What are the three commonly used methods of flow control
used for handling network congestion?
A. Buffering
B. Source-quench messages
C. Error checking
D. Windowing
Answer / guest
Answer: A, B, and D
Buffering is used by ?network devices? to temporarily store
bursts of excess data in memory until they can be processed.
Source-quench messages are used by ?receiving devices? to
help their buffers from overflowing. Windowing is when the
source device requires an acknowledgement from the
destination after a certain number of packets have been
transmitted.
| Is This Answer Correct ? | 1 Yes | 1 No |
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200
What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer
How can change k-value in EIGRP configuration.
When is the route to a node determined in an SRB (Source Route Bridging) Token Ring network? A. Before any data is transmitted B. After the data is transmitted C. During the transmission of data D. After the first frame is transmitted
It is not necessary to build an entire network to prove your network design. A. True B. False
What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed
Which IP address is not a private address? A. 142.18.0.0 B. 10.0.0.0 C. 172.16.0.0 D. 192.168.0.0
In an ATM network, which type of device is in a LAN per ELAN (Emulated LAN)? A. LAN Emulation Workstation B. LAN Emulation Router C. LAN Emulation Server D. LAN Emulation Bridge
Which Of the Statements best describes VPLS ?
Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25
Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks
What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.