what is flow control,.
Answers were Sorted based on User's Feedback
Answer / ajaz ahmad wani
In computer networking, flow control is the process of
managing the rate of data transmission between two nodes to
prevent a fast sender from over running a slow receiver.
This should be distinguished from congestion control, which
is used for controlling the flow of data when congestion
has actually occurred
Posted By
Ajaz Ahmad Wani
Network Engineer
E-mail-baba.ajaz@gmail.com
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / jitendera sinha
flow control is the process in which it prevent the sender
to overflow the buffer of receiver
jitendera sinha
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / nikhil maggu
Jeetendra just want to correct you with your last step i.e
3rd step after receiving ACK(reply for request) the
sender(or 1st node) sendsback ACK again that as confirmation
for starting the session
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / mr.shahin07
Flow control ensure that one device doesn't overflow another
device with too much data in one connection.
Commonly used flow control technique are - Buffer, Ready/Not
Ready signal & windowing.
| Is This Answer Correct ? | 0 Yes | 0 No |
How do you disable advanced editing? A.) terminal editing B.) terminal no editing C.) disable editing D.) no terminal editing
What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable
What is the standard ISDN term for a non-native analog telephone? A.) TE1 B.) TA C.) LE D.) TE2 E.) ET
Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding
What are the protocol data units (pdu) in ccna?
What does the term "attenuation" mean in data communication? 1 loss of signal strength as distance increases 2 time for a signal to reach its destination 3 leakage of signals from one cable pair to another 4 strengthening of a signal by a networking device
Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connection-less oriented D.) Incorporates no handshaking
Two of the protocols that can be carried in the Protocol field of an IP packet are? A. TCP B. UDP C. FTP D. TFTP
Which of the following is an example of the Datalink Layer? A.) LLC B.) TCP C.) SQL D.) IPX E.) Token Ring F.) MAC
hi all.. can any one explain the complete topology of stp and rstp how it works . root swtch connects to a root port and then root port conenct to other switchs designated port. i was going thru his site http://www.cisco.com/en/US/tech/tk389/tk621/technologies_whi te_paper09186a0080094cfa.shtml in which DR also exist on root switch only which makes my understanding grim.I had a diff notion of stp all together. please post asap. and if possible refer a url so thst i can read it my self .. thanks
Which of the following are logged when IP access list logging is enabled? A.) source address B.) protocol C.) source port D.) destination address E.) access list number F.) destination port
What is the passive topology in ccna?