what is flow control,.
Answers were Sorted based on User's Feedback
Answer / ajaz ahmad wani
In computer networking, flow control is the process of
managing the rate of data transmission between two nodes to
prevent a fast sender from over running a slow receiver.
This should be distinguished from congestion control, which
is used for controlling the flow of data when congestion
has actually occurred
Posted By
Ajaz Ahmad Wani
Network Engineer
E-mail-baba.ajaz@gmail.com
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / jitendera sinha
flow control is the process in which it prevent the sender
to overflow the buffer of receiver
jitendera sinha
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / nikhil maggu
Jeetendra just want to correct you with your last step i.e
3rd step after receiving ACK(reply for request) the
sender(or 1st node) sendsback ACK again that as confirmation
for starting the session
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / mr.shahin07
Flow control ensure that one device doesn't overflow another
device with too much data in one connection.
Commonly used flow control technique are - Buffer, Ready/Not
Ready signal & windowing.
| Is This Answer Correct ? | 0 Yes | 0 No |
Which addresses are INCORRECTLY paired with their class? A. 1 to 126, Class A B. 128 to 191, Class A C. 1 to 126, Class B D. 128 to 191, Class B
What is window in networking terms?
Which Distance Vector characteristic can help to speed up convergence? A.) Triggered Updates. B.) Split Horizon. C.) Poison Reverse. D.) Hold Down timers. E.) Inverse ARP.
What is the regional telco office called, where the customers local loop terminates? A.) Demarc B.) DTE C.) DCE D.) CO E.) CPE
When we use extended access-list?
can we configure multiple as on single router using eigrp
What is a backoff on an 802.3 networks A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. it is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged.
Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in
Identify the following command to configure a secret password to 'cisco'? A.) Router(config)#enable password cisco secret B.) Router(config)#enable secret cisco C.) Router(config)#enable secret password cisco D.) Router(config)#set secret = cisco
please name some routed protocol.
Which encapsulation methods are most commonly used with dialup Integrated Services Digital Network (ISDN)? A. IP and IPX B. IP and PPP C. PPP and SDLC D. PPP and HDLC
What utility can you use to see the path a packet takes through an internetwork? A.) Route B.) SNMP C.) Trace D.) Ping