ESAT Forouzan - Chapter 23: Congestion Control and Quality of Service Flashcards
The maximum length of time that traffic is generated at the peak rate is called the ___________.
a. Average data rate
b. Maximum burst size
c. Effective bandwidth
d. Constant bit rate
b. Maximum burst size
The ____ is the maximum data rate of the traffic
a. Average data rate
b. Peak data rate
c. Maximum burst size
d. Effective bandwidth
b. Peak data rate
The effective bandwidth is based on _________.
a. Average data rate
b. Peak data rate
c. Maximum burst size
d. All of the above
d. All of the above
_____traffic features sudden data rate changes in very short periods of time.
a. Constant-bit-rate
b. Variable-bit-rate
c. Bursty
d. Peak-bit-rate
c. Bursty
When the load is greater than the capacity, the delay _______
a. Decreases
b. Increases linearly
c. Goes to infinity
d. Goes to zero
c. Goes to infinity
______ is a closed loop mechanism to alleviate congestions
a. A choke point
b. Implicit signaling
c. Explicit signaling
d. All of the above
d. All of the above
For a system using TCP, the sender window size is determined by the _____ window size
a. Receiver
b. Sender
c. Congestion
d. (a) and (c)
d. (a) and (c)
Slow start is used in conjunction with ______as a TCP congestion control strategy
a. Additive increase
b. Additive decrease
c. Multiplicative increase
d. Multiplicative decrease
a. Additive increase
The FECN informs the _____ of congestion while the BECN informs the _____ of congestion
a. Destination; interface
b. Destination; sender
c. Sender; destination
d. Interface; sender
b. Destination; sender
_____ is a flow characteristic in which the delay varies for packets belonging to the same flow
a. Choke point
b. Throughput
c. Additive increase
d. Jitter
c. Additive increase
In _____ queuing the first packet into the queue is the first packet out of the queue
a. FIFO
b. LIFO
c. Priority
d. Weighted fair
a. FIFO
The ____ traffic shaping method gives a host credit for its idle time
a. Leaky bucket
b. Token bucket
c. Traffic bucket
d. Bursty bucket
b. Token bucket
A flow-based QoS model designated for IP is called________
a. Integrated services
b. Differentiated services
c. RSVP
d. Multicast trees
a. Integrated services
A signaling protocol that helps IP create a flow is called _____
a. Integrated services
b. Differentiated services
c. RSVP
d. Multicast trees
c. RSVP
RSVP uses _____ messages
a. Path
b. Resv
c. Resource
d. (a) and (b)
d. (a) and (b)