Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
the three ways to give login access to the router are by the console port auxiliary port and virtual terminal
destination unreachable normal 0 false false false en-in x-none x-none microsoftinternetexplorer4
what does a standard ip access-list use as test criteriaans standard ip access list use only source
name the osi layer which performs code conversion code formatting and encryptionans presentation layer performs code conversion code formatting and
identify the 3 major functions at layer 3 of the osi modelans layer three explains the path forwards the packet and executes software logical
half duplex is analogous to a one a lane bridge it can handle traffic in both directions but no at the similar
identify the purpose of the tcp three step handshakesans the three step handshake establishes the parameters needed for a tcp connection during the
address resolution protocol resolves the mac address if the ip address is known it is a layer 3
switches operate at layer 2 they enhance bandwidth by decreasing the number of devices sharing the media they isolate collisions like a bridge they
reverse address resolution protocol is used to get a layer 3 address if the mac address is called which then facilitates the loading of the
upd is a layer 4 transport protocol it is connection-less due to it does establish a connection thus the 3 step handshake is not needed it does not
recognize the hardware component used to store buffers tables running-configuration etcans ram is the dynamic memory area rom have the boot strap
communication resource sharing and media when many host share their resources with every other or when many devices connect with each other for
illustrate a traffic light is an example of what type of mechanismans a traffic light is an example of flow
grp uses a composite metric complete up of bandwidth and delay by default it updates each 60 seconds and will trigger an update if the topology
recognize the access-list range for an extended ip access-listans ip extended access-lists use the number range of
process to send data is called as encapsulation and process to receive data is called
to split data in pieces is known as segmentation and divide segmentation in pieces called fragmentation
fcs frame check sequencecrc cyclic redundancy check algorithm runs in switch that known as fcs frame check
ip plus port ip on layer 3 and port on layer 4 - in encapsulation socket base decision on network layer -layer
three layers are called upper layersa application layer - 7b presentation layer - 6c session layer -
recognize the two items that tcp and udp share in commonans tcp and upd are both layer 4 transport protocols and both use port number to recognize
any protocol used by an internetwork to exchange routing data within an autonomous system eg rip igrp and
a logical circuit that is created by virtual channel links it carries data among two endpoints in a networkthe one more name for virtual channel is
along any transmission path from a given source to a given destination a group of virtual circuits can be grouped together into what is known as