What are the three commonly used methods of flow control
used for handling network congestion?
A. Buffering
B. Source-quench messages
C. Error checking
D. Windowing
Answer / guest
Answer: A, B, and D
Buffering is used by ?network devices? to temporarily store
bursts of excess data in memory until they can be processed.
Source-quench messages are used by ?receiving devices? to
help their buffers from overflowing. Windowing is when the
source device requires an acknowledgement from the
destination after a certain number of packets have been
transmitted.
| Is This Answer Correct ? | 1 Yes | 1 No |
What task do you complete to identify organizational objectives that will reflect your design? A. Business Objectives B. Scheduling requirements C. Vacation time D. Meetings
What are metrics used with IGRP? A. Ticks B. Load C. Hops D. Delay
when ever we apply show flash comand on the router it givesthat informatin router#show flash syatem file directory: file length name/status 1 8121000 c2500-js-L.112-18.bin what does it nean plz help i have read it from book but not bale to understand i am looking towards u for the help
What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer
What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be
When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a networking device B. When an SNMP agent wants to inform the SNMP manager about a change of state on the networking device C. When the SNMP manager wants to access large chunks of data D. When the NMS wants to share trap information
How many networks will be advertised using route summarization within an OSPF network if you are given the following networks? 192.108.168.0 192.108.169.0 192.108.170.0 192.108.171.0 192.108.172.0 192.108.173.0 192.108.174.0 192.108.175.0 A. 1 B. 2 C. 3 D. 4 E. 5
Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200
How can change k-value in EIGRP configuration.
The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data