Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

what is GFC?

Posted on 2002-06-06
3
Medium Priority
?
761 Views
Last Modified: 2012-05-04
Hey there,
I'm not clear on what is GFC and the 16 possible values. Could anyone help me out here or does anyone know of any www that provides a complete explanation of it.
thanks
0
Comment
Question by:bhkh
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 11

Accepted Solution

by:
geoffryn earned 100 total points
ID: 7060420
Generic Flow Control.  It is a field in the ATM header.  it is 4 bits long nad there fore has 16 possible values.  It isn't used very often and has local significance.  It provides support for flow control and multiplexing.
0
 

Assisted Solution

by:eumac
eumac earned 100 total points
ID: 7062448
Yes it is a 4 bit field in the ATM cell header but it is not currently being used.

You might find the following web site usefull.

www.unm.edu/~network/presentations/course/chap5/sld001.htm
0
 

Expert Comment

by:CleanupPing
ID: 9155623
bhkh:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0

Featured Post

Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question