Correct : B. only those packets which are queued in the router at that time will suffer
2. In datagram subnet new route is chosen …………………
Correct : A. for every packet sent
3. For a connection oriented service, we need a ……………
Correct : C. datagram subnet
4. In ………………, each packet of a message follows the same path from sender to receiver.
Correct : A. circuit switching
5. A permanent virtual circuit involves ……………..
Correct : B. data transfer
6. The set of optimal routes from all sources to a given destination from a tree rooted to the destination is known as ……………..
Correct : C. sink tree
7. Adaptive routing algorithms get their information from ………….
Correct : C. from locally, adjacent, external routers
8. In Hierarchical routing for N router subnet, the optimal number of levels is …………..
Correct : C. lnn (
9. The router algorithm takes the decision to changes the route when ……………..
Correct : B. topology changes
10. If route from router I to router J is computed on line based on the current statistics, then it is called as ………………..
Correct : A. dynamic routing
11. If the subnet uses virtual circuits internally, routing decisions are made only when a new virtual circuit is being setup. This is called as……………..
Correct : A. session routing
12. …………….. change their routing decisions to reflect changes in the topology.
Correct : B. adaptive algorithms
13. If router J is on the optimal path from router I to router K, then the optimal path from J to K also falls along the same route is known as ………………..
Correct : B. optimality principle
14. ……………. do not base their routing decisions on measurements or estimates of the current traffic and topology.
Correct : A. non adaptive algorithms
15. The method of network routing where every possible path between transmitting and receiving DTE is used is called ……………
Correct : B. packet flooding
16. In Hierarchical routing, the routers are divided into what is called as ……………..
Correct : C. regions
17. The regions in Hierarchical routing are grouped in to ……………..
Correct : A. clusters
18. The Clusters in Hierarchical routing are grouped in to ………………
Correct : B. zones
19. If a router sends every incoming packet out only on those lines that are going approximately in the right direction is known as ……………..
Correct : C. selective flooding
20. To do multicast routing, each router computes a …………………
Correct : C. spanning tree
21. In ………………. to send a multicast message a host sends it to the core, which then does the multicast along the spanning tree.
Correct : A. core based trees
22. In distance vector routing algorithm, each router maintains a separate routing table with the following entries.
Correct : C. preferred output line, estimated time
23. In distance vector routing algorithm, the routing tables are updated …………………
Correct : A. by exchanging information with the neighbours
24. In AODV routing algorithm for MANETs, the route is discovered at time
Correct : C. when there is a need for route by the host
25. The processes that keep track of all mobile hosts visiting the area is ……………..
Correct : C. foreign agent
26. The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called …………….
Correct : A. migratory hosts
27. The hosts who compute on the run and want to maintain their connections as they move around ……………
Correct : C. mobile hosts
28. What is the type of network in which the routers themselves are mobile?
Correct : B. mobile ad hoc network
29. In open loop congestion control techniques, the decisions are based on the ……………
Correct : A. without regard to the current state of the network
30. In closed loop congestion control techniques, the decisions are based on the ……………..
Correct : A. concept of a feedback loop
31. ..………..is used to validate the identity of the message sender to the recipient
Correct : C. digital certificate
32. When too many packets are present in the subnet, and performance degrades then it leads to ………………..
Correct : B. congestion
33. What is it goal of congestion control?
Correct : C. making sure that subnet is able to carry the offered traffic
34. The service of open loop congestion control technique is …………………..
Correct : B. when to accept new traffic
35. In …………… case higher bandwidth can be achieved.
Correct : A. connectionless networks
36. In transport layer, End to End delivery is the movement of data from ……………….
Correct : C. source to destination
37. The service of closed loop congestion control technique is ………………
Correct : C. monitor the system to detect when and where congestion occurs
38. The solution to increase the capacity when congestion occurs is …………………
Correct : C. splitting traffic over multiple routes
39. When the source host receives the choke packet, then the source ………………
Correct : C. reduces the traffic generation
40. If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called ………………..
Correct : B. tail dropping
41. Flow control policy is implemented in ………………….
Correct : B. transport layer
42. For applications such as audio and video streaming, the variation in the packet arrival times is called ……………..
Correct : B. jitter
43. The first collision free protocol is ……………….
Correct : B. basic bitmap
44. Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called ………………
Correct : A. tunnelling
45. FDDI is an acronym for ……………
Correct : B. fiber distributed data interface
46. The address field of a frame in HDLC protocol contains the address of the ……………… station.
Correct : B. secondary
47. In ………………. transmission, the channel capacity is shared by both communicating devices at all times.
Correct : C. full-duplex
48. Source routing bridges in the same LANs must have …………… bridge Number.
Correct : B. different
49. A repeater takes a weakened or corrupted signal and …………… it.