) slow start
B) window management
C) backpressure
D) none of the above
Q:
________ is a measure used in the implementation of TCP congestion control measures.
A) Fast recovery
B) Slow start
C) Exponential RTO backoff
D) All of the above
Q:
A ________ fills at a constant rate up to the capacity of the bucket and empties at a rate dictated by the input data stream while the bucket is not empty.
A) leaky bucket
B) choke packet
C) slow start
D) token bucket
Q:
A common technique for predicting the next value on the basis of a time series of past values, and the one specified in RFC 793, is _________.
A) Jacobson's algorithm
B) token bucket
C) exponential averaging
D) implicit congestion signaling
Q:
The ________ specifies the amount by which the data rate can exceed the token rate for short periods of time.
A) bucket size
B) choke packet
C) reservation
D) exponential average
Q:
One aspect of a reservation scheme is _______, in which a node in the network monitors the traffic flow and compares it to the traffic contract.
A) traffic policing
B) window management
C) congestion control
D) RTT variance estimation
Q:
__________ schemes are based on providing an explicit data rate limit to the source over a logical connection.
A) Backward
B) Rate based
C) Forward
D) Binary
Q:
_________ schemes are common for end-to-end flow control, in which a destination system uses credit to prevent the source from overflowing the destination buffers.
A) Rate based
B) Backward
C) Binary
D) Credit based