What are the three commonly used methods of flow control
used for handling network congestion?
A. Buffering
B. Source-quench messages
C. Error checking
D. Windowing
Answer / guest
Answer: A, B, and D
Buffering is used by ?network devices? to temporarily store
bursts of excess data in memory until they can be processed.
Source-quench messages are used by ?receiving devices? to
help their buffers from overflowing. Windowing is when the
source device requires an acknowledgement from the
destination after a certain number of packets have been
transmitted.
| Is This Answer Correct ? | 1 Yes | 1 No |
When doing an RFP (Request for Purchase) for a customer, at what step do you reiterate your solution and the customer requirements? A. Design Requirements B. Design Solution C. Summary D. Appendices
What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed
EIGRP was developed to improve what two protocols? A. OSPF B. RIP C. BGP D. IGRP
The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE
When should you apply SAP filters to Netware service advertisement messages? A. When services are not required for a particular area or network B. Only after service advertisement messages have flooded the network C. Before any type of router convergence takes place D. When no change in network services has taken place for 40 minutes
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address
When designing a flat switched network you can have: A. the same number of IP and IPX nodes without performance degradation B. more IP than IPX nodes on the same segment C. more IPX than IP nodes on the same segment D. more AppleTalk than IP nodes on the same segment
Traffic Shaping does which one of the following? A. Eliminates bottlenecks by throttling back traffic volume at the source or outbound end B. Reduces the frame size so bandwidth is better utilized C. It increases source traffic to a configured bit rate D. Allows you to control hubs and repeaters
What are three ASN.1 (Abstract Syntax Notation One) data types? A. data feeds B. name C. syntax D. encoding
What are two services that the OSPF Hello protocol provides? A. It discovers neighbor routers B. It gets routes from neighbors during startup C. It helps elect a designated router D. It allows administrator to test for connectivity between two devices
What are two true statements regarding DDR (Dial-on-Demand Routing)? A. Allows a router to automatically initiate and end a circuit-switched session B. DDR cannot be configured because it is set with a default configuration C. Can configure it to be used during non-peak hours D. Can only be used with Cisco PIX
How can I release the restriction of CISCO2811C/K9? 10M optical fiber, Speed limit of 125kb / s, made by last network administrator, how can I release the restriction? Please tell me the detail, thanks! Cisco configuration: CISCO2811C/K9 ! ! ! ! ! ! ! interface FastEthernet0/0 description WANpork ip address x.x.x.x 255.255.255.248 ip access-group 110 in no ip proxy-arp ip verify unicast reverse-path ip nat outside ip virtual-reassembly duplex auto speed auto ! interface FastEthernet0/1 description LANpork ip address 192.168.x.x 255.255.255.0 ip access-group 101 in no ip proxy-arp ip verify unicast reverse-path ip nat inside ip virtual-reassembly rate-limit output 1000000 1000000 1000000 conform-action transmit exceed-action drop duplex auto speed auto !