Flow control is a function that prevents network congestion by ensuring that (66) do not over-whelm (67) with data. There are three commonly used methods for handling network congestion. (68) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (69) are used by receiving devices to help prevent their buffers from overflowing. (70) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
A. transmitting devices
B. transmitted devices
C. receiving devices
D. received devices
查看答案
For each blank, choose the best answer from the four choices and write down on the answer sheet. (11) is a protocol that a host uses to inform a router when it joins Or leaves an Internet multicast group. (12) is an error detection code that most data communication networks use. (13) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information. (14) is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-periodic basis over a range of media. (15) is an identifier of a web page.
(56) is a one-way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string. (57) is a protocol that most USENET machines now use it to allow news articles to propagate from one machine to another over a reliable connection. (58) is an approach preferred by cable TV providers. In this solution the fiber terminates at an opto-electrical converter and the final segment is a shared coaxial cable. (59) is a device used to connect two separate network that use different communication protocol. (60) is a digital-to-digital polar encoding method in which the signal level is always either positive or negative.
A. Router
B. Gateway
C. Bridge
D. hub
(56) is a one-way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string. (57) is a protocol that most USENET machines now use it to allow news articles to propagate from one machine to another over a reliable connection. (58) is an approach preferred by cable TV providers. In this solution the fiber terminates at an opto-electrical converter and the final segment is a shared coaxial cable. (59) is a device used to connect two separate network that use different communication protocol. (60) is a digital-to-digital polar encoding method in which the signal level is always either positive or negative.
A. RTP
B. RTTP
C. FTP
D. NNTP
Networks can be interconnected by different devices in the physical layer networks can be connected by (1) or hubs. Which just move the bits from one network to an identical network. One layer up we find bridges and switches which operate at data link layer. They can accept (2) examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process in me network layer, we have routers that can connect two networks, If two networks have (3) network layer, the router may be able to translate between the packer formats. In the transport layer we find transport gateway, which can interface between two transport connections Finally, in the application layer, application gateways translate message (4) . As an example, gateways between Internet e-mail and X.400 e-mail must (5) the e-mail message and change various header fields.
A. reapers
B. relays
C. packages
D. modems