what is flow control,.

Answers were Sorted based on User's Feedback



what is flow control,...

Answer / ajaz ahmad wani

In computer networking, flow control is the process of
managing the rate of data transmission between two nodes to
prevent a fast sender from over running a slow receiver.
This should be distinguished from congestion control, which
is used for controlling the flow of data when congestion
has actually occurred
Posted By
Ajaz Ahmad Wani
Network Engineer
E-mail-baba.ajaz@gmail.com

Is This Answer Correct ?    5 Yes 0 No

what is flow control,...

Answer / jitendera sinha

flow control is the process in which it prevent the sender
to overflow the buffer of receiver

jitendera sinha

Is This Answer Correct ?    2 Yes 0 No

what is flow control,...

Answer / nikhil maggu

Jeetendra just want to correct you with your last step i.e
3rd step after receiving ACK(reply for request) the
sender(or 1st node) sendsback ACK again that as confirmation
for starting the session

Is This Answer Correct ?    0 Yes 0 No

what is flow control,...

Answer / mr.shahin07

Flow control ensure that one device doesn't overflow another
device with too much data in one connection.

Commonly used flow control technique are - Buffer, Ready/Not
Ready signal & windowing.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Can Anybody tell me if I wanna block all MP3,video sites from cisco 2600 router,how shall i proceed with ACL's?? Please post the steps for the following alonge with detail. Thanks to you all ..appriciated

5 Answers   Cisco,


When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

8 Answers   Wipro,


On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this channel? A.) 64 Kbps B.) 1.544 Mbps C.) 128 Kbps D.) 2.048 Mbps E.) 16 Kbps

4 Answers  


Which of the following is a routing protocols? TCP RIP SMTP UDP

7 Answers  


Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version

1 Answers  






Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether

1 Answers  


What is the function of Layer 2 Device?

3 Answers  


When editing a line in the CLI mode, what does 'CTRL-A' do? A.) Moves you to the previous command. B.) Moves you to the next word. C.) Moves you to the end of the line. D.) Moves you to the next command. E.) Moves you to the beginning of the line.

1 Answers  


Which of the following are examples of the Session Layer? A.) TCP B.) LLC C.) SQL D.) NFS E.) Token Ring

1 Answers  


What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.

1 Answers  


Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables

1 Answers  


Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process

1 Answers  


Categories