网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71)between sending the notification and notification arriving at the source,thousands of additional(72)may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.
A.packets
B.cells
C.message
D.files
B.cells
C.message
D.files
参考答案
参考解析
解析:
在低速网络中,通常采用碰到拥塞时,通过向源端反映使其降低发送速率。而在告诉网络中,这种方式将会恶化,因为在发送通告和通告到达之间会有成千上万的其它数据包到达。在ATM网络中,主要采用允许控制来避免拥塞,当有一台主机要建立一条新的虚连接时,它必须描述它所需的流量和服务等级。
在低速网络中,通常采用碰到拥塞时,通过向源端反映使其降低发送速率。而在告诉网络中,这种方式将会恶化,因为在发送通告和通告到达之间会有成千上万的其它数据包到达。在ATM网络中,主要采用允许控制来避免拥塞,当有一台主机要建立一条新的虚连接时,它必须描述它所需的流量和服务等级。
更多 “In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71)between sending the notification and notification arriving at the source,thousands of additional(72)may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.packets B.cells C.message D.files” 相关考题
考题
根据下面的文字资料回答 66~70 题In low-speed network,it is usually adequate to wait for congestion to occur andthen react to it by telling the source of packets to slow down.In high-speednetworks,this approach oftenworks poorly,because in the( 1 )between sending thenotification and notification arriving at the source,thousands ofadditional( 2 )may aITive.In ATM network,a major tool forpreventing( 3 )is( 4 )control.when a host wants a new virtual( 5 ),it mustdescribe the traffic to be offered and the service expected.第66题:文中( 1 )处正确的答案是( )。A.intervalB.timeC.slotD.delay
考题
●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.(71)~(72)A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices(73)~(75) A.BufferB.Source-quench messagesC.BufferingD.Windowing
考题
● An internet is a combination of networks connected by (71) . When a datagram goes from a source to a (72) , it will probably pass many (73) until it reaches the router attached to the destination network. A router receives a (74) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?(71)A. modemsB. routersC. switchesD. computers(72)A. userB. hostC. cityD. destination(73)A. destinationsB. routersC. packetsD. computers(74)A. destinationB. resourceC. packetD. source(75)A. pathwaysB. routersC. diagramsD. calls
考题
The network layer provides services to the transport layer.It can be based on either (1).In both cases,its main job is (2) packets from the source to the destination.In network layer,subnets can easily become congested,increasing the delay and (3).for packets.Network designers attempt to avoid congestion by proper design.Techniques include (4) policy,caching,flowcontrol,and more.The next step beyond just dealing with congestion is to actually try to achieve a promised quality of service.The methods that can be used for this include buffering at the client,traffic shaping,resource (5),and admission control.Approaches that have been designed for good quality of service include integrated services(including RSVP) ,differentiated services, and MPLS.(1)A.virtual circuits or datagramsB.TCP or UDPC.TCP or IPD.IP or ARP
考题
Flow control is a function that prevents network congestion by ensuring that _( )_ do not overwhelm_( )_ with data.There are three commonly used methods for handling network congestion._( )_is used by network devices to temporarily store bursts of excess data in memory until they can be processed._( )_ are used by receiving devices to help prevent their buffers from overflowing._( )_ is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering
考题
●In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks, this approach often works poorly, because in the (71) between sending the notification and notification arriving at the source, thousands of additional (72) may arrive.In ATM network , a major tool for preventing (73) is (74) control.When a host wants a new virtual (75) ,it must describe the traffic to be offered and the service expected.(71) A.intervalB.timeC.slotD.delay(72) A.packetsB.cellsC.messageD.files(73) A.collisionB.congestionC.dropD.delay(74) A.flowB.admissionC.trafficD.time(75) A.pathB.routC.circuitD.way
考题
In low-speed network,it is usually adequate to wait for congestion to occur and then react to it bytelling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71) between sending the notification and notification arriving at the source,thousands of additional(72) may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offeredand the service expected.(69)A.intervalB.timeC.slotD.delay
考题
An internet is a combination of networks connected by (71) .When a datagram goes from a source to a (72) ,it will probably pass many (73) until it reaches the router attached to the destination network.A router receives a (74) from a network and passes it to another network.A router is usually attached to several networks.When it receives a packet,to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?A.modemsB.routersC.switchesD.computers
考题
In low - speed network ,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down. In high - speed networks, this approach often works poorly, because in the(71)between sending the notification and notification arriving at the source, thousands of additional(72)may arrive. In ATM network , a major tool for preventing(73)is(74)control. When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.intervalB.timeC.slotD.delay
考题
In low-speed network, it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down. In high-speed networks, this approach often works poorly, because in the(71)between sending the notification and notification arriving at the source, thousands of additional(72)may arrive. In ATM network , a major tool for pre- venting(73)is(74)control. When a host wants a new virtual(75), it must describe the traffic to be offered and the service expected.A.intervalB.timeC.slotD.delay
考题
Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices
考题
Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices
考题
The high-speed data services for the interconnection of computer networks are usually referred to as ______ connections.A.LANsB.MANsC.WANsD.ATM
考题
Without proper safeguards, every part of a network is vulnerable to a security breach or unauthorized activity from ( ), competitors, or even employees. Many of the organizations that manage their own ( ) network security and use the Internet for more than just sending/receiving e-mails experience a network ( )— and more than half of these companies do not even know they were attacked. Smaller ( ) are often complacent, having gained a false sense of security. They usually react to the last virus or the most recent defacing of their website. But they are trapped in a situation where they do not have the necessary time and( )to spend on security.A.intrudersB.terminalsC.hostsD.users@@@SXB@@@A.exteriorB.internalC.centreD.middle@@@SXB@@@A.attackB.collapseC.breakdownD.virus@@@SXB@@@A.usersB.campusesC.CompaniesD.networks@@@SXB@@@A.safeguardsB.businessesC.experiencesD.Resources
考题
Users have been complaining that their Frame Relay connection to the corporate site is very slow. The network administrator suspects that the link is overloaded. Based on the partial output of the Router show frame relay pvc command shown in the graphic, which output value indicates to the local router that traffic sent to the corporate site is experiencing congestion?()A. DLCI = 100B. last time PVC status changed 00:25:40C. in BECN packets 192D. in FECN packets 147E. in DE packets 0
考题
Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from(71),competitors,or even employees.Many of the organizations that manage their own(72)network security and use the Internet for more than just sending/receiving e-mails experience a network(73)—and more than half of these companies do not even know they were attacked.Smaller(74)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are trapped in a situation where they do not have the necessary time and(75)to spend on security.
A.users
B.campuses
C.companies
D.networks
考题
●The network layer provides services to the transport layer.It can be based on either(71).In both cases,its main job is(请作答此空)packets from the source to the destination.In network layer,subnets can easily become congested,increasing the delay and(73)for packets.Network designers attempt to avoid congestion by proper design.Techniques include(74)policy,caching,flow control,and more.The next step beyond just dealing with congestion is to actually try to achieve a promised quality of service.The methods that can be used for this include buffering at the client,traffic shaping,resource(75),and admission control.Approaches that have been designed for good quality of service include integrated services(including RSVP),differentiated services,and MPLS.A.dealing with
B.routing
C.sending
D.receiving
考题
In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71)between sending the notification and notification arriving at the source,thousands of additional(72)may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.flow
B.admission
C.traffic
D.time
考题
Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from( ),competitors,or even employees.Many of the organizations that manage their own( )network security and use the Internet for more than just sending/receiving e-mails experience a network( )—and more than half of these companies do not even know they were attacked.Smaller(本题)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are
trapped in a situation where they do not have the necessary time and( )to spend on security.A.users
B.campuses
C.companies
D.networks
考题
An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway?
空白(4)处应选择()A、destinationB、resourceC、packetD、source
考题
What are three benefits of class of service?()A、It can make a slow network faster.B、It can prioritize latency-sensitive traffic.C、It can eliminate congestion.D、It can control congestion.E、It can allocate bandwidth for different classes of traffic.
考题
What is the most common cause of network congestion?()A、aggregation congestion occurring at the core layer where the different distribution layer devices feed traffic to the core-layer switchesB、speed mismatches when moving from a low-speed LAN environment to a higher speed WAN environmentC、flapping Ethernet interfaces caused by misconfigured LAN interfacesD、flapping serial interfaces caused by misconfigured WAN interfacesE、speed mismatches when moving from a high-speed LAN environment to a lower speed WAN environment
考题
In a run sparse-dense-mode multicast network, when rendezvous point down , will the recipient receive the packets send by the source?why?
考题
What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。A、permit all packets matching the first three octets of the source address to all destinationsB、permit all packets matching the last octet of the destination address and accept all source addressesC、permit all packets from the third subnet of the network address to all destinationsD、permit all packets matching the host bits in the source address to all destinationsE、permit all packets to destinations matching the first three octets in the destination address
考题
单选题What is the most common cause of network congestion?()A
aggregation congestion occurring at the core layer where the different distribution layer devices feed traffic to the core-layer switchesB
speed mismatches when moving from a low-speed LAN environment to a higher speed WAN environmentC
flapping Ethernet interfaces caused by misconfigured LAN interfacesD
flapping serial interfaces caused by misconfigured WAN interfacesE
speed mismatches when moving from a high-speed LAN environment to a lower speed WAN environment
考题
单选题What is the effect of the following access list condition? access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。A
permit all packets matching the first three octets of the source address to all destinationsB
permit all packets matching the last octet of the destination address and accept all source addressesC
permit all packets from the third subnet of the network address to all destinationsD
permit all packets matching the host bits in the source address to all destinationsE
permit all packets to destinations matching the first three octets in the destination address
考题
单选题An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway?
空白(4)处应选择()A
destinationB
resourceC
packetD
source
热门标签
最新试卷