19的英文怎么写计算机网络教程自顶向下方法选择题及答案-Chapt-4-Network-Layer-QUIZZ
Chapter 4 Network Layer
1.
Packetizing at the network layer involves
A) Encapsulating the payload at the source
B) Adds a header that contains the source and destination information
C) Decapsulating the payload at the destination
D) All of the choices are correct
2.
Routers in the path are not allowed to ___________________________.
A) fragment the packet they receive功和机械能
B) decapsulate the packet
C) change source or destination address
D) All of the choices are correct
3.
The network layer in the Internet provides _________________.
A) comprehensive error and flow control.
B) limited error control, but no flow control.子夜四时歌秋歌
C) comprehensive error control but limited flow control.
D) All of the choices are correct
4.
In a virtual-circuit approach, the forwarding decision is bad on the value of the _____________ field in the packet header.
A) source address
B) destination address
C) label
D) None of the choices are correct
5.
In a datagram approach, the forwarding decision is bad on the value of the _____________ field in the packet header.
A) source address
B) destination address
C) label
D) None of the choices are correct
6.
The performance of a network can be measured in terms of ________.
人工智能排名A) delay
B) throughput
C) packet loss
D) all of the choices are correct
7.
Transmission delay (time) is the ratio of ______________________.
A) transmission rate to packet length
B) transmission rate to distance
C) packet length to transmission rate
D) processing time to transmission rate
8.
Propagation delay (time) is the ratio of ______________________.
A) transmission rate to propagation speed设置输入法
B) propagation speed to distance
C) packet length to propagation speed
D) distance to propagation speed
9.
When the load in the network reaches the network capacity, the packet delay ___________ and the network throughput reaches ______________.
A) increas sharply; its minimum
B) increas sharply; its maximum
C) decreas sharply; its minimum
D) decreas sharply; its maximum
10.
In open-loop congestion control, policies are applied ____________________.
A) to prevent congestion before it happens
B) to alleviate congestion after it happens
C) to either prevent congestion before it happens or to alleviate congestion after it happe
ns
D) None of the choices are correct
11.
The __________________ technique is one of the open-loop congestion policy
A) backpressure
B) choke packet
C) implicit signaling
D) None of the choices are correct
12.
The __________________ technique is one of the clo-loop congestion policy
A) acknowledgment policy
B) choke packet
无尽战刃C) discarding policy
D) None of the choices are correct
13.
IP is a _________ protocol.
A) connection-oriented unreliable
B) connection-oriented reliable
C) connectionless unreliable
D) connectionless reliable
14.
人有悲欢离合月有阴晴圆缺
An HLEN value of decimal 10 means _______.
A) there are 10 bytes of options
B) there are 10 bytes in the header
C) there are 40 bytes of options
D) there are 40 bytes in the header
15.
If the fragment offt has a value of 100, it means that _______.
A) the datagram has not been fragmented
B) the datagram is 100 bytes in size
C) the first byte of the datagram is byte 800
D) None of the choices are correct
16.
What is needed to determine the number of the last byte of a fragment?
A) offt number
B) total length
C) both offt number and the total length
D) None of the choices are correct
>韩国xxxx