Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Maryam Khalid

Bronze
Ask Maryam Khalid
82 Visits
0 Followers
0 Questions
Home/ Maryam Khalid/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: October 24, 2021In: Q & A

    How Can Vlan Hopping Attacks Be Prevented On A Network?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 2, 2022 at 1:19 pm

    How Can VLAN Hopping Attacks Be Prevented On A Network? On each nontrunk port, it can disable the STP. On the link of trunks, it uses the ISL encapsulation. On the trunks port, it can use the VLAN 1 as the local VLAN. It can incapacitate the negotiation of the trunk for the trunk ports and technicalRead more

    How Can VLAN Hopping Attacks Be Prevented On A Network?

    • On each nontrunk port, it can disable the STP.
    • On the link of trunks, it uses the ISL encapsulation.
    • On the trunks port, it can use the VLAN 1 as the local VLAN.
    • It can incapacitate the negotiation of the trunk for the trunk ports and technically set the nontrunk ports as an access port. 

    Answer: The attack of VLAN hopping depends on the hacker who is able to form the trunk link along with the switch. The attacks can be prevented with incapacitated DTP and user-facing ports configuration as the static access ports which are helpful. The incapacitation of STP (Spanning tree protocol) can’t erase the attacks as VLAN hopping.

    What is VLAN hopping?

    Virtual local area network hopping or VLAN hopping is the process of attacks on the resource of the VLAN by forwarding the frames to the port which are not accessible through an end system. The major purpose of the attack is to get access to other VLANs on the same network.

    For the process to begin the treat actor has to violate at least one of the VLAN on the given network, which will help the cybercriminals to form the base for the attack on other VLANs which are connected to the same network with the breach.

     How does VLAN hopping cause vulnerability in the security of the network? 

    The weakness in the VLANs is associated with certain features such as:

    • Make the network administrator divide at least one of the switched networks to compare the requirements as functional and security of the system without the need of a new wire or modify the infrastructure.
    • Make the performance of the network better by joining the device which communicate often together.
    • Give the larger network better and improved security by allowing control to the devices such as which one has access or not.

    Splitting the user’s VLANs help in the security improvement because the users are able to access the network which they are requested. And if the one VLAN is attacked by the hacker they will retain it in that network.

    Prevention of VLAN hopping:

    • Better security can prevent the VLAN hopping such as the interface which is untouched should be placed and closed in a VLAN.
    • Try to avoid the VLAN trunk port use if it is not urgent.
    • Extra access ports need to be configured by hand with the help of switch port mode access.
    • The switch spoofing and double tabbing can be avoided with the help of proper switch configuration.
    • To minimize the switch spoofing risk, try to switch off the auto-tracking feature on the switches which are in no need to trunk.
    • The extra port that should not be trunks must be set as the access ports.
    • The double tagging is prevented through three steps such as:
    1. The host must not be on the default Ethernet VLAN or VLAN 1.
    2. The local VLAN on each trunk port should be an unused VLAN ID.
    3. For all trunk ports, the direct tagging of local VLAN must be allowed.
    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: October 24, 2021In: Q & A

    Which Component Is Most Likely To Allow Physical And Virtual?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 2, 2022 at 1:19 pm

    Which component is most likely to allow physical and virtual machines to communicate with each other? VHD. Virtual switch. Hyper V. Host OS. Answer: The virtual switch is mostly responsible to permit the virtual servers and the desktops to communicate on the segment of the network and physical machiRead more

    Which component is most likely to allow physical and virtual machines to communicate with each other?

    • VHD.
    • Virtual switch.
    • Hyper V.
    • Host OS.

    Answer: The virtual switch is mostly responsible to permit the virtual servers and the desktops to communicate on the segment of the network and physical machine. These switches are mostly configured in the hypervisor.

    What do you know about the virtual switch?

    A virtual switch is basically the program which permits only one virtual machine to establish a connection with the other VM.it work is more than transferring the data frames, it can direct form the communication through checks the data frames on the network right before forwarding them to the destination.

    These are generally implanted in the installed software, but they might be present as a fraction of the firm of server hardware. These machines are designed in a way that can’t be connected with NIC (network interface card).it can also merge the virtual switch in a single logical switch, it can be used to enhance the bandwidth and form the active mesh among servers and the switches.

    The switch is basically formed to give the process which lessens the network configuration complexity.it can be done by decreasing the switches in use which are in need to be maintained after we determine the size of the network, its data frames, and the structure. The switch is called the intelligent, which can ensure the integrity of the machines which are part of the network and security.it can be a help for network administrators because moving the place of virtual machine across its host is a time taking and are a great threat to its security.

    Some of the benefits of virtual machines are discussed in the following:

    • The formation and the virtual machine migration are easy with help of it.
    • The network administrator is able to maintain the switch deployment through the hypervisor.
    • Regardless of the physical switch, it can be adaptable to new functions which are either related to hardware or its firmware.

    Virtual switch types

    The types of virtual switch types are discussed below:

    • Private virtual switch: this type of switch allows the switch which is connected with the same host. Communication with the switch outside the host is not possible with it.
    • Internal virtual switch: This switch is almost the same as the private virtual switch except that it also allows communication between VMs and their Hyper-V host.
    • External virtual switch: This switch is responsible to allows the formation of VMs in the host which connects with the outside world.
    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: October 24, 2021In: Q & A

    Which Of The Following Best Describes The Concept Of A Vlan?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 2, 2022 at 1:18 pm

    Which of the following best describes the concept of a VLAN? It is the device on different networks on which various packets are received. The devices are present on the same network but logically linked the way they were working on the separate network. These are the devices that without the use ofRead more

    Which of the following best describes the concept of a VLAN?

    1. It is the device on different networks on which various packets are received.
    2. The devices are present on the same network but logically linked the way they were working on the separate network.
    3. These are the devices that without the use of network addresses can communicate through the help of the internet.

    Answer: The correct answer is option 2 which describes that VLAN is the devices present on the same network but logically linked the way they were working on the separate network.

    VLAN concept describes that in this process the device is divided logically on the data link layer of the OSI model. The devices on the network layer divide the broadcast domain with the help of the concept of VLAN. The broadcast is the process in which one device is designated for the packet all of the devices connected will also receive the packets. This receival of the packets is limited to only switches and the router might not be able to send the packets, for that we need the inter VLAN routing. With the help of the VLAN, various small-sub-networks which are different from each other are formed which are quite easy to handle.

    For the connection with VLAN, there are possible three ways and the connection depends on the devices which are connected such as they are either VLAN-aware (VLAN-aware must know about the formats) or VLAN unaware (these are not aware of the formats and memberships). The VLAN connections are discussed in the following:

    Trunk link

    The devices along with the connection with the trunk link are VLAN-aware. The packets on this connection must have the attached header known as the tagged frames.

    Access link

    The purpose of this link is to establish the link among VLAN-unaware devices with its bridges. Unlike the trunk link, the frames on it have to be untagged.

    Hybrid link

    It is the link that combines both the trunk and access link properties. in this, both VLAN-unaware and aware devices are connected and have both frames tagged and untagged.

    Ranges:

    The ranges of the VLAN are listed below with some works:

    • VLAN 0,4095: these are the taken VLAN ranges that can’t be seen and used.
    • VLAN 1: it is the default range for the switches, all ports of the switches present in VLAN.it can’t be removed or modified but can be used.
    • VLAN 2-1001: it is the general range that can be changed formed, modified, and deleted.
    • VLAN 1002-1005: it is the range for the CISCO default and token ring, and they can’t be deleted.
    • VLAN 1006-4094: it is considered as the extended range.

    Some of the benefits of the VLAN are listed below:

    • Performance is improved with the help of it.
    • It helps in the formation of virtual groups which helps the data retrieval.
    • It is easy to access the control for firewalls, domain without the worry of security.
    • It gives flexibility in the creation, modification, etc.
    • It helps to reduce the cost by developing the broadcast domains.
    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: October 24, 2021In: Q & A

    An All In One Security Appliance Is Best Suited For Which Type Of Implementation?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 2, 2022 at 1:18 pm

    An all-in-one security appliance is best suited for which type of implementation? Answer: An all-in-one security appliance is best suitable for a remote office with no on-site technician. Let’s further discuss the on-site safety technician in the following section: Onsite safety technicians Onsite sRead more

    An all-in-one security appliance is best suited for which type of implementation?

    Answer: An all-in-one security appliance is best suitable for a remote office with no on-site technician. Let’s further discuss the on-site safety technician in the following section:

    Onsite safety technicians

    Onsite safety is important because it might be the cause of many serious problems such as the dangerous element’s exposure, injuries, and the hazardous in the workplace which is difficult to handle.

    Safety consultants are common in the organizations that are responsible to raise awareness about safety, health, and developing an efficient and comfortable environment. The work of the on-site safety consultants is to inspect the companies to make sure that they are applying the safety precautions and comply with state, federal, and general safety codes as the OSHA standard for safety. The safety of the staff is also very important. the on-site safety team fulfills a need of services up to 24-hour on-location stays to a once-a-month audit.

    What do you know about the safety inspection?

    The safety inspection is the method to help the companies to determine the safety hazards and the dangerous experiments taking place in the organizations. It helps the firms to prevent the accepted risk as physical injuries or the causalities that might happen.

    The work which should be assigned to an on-site technician are:

    • Managed and formed the safety and health log for inspection.
    • Make the plan and determine a site-specify safety and health.
    • Make the safety audit report draft.
    • If it is necessary modify the safety rules and regulations.

    What kind of issue related to safety may happen?

    The problem which is accepted to arise due to the issue in the safety regulation are described in the following:

    • The dangerous thing may get exposed.
    • Due to machines, a physical injury occurs.
    • The hazards which are difficult to control such as a chemical.

    The issue can mitigate if the companies consider safety as their top priority, it helps to reduce the injuries, exposure and increase the quality, and the company image gets better.

    Evaluation of the workplace safety

    The main purpose of the on-site safety technician is to ensure the safety of the workers and for that, they are allowed to conduct workplace inspections. The machinery which is given to the employees are also determined by the technicians as their safety labels, if there are up to the standards for the safety .and after the evaluation the technician gives the list of the problems which might cause the damage and ask them to correct them.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: October 24, 2021In: Q & A

    Which Of The Following Are True Regarding Using Multiple Vlans On A Single Switch?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 2, 2022 at 1:17 pm

    Which of the following statements is true regarding using multiple VLANs on a single switch?  The Broadcast domain increases. The collision domain remains the same. The broadcast domain remains the same. The collision domain must decrease. The collision domains increase in number. The broadcast domaRead more

    Which of the following statements is true regarding using multiple VLANs on a single switch? 

    1. The Broadcast domain increases.
    2. The collision domain remains the same.
    3. The broadcast domain remains the same.
    4. The collision domain must decrease.
    5. The collision domains increase in number.
    6. The broadcast domain number must increase.

    Answer: The correct answer is options (2) and (6) .by using the multiple VLAN on a single switch it can make the collision domain remain the same and the broadcast domain number must increase.

    Let’s take a look at how the multiple VLAN on the single switch is used? As the VLAN uses multiple switches more than one VLAN also uses the single switch. The multiple VLAN in the various switches establish the communication through a single link through the switches. for this, the process trunking is used which permits multiple VLAN communication through the single link between the switches.

    What is trunking?

    Trunking is the method that is essential for the data communication system that gives multiple users access to the network with the process of sharing the various lines and frequencies.it is indicated in the name that the technology is a tree-like infrastructure with one trunk and multiple branches. The common use of trunking is in the VHF (very-high-frequency) and the telecommunication system.

    The trunking process is also defined as a network that is capable to manage various signals at the same time. The data which moves through the technology is either audio, video, signals, or images. The network as telecommunication through the world uses the trunking process.it can minimize the size of this network and also increase the bandwidth. Very-high-frequency radio in the police and control center is also due to trunking.

    Moreover, trunking is the key element of the VLANs. The VLAN is the process in which a physically existed network can create the independent virtual logical network broadcast domains. The important link for the communication is the trunk, the switches established a connection with the link and can provide support to various clients by establishing the branches.

    In the share hubs, the VLAN is the improvement of it, VLAN can form the groups of client devices which can easily communicate with each other. On the network which has high traffic, it can be able to reduce the traffic congestion.it can also make the segments for the data that move through the switches. The link can transfer many data packets from the VLANs. the switches are connected through a trunk link to make the ports independently configured with a dedicated VLAN.

    The VLAN trunking can extend the VLAN through the network. when the various VLANs across the network are implemented, the links are in need to make sure that the signals are segregated to reach the designation.it is considered as efficient as multiple VLAN configured on a single port. Multiple VLAN on the single port helps in differentiation and signals routing. The trunking port of VLAN uses the identifying tags so that the frames are marked as they move between the switches. 

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: October 24, 2021In: Q & A

    Refer To The Exhibit. Which Of The Three Cisco Ios Images Shown Will Load Into Ram?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 2, 2022 at 1:03 pm

    Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM? The image is selected based on the boot system command in the configuration. The image is chosen based on the standards of the register configuration. The third Cisco IOS image was chosen on the account of the currenRead more

    Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM?

      1. The image is selected based on the boot system command in the configuration.
      2. The image is chosen based on the standards of the register configuration.
      3. The third Cisco IOS image was chosen on the account of the current IOS command.
      4. The second Cisco IOS image is chosen by the router due to its small size.

    Answer: The correct answer is option 1. During the upgrade or testing of various IOS versions, the boot system is responsible for selecting the image to boot the Cisco device.

    Boot system command 

    For the up-gradation of the copied IOS image when the image is already present in the router flash memory. You must configure the router to update the new image in the boot process using this command. After then saving the changes, refresh the router to boot it with the changing image. After the booting, for the verification of the new image whether it is loaded or not use the show version command.

    In the startup process, the bootstrap investigates the file of startup configuration in the NVRAM for boot system command which defines the name and the position of the Cisco IOS software image to deliver or load. Various boot system commands enter the sequence for a fault-tolerant boot plan.

    The command is considered as the global command which is used to load the Cisco IOS image. Various types of syntax are available such as:

    For flash specification as the main source of the Cisco ISO image.

    Router(config)# boot system flash0://c1900-universalk9-mz.SPA.152-4.M3.bin

    For the image source, the TFTP is specified with ROMmon as the backup and the syntax of the command is:

    Router(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin

    Router(config)# boot system rom

    By default, the router loads the first Cisco IOS image present in flash and runs it. for the verification, the show version command is considered.

    Boot system command on switch and router

    The interface available in the startup-config file is initiated with the Cisco IOS command by the OS of IOS. The file is known as config-text and is present in the flash.

    Let’s take an example in which the boot system command is used to set the variable. the IOS is present in a different folder and the path is also defined. the show boot is used to check the set IOS boot file.

    Automatically boot is tried by the switch along with using the data in the BOOT environment volatile. If the variable is not set, the switch tried to stack and run the first executable file it can find. On Catalyst 2960 Series switches image with the identical name as the file is present in the directory  (except the .bin file extension)

    S1(config)# boot system flash:/c2960-lanbasek9-mz.150-2.SE/c2960-lanbasek9-mz.150-2.SE.bin.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: October 24, 2021In: Q & A

    Which Type Of Port Transfers Data Using Light Waves?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:43 am

    Which type of port transfers data using light waves? Answer: IrDA is the port that transfers data using the light waves.it is described as a standard through which the data is transmitted with the help of an infrared port. The speed is almost the same as the normal parallel ports. Those who developeRead more

    Which type of port transfers data using light waves?

    Answer: IrDA is the port that transfers data using the light waves.it is described as a standard through which the data is transmitted with the help of an infrared port. The speed is almost the same as the normal parallel ports. Those who developed the port use wireless technology for two-device connectivity.

    What is IrDA port?

    IrDA stands for the infrared Data Association which used infrared light beams for the information transmission and also needs a direct line of sight and the range for its proper working is less. For the protocol set which is complete IrDA gives the specification for the wireless communication. The port sports Bluetooth which is a benefit for the long-distance mostly around 30 feet and also the Omni-directional.

    The main purpose for using the IrDA is its specification of the wireless data transfer with the principles of point-to-shoot within the range of the last one meter. The port is used in many things as the TV, DVD players use the controls of IR .few mobile phones are also able to use the IR port to manage the electronic devices but it can also use the additional software.it can guarantee the transfer of data, the line-of-sight, and the error range is low which is the reason for its efficiency.

    The communication is cheaper and quite adopted for the shorter ranges as 1-3m through wireless. Mostly the technology is used in the electronic consumer, automobiles, OC medical devices, home appliances, and any kind of commercial services. The IrDA protocol stack is the model of the open system interconnection and a few of its specifications are discussed in the following:

    IrPHY (Infrared physical layer)

    The ability is specified to assist point-to-point communication among the electronic devices. It gives the facility of optical media interface for SIR (serial infrared) transmission and it is the part of the first layer of the OSI model.

    Infrared link access protocol (IrLAP)

    It is the facility of the second layer of the OSI model of IrDA.it is present between the IrPHY and IrLMP layers.it shows the data link layer.

    Infrared link management protocol (IrLMP)

    This is the third layer of the IrDA abilities.it can describe the link management multiplexer and also the link management information access service.

    Transport protocol (TinyTP) 

    This non-obligatory protocol targeted inside the fourth layer lies on the pinnacle of the IrLMP layer.

     Infrared communication protocol (IrCOMM)

    The IrCOMM protocol targeted inside the 5th layer shall we the infrared tool act like both a serial or parallel port.

     Infrared Financial Messaging (IrFM) 

    This protocol targeted with inside the 6th layer is a Wi-Fi charge widespread evolved via

    way of means of the Infrared Data Association.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: October 24, 2021In: Q & A

    Which Of The Following Statements Is True Regarding Access Control Lists (Acls)?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:43 am

    Which of the following statements is true regarding the Access control list (ACL)? Access Control Lists (ACL) extension provides access to retain traffic from the specified IP address or the destination IP address and port.  The extension of the access control lists(ACLs) gives the access to keep thRead more

    Which of the following statements is true regarding the Access control list (ACL)?

    1. Access Control Lists (ACL) extension provides access to retain traffic from the specified IP address or the destination IP address and port.
    1.  The extension of the access control lists(ACLs) gives the access to keep the frames from only specified source IP addresses.
    2. The standard access control lists(ACLs) give the access to keep the frames from only specified source IP addresses.
    3. ACLs filter the frames or the network traffic by managing whether routed frames moved or keep them at the router interface.
    4. Standard IP Access Control List can be used to permit or deny traffic from a specific source IP address or for a specific destination IP address, and port.

    Answer: The correct option for the ACL is options 1,3 and 4. Let’s see at the explanation of the given answer.

     If the ACE (access control entry) authorizes the frames, then they would not be prevented by any specific entry later in the access control lists(ACLs). And if the packets are permitted by the ACE they would not be authorized by any more specific in the ACLs. if the packets are not matched with any other entry in the access control list then they are prevented.

    The access control is processed in a sequential, starting from the first toward the end. as the ACL process work from top to last, the perfect sequence is important to ensure the proper filtering. The higher specified entry is resent at the top in the ACL and processed before the low specified entry. This will impose to ensure that the higher specific entry in an ACL list does not neglect the statement impact present at the low level in the ACL.

    ACL contains multiple entries that cause the conflict. Such as you have the entry which authorizes the network traffic from the specified source or the designated IP address and other entries which prevent the entries from the exact source or designated IP address.

    During the modification of the ACL be very careful. By default, the new entries are located at the end of the ACL and are not able to cause any kind of conflicts among the entries. As new statements added to a current ACL are appended to the cease of the prevailing ACL, it is probably essential to recreate the ACL if you want to make considerable modifications to an ACL or upload an assertion that has to seem at or close to the pinnacle of the access control list.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: October 24, 2021In: Q & A

    What Is The Minimum Size Of An Ethernet Frame?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:43 am

    What is the minimum Ethernet frame size? 1500 bytes. 64 bytes. 32 bytes. 1024 bytes. Answer: The minimum Ethernet frame size is 64 bits, any frames which are smaller than the minimum size are described as the collision part or runt frames that need to be removed. The Ethernet frames are described byRead more

    What is the minimum Ethernet frame size?

    • 1500 bytes.
    • 64 bytes.
    • 32 bytes.
    • 1024 bytes.

    Answer: The minimum Ethernet frame size is 64 bits, any frames which are smaller than the minimum size are described as the collision part or runt frames that need to be removed.

    The Ethernet frames are described by the IEEE standard, it starts with the preamble and the SFD which work on the physical layer. The header of the Ethernet has the source and the destination MAC address. the end field is the CRC that can find the errors. Let’s discuss the Ethernet frames in the following:

    The general terms for describing the frames are their size and the MTU (maximum transmission unit) size. The total frame of the Ethernet is the sum of the total Ethernet header (14 bytes). payload filed of Ethernet (the IP frames .1500 bytes), and the last field check sequence field (4 bytes).

    The purpose of the Maximum size units is to define the highest number of the bytes of data that are enclosed in the frames of the Ethernet, such as the default MTU size of the Ethernet frames is 1500 bytes. Moreover, the highest frame size of the MTU is 9000 and it is also configured.

    Advantages of increasing the Gigabit Ethernet frame size

    The pros of the increment in the default size for Gigabit Ethernet will assist the storage system and the infrastructure of the Gigabit Ethernet frame. The performance is also increased significantly depending on the work.

    Pros of the Jumbo frames

    The jumbo size might be used to lessen the processing of the CPU with the network interface, as the jumbo is greater in size than the normal frames.

    Flow control

    Flow control is the maintenance of the frame flow among the directly connected link partners. with the help of the flow control, the packet’s movement can be paused and then start from the point when it is needed.

    The minimum size of the frames are 64 bytes while the maximum is 1518 bytes .and it consists of all the field included in the frames except the preamble and the start frame delimiter. The size of frames less than 64 is the collision fragment and discarded from the destination station. The size of the frames increased for the VLAN tags. If there is any change in the size of frames the designated device will drop the packets, which are the reason for the collision or the unwanted signals which considered as invalid the frames are almost the same at the data link layer, while at the physical layer different version are present and their methods vary for detection and the placement of the data in media.

    The formula for the maximum number of frames per second is:

    Ethernet Data Rate (bits per second) / Total Frame Physical Size (bits)

    Suppose we have the data rate of 10 000 0000 and the total frame size is 84 then:

    = 10 000 0000 / (84 x 8)

    = 14 880 frames per second.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: October 24, 2021In: Q & A

    Which Of The Following Statements Is True About Operating Systems?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:43 am

    Which of the following statements is true about the operating system? The operating system is responsible for the scheduling of the process or threads access to I/O devices. The operating system is responsible for the scheduling of the process or threads' run time to cores of the CPU. The inner arriRead more

    Which of the following statements is true about the operating system?

    1. The operating system is responsible for the scheduling of the process or threads access to I/O devices.
    2. The operating system is responsible for the scheduling of the process or threads’ run time to cores of the CPU.
    3. The inner arrival time of the packets is scheduled by the operating system.
    4. The process/threads are restricted by the operating system from entering into the memory.
    1. A and B.
    2. B and d.
    3. A, b, and c.
    4. A b, c, and d. 

    Answer: The correct answer is option 4. process schedule in an operating system is responsible for the schedule of the process as the running state, ready, and the waiting state.

    Operating system 

    The operating system is the system software that is used to store and manage the computer components resources and also give the service for various computer programs.it is the most essential part of the software system in the computer. the operating system handles all the application programs of the system after the boot program. The application program interface is used for service requests. The UI like the command line or graphical user interface helps in the direct connection with the operating system

    Reason to learn the operating system

    Operating act as the interface between the hardware and the user interface and perform many tasks such as file management. input-output device management, memory management manage the devices as the printer disk driver which are peripheral.

    Some of the operating system functions are listed below:

    • Memory management.
    • I/O device management.
    • Device management.
    • Processor management.
    • Security.
    • Job accounting.
    • Detection of the error.
    • Harmony between the user and the software.
    • Manage the performance of the system.
    • File management.

    Types of the operating system

    The types of the OS are described in the following:

    • General-purpose OS: It can install on various desktops platform, laptops and run the application. The main purpose is the management of the hardware and processes.
    • Mobile OS: the operating system is designed to meet the need of mobile devices.it can handle the data easily, be responsive, and be efficient in performance.
    • Embedded OS: It is present in embedded devices such as microwaves, car GPS. Embedded OS is specified to perform the assigned task with greater efficiency.
    • RTOS.
    • Network Operating system.

    Operating system versions:

    OS is available in many versions each with specific abilities as the Linux OS, windows OS, MS-DOS, android mobile OS, z/OS, AIX, OS/400, VMS, etc.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 14 15 16 17 18 … 29

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut