adplus-dvertising
frame-decoration

Question

Which of the following is not a congestion policy at network layer?

a.

Flow Control Policy

b.

Packet Discard Policy

c.

Packet Lifetime Management Policy

d.

Routing Algorithm

Answer: (a).Flow Control Policy

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the following is not a congestion policy at network layer?

Similar Questions

Discover Related MCQs

Q. The combination of an IP address and a port number is known as ...................

Q. A network with bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this network ?

Q. Consider a subnet with 720 routers. If a three-level hierarchy is choosen with eight clusters, each containing 9 regions of 10 routers, then total number of entries in the routing table is ...................

Q. In a classful addressing, the IP addresses with 0 (zero) as network number:

Q. In electronic mail, which of the following protocols allows the transfer of multimedia messages?

Q. A device is sending out data at the rate of 2000 bps. How long does it take to send a file of 1,00,000 characters ?

Q. Infrared signals can be used for short range communication in a closed area using ................... propagation.

Q. A bridge has access to ............... address in the same network.

Q. The minimum frame length for 10 Mbps Ethernet is ............. bytes and maximum is ................ bytes.

Q. The bit rate of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of the signal is ...............

Q. Match the following:

List – I                                    List - II
a. Physical Layer                     i. Allow resources to network access
b. Datalink Layer                     ii. Move packets from one destination to other
c. Network Layer                      iii. Process to process message delivery
d. Transport Layer                   iv. Transmission of bit stream
e. Application Layer                v. Formation of frames

Codes:
      a   b   c    d   e

Q. Object Request Broker (ORB) is

I. A software program that runs on the client as well as on the application server.
II. A software program that runs on the client side only.
III. A software program that runs on the application server, where most of the components reside.

Q. A software agent is defined as

I. A software developed for accomplishing a given task.
II. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task.
III. An open source software for accomplishing a given task.

Q. A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded?

Q. In ................ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.

Q. Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?

Q. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?

Q. The ................ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.

Q. The count-to-infinity problem is associated with

Q. Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames. Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission, the total overhead time is ..............