Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the three commonly used methods of flow control
used for handling network congestion?

A. Buffering

B. Source-quench messages

C. Error checking

D. Windowing



What are the three commonly used methods of flow control used for handling network congestion? A..

Answer / guest

Answer: A, B, and D

Buffering is used by ?network devices? to temporarily store
bursts of excess data in memory until they can be processed.
Source-quench messages are used by ?receiving devices? to
help their buffers from overflowing. Windowing is when the
source device requires an acknowledgement from the
destination after a certain number of packets have been
transmitted.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CCDA Interview Questions

Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200

1 Answers  


What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer

1 Answers  


How can change k-value in EIGRP configuration.

1 Answers  


When is the route to a node determined in an SRB (Source Route Bridging) Token Ring network? A. Before any data is transmitted B. After the data is transmitted C. During the transmission of data D. After the first frame is transmitted

1 Answers  


It is not necessary to build an entire network to prove your network design. A. True B. False

1 Answers  


What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed

1 Answers  


Which IP address is not a private address? A. 142.18.0.0 B. 10.0.0.0 C. 172.16.0.0 D. 192.168.0.0

1 Answers   NetMax,


In an ATM network, which type of device is in a LAN per ELAN (Emulated LAN)? A. LAN Emulation Workstation B. LAN Emulation Router C. LAN Emulation Server D. LAN Emulation Bridge

1 Answers  


Which Of the Statements best describes VPLS ?

1 Answers   Pari Networks,


Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25

1 Answers  


Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks

1 Answers  


What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.

2 Answers  


Categories