Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Three Services Are Provided By The Transport Layer? (Choose Three.)
What three services are provided by the transport layer? (Choose three.) Flow control. Address mapping. Data transfer. Data encryption. Determination of the path. Representation of the data. Bit transmission. Answer: The responsibility of the transport layer is to identify the digital communicationRead more
What three services are provided by the transport layer? (Choose three.)
Answer: The responsibility of the transport layer is to identify the digital communication of the source to the destination application with the use of the port’s numbers. The protocols which work on the transport layer are the TCP and UDP. The transmission control provides reliability by forming the connection, maintaining the flow control, and error recovery.
The responsibility of the transport layer which has to be done is described in the topic. To know them to read the topic to the end.
Transport layer services
The services of the transport layers are various in numbers some of them are discussed in the following section:
Address Mapping
Address mapping means on the network address the transport address is mapped. As the session entity demands the transport service data unit from another session transport layer entity sends the access point address to the transport service for identification. The transport entity will control the NASP (Network Service Access Point). The whole process is called address mapping.
Assigning the network connection
For the transport protocol data units (TPDUs) transfer the transport entity assigned the network connection. The assigned network connection is established by a transport entity. In some transport protocols, recovery after disconnection from the network is possible. When the disconnection happens in some protocols, the TPDUs is reassigned by the transport entity on the different connection.
Data transfers
Data Transfers The data carried by the shipping layer are of two types are the regular transfer of data and the accelerated data transfer. In normal data transfer, the user requests data transfer in an integer number of bytes.
The transfer of the data is transparent such as the boundaries of the data are sustained in the transfer of data and one of the constraints is present on the content and the number of the octet. This type of data transfer can be done in two ways at the same time. The expedited data transfer has different flow control and all the data queues that have the maximum priority can pass for the delivery of data. This type of data flow is an optional or optional service provider and the number of the user data octets is restricted to 16.
Transport connection multiplexing
For the optimal network link uses, the transport entity creates the multiple end-to-end transport connection to the network connection which is referred to as multiplexing. There are many TSDUs that are identified by the receiving transport entity by using the TCEPI (transport connection endpoint identifiers), which are attached with each TSDU by transferring transport entity. For every connection, the TCEP is specific and unique.
See lessWhich Memory Technology Allows Two Memory Modules To Be Accessed At The Same Time?
Which memory technology allows two memory modules to be accessed at the same time? SIMM. SRAM. ECC Dual channel Answer: Dual channel RAM has two channels which allow the two-memory module to be accessed at the same time. On both sides of the module, the Double-side memory modules are present. StatiRead more
Which memory technology allows two memory modules to be accessed at the same time?
Answer: Dual channel RAM has two channels which allow the two-memory module to be accessed at the same time. On both sides of the module, the Double-side memory modules are present. Static RAM (SRAM) is a memory that does not need any kind of refreshing and gives faster access to the data. For error checking the ECC, the mode is available.
Memory module
The memory module is also known as RAM (random access memory) stick which is a printed circuit board where the memory integrated circuit is ascended. in an electronic system, the installation and the replacement are easily done because of the memory module mostly in the computer as personal, computers, workstation, and the servers.
The first module is specifically for the computer and it is a propriety design made by a specific manufacturer. After some time an organization JEDEC standardized the memory module and is used by any system design. There are different types of memory modules:
Memory module applications
In most digital electronic platforms the memory is the essential component from mobile phones to radios. For any device which wants to store the information, memory is used for it. In the case of the monitor or the TV, the storage is a kind of internal software that helps in the running of the device or acts as the temporary storage for the processor. Some of the applications of the memory module are discussed in the following section:
Features of the memory modules
The features of memory modules are defined in the following section:
What Are The Two Sizes (Minimum And Maximum) Of An Ethernet Frame? (Choose Two.)
What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.) 56 bytes. 1324 bytes. 1518 bytes. 64 bytes. 128 bytes. Answer: The lowest frame for the Ethernet is 64 bytes while the maximum frame for the Ethernet is 1518 bytes. For the recognition of the runt and jumbo frames, theRead more
What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)
Answer: The lowest frame for the Ethernet is 64 bytes while the maximum frame for the Ethernet is 1518 bytes. For the recognition of the runt and jumbo frames, the technician has to know about the maximum and the minimum frames.
Ethernet frames
With Ethernet, the data are shared in the form of data packets. The packets have many items in them such as the ethernet frames. The Ethernet frames are the protocol of the data link layer and use the Ethernet physical transport layer transport mechanism. In Ethernet data transmission methods, the responsibility of Ethernet frames is to ensure proper throttling and successful data packets.
The Ethernet frames are present at the data link layer of the OSI model and ensure the successful transmission of the data and the bitstream separation. The size of the ethernet is defined by the standard of ethernet 802.3 which is from 64 bytes to 1518 bytes. The least size is 64 bytes and the maximum size is 1518 bytes.
The frame of ethernet is discovered a long time ago and the first version is based on the 16-bit field which does not have its own defined types whereas modern Ethernet frames are used in Ethernet II.
Elements of the ethernet frames
The frames are categorized into several data sets. Records are maintained in which binary code is included which have the essential information such as address information, control, payload data, etc. Moreover, the Ethernet frames have 3 parts: Ethernet header which includes: preamble, SFD, Destination, source, and types, encapsulate data contains: Data and pad, and the Ethernet trailers.
Let’s see the further explanation of the ethernet frames elements in the following section:
Permeable: Its work is to provide information about the beginnings of the frame and it enables synchronization to the receiver.
Start Frame Delimiter (SFD): It tells theta the destinated MAC address filed begins with the next byte. The length of the SFD is 1 byte.
Destinated MAC: The destination device MAC address is saved in the MAC address. The field length is 6 bytes.
Source MAC: The MAC address for the source is contained in the Source MAC. The size of the field is 6 bytes. It can identify the source device as well.
Type field: the length of the type field is 2 bytes .in the IPV4 and IPV5 the protocol types are defined by it.
Data and pad: the least size of the field is 46 bytes. And the highest is 1500 bytes. The payload data is present in Data and pad. The data with less or high than the size limit in one data packet and cannot be packed by the network layer.
Frame Check Sequence: the length of the field is 4 bytes. The value with a length of 4 bytes is present in this field which ensures whether the frame is complete or not. The 32-bit cyclic redundancy check is present in it which allows the detection of the corrupted data.
See lessWhat Is The Correct Syntax Of A Floating Static Route?
What is the correct syntax of a floating static route? ip route 209.165.200.228 255.255.255.249 serial 0/0/0. ip route 209.165.200.228 255.255.255.248 10.0.0.1 120. Ip route 0.0.0.0.0.0.0.0 serial 0/0/10. Ip route 172.16.0.0.255.248.0.0 10.0.0.0. Answer: The floating static route is for the backup oRead more
What is the correct syntax of a floating static route?
Answer: The floating static route is for the backup of the routes mostly to the routes which are learned from the dynamic routing protocol. For the configuration of the floating static route, the router must have a high administrative distance rather than the primary route, such as for the primary route which is learned through OSPF, then route which gives the backup to the OSPF route must have the administrative distance higher than the 110. the distance of administrative on the floating static route is placed at the end of the static route: ip route 209.165.200.228 255.255.255.248 10.0.0.1 120.
Floating static route and its configuration
In case of the failure of the link, the floating static route is used by the network administrator which gives the backup to the primary static or the dynamic route and works only in case of the absence of the primary route. The causes of the failure are due to physical layer problems or maybe wrong configuration. If many routes are presented to the destination then the path with the low administrative distance is preferable by the router.
The administrative distance by default of the EIGRP is 90, in case someone wants to configure the floating static route of the EIGRP routes. The configuration of the floating is only possible if the administrative value is greater than 90, and if the configuration happens below the value 90 then the router uses the static route first.
Configuration of floating static route
In the global configuration, the floating static route happens by using the ‘ip route’ command. If the distance is not specified then the default value is 1. for example suppose in a topology the default static route is configured with the default distance value and referring to the fastest Ethernet 0/0 of router 3. the configuration of the floating route happens with the following commands in the global configuration:
Verification of the floating static route
Router 3 by default refer to router 2 along with the default administrative distance and the floating static route by default refer to router 1 with the value of 3. so the administrative value is higher than the default value which is 1, so this route will float and not available in the routing table unless the pointing route fails. The command “show ip route” is used.
The verification of the route can also happen with the “tracert and traceroute” command. Another way for the verification is by disconnecting the cable of router 1 and router 3 and checking the routing table of router 3.
See lessWhich Three Statements Describe The Similarities Between Ospfv2 And Ospfv3? (Choose Three.)
Which three statements describe the similarities between OSPFv2 and OSPFv3? (Choose three.) Both of them are link-state protocols. The source address act as the global address by them in the event of sending the OSPF messages. The concept of multi areas is common in both of them. Assist with the autRead more
Which three statements describe the similarities between OSPFv2 and OSPFv3? (Choose three.)
Answer: a correct answer is an option a (Both of them are link-state protocol.), c (the concept of multi-area is common in both of them), e (both of them use the alike DR/BDR election process).
What is OSPF?
OSPF stands for the open shortest path first protocol, the protocol is from the IP routing protocol and acts as the IGP (interior gateway protocol) for the internet which routes all the information in the IP network, related to the ip routing to the single autonomous system.
The protocol is the link-state protocol which ensures that topology information is also exchanged with the closest network by the routers. in the AS the topology information is present in massive amounts, which allows each router to have a clear picture of the topology in the autonomous system with the help of the Dijkstra algorithm. That’s why the next-hop address is chosen by selecting the best end-to-end path of the destination in the link-state protocols.
With the help of the algorithms, the routing table is calculated by the routers. The routing table has thorough information about the destination, the protocols for the routing, the next-hop address, and the outgoing interface. Some of the features of the protocol are described in the following:
Let’s see the difference between the OSPFv2 and OSPFv3 in the following:
Advertises: OSPFv2 advertise IPv4 routes, whereas OSPFv3 advertise routes for IPV6.
Source address: The source for the OSPFv2 is the exit interface for the IPv4 address while in the OSPFv3 the source for the message is the link-local address of the exit interface.
DR/BDR multicast address: for the OSPFv2 the address is 224.0.0.6 while for the OSPFv3 it is FF02::6.
IP unicast routing: in IPV4 it is allowed by default, while in the IPV6 the command unicast-routing needs to be configured.
Authentication: the authentication in the OSPFv2 is either the plaintext or the MD5, whereas in the OSPFv3 it is IPV6.
See lessWhat Component Must Be Compatible With Every Other Component Of The Computer?
What Component Must Be Compatible with Every Other Component of The Computer? Answer: The component which needs to be compatible with each component of the computer is the motherboard. The motherboard contains almost every electronic part and it is located on the central processing unit. The motherbRead more
What Component Must Be Compatible with Every Other Component of The Computer?
Answer: The component which needs to be compatible with each component of the computer is the motherboard. The motherboard contains almost every electronic part and it is located on the central processing unit. The motherboard must be compatible because all parts all connected with the CPU and it is located on it. suppose if the power supply is not proper for the motherboard then the central processing will work? No, it won’t work, that’s why it is necessary for the motherboard to be compatible.
Let’s discuss further the motherboard its components features and function. All of them all describe in the following section. So, stay connected to the end.
What is the motherboard?
The motherboard is the central space or the platform on which all parts of the computer are connected. The CPU, memory, hard drives, video card, sound cards, and various other cards are connected either by direct or with wires.it is known as the backbone of the computer.
The motherboard is the circuit of the PC which is called the logic board. The motherboard has the chips and the controllers in a group known as the chipset. Each new motherboard has a new chipset and they are effective and fast than the previous ones. The RAM slots, ROM, PCL slots the USB port all are present on the motherboard.
Motherboard characteristics
The motherboard has some characteristics which are discussed in the following section:
Motherboard functions:
The motherboard performs some functions which are described below:
Motherboard manufacturers
Some of the popular manufacturers are listed below:
What Is A Best Practice To Use Before Beginning An Etherchannel Implementation?
What is a best practice to use before beginning an EtherChannel implementation? Affected interfaces are assigned to VLAN 1. Affected interfaces are assigned to the management VLAN. Each affected interface is shut down. Enable the affected interface. Affected interfaces are assigned to the unused VLARead more
What is a best practice to use before beginning an EtherChannel implementation?
Answer: Before the beginning of the EtherChannel implementation, the affected interface needs to be shut down so that any kind of incomplete configuration will not create activity on the link.
What is EtherChannel?
EtherChannel is the combination port for the various physical ports links which are grouped into one link. It gives the speed links and the redundancy. The greatest links are 8 which combine to form the single logical link. EtherChannel helps the connection of multiple links to a single link which prevents the blockage of any less redundant link.
For example, in a topology, if the switches are connected with a PC and the links between the switches and the PC is considered as 1000mb/s, while in switches it is 100mb/s. Moreover, if the traffic which is sent is greater than the 100mb/s but we have the link of 100mb/s between the switches in this condition the switches restarted to drop. For this problem, the EtherChannel is used in which the high-speed links between switches are established and we can form more links with the same speed. EtherChannel help in building multiple links to a single logical link.
The standard for the formation of the EtherChannel is given in the following:
Protocols of the EtherChannel
For the formation of the EtherChannel, there are two protocols one is PAgP (port aggregation protocol) while the other one is LACP (link aggregation protocol)
The PAgP is the cisco protocol that forms the EtherChannel.
It is the protocol for the IEEE standards which are described in the 802.3ad which form the EtherChannel it is quite alike to the PAgP protocol.
Modes in the protocols of EtherChannel:
The modes in the configuration of this interface are described below:
ON: the ethernet is part of the EtherChannel but the negation will not take at this place.
Desirable: the ethernet will attempt to transform the other side interface into an EtherChannel.
Auto: if the opposite site requests the interface then it will be the portion of the EtherChannel.
OFF: EtherChannel will not configure in this mode.
See lessWhy Are The Pings From Pc0 To Server0 Not Successful?
Why are the pings from PC0 to Server0 not successful? The static route to network 192.168.1.0 is misconfigured on router 1. The static route to network 192.168.1.0 is misconfigured on router 2. The static route to network 192.168.2.0 is misconfigured on router 1. The static route to network 192.168.Read more
Why are the pings from PC0 to Server0 not successful?
Answer: The static route has to specify either the local interface or the next-hop IP address.
Along with the answer to the question we have mentioned about ping as what is ping? and what is the work of the pings? In this topic. those who are interested to know will read the topic to the end.
What is the ping?
Ping is the internet program that is used for the verification of the IP address existence and also approves the request in the computer network administration. It is also known as the packet internet or the inter-Network groper. The ping is also used to ensure the computer which is host is operating perfectly when the user is trying to use it. the computer along with the networking ability, the embedded computer is also using the ping.
The two basic functions of the ping are:
The ping works with the help of the ping command and it is a regular command in the command-line interface. Most networks offer the ping function which allows you to access the server’s ping by entering the IP address. The response time of the ping is equally important because it can add the high up to the request over the internet. Ping is mainly used in online games because the events are real. The response time of the ping is proportional to the distance between the source and the destination address.
Working of the ping
The working of the ping starts with an ICMP echo request which is sent to the specific interface on the network and then waits for the response. The signals of the pings are sent to the specified address as the command of the ping is sent. When the request is received to the destination then the assurance echo reply packet is sent back toward the source and the basic function of the ping works. Time for the response is measured in milliseconds, the process begins with the server echo request and ends with the response from the destination. Ping command sends several requests about 4 to 5 and then displays the results. The RTT tells the number of the bytes which are received and the time to give a reply.
Ping Spoofing:
The fake request which is sent toward the server is considered ping spoofing. in that case, the wrong data shows and it looks like the original packets which are sent toward the server. The receiver will receive the fake information and give the response to the third user instead of the original. And the receiver also receives the unrequested data from another address. The spoofing is hard to detect.
See lessWhich Step Should Be Performed First When Deleting A Vlan That Has Member Switch Ports?
Which step should be performed first when deleting a VLAN that has member switch ports? Charge the switch. Execute the delete command vlan.dat. Reassign the VLAN member ports to other different VLANs. Reinforce or backup the running config. Answer: When someone wants to delete the active VLAN it isRead more
Which step should be performed first when deleting a VLAN that has member switch ports?
Answer: When someone wants to delete the active VLAN it is needed that the recently assigned ports as a VLAN member need to be reassigned. The port which is a VLAN member which is deleted will become unstable.
VLAN description and its types
VLAN a virtual LAN is the subnetwork that makes the device collection jointed on different or separate local area networks (LANs)the LAN is the connection of the devices such as computers which can communicate with each other and with servers in local areas.
VLAN is useful for the administrator because they can use the single switch partitions to compare their functionality and the security of the system rather than using the new cables and making the changes in the infrastructure of the network. For the management of the traffic over the network VLAN is used by the business on a larger scale by the partition of the switch.
For the devices which communicate most often VLAN is important because and the performance becomes improve. The security protection is also provided by VLAN to a large network with the control on the devices which can access each other. The VLAN is a logical connection rather than a physical one’s which is kind of flexible.
Types of VLAN:
Types of the VLANs are discussed in the following section:
Protocol-based VLAN:
The traffic control can be done by the protocol-based VLAN. The switch will move the traffic based on traffic protocol.
Static based VLAN:
It is the port-based VLAN and it required the network administrator which can allocate the ports on the network switch with the virtual network.
Dynamic based VLAN:
The network memberships which are based on the characteristics of the device are defined by the network administrator and it is allowed by dynamic-based VLAN rather than the location of the switch port.
Working on the VLAN
When the workstation sends the data toward the bridge of LAN, it is tagged with the VLAN identifies which shows the VLAN of the incoming data, the process is known as the explicit tagging. With the implicit tagging is almost impossible to find the VLAN of coming data. in implicit tagging the data is not tagged with the VLAN identifier but from the VLAN from where the data came is identified with port numbers.
Tagging depends on the ports, the media access control source field the network address of the source, or the other filed combinations, VLAN is categorized with the help of the used method to do the tagging with methods the bridge required the database with the new version and also had the map of the fields used and the VLAN.
IF the tagging is based on the port then the database has the information related to that port VLAN. And the database is called the filtering database. The bridges need to make sure that the information on the LAN is the same on each database, and according to the LAN operation, the bridges define where the data need to go.
See lessWhich Osi Layer Is Responsible For Directing Data From One Lan To Another?
Which OSI layer is responsible for directing data from one LAN to another? Physical layer. Network layer. Transport layer. Datalink layer. Answer: The layer which is responsible for directing the data from one LAN to the other is the Network layer of the OSI model. Let’s understand the function andRead more
Which OSI layer is responsible for directing data from one LAN to another?
Answer: The layer which is responsible for directing the data from one LAN to the other is the Network layer of the OSI model. Let’s understand the function and the design of the network layer in the mode so that it will be easier for you to understand.
What is the network layer?
The function of the subnet is maintained by the network layer. The basic purpose of the network layer is to transfer the packets across the destination to multiple links. When the computers are connected to the same link then there is no need for the network layer. It tells about the path or routes them to from one end to the other across network channels as a network layer.
The packets division of the departing message in packets forms and gather the incoming message to the higher level. Due to the broadcast, the problem of routing is easy that’s why the end of the network layer is not much or thin.
The function of the network layer
The function of the network layer is given in the following section:
Issue related to design with the network layer
In the end, I must say that the OSI model gives the service to transfer the information from one layer to the other very smoothly. And the information to the destination port is readable.
See less