Packets from different flows arrive at a switch or router for _____________
Packets from different flows arrive at a switch or router for _____________
In Congestion, CBR stands for ______________
In Congestion, CBR stands for ______________
In Congestion Control, the warning message goes directly to the___________
In Congestion Control, the warning message goes directly to the___________
In the slow-start algorithm, the size of the congestion window increases exponentially until it reaches _____________
In the slow-start algorithm, the size of the congestion window increases exponentially until it reaches _____________
A mechanism to control the amount and the rate of the traffic sent to the network is called____________
A mechanism to control the amount and the rate of the traffic sent to the network is called____________
Average data rate is equals to_____________
Average data rate is equals to_____________
n Congestion, to define the maximum data rate of the traffic we use_____________
n Congestion, to define the maximum data rate of the traffic we use_____________
The main focus point in Congestion Control and Quality of Services is___________
The main focus point in Congestion Control and Quality of Services is___________
ADR stands for _______________
ADR stands for _______________
In Differentiated Services, each packet contains a field called the____________
In Differentiated Services, each packet contains a field called the____________
The Average Data Rate (ADR), is a useful characteristic of ______________
The Average Data Rate (ADR), is a useful characteristic of ______________
In Quality Service, Jitter is the variation in delay for packets belonging to the _____________
In Quality Service, Jitter is the variation in delay for packets belonging to the _____________
In open-loop congestion control, policies are applied to _____________
In open-loop congestion control, policies are applied to _____________
Four different attributes to control traffic have been devised in______________
Four different attributes to control traffic have been devised in______________
Two classes of services have been defined for ___________
Two classes of services have been defined for ___________
The effective bandwidth is the bandwidth that the network needs to allocate for the___________
The effective bandwidth is the bandwidth that the network needs to allocate for the___________
A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the ___________
A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the ___________
Integrated Services in which the receivers and not the sender makes the reservation is ____________
Integrated Services in which the receivers and not the sender makes the reservation is ____________
In Congestion, the maximum burst size normally refers to the maximum length of time the traffic is generated at the______________
In Congestion, the maximum burst size normally refers to the maximum length of time the traffic is generated at the______________
Scheduling is done on _____________
Scheduling is done on _____________