Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Maryam Khalid

Bronze
Ask Maryam Khalid
60 Visits
0 Followers
0 Questions
Home/ Maryam Khalid/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: October 24, 2021In: Q & A

    What Will An Ospf Router Prefer To Use First As A Router Id?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 30, 2021 at 5:05 pm

    What will an OSPF router prefer to use first as a router ID? A loopback interface because it is configured with the high IP address on the router. The interface IP is highly active and is configured on the router. The IP address which configured with the command router-id. Right before the specificRead more

    What will an OSPF router prefer to use first as a router ID?

    • A loopback interface because it is configured with the high IP address on the router.
    • The interface IP is highly active and is configured on the router.
    • The IP address which configured with the command router-id.
    • Right before the specific configuration, the interface participates in the routing process is the preference of the ODPF.

    Answer: The preference for the OSPF router ID is the 32-bit address and is not present in the routing table and is not taken into account by any network command. If the OSPF router ID is not used for the configuration with the router-id command then the loopback interface. if these options are not available then the OSPF router uses the IP address from the physical interface.

    What is OSPF?

    The first open part is the IP protocol to functions such as IGP (Inner Gateway Protocol of internet and work in the IP address distribution over the autonomous system in the network. OSPF is also the link-state routing protocol and shares the information related to the network with the neighboring networks. The information is all over the AS that’s why every router in the AS has the provided information. With the help of the Dijkstra algorithm, the information determined the end-to-end path .that is the reason that is link-state the next-hop address which is the destination for the data is identified by selecting the best end-to-end path.

    The main pros of the link state that the information which is spread throughout the AS helps the router to determine the routes his meets their criteria and is effective for traffic engineering, where the router meets the specific quality of the required services. While the protocol will not hold more routes as they continue to add. Greater the routs then increase in length, frequency, and the time to find the end-to-end routes. It means the link protocol is not suitable for the internet in a wide area and the IGPS work with a single AS due to this reason.

    Configuration of the OSPF

    Suppose if we have three router names with R1, R2, R3, and they are associated with the network 10.255.255.80/30, 192.168.10.48/29, and 10.255.255.8/30 (interface gi0/0).

     R1 configuration are in the following:

    R1(config)#router ospf 1

    R1(config-router)#network 192.168.10.48 0.0.0.7 area 1

    R1(config-router)#network 10.255.255.80 0.0.0.3 area 1

    R1(config-router)#network 10.255.255.8 0.0.0.3 area 1.

    Configuring of the R2 in OSPF

    R2 (config)#router ospf 1

    R2 (config-router)#network 192.168.10.64 0.0.0.7 area 1

    R2 (config-router)#network 10.255.255.80 0.0.0.3 area 1

    Now for the R3 configuration

    R3 (config)#router ospf 1

    R3 (config-router)#network 192.168.10.16 0.0.0.7 area 1

    R3 (config-router)#network 10.255.255.8 0.0.0.3 area 1

    The configuration is checked with the command in the following:

    R3#show ip protocols 

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: October 24, 2021In: Q & A

    What Mitigation Plan Is Best For Thwarting A Dos Attack That Is Creating A Switch Buffer Overflow?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 30, 2021 at 5:05 pm

    What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow? Turn off DTP. Turn off STP. Enable the port security. Put the unused ports in untouchable VLAN.  Answer: the MAC address table is responsible for the overflow attack the overflow of the buffer and theRead more

    What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?

    • Turn off DTP.
    • Turn off STP.
    • Enable the port security.
    • Put the unused ports in untouchable VLAN. 

    Answer: the MAC address table is responsible for the overflow attack the overflow of the buffer and the spoofing in MAC is mitigated by enabling the port security. The STP will not be disabling because it keeps the Layer 2 loops, while the DTP has to be disabled to keep the hopping of VLAN. The unrecognized connectivity is prevented by putting the unused port in the unusable VLAN.

    Attack mitigation plan

    Attack mitigation plan is the abstract of the security which is formed to give response to any kind of attack as redirect the attack, create the traffic walls and by activating the traffic walls with the help of the natural function i.e. spoofing attack or a DDoS attack, etc.

    The nullification of the attack using the mitigation happens on two security levels:

    Vulnerability-based attack: the vulnerability attack is used to extract sensitive information from the set of application infrastructure.it is possible with the implementation of the virus as the worms etc. If someone is not ready for the mitigation attack then the information is hacked by the skilled hacker. Large the company greater the risk of the malicious attack that’s why the mitigation plan is the security measure from medium to the large organization as well.

    Non-vulnerability-based attack: The purpose of the attack is to misuse the organization’s service with the help of the malicious attack on the traffic which happens to come from the legal user. If some of the problems happen in the IT infrastructure then an attacker tried to overload the resources with the help of the repeated requested till the system is burdened and become ineffective for the legitimate users.

    The dangerous non-vulnerability-based attack is the DoS/DDoS in it the system is overloaded with a repeated request for the information and the system is engulfed, slow in the processor crashing together. The DoS tack is in a different format that’s why proper security is important which can find the attack and remove them properly.

    The mitigation attack is used by most of the companies and the public sectors to lessen the effect of the attack till the problem is solved. The top strategies which are provided by the NSA and US government are in the following sections:

    • Updating and upgrading the software.
    • Protect the accounts and the privileges.
    • Implement the legitimate software execution policies.
    • Practice the recovery plan of the system.
    • Manage the system and its configuration.
    • The continuous search for the intruder in the network.
    • Implement the modern security features for the hardware,
    • Segregate Networks Using Application-Aware Defenses.
    • Integrate Threat Reputation Service.
    • Transition to Multi-Factor Authentication.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: October 24, 2021In: Q & A

    What Statement Correctly Describes “Jitter”?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 30, 2021 at 5:04 pm

     What statement correctly describes "jitter"? Answer: Jitters are the process when the frames took a lot amount of time during their travel toward the destination. What do you know about jitters? Jitter is the disturbance or the deviation in the frequency of digital signals, the disturbance is eitheRead more

     What statement correctly describes “jitter”?

    Answer: Jitters are the process when the frames took a lot amount of time during their travel toward the destination.

    What do you know about jitters?

    Jitter is the disturbance or the deviation in the frequency of digital signals, the disturbance is either the amplitude, delay in the time, or any signals width. The jitters are determined by either the monitor flickers, the processor of the desktop is affected or the server problem, the audio is affected by having the flicks and the network devices connection is also disturbed due to it.

    In the Internet protocols (IP) the jitters cause the variation in the latency of frame flow in the systems when the frame took a lot of time to move from one place to other, the delay, can change in the routes and variation in the time as well.

    In real-time, the jitters cause a problem as the live conference, etc. The virtual and the hosted desktop structure is also affected due to the jitters, the deviation in the audiovisual signals disturbs the quality of the communication.

    Let’s discuss the cause of the jitters in the following sections:

    Bad hardware performance: if you use the network which is not updated along with the old hardware, the switches, cable, modems are the reason for the creation of the jitters.

    Less bandwidth: The network is overloaded with traffic because too many devices are using it which lessens the bandwidth and the jitters appear.

    Wireless jitters: The wireless network has disadvantages because it because the jitters but using the wired network you can at least determine the problem easily compared to the wireless.

    Avoiding the prioritization in packets: for the VoIP systems, the jitters happen when you avoid the priority list and do not focus on the audio signals as compared to the others.

    Jitters types 

    The jitters types are discussed in the following sections:

    Constant jitters: the constant packet-to-packets variations in the delay of time.

    Transient jitters: the increase in the delay of packets arrival which may happen by single packets.

    Short-term variation of delay: The jitters type is associated with the change in the routes along with the congestion.

    Ways to reduce the jitters

    The ways to lessen the jitters are described below:

    Jitter buffer: the jitter buffer can reduce the effect, in the network or desktops, etc. The packets which are used by some application is revived with the help of buffers. The buffers smooth the variations of packets time by moving them to buffers.

    Update the Ethernet cable: the cause of the jitters is too old equipment and the software the new Ethernet cable reduce the jitters because the rate of transmission in it is 250 megahertz.

    Reduce the unwanted bandwidth: the bandwidth which is not useful for the work cause jitters that’s why to lessen them by stopping some works in the background as games, music, etc.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: October 24, 2021In: Q & A

    What Status Indicators Apply Only To Dynamic Disks? (Choose All That Apply.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 30, 2021 at 5:04 pm

    What status indicators apply only to dynamic disks? (Choose all that apply.) Active. Unallocated. Foreign drive. Health (At risk). Answer: foreign drive and health (At risk) is the status indicator applied only to dynamics disks. The answer to the question is determined but let’s focus on the dynamiRead more

    What status indicators apply only to dynamic disks? (Choose all that apply.)

    • Active.
    • Unallocated.
    • Foreign drive.
    • Health (At risk).

    Answer: foreign drive and health (At risk) is the status indicator applied only to dynamics disks.

    The answer to the question is determined but let’s focus on the dynamics disk its definition storage and the difference between basic disk and the dynamics disks.

    Dynamic disk:

    The physical device can manage the volume with the help of the LDM database. Logic Disk Manager (LDM) is a 1MB database that is present in the dynamic disk. All the knowledge of volume is placed in the single disk by the dynamic disk and also contains some other information of each dynamics disk as the size of the volume, the volume of the file system, volume label, etc.,

    The dynamic disk contains the assigned information if multiple disks are present in a computer. This also means all the disks are different and have no connection among them. The relevant information of the dynamics disks gives access to check “Missing” disk on the system disk management when someone deletes it from the device. And all the activities and information store in an LDM database also depict the importance of the LDM which is equal to the partitionable of the basic disks.

    In the dynamic disk, there is a space that has the information of the partition disk and it is called the MBR. The table is not the same as the basic disks, its purpose is to make the disk manager and windows have the knowledge that the disk is the dynamic disk. While the end of the dynamic disk is occupied by the LDM database. 

    Dynamic disk functions

    The functions performed by the dynamic disk are described in the following section:

    • The disk can create and remove the simple, spanned, striped, mirrored, and RAID-5 volume.
    • The volume of simple and spanned cans increased by the disk.
    • The mirror and the RAID-5 volumes can be repaired by disk.
    • Activate the missing and the offline disk.

    Let’s check at the difference between the dynamic disks and the basic disks below:

    • In the basic, the regular partition table used which are present in MS-DOS and windows that can manage the partition on hard disks. While in the dynamic disk the hard drive has its own volumes.
    • In a basic disk, the maximum limit of the hard drive partition is 3 to 4 and the secondary-extended partition is only one. in the dynamic disk, the secondary-extended partition is not limited.
    • The basic disk has two types of partition one is MBR partition, other is GPT partition, while in the dynamic the partition is not present instead the simple volumes, spanned volumes, striped volumes, mirrored volumes, and RAID-5 volumes are present.
    • The basic disk without any loss is converted to a dynamic disk, while the dynamic disk is converted to a basic with the deletion of entire volumes.
    • The basic disk assists the multi-boot configuration while the dynamic disk rejects it.
    • The basic disk can easily install on the old system while the dynamic disk support windows 2000 and so on.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: October 24, 2021In: Q & A

    When A Laptop Internal Device Fails, What Three Options Can You Use To Deal With The Problem?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 30, 2021 at 5:04 pm

    When a laptop internal device fails, what three options can you use to deal with the problem? Answer: The things to do when the laptop internal device fails are listed in the following: Send the laptop to the service center for repair. Use the alternative at the place of the failed internal device.Read more

    When a laptop internal device fails, what three options can you use to deal with the problem?

    Answer: The things to do when the laptop internal device fails are listed in the following:

    • Send the laptop to the service center for repair.
    • Use the alternative at the place of the failed internal device.
    • Change the failed internal device.

    The laptop is the device the world needs today and we all want it to work flawlessly without any problem, but there’s no way this thing won’t fail at some point, it can happen every now and then. The failure might be the physical device failure as the hardware problem or any kind of bugs in the software which make the laptop useless. When the failure happens you want to take it to the service center, which is useful most often, but sometimes the problem is not big you assume it is you can do it easily at home with a little effort. When the laptop breaks then try to figure the problem by yourself. We are going to discuss what you need to check before sending your laptop to the service center. Let’s take a look at a few problems and their possible solutions.

    Heating the fan cause the shutdown of the laptop

    Moreover, the laptop is a portable device, which means it gets moved to many places. This could lead to a problem in the intake of the fan. The particles and the dust can also drag into the cooling system followed by the fan. The possible solution is to place the laptop in the hard place as on the table. Put the laptop on the surface which prevents the dust particle enter to the system. Remove the compressed air from the fan. Try to lessen the program working at a time in the laptop it helps in the efficiency

    BSOD (blue screen of death)

    The BSOD is a common problem that happens on laptop devices and many things trigger it, which are connected to either the hardware or the software problems. The laptop might be fine with a restart or sometimes not.in such a situation check the malware or any kind of corrupted devices. Boot the window and quick run for the viruses with the help of window defender or the antivirus you have downloaded to the device. Try to update it because it might be the reason for a malware attack. Another reason the outdated drivers .update them with the device manager option, and if you see the yellow marks on any hardware option it means it’s time to update it, simply click on it and it will update.

    Internet problem

    The laptop often loses the internet connection in and it became the reason for the hassle. Before you thought that any kind of equipment is failed try some of few things: check the wireless button or the auto switch of the connection of the laptop is ON. Reboot the router and use the drain power tactics, remove the router plug and let it drain for 10-20 sec, plug the router.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: October 24, 2021In: Q & A

    At Which Layer Would You Find Errors That Were Caused By Emi?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 30, 2021 at 5:03 pm

    At which layer would you find errors that were caused by EMI (electromagnetic interference)? Answer:  Physical layer is the layer where we could find the errors caused by electromagnetic interference. in the OSI model, the physical layer is the first layer or the last depending on the order but it wRead more

    At which layer would you find errors that were caused by EMI (electromagnetic interference)?

    Answer:  Physical layer is the layer where we could find the errors caused by electromagnetic interference. in the OSI model, the physical layer is the first layer or the last depending on the order but it works to handle the transmission of bit-level among devices and assist the mechanical or electrical part of the physical medium for effective synchronized communication.

    What is meant by EMI?

    EMI stands for electromagnetic interference and it is defined as the disturbance of the function of an electronic device during the territory of the electromagnetic field of the RF which is the result of the neighboring electronic device.

    The personal computer inner circuit generates the electromagnetic field in the range of RF, or the cathode rays tube also forms the Electromagnetic field over a wide range, and the creation of the EM disturbs nearby the wireless signal. If you are using the personal computer and the wireless connection is also working then you might hear the sound of RF in the receiver which is formed in the personal computer system.

    The wireless ejector which has high energy is capable to generate the electromagnetic field which affects the neighbor’s device. The device which is close to the broadcast stations might have experienced the EM field ejecting from the radio etc. Most of the devices can’t handle the EM field and have a problem in working as the PC, telephone system, etc.

    The effect of the EMI is lessening if the electronic devices are working with the food electrical system which is connected to the ground. While the cable which helps in the connection is also covered in the shield which keeps them from ejecting or receiving the RF energy. Some special parts as line filters, capacitors are present in the cables and the cords to lessen the EMI of the systems. Try to contact the manufacture before any kind of changes In the system.

    Types of the EMI

     EMI have many types as the man-made, naturally, process, continuous interference, impulse noise but and electromagnetic interference types on the basis of bandwidth are discussed in detail in the following section:

    Narrowband:

    The narrowband is generated by the single source mostly from the vibrations of some form; the narrowband is also formed from the false signal caused by the disturbance of the transmitter as the mobile phone etc. The false signals are present at various spots in the RF field and cause interference of the neighbor user spectrum.

    Broadband:

    Broadband has many forms and arises from different sources as well. The interference caused by humans arises from many sources as the arc welder where the sparks form continuously. The natural broadband interference is due to the sun, as when the sun is behind the satellite the sun-out generates for the satellite TV system and the noise covers the required signals. But the effects remain for a few minutes which is a kind of advantage.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: October 24, 2021In: Q & A

    When Would A Network Administrator Use The Clear Access-List Counters Command?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:32 am

    When would a network administrator use the clear access-list counters command? During the baseline obtaining. During low memory buffers. During the ACL troubleshooting and want to know how many packets are matched. From the ACL when the ACE is deleted. Answer: The number of the ACE match condition wRead more

    When would a network administrator use the clear access-list counters command?

    • During the baseline obtaining.
    • During low memory buffers.
    • During the ACL troubleshooting and want to know how many packets are matched.
    • From the ACL when the ACE is deleted.

    Answer: The number of the ACE match condition which is made during the particular ACE are reset with the help of the clear access-list counters command.it is effective during the trouble of the ACL which is recently turned to account.

    What is an access control list (ACL)?

    As the name indicate the access control list is the rules or a list set that is set for the network traffic filtration. The configuration of the ACL happens through the help of the network devices with the abilities of the packet filtering like the router and the firewalls.

    It contains the condition lists which divide the packets and help in the determination of the allocation and the denying of the network traffic. They apply to the interface basis of the packets leaving or the entering interface. On the Cisco device two types of ACLs are present:

    Standard access list: It helps in the evaluation of the source IP address for the packets.it is not so powerful as the extended access list but it is less CPU concentrated for the device.

    Extended access list: It helps in the determination of the source and the destination address, layer 3 protocol types, port of the source and the destination, and various other parameters. The extended ACL is complicated in configuration and needs more CPU time them the normal ACLs, but it gives the control on a granular level.

    How to Troubleshoot the ACL issues?

    Somehow the ACLs are very difficult to troubleshoot, in the structure of the design it can control the network traffic and as the result, it causes the issue on the particular traffic. The 3 steps procedure help in the determination of whether the ACL is to blame in the issue related to the network:

    Step 1: regulate the interface which has the ACLs

    The first try to find whether the ACL is applied to the experiencing issue of the network during the router configuration. On the Cisco IOS command, two commands are helpful in the evaluation:

    • Show run interface.
    • Show IP interface.

    Step:2 evaluate when the ACL statement is affecting the traffic

    Evaluate the ACL which are affecting the network and the particular person who is experiencing the issue, determine or experiencing. Some of the commands for the evaluation are in the following:

    • Show access list.
    • Shoe io access-list.

    Step 3: Check the ACLs to match the traffic

    This step determines the type of traffic which is sent to UDP, TCP, or the ICMP. Do any modern ACLs which would alter the traffic? ICMP is come under its types and not in the TCP or UDP.

    Step:4 Some of the facts which remember about ACLs

    ACLs procedure on the logic of the first-match logic which means ACL 1 is processed before the ACL 2 and so on. The TCP or UDP are used in the commands of the ACL when the port numbers are checked. use the explicit deny for the ACL counter increments.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: October 24, 2021In: Q & A

    Why Would A Network Administrator Issue The Show Cdp Neigbors Command On A Router?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:32 am

    Why would a network administrator issue the show CDP neighbors command on a router?​ It can show the router ID and various information about the OSPF neighbors. It can show the information about the routing table and other directly connected Cisco devices. The line status and other directly connecteRead more

    Why would a network administrator issue the show CDP neighbors command on a router?​

    • It can show the router ID and various information about the OSPF neighbors.
    • It can show the information about the routing table and other directly connected Cisco devices.
    • The line status and other directly connected Cisco devices information can be displayed with it.
    • The directly connected cisco devices information and the device ID can display with it. 

    Answer: The command show CDP gives the knowledge about the directly connected Cisco devices such as the device ID, local interface, capability, platforms, and the port ID of the remotely connected devices.

    What is CDP?

    CDP is known as a Cisco proprietary protocol that runs on the data link layer. Due to the CDP operation on the data link layer, more than two Cisco devices such as the router that supports various network-layer protocols, learn from each other whether or not Layer 3 connectivity is present.

    When Cisco devices start-up, the CDP starts by default. CDP found the neighboring cisco devices automatically which runs the CDP rather than the type of the layer 3 protocol or suits are running or not. Another work of CDP is that it exchanges the hardware and the software information with the CDP neighbor who is directly linked.

    The information provided by the CDP about its neighbor is in the following:

    • Device identifier: the hostname of the switch which is configured.
    • Address list: for up to one network layer address of supported protocol.
    • Port identifier: it gives the information about the name of the local and remote port-in which is in form of ASCII character as the ethernet0.
    • Capabilities list: it shows whether the device is the router or not.
    • Platform: it shows the platform of the hardware i.e., a cisco 1841 series of the router.

    The command shows cdp neighbor provide the information about the IP address of the neighboring devices. Despite the information, if you can ping the neighbor the CDP will show the IP address of the neighbor. The command is used when the router could not route across to their shared data link. The command show cdp neighbor will show if any of the CDP neighbors has the error in the IP configuration error.

    To telnet in the device in the network discovery situation, the IP address of the CDP neighbor information is needed to know. But the CDP has been a security risk because some of the version of the IOS gives the CDP information by default that’s why it needed to know how to disable the CDP? For the disable of the CDP globally the global configuration command no cdp run is used. For the disable on interface level the command is no cdp enable.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: October 24, 2021In: Q & A

    Which Two Traffic Types Require Delay Sensitive Delivery? (Choose Two.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:31 am

    Which two traffic types require delay-sensitive delivery? (Choose two.) Voice. Video. Email. Web. File transfer protocol. Answer: voice and video traffic are the two-network types that need the required sensitivity delivery and must give priority over the other type of the network as the email, web,Read more

    Which two traffic types require delay-sensitive delivery? (Choose two.)

    • Voice.
    • Video.
    • Email.
    • Web.
    • File transfer protocol.

    Answer: voice and video traffic are the two-network types that need the required sensitivity delivery and must give priority over the other type of the network as the email, web, File transfer protocol, etc.

    The answer to the elective question is given now let’s take a look at the network traffic and its types. The detailed information about it is given in the following section.

    Network traffic

    The data amount which has been sent, receive, or moved in the computer is known as the network traffic. Another name of it is data traffic, which is split into the data parts and before it is reassembled by the receiver device or PC it is sent toward the network.

    The network traffic has the flow in two directions, north-south, and east-west. The quality of the network is affected by the traffic because sometimes the unregular high data can cause the slow download or the flecked voice-over-internet protocol (VoIP) attachment. The security breach might be happening due to the high amount of unusual data.

    Types of the network traffic

    The network traffic has types and each traffic type has its characteristics and requirements. That’s why the behavior of the traffic changes along with the types. The network traffic types are Voice, video, and data traffic. some others are also on the web but they are least important as compared to others. The traffic types and their behaviors and the needs are discussed in the following section:

    Voice traffic

    The real-time and the sensitive traffic type are the voice traffic because the voice packets can each either at the same time or with delay. Due to different arrival times, the delay time is considered important in voice traffic.

    Jitters are formed due to the delay in the traffic and the voice clearness is affected by it. The packets are also lost during the voice traffic. most of the few packets are acceptable but the huge loss causes the in communication. The quality-of-service (QoS) configuration is used to avoid packets loss and the jitter during voice communication.

    Video traffic

    Due to the increment in technology the video traffic is the most important. Because most of the people have their own YouTube channels where they upload their content and people enjoy watching them. like the voice traffic, the video traffic is not sensitive so packets loss and delay are handled by it. The video conference is also the type of video traffic but in it, the delay has a drastic effect because those who are in the meeting don’t have extra time. Communication cannot be attained with much delay. The video traffic consumes a lot of the resources because they are burst.

    Data traffic 

    The data traffic uses the process of transmission to deal the packets loss. Regardless of the voice and the video traffic it is not affected by the delay. The traffic type is mostly used for email, web FTP, etc. The transmission control protocol is used by the data traffic to ensure that the message is sent successfully. And the retransmission ensures the data is returned with no such loss.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: October 24, 2021In: Q & A

    What Type Of Network Must A Home User Access In Order To Do Online Shopping?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:31 am

    What type of network must a home user access to do online shopping? The intranet. The internet. An extranet. LAN (local area network). Answer: The home user will do internet shopping because the vendor is accessible with the help of the internet. The intranet is for internal use and it comes under tRead more

    What type of network must a home user access to do online shopping?

    • The intranet.
    • The internet.
    • An extranet.
    • LAN (local area network).

    Answer: The home user will do internet shopping because the vendor is accessible with the help of the internet. The intranet is for internal use and it comes under the local area network.to access the resources in the organization or company the extranet network is useful for external users. The home user has no such need to use the local area network for internet access. Such as the PC is connected to the modem through the help of an ISP.

    What is the internet? And how does it work?

    Internet is the utmost important factor in today’s world. Internet is the global network that spread throughout the world including the PC, computer, and many other electronics devices. The Internet allows information to flow throughout the world.it happens by establishing the connection of the computer with the internet and it is known as going online.

    The worldwide connected network system is called the internet.it has various computers, routers servers, etc. The network which forms the internet is owned by different companies but the information flow is the same because the protocol used on the internet is the same.

    Working of the internet

    The working of the internet is very complicated and took a lot of time to explain the working. The internet is the network of the cables such as copper telephone wires, TV cables, and fiber optics is the latest. the wireless network such as the WIFI or the 3G/4G also depends on the physical cables to obtain access to the internet.

    When someone checks the website online then the device sends the request to the server with the help of wires. the server acts as the storage device such as the hard drive of the computer and stores the information of the website .as the request is received by the server the website retrieves the data and sends it to the client computer.

    Internet benefits

    Some of the benefits of the internet are described in the following section:

    • It gives them access to information that is difficult to achieve.
    • The device’s ability to connect, share, and the connection is improved with the help of the internet.
    • It has given me the chance to work from home.
    • The chances to sell the product and money-making are possible with the help of the internet.
    • The entertainment access is possible through inter such as video, audio, etc.
    • It gives them access to the IoT (internet of things) which makes the home appliances connect with the PC or the cellphones so they can be connected from anywhere.
    • Cloud storage makes the data safe from hazardous as deletion, corrupt data, etc.
    • The personal account as the bank account can be managed by the person itself with the help of the internet.
    • Ecommerce businesses are established only with the assistance of the internet.
    • Online Business meeting is possible through the internet.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 17 18 19 20 21 … 29

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}