What are the three commonly used methods of flow control
used for handling network congestion?
A. Buffering
B. Source-quench messages
C. Error checking
D. Windowing
Answer / guest
Answer: A, B, and D
Buffering is used by ?network devices? to temporarily store
bursts of excess data in memory until they can be processed.
Source-quench messages are used by ?receiving devices? to
help their buffers from overflowing. Windowing is when the
source device requires an acknowledgement from the
destination after a certain number of packets have been
transmitted.
| Is This Answer Correct ? | 1 Yes | 1 No |
Which Of the Statements best describes VPLS ?
Which two of the following describe ASN.1 (Abstract Syntax Notation One)? A. It is an abstract routing protocol that is not used very often. B. It is an OSI language for describing data types independent of particular computer structures and representation techniques. C. Consists of only one basic routing algorithm. D. Uses BER (Basic Encoding Rules).
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200
Diagramming application information flow is important because: A. it helps identify heavy traffic paths B. it helps figure out why email gets from one place to another C. it can tell you when to purchase a new router D. it can tell you when to purchase a new switch
Which address is updated at each hop in the path in path switching?
What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.
EIGRP was developed to improve what two protocols? A. OSPF B. RIP C. BGP D. IGRP
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
What are two true statements regarding DDR (Dial-on-Demand Routing)? A. Allows a router to automatically initiate and end a circuit-switched session B. DDR cannot be configured because it is set with a default configuration C. Can configure it to be used during non-peak hours D. Can only be used with Cisco PIX
It is not necessary to build an entire network to prove your network design. A. True B. False
What are three LAPB features supported by SDLC? A. Frame types B. Frame format C. Field functions D. ABM
What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be