what is flow control,.
Answers were Sorted based on User's Feedback
Answer / ajaz ahmad wani
In computer networking, flow control is the process of
managing the rate of data transmission between two nodes to
prevent a fast sender from over running a slow receiver.
This should be distinguished from congestion control, which
is used for controlling the flow of data when congestion
has actually occurred
Posted By
Ajaz Ahmad Wani
Network Engineer
E-mail-baba.ajaz@gmail.com
Is This Answer Correct ? | 5 Yes | 0 No |
Answer / jitendera sinha
flow control is the process in which it prevent the sender
to overflow the buffer of receiver
jitendera sinha
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / nikhil maggu
Jeetendra just want to correct you with your last step i.e
3rd step after receiving ACK(reply for request) the
sender(or 1st node) sendsback ACK again that as confirmation
for starting the session
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / mr.shahin07
Flow control ensure that one device doesn't overflow another
device with too much data in one connection.
Commonly used flow control technique are - Buffer, Ready/Not
Ready signal & windowing.
Is This Answer Correct ? | 0 Yes | 0 No |
Can Anybody tell me if I wanna block all MP3,video sites from cisco 2600 router,how shall i proceed with ACL's?? Please post the steps for the following alonge with detail. Thanks to you all ..appriciated
When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised
On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this channel? A.) 64 Kbps B.) 1.544 Mbps C.) 128 Kbps D.) 2.048 Mbps E.) 16 Kbps
Which of the following is a routing protocols? TCP RIP SMTP UDP
Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version
Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether
What is the function of Layer 2 Device?
When editing a line in the CLI mode, what does 'CTRL-A' do? A.) Moves you to the previous command. B.) Moves you to the next word. C.) Moves you to the end of the line. D.) Moves you to the next command. E.) Moves you to the beginning of the line.
Which of the following are examples of the Session Layer? A.) TCP B.) LLC C.) SQL D.) NFS E.) Token Ring
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.
Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process