adplus-dvertising
frame-decoration

Question

In the ______ bucket algorithm, bursty chunks are stored in the bucket and sent out at an average rate.

a.

leaky

b.

token

c.

either (a) or (b)

d.

neither (a) nor (b)

Posted under Networking

Answer: (a).leaky

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In the ______ bucket algorithm, bursty chunks are stored in the bucket and sent out at an average rate.

Similar Questions

Discover Related MCQs

Q. The _______ bucket algorithm allows idle hosts to accumulate credit for the future in the form of tokens.

Q. In _________, when a source makes a reservation, it needs to define a flow specification.

Q. _________ is a class-based QoS model designed for IP.

Q. In Frame Relay, the user can never exceed the_________.

Q. In Frame Relay, a ___________ is the maximum number of bits in a predefined time that the network is committed to transfer without discarding any frame or setting the DE bit.

Q. In Frame Relay, the _____________ defines an average rate in bits per second.

Q. In Frame Relay, the ___________ is the maximum number of bits in excess of Bc that a user can send during a predefined time.

Q. In ATM, the _________ class is designed for customers who need real-time audio or video services. The service is similar to that provided by a dedicated line such as a T line.

Q. In ATM, the _________ class is divided into two subclasses: real-time (VBR-RT) and non-real-time (VBR-NRT). VBR-RT is designed for those users who need real-time services (such as voice and video transmission) and use compression techniques to create a variable bit rate. VBR-NRT is designed for those users who do not need real-time services but use compression techniques to create a variable bit rate.

Q. In ATM, the _________ class delivers cells at a minimum rate. If more network capacity is available, this minimum rate can be exceeded.

Q. In ATM, the _________ class is a best-effort delivery service that does not guarantee anything.

Q. The service of closed loop congestion control technique is ..................

Q. The solution to increase the capacity when congestion occurs is .....................

Q. When routers are being inundated by packets that they cannot handle, they just throw them away is known as ...................

Q. Upon receipt of a bad segment, UDP ..............

Q. When the source host receives the choke packet, then the source ..................

Q. If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called ....................

Q. Flow control policy is implemented in ......................

Q. For applications such as audio and video streaming, the variation in the packet arrival times is called .................

Q. Packet discard policy is implemented in .................