网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71)between sending the notification and notification arriving at the source,thousands of additional(72)may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.

A.path
B.rout
C.circuit
D.way

参考答案

参考解析
解析:在低速网络中,通常采用碰到拥塞时,通过向源端反映使其降低发送速率。而在告诉网络中,这种方式将会恶化,因为在发送通告和通告到达之间会有成千上万的其它数据包到达。在ATM网络中,主要采用允许控制来避免拥塞,当有一台主机要建立一条新的虚连接时,它必须描述它所需的流量和服务等级。
更多 “In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71)between sending the notification and notification arriving at the source,thousands of additional(72)may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.path B.rout C.circuit D.way” 相关考题
考题 根据下面的文字资料回答 66~70 题In low-speed network,it is usually adequate to wait for congestion to occur andthen react to it by telling the source of packets to slow down.In high-speednetworks,this approach oftenworks poorly,because in the( 1 )between sending thenotification and notification arriving at the source,thousands ofadditional( 2 )may aITive.In ATM network,a major tool forpreventing( 3 )is( 4 )control.when a host wants a new virtual( 5 ),it mustdescribe the traffic to be offered and the service expected.第66题:文中( 1 )处正确的答案是( )。A.intervalB.timeC.slotD.delay

考题 ●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.(71)~(72)A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices(73)~(75) A.BufferB.Source-quench messagesC.BufferingD.Windowing

考题 ● An internet is a combination of networks connected by (71) . When a datagram goes from a source to a (72) , it will probably pass many (73) until it reaches the router attached to the destination network. A router receives a (74) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?(71)A. modemsB. routersC. switchesD. computers(72)A. userB. hostC. cityD. destination(73)A. destinationsB. routersC. packetsD. computers(74)A. destinationB. resourceC. packetD. source(75)A. pathwaysB. routersC. diagramsD. calls

考题 The network layer provides services to the transport layer.It can be based on either (1).In both cases,its main job is (2) packets from the source to the destination.In network layer,subnets can easily become congested,increasing the delay and (3).for packets.Network designers attempt to avoid congestion by proper design.Techniques include (4) policy,caching,flowcontrol,and more.The next step beyond just dealing with congestion is to actually try to achieve a promised quality of service.The methods that can be used for this include buffering at the client,traffic shaping,resource (5),and admission control.Approaches that have been designed for good quality of service include integrated services(including RSVP) ,differentiated services, and MPLS.(1)A.virtual circuits or datagramsB.TCP or UDPC.TCP or IPD.IP or ARP

考题 Flow control is a function that prevents network congestion by ensuring that _( )_ do not overwhelm_( )_ with data.There are three commonly used methods for handling network congestion._( )_is used by network devices to temporarily store bursts of excess data in memory until they can be processed._( )_ are used by receiving devices to help prevent their buffers from overflowing._( )_ is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering

考题 ●In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks, this approach often works poorly, because in the (71) between sending the notification and notification arriving at the source, thousands of additional (72) may arrive.In ATM network , a major tool for preventing (73) is (74) control.When a host wants a new virtual (75) ,it must describe the traffic to be offered and the service expected.(71) A.intervalB.timeC.slotD.delay(72) A.packetsB.cellsC.messageD.files(73) A.collisionB.congestionC.dropD.delay(74) A.flowB.admissionC.trafficD.time(75) A.pathB.routC.circuitD.way

考题 In low-speed network,it is usually adequate to wait for congestion to occur and then react to it bytelling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71) between sending the notification and notification arriving at the source,thousands of additional(72) may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offeredand the service expected.(69)A.intervalB.timeC.slotD.delay

考题 An internet is a combination of networks connected by (71) .When a datagram goes from a source to a (72) ,it will probably pass many (73) until it reaches the router attached to the destination network.A router receives a (74) from a network and passes it to another network.A router is usually attached to several networks.When it receives a packet,to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?A.modemsB.routersC.switchesD.computers

考题 In low - speed network ,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down. In high - speed networks, this approach often works poorly, because in the(71)between sending the notification and notification arriving at the source, thousands of additional(72)may arrive. In ATM network , a major tool for preventing(73)is(74)control. When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.intervalB.timeC.slotD.delay

考题 In low-speed network, it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down. In high-speed networks, this approach often works poorly, because in the(71)between sending the notification and notification arriving at the source, thousands of additional(72)may arrive. In ATM network , a major tool for pre- venting(73)is(74)control. When a host wants a new virtual(75), it must describe the traffic to be offered and the service expected.A.intervalB.timeC.slotD.delay

考题 Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices

考题 Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices

考题 The high-speed data services for the interconnection of computer networks are usually referred to as ______ connections.A.LANsB.MANsC.WANsD.ATM

考题 Without proper safeguards, every part of a network is vulnerable to a security breach or unauthorized activity from ( ), competitors, or even employees. Many of the organizations that manage their own ( ) network security and use the Internet for more than just sending/receiving e-mails experience a network ( )— and more than half of these companies do not even know they were attacked. Smaller ( ) are often complacent, having gained a false sense of security. They usually react to the last virus or the most recent defacing of their website. But they are trapped in a situation where they do not have the necessary time and( )to spend on security.A.intrudersB.terminalsC.hostsD.users@@@SXB@@@A.exteriorB.internalC.centreD.middle@@@SXB@@@A.attackB.collapseC.breakdownD.virus@@@SXB@@@A.usersB.campusesC.CompaniesD.networks@@@SXB@@@A.safeguardsB.businessesC.experiencesD.Resources

考题 Users have been complaining that their Frame Relay connection to the corporate site is very slow. The network administrator suspects that the link is overloaded. Based on the partial output of the Router show frame relay pvc command shown in the graphic, which output value indicates to the local router that traffic sent to the corporate site is experiencing congestion?()A. DLCI = 100B. last time PVC status changed 00:25:40C. in BECN packets 192D. in FECN packets 147E. in DE packets 0

考题 Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from(71),competitors,or even employees.Many of the organizations that manage their own(72)network security and use the Internet for more than just sending/receiving e-mails experience a network(73)—and more than half of these companies do not even know they were attacked.Smaller(74)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are trapped in a situation where they do not have the necessary time and(75)to spend on security. A.users B.campuses C.companies D.networks

考题 ●The network layer provides services to the transport layer.It can be based on either(71).In both cases,its main job is(请作答此空)packets from the source to the destination.In network layer,subnets can easily become congested,increasing the delay and(73)for packets.Network designers attempt to avoid congestion by proper design.Techniques include(74)policy,caching,flow control,and more.The next step beyond just dealing with congestion is to actually try to achieve a promised quality of service.The methods that can be used for this include buffering at the client,traffic shaping,resource(75),and admission control.Approaches that have been designed for good quality of service include integrated services(including RSVP),differentiated services,and MPLS.A.dealing with B.routing C.sending D.receiving

考题 In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71)between sending the notification and notification arriving at the source,thousands of additional(72)may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.flow B.admission C.traffic D.time

考题 Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from( ),competitors,or even employees.Many of the organizations that manage their own( )network security and use the Internet for more than just sending/receiving e-mails experience a network( )—and more than half of these companies do not even know they were attacked.Smaller(本题)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are trapped in a situation where they do not have the necessary time and( )to spend on security.A.users B.campuses C.companies D.networks

考题 低速控制()A、low-speed controlB、inching controlC、high-speed controlD、slow-speed control

考题 An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway? 空白(4)处应选择()A、destinationB、resourceC、packetD、source

考题 What are three benefits of class of service?()A、It can make a slow network faster.B、It can prioritize latency-sensitive traffic.C、It can eliminate congestion.D、It can control congestion.E、It can allocate bandwidth for different classes of traffic.

考题 What is the most common cause of network congestion?()A、aggregation congestion occurring at the core layer where the different distribution layer devices feed traffic to the core-layer switchesB、speed mismatches when moving from a low-speed LAN environment to a higher speed WAN environmentC、flapping Ethernet interfaces caused by misconfigured LAN interfacesD、flapping serial interfaces caused by misconfigured WAN interfacesE、speed mismatches when moving from a high-speed LAN environment to a lower speed WAN environment

考题 In a run sparse-dense-mode multicast network, when rendezvous point down , will the recipient receive the packets send by the source?why?

考题 What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。A、permit all packets matching the first three octets of the source address to all destinationsB、permit all packets matching the last octet of the destination address and accept all source addressesC、permit all packets from the third subnet of the network address to all destinationsD、permit all packets matching the host bits in the source address to all destinationsE、permit all packets to destinations matching the first three octets in the destination address

考题 单选题What is the most common cause of network congestion?()A aggregation congestion occurring at the core layer where the different distribution layer devices feed traffic to the core-layer switchesB speed mismatches when moving from a low-speed LAN environment to a higher speed WAN environmentC flapping Ethernet interfaces caused by misconfigured LAN interfacesD flapping serial interfaces caused by misconfigured WAN interfacesE speed mismatches when moving from a high-speed LAN environment to a lower speed WAN environment

考题 单选题What is the effect of the following access list condition?  access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。A permit all packets matching the first three octets of the source address to all destinationsB permit all packets matching the last octet of the destination address and accept all source addressesC permit all packets from the third subnet of the network address to all destinationsD permit all packets matching the host bits in the source address to all destinationsE permit all packets to destinations matching the first three octets in the destination address

考题 单选题An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway? 空白(4)处应选择()A destinationB resourceC packetD source