A. Open-loop and closed-loop
B. Open-control and closed-control
C. Active control and passive control
D. Active loop and passive loop
Explanation: Open loop congestion control techniques are used to prevent congestion before it even happens by enforcing certain policies. Closed loop congestion control techniques are used to treat congestion after it has happened.
A. Remove after congestion occurs
B. Remove after sometime
C. Prevent before congestion occurs
D. Prevent before sending packets
Explanation: Open loop congestion control techniques are used to prevent congestion before it even happens by enforcing certain policies. Retransmission policy, window policy and acknowledgement policy are some policies that might be enforced.
A. Packet is lost
B. Packet is corrupted
C. Packet is needed
D. Packet is error-free
Explanation: Retransmission refers to the sender having to resend the packet to the receiver. It needs to be done only when some anomaly occurs with the packet like when the packet is lost or corrupted.
A. Packet which are not lost
B. Only those packets which are lost or corrupted
C. Packet from starting
D. All the packets
Explanation: In Selective Repeat, the sender side uses a searching algorithm to find the packets which need to be retransmitted based on the negative acknowledgements received and then resends only those packets thus saving bandwidth.
A. Sender
B. Receiver
C. Router
D. Switch
Explanation: The discarding policy adopted by the routers mainly states that the routers discard sensitive or corrupted packets that it receives, thus controlling the integrity of the packet flow. The discarding policy is adopted as an open loop congestion control technique.
A. Remove after congestion occurs
B. Remove after sometime
C. Prevent before congestion occurs
D. Prevent before sending packets
Explanation: In closed loop congestion control, methods are implemented to remove congestion after it occurs. Some of the methods used are backpressure and choke packet.
A. Admission policy
B. Backpressure
C. Forward signaling
D. Backward signaling
Explanation: In this closed loop congestion control technique, the congested node propagates in the opposite direction of the data flow to inform the predecessor node to reduce the flow of packets. This is why this technique is called a node-to-node congestion control technique.
A. Congestion networks
B. Closed circuit networks
C. Open circuit networks
D. Virtual circuit networks
Explanation: In Virtual circuit networks, each node knows the upstream node from which a flow data is coming. So, it makes possible for the congested node to track the source of the congestion and then inform that node to reduce the flow to remove congestion.
A. Explicit
B. Discard
C. Choke
D. Backpressure
Explanation: Choke packet is sent by a node to the source to inform it of congestion. Two choke packet techniques can be used for the operation called hop-by-hop choke packet and source choke packet.
A. Exponentially
B. Additively
C. Multiplicatively
D. Suddenly
Explanation: In slow-start algorithm, the size of the congestion window increases exponentially until it reaches a threshold. When it reaches the threshold, it stops increasing and continues sending packets through the threshold window thus preventing congestion.