计算机网络教程自顶向下方法选择题及答案-Chapt-4-Network-Layer-QUIZZ
Chapter 4 Network Layer
1.
Packetizing at the network layer involves
A) Encapsulating the payload at the source
B) Adds a header that contains the source and destination information
C) Decapsulating the payload at the destination
D) All of the choices are correct
2.
Routers in the path are not allowed to ___________________________.
A) fragment the packet they receive
B) decapsulate the packet
C) change source or destination address
generated
D) All of the choices are correct
3.
The network layer in the Internet provides _________________.
A) comprehensive error and flow control.
B) limited error control, but no flow control.
C) comprehensive error control but limited flow control.
D) All of the choices are correct
4.
In a virtual-circuit approach, the forwarding decision is based on the value of the _____________ field in the packet header.
A) source address
B) destination address
C) label
D) None of the choices are correct
5.
In a datagram approach, the forwarding decision is based on the value of the _____________ field in the packet header.
A) source address
B) destination address
C) label
D) None of the choices are correct
6.
The performance of a network can be measured in terms of ________.
A) delay
B) throughput
C) packet loss
D) all of the choices are correct
7.
Transmission delay (time) is the ratio of ______________________.
A) transmission rate to packet length
B) transmission rate to distance
C) packet length to transmission rate
D) processing time to transmission rate
8.
Propagation delay (time) is the ratio of ______________________.
A) transmission rate to propagation speed
B) propagation speed to distance
C) packet length to propagation speed
D) distance to propagation speed
9.
When the load in the network reaches the network capacity, the packet delay ___________ and the network throughput reaches ______________.
A) increases sharply; its minimum
B) increases sharply; its maximum
C) decreases sharply; its minimum
D) decreases sharply; its maximum
10.
In open-loop congestion control, policies are applied ____________________.
A) to prevent congestion before it happens
B) to alleviate congestion after it happens
C) to either prevent congestion before it happens or to alleviate congestion after it happen
s
D) None of the choices are correct
11.
The __________________ technique is one of the open-loop congestion policy
A) backpressure
B) choke packet
C) implicit signaling
D) None of the choices are correct
12.
The __________________ technique is one of the close-loop congestion policy
A) acknowledgment policy
B) choke packet
C) discarding policy
D) None of the choices are correct
13.
IP is a _________ protocol.
A) connection-oriented unreliable
B) connection-oriented reliable
C) connectionless unreliable
D) connectionless reliable
14.
An HLEN value of decimal 10 means _______.
A) there are 10 bytes of options
B) there are 10 bytes in the header
C) there are 40 bytes of options
D) there are 40 bytes in the header
15.
If the fragment offset has a value of 100, it means that _______.
A) the datagram has not been fragmented
B) the datagram is 100 bytes in size
C) the first byte of the datagram is byte 800
D) None of the choices are correct
16.
What is needed to determine the number of the last byte of a fragment?
A) offset number
B) total length
C) both offset number and the total length
D) None of the choices are correct

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。