Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Maryam Khalid

Bronze
Ask Maryam Khalid
60 Visits
0 Followers
0 Questions
Home/ Maryam Khalid/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: October 3, 2021In: Q & A

    What Kind Of Data Can Be Lost When A Computer Is Turned Off?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:58 pm

    What Kind of Data Can Be Lost When A Computer Is Turned Off? The Data which is lost or have the chance to be lost when the computer is turned off is RAM (random access memory) and the reason is RAM is a volatile memory it is not fixed but a changeable memory while the ROM (read-only memory) is non-vRead more

    What Kind of Data Can Be Lost When A Computer Is Turned Off?

    The Data which is lost or have the chance to be lost when the computer is turned off is RAM (random access memory) and the reason is RAM is a volatile memory it is not fixed but a changeable memory while the ROM (read-only memory) is non-volatile it is fixed and only change when the developer wants to change.

    A data is a computer is stored in different manners and the memory is the primary place and the data is stored in a manner that it is accessible by the CPU of the computer. RAM is the fast storage place where data can be achieved very easily with not much delay. The RAM is a direct connection with the CPU through the memory bus and the data can be accessed by it quickly. The data for the active program and the OS all are stored in the RAM. That’s why because of the flexibility the RAM losses the data when the power is turned off. The data stored in ROM is related to the instruction to start the program and for the computer initiation .in the case of the full storage of the ROM than the virtual memory is used because it is slower than the RAM.

    Let’s discuss the types of memory who has the chance to lose when the computer is turned off in the following:

    Main RAM:

    The Main RAM has different characters than the volatile RAM. the browser, word processor, and different programs all use it as the scratchpad in a manner to add remove or update the data in it. Millions of the small transistors enveloped in the integrated chips are present in the main RAM. It works at a high speed, and the chance of it being lost at the time of the power loss is high.

     Cache RAM:

    In the main memory, the microprocessor has the extra memory units which are called a cache and they are at the three stages of the cache L1, L2, and L3 and the speed of the working is up to 1 billion of a second or as we say 60 to 80 times more than the regular RAM.it is quite expensive than the regular RAM and the microprocessor has the million or fewer characters of this memory. But like the standard RAM, it has the chance to be lost when the computer is turned off.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: October 3, 2021In: Q & A

    When Using Snmpv1 Or Snmpv2, What Piece Of Information Is Needed To View Information From An Agent?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:58 pm

    When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent? Entity. Community string  MIB. OID. Answer: The community string is the piece of information that is needed to view the information from an agent when someone is using the SNMPv1 and SNMPv2.  What isRead more

    When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?

    • Entity.
    • Community string 
    • MIB.
    • OID.

    Answer: The community string is the piece of information that is needed to view the information from an agent when someone is using the SNMPv1 and SNMPv2.

     What is SNMP?

    SNMP is the simple network management protocol it is based on the response/request format and a standard protocol.it works in a way when the network manager sends the request the response comes from the managed agents in return. The SNMP has the three-basic versions SNMPv1, SNMPv2c, and SNMPv3.

    The base of the protocol is a simple set of operations that gives the authority to modify the state or the condition of SNMP-based devices. Some of the examples are that the SNMP can use to power off the interface of the router and also check the speed of the operating Ethernet. SNMP tells when the switch is heated up and needs to be dislocated from the power.

    Most of the time SNMP is connected with the router management but it can also manage many other devices such as Unix, Windows, printers, modems rags, etc. Before the SNMP the protocol for the router management is the SGMP (simple gateway management protocol). the running devices which allow the retrieval of the SNMP are also managed such as the web servers and database along with the physical devices.

    Now that you know the SNMP let’s take a look at the overview of the different versions of the SNMP in the given section:

    SNMPv1

    SNMPv1 is the very first version of the SNMP the setup of it is easy and require few plain text community.it is open source and the standard protocol but in some areas, it lacks to maintaining the applications. Such as it has 32-bits counters and the security is not so good only the community string is the best method of security in the SNMPv1.the upcoming version has covered these issues only the smaller RTUs support the SNMPv1.

    SNMPv2c

    It is designed in 1993 and is the sub-category of the SNMPv2.the operations like the Get, GetNext, and the set are the same in both SNMPv1 and SNMPv2c .but the feature which is lacking in the previous version is the Inform command .despite the traps which can only be received by the manager the informs have the acknowledgment of the message response. If the manager fails to respond the inform the SMNP agent to resend them. Various other features are improved error handling and SET commands.

    SNMPv3 

    It is the very close version of the SNMP and the feature which makes it unique is its enhanced security. For the management of the security the model which is designed is a User-based Model and for the access control is a view-based access control model.

    SNMPv3 has other 2 forms: authentication and encrypting.

    Authentication: 

    The authentication ensures the traps can be read by the intended recipient. when the response is created a special key is given on the base of EngineID of entity, which is shared among the recipient and also receives the response(message).

    Encrypting:

    The message of SNMP is encrypted by privacy to make sure that unauthorized users can not be able to access it. Privacy is useful when the SNMP response is transferred over the internet.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: October 3, 2021In: Q & A

    What Statement Regarding Crossover Cables Is Accurate?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:58 pm

    What statement regarding crossover cables is accurate? It establishes the computer connection with HUB or switch. T568B wiring is used on the ends. Two Gigabit ethernet cables are connected with the help of it. It is for the connection of the two Pcs Together. Answer: The statement related to the crRead more

    What statement regarding crossover cables is accurate?

    1. It establishes the computer connection with HUB or switch.
    2. T568B wiring is used on the ends.
    3. Two Gigabit ethernet cables are connected with the help of it.
    4. It is for the connection of the two Pcs Together.

    Answer: The statement related to the crossover cables which is accurate is option 4 that which is used for the connection of the two PCs together.

    What is the crossover cable?

    A crossover cable is the one form of cable which is used for the connection of the two same devices.it works by the process of reversing the transmission and receiving the pins at ends so that one device input is the output of the other device and via.

    Mostly the cable on which the crossover is implemented is the twisted pair cable because it has four pairs of cables. And for the proper working of the crossover, both ends should have the same format for wiring.

    The swap in the wires or reverse might be changed because it depends on the network and the devices in use. The mesh network can be created with the help of crossover cables because these can work without the intermediary devices i.e., switch or hub. For example, in the 100baseTX network to create the crossover the second and third pair have to swap with ends. Some of the examples of crossover cables are rollover cables, loopbacks, and null modem cables.

    Uses of the crossover cables

    We have listed some uses of the crossover cables in the following section:

    • It is used for the computer-to-computer connection without any help from a hub or switch. (switch to switch)
    • It is used for the connection of a network device to another network device. (router to router)
    • It is used to establish the connection between the two-computing device with the help of ethernet ports. (router port to PC)
    • It is used for the computer’s direct connection with each other. (computer to computer)
    • Two hubs or switches are also connected with the help of general ports in switches and hubs. (hub switch).

    Difference of the straight-through ad crossover cables

    The key pit or the difference of straight through ad crossover cables are given in the following:

    • A straight-through cable is a CAT5 form and the R-45 is present at the ends with the same pinout while the crossover cable is a form of CAT along with T568A configuration.
    • Straight through is most common for network cables while the crossover is for many different applications.
    • Straight through is connected with the router LAN port through the uplink port, the crossover is connected along with the normal port of Router LAN.
    • The computer is connected straight through the DSL modem port while the crossover needs the normal switch/hub port with router LAN.
    • Straight through connect two different types of device, crossover connect the devices with the same type.
    • Straight through connect the WAN port of router with the cable or DSL modem LAN port, crossover connects the two hub or switches with the regular ports.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: October 3, 2021In: Q & A

    What Vendor Neutral Protocol Implements Support For Vlan Tagging?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:58 pm

    What vendor-neutral protocol implements support for VLAN tagging? ISL VTP 802.1Q VSTP Answer: 802.1Q is the vendor-neutral protocol that implements support for VLAN tagging. Now that we got our answer let's understand the concept of VLAN tagging, we have listed some of the characteristics of VLAN taRead more

    What vendor-neutral protocol implements support for VLAN tagging?

    1. ISL
    2. VTP
    3. 802.1Q
    4. VSTP

    Answer: 802.1Q is the vendor-neutral protocol that implements support for VLAN tagging.

    Now that we got our answer let’s understand the concept of VLAN tagging, we have listed some of the characteristics of VLAN tagging in the topic.

    What is VLAN tagging?

    VLAN tagging gives access to the different IP addresses to be configured as the multiple VLANs. when the packets are moving that are tagged with the specific ID which is the VLAN ID tag associated with IEEE 802.1Q VLAN specifications. The tags on the packets are extracted by the Ethernet switch or router and transferred the packets to the destinated VLAN group.

    The tagging gives the user a choice that the leaving packets have the VLAN ID tag inserted in the header or not. With the help of the graphical user interface of the web, the application user can identify the 16-bit tag control information which is allocated to the service IP address or a media 0 IP address, or a Media 1 IP address.

    The VLAN helped in a way that various VLANs are handled to the port. VLAN tagging determines which VLAN belongs to the other on the intended side. For easy identification, the packets are marked with Ethernet frames. The full-fledged logical system was built along with the help of VLAN tagging in a physical network. The domain can also be built with VLAN tagging.

    How does the VLAN tagging work?

    The tagging works with inserting the VLAN ID to the header for the recognition of the present network.in this way, we can identify the interface or the broadcast place where the packets Are destined to receive the right knowledge. The configuration of the switches is done before the VLAN tagging process starts. The multiple broadcasts are separated to the individual domain with the system. clients and the knowledge are configured, arranged, and logically grouped. the bridging can be moved with the VLAN tagging. The system is thoroughly optimized. The working of the VLAN is in the following:

    • The physical address of the source and destination address.
    • Type/length field.
    • Payload the data.
    • For integrity check the FCS.

    First, the frame has the 4-byte VLAN tag and it has VLAN ID, the tag comes after the Source MAC and the FCS is removed in this stage. at last, the FCS is calculated again base on the entire frame. If the VLAN ID is 12-bit then the expected VLANs are 4096.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: October 3, 2021In: Q & A

    Why Are Open Standards Important In The Data Communications Industry?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:57 pm

    Why are open standards important in the data communications industry? The open standard is important for the data communication industry because they allow the interaction between the software and the hardware from a different businessperson. With the increment of the data factories, the availabilitRead more

    Why are open standards important in the data communications industry?

    The open standard is important for the data communication industry because they allow the interaction between the software and the hardware from a different businessperson. With the increment of the data factories, the availability of the data is very complex .and if we want our industry to grow drastically then the open standard is the important factor in this because people will attract to the platforms that have the open standard. 

    Data communication

    Data communication can transfer the message in encrypted form from one end which is the source to the other end which is the destination with the help of the electronic media. Simply it is the message transfer way from one end to the other with the media either wired or wireless. Communication happens when the digital media is converted to analog and the analog to the digital and the information is carried in the form of signals. The signals are voltage proportional to the amplitude of the voice.

    Communication occurs with the exchange of information along with the help of the standard and the protocols. The communication is completed when it follows the few points which are described in the following:

    • Time and effort are less needed in business operations.
    • Gather the data for the business in its source.
    • Take control over the data for the business.
    • With the sudden damage of the information, the communication is affected.
    • Lessen the current and the cost for the business.
    • Provide the association with the expansion of the business in the future with less cost.
    • Provide the association with the centralized computer system.
    • Support the management of the business.

    Characteristics of the data communication

    The characteristics of the data communication are described in the following:

    Delivery:

    The data need to be delivered to the correct destination .it is important that the destined device can receive the data because this will affect the function of the system.

    Accurate:

    The data must transfer in its actual form because if the data during the transmission is altered then it is for no use and incorrect.

    Timeliness:

    The data must reach the destination at the exact time. The late data re of no use. For the video, audio, and image they must transfer to the destination as they are developed without any delay. The delivery on time is the real-time transmission.

    Types of data communication:

    The types of data communication are:

    • personal computer to personal.
    • Personal to host.
    • Processor to processor.

    Personal computer to personal:

    The personal computer is connected on a one-to-one basis. There is no restriction on information and the information is an online communication and offline communication.

    Personal to host computer:

    The personal computer depends on the host computer for the data transmission (send, receive. And information storage). The server is mid-range and it can give the facility of processing and the data to a personal computer.

    Processor to processor:

    The information is an exchange between more than two computers because the data is huge such and the updating of the files.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: October 3, 2021In: Q & A

    What Is The Purpose Of The Network Security Authentication Function?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:57 pm

    What is the purpose of the network security authentication function? To get the identification of the user. To find the resource of access. To keep an eye on user actions. To give challenge and response. Answer: some terms like authentication, authorization, and accounting are the services in the neRead more

    What is the purpose of the network security authentication function?

    • To get the identification of the user.
    • To find the resource of access.
    • To keep an eye on user actions.
    • To give challenge and response.

    Answer: some terms like authentication, authorization, and accounting are the services in the network known as the AAA. authentication needs to find the user identification while authorization determines the resource of the access and accounting keep an eye on user actions.

    What is authentication?

    The authentication is to determine who are the user, the identity of the user. The term user authentication is also common which means checking the user identity when the user login to the particular app, system website, etc.

    The main purpose is to prevent unknown or unauthorized users to get access to the system. the OS (operating system) has 3 ways to determine the user identity which are: Password, physical identification, and biometric. These are explained in the following section:

    Password:

    A password is an ancient and common method to check user identification. A password is the digits is a text which is specifically allocated to the user who has the access to the system. The user has their password and the username which is only known by him.

    When the user logs in with the user name and password the system checks its data either the given login detail is correct or not and gives the response according to it. if the detailed match with the system the user is allowed and vice versa.

    Physical identification:

     In this method, a machine determines the user identification with some specific symbols, cards, or badges. The companies have the physical identification method by allocating the employees an identity card that has the information stored. when the employee shows the card, he/she will be allowed to enter the companies otherwise the alarm went off.

    Sometimes along with the card, the password is also needed to enter such as the ATM. Nowadays the smart card has been invented which contain all the information along with password but it has a drawback when it gets lost.

    Biometric:

    The biometric is further advanced than physical identification.it involves biological characteristics such as voice, fingerprints, face, eyes, etc., the devices are a scanner that collects the unique data of the user. Software that transforms the data to form which is stored. A database that has the information of different users.

    The function of the authentication:

    The function of the authentication is given in the following section:

     Message authentication:

    • A source that checks the message’s integrity either it is correct or not.
    • Make sure the data which are received are the same there is no modification, deletion, etc.
    • Make sure the user identity.

    The function has two levels which are:

    Lower level: generate a value to authenticate the message.

    higher value: give the signals that the message has been received.

    The function has three groups:

    Message encryption: encrypt the message to the cipher form.

    Message authentication code: the secret key with a fixed length that acts as an authenticator.

    Hash function: it maps the message regard of the length to hash value for authentication.

    See less
    • 2
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: October 3, 2021In: Q & A

    What Technique Is Used With Utp Cable To Help Protect Against Signal Interference From Crosstalk?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:57 pm

    What technique is used with UTP cable to help protect against signal interference from crosstalk? Twist the wires into pairs.  Wrapping the foil shield around the wire pairs. Encase the cable in a flexible plastic sheath. Terminate the cable with the grounded connector. Explanation: To help protectRead more

    What technique is used with UTP cable to help protect against signal interference from crosstalk?

    • Twist the wires into pairs.
    •  Wrapping the foil shield around the wire pairs.
    • Encase the cable in a flexible plastic sheath.
    • Terminate the cable with the grounded connector.

    Explanation:

    To help protect against signal interference from crosstalk the technique used by the UTP cable is to twist the wires into pairs because it will create the magnetic field of each wire which cancels the effect of each other.

    What is UTP?

    UTP (unshielded twisted pair cable) is an omnipresent copper cable type that is common in telephones wiring or the local area networks. Unshielded cable has a total of five types which are identified with the prefix CAT and each has different bandwidth. The connector for the UTP cables is RJ-45.

    Other cables like the coaxial cable and the fiber optic cable have their benefits and cons but UTP is the most useable cable because of its cost and the setup of installation is easy compared to others.

    Working of the UTP cable:

    The UTP cable consists of four twisted pair of copper wires, which are surrounded in the plastic cover along with various pair which depends on the bandwidth. The wire is twisted to each other and then, they are further twisted together to prevent the crosstalk and the EMF of wires individually because they can reduce the performance of the network. The signal in UTP requires both wires.

    The cables have their color code so it is easy to identify the pair. The basic colors are blue, orange, brown, and gray. And they are twisted with other colors such as white, red, black, yellow, or violet. one wire in a pair consists of a solid color and the other is with the suitable one. Such as the blue solid wire is paired with white-blue striped wire for easy identification. The pair cable is designed by alexander graham bell in 1881. different user needs different pairs such as analog, digital, or Ethernet.

    UTP cable types

    There are a total of five UTP cables which are discussed in the following:

    CAT 3: the cable is not as common in today’s world it is implemented in phones the support is 10Mbps up to 100 meters.

    CAT 4: it is common in the token ring and the CAT4 is 16Mbps within the range of 100 meters.

    CAT5: it is common in Ethernet-based LANs consist of the two pairs which are twisted together the support is 100 Mbps in the range of 100 meters.

    CAT5e: it is also present in Ethernet LAN but has four pairs of the cable. the support is 1G bps up to 100 meters

    CAT 6: it is common in the Ethernet LAN and the central network for Data it has four twisted-pair cables the support for 100 meters is 1 Gbps while for 50 meters it is 10 Gbps.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: October 3, 2021In: Q & A

    What Will Happen If The Default Gateway Address Is Incorrectly Configured On A Host?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:56 pm

    What will happen if the default gateway address is incorrectly configured on a host? In LAN the host can’t communicate with each other. The packets which are coming from the host cannot be forwarded by the switch. For the accurate default gateway, the host needs to use the ARP. To another network, tRead more

    What will happen if the default gateway address is incorrectly configured on a host?

    • In LAN the host can’t communicate with each other.
    • The packets which are coming from the host cannot be forwarded by the switch.
    • For the accurate default gateway, the host needs to use the ARP.
    • To another network, the host cannot communicate with the other.
    • Ping to 127.0.0.1 from the host is not successful.

    Answer: when the message is sent to the other network from the host it can be directly sent with the help of the message but to send the message to the remote network, we need the router for the successful conversation which is also called a default gateway. Because the frames of the remote network can not be used with a direct message and the IP frames are sent to the router in the remote network then the router will further be sent toward the destination port. That’s why if the default gateway address is incorrectly configured on the host it can’t be able to communicate with another host on the remote network but communicate on the same.

    Now that you get your answer let’s further study the default gateway, its function, and how to find it on the PC. Read the topic to the end so that your curiosity ends!

    What is the default gateway?

    A default gateway in the computer network is the node that acts as the forwarding node when the IP frames cannot be able to find their destination port to another network. in simple when the host wants to communicate outside its network then the default gateway is used. the router and multilayer switch is commonly used as the default gateway.

    Functions of the default gateway:

    The functions are discussed in the following section:

    • The main work of the gateway is to forward the packets to their destination when they cannot be able to find them in another network.
    • The router or node is responsible for the connection with the host network.
    • When the frames are sent then at first they come toward the default gateway and then with the help of they are forwarded toward the destinated route. The default gateway is the correct spot for the frames in the network.

    How to find the PC’S default gateway?

    You can find the default address of the PC with the help of the few steps in the following:

    • On the command prompt type “ipconfig” and then tap on Enter.
    • Different information is shown on the window scroll down and checks the default gateway which is written on the right of the IP address of the device.

    If the configuration of the default gateway is not happening then the frames will be dropped because they can’t be able to leave the host without configuration.

    If the configuration is incorrectly configured then a few problems might be arising:

    • Communication with the host of the other network is not possible.
    • The packets can not be forwarded by the switch.
    • The ARP is used to find the accurate default gateway.
    See less
    • 1
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: October 3, 2021In: Q & A

    What Is The Prefix For The Host Address 2001:Db8:Bc15:A:12ab::1/64?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:56 pm

    What is the prefix for the host address 2001: DB8:BC15: A:12 ab::1/64? 2001: DB8:BC16. 2001: DB8:BC15: A 2001: DB8:BC15: A:2. 2001: DB8:BC15: A:21 Answer: the network side of the host address is determined with the prefix length. A/64 indicates the prefix length of the 64 bits of the IPV6 address. tRead more

    What is the prefix for the host address 2001: DB8:BC15: A:12 ab::1/64?

    • 2001: DB8:BC16.
    • 2001: DB8:BC15: A
    • 2001: DB8:BC15: A:2.
    • 2001: DB8:BC15: A:21

    Answer: the network side of the host address is determined with the prefix length. A/64 indicates the prefix length of the 64 bits of the IPV6 address. that’s why the prefix is 2001: DB8: BC15: A.

    Let’s take a look at the method to determine the prefix of the IPV6 address in the following section. That’s why to read or learn it to the very end!

    What is a network prefix?

    A prefix is the aggregation of the IP address and the IP has two versions IPV4 and IPV6. the V4 has 32 bits while the V6 has 128 bits in a number. With the use of technology, the IPV4 is not enough that’s why the IPV6 is developed. The prefix length finds the accumulation of the number of bits is the accumulation is also determined by it. The prefix finds the number of IP addresses in the specific host part of the address.

    Let’s see at the simplified example for the prefix consider the internet as the city and the prefix as the city block while the IP address is the building block of the city. If the city block is present then the building block is also with the IP address and with each IP address of the building the block is itself the prefix.

    The prefix of the IPV6 address

    IPV4 gas its subnet mask and regard of 255.255.255.0 we can use the prefix length. such as the IPV6 prefix length is:

    2001:1111:2222:3333: :/64

    Behind the / the numbers used to indicate the prefix number, we can use. And the above example (2001:1111:2222:3333: :/64) shows the prefix of 64 bits and another number behind it is used for the host.

    Unlike the IPV4 in the IPV6, we can find the prefix and it works differently rather than find the subnet mask. Let’s see an example:

    2001:1234:5678: 1234:5678: ABCD: EF12:1234/64 which is the prefix? And which are the Ip address and the host?

    As we know that /64 bits mean the first 64 bits are the prefix. the hexadecimal has 4 bits which mean 2001:1234:5678:1234 is the prefix part of the address. Since the prefix part has 16 hexadecimal characters which means 16 *4 = 64 bits and the rest of the address is the IP address that determines the host.

    5678: ABCD: EF12:1234         

    Now that the Prefix part is determined but the written form of it is not correct. for prefix, an extra zero are present at the end of the prefix, such as

    2001:1234:5678: 1234:0000:0000: 0000:0000/64 is the exact prefix length we can also shorten it to the 2001:1234:5678:1234: :/64.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: October 3, 2021In: Q & A

    What Three Application Layer Protocols Are Part Of The Tcp/Ip Protocol Suite? (Choose Three.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:56 pm

    What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.) DNS ARP. NAT DHCP. FTP PPP. Answer: There are many applications layers protocol but in the given options DHCP, FTP and DNS are the protocols that are part of the TCP/IP protocol suite. In this topic, we havRead more

    What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

    • DNS
    • ARP.
    • NAT
    • DHCP.
    • FTP
    • PPP.

    Answer: There are many applications layers protocol but in the given options DHCP, FTP and DNS are the protocols that are part of the TCP/IP protocol suite.

    In this topic, we have explained the protocols which are present at the application layer in the OSI model. those who want to know will stick to the topic to the end to get the details.

    Application layer protocol

    The protocols which work under the application layer are categorized into two forms such as:

    • The protocol for users i.e., eMail.
    • The protocols assist the user’s protocols such as the DNS (Domain Name System).

    Some of them  are discussed in the following section:

    Domain Name System

    It is the model for the client-server and is also known as the DNS. For the transport layer, it acts as the user datagram protocol which helps in communication. A hierarchical naming scheme is used by it.it is configured with FQDN and with other protocols of the internet. An FQDN requests the DNS and the response is given with the IP address mapped. the port for the DNS is 53.

    SMTP (Simple Mail Transfer Protocol)

    The electronic mail among users is transferred with the help of these protocols, and the client-server software is used in this transfer. The user types the message in the email then it contains it until the internet is not connected. When we submit the email then it is handled by the message transfer agent which is also present in the client-server software. The protocol is also used to transfer the email to another transfer agent. As the SMTP is used to only send the message the server uses it to both send and receive the email. The port for the SMTP is 25 and 587.

    File transfer protocols

    It is the most common protocol which is used to send the file over the internet. The TCP/IP is used by the FTP and the port for it is 21. It also works on the client-server model the client request for the file while the response is given by the servers to the client. Port 20 of TCP is used by FTP for the exchange of information.

    When the client requests a file, the server gains the request and opens the TCP connection, and transfers the file toward the client back. When the transfer completes the connection terminates and opens with another request.

    DHCP protocol

    Dynamic host configuration protocol is the protocol for the management of the network in the application layer of the OSI model.it helps to give the IP address to the devices so that they can communicate with the help of the given IP addresses. The main goal is to give the specific and unique IP address to the nodes or hosts. The protocol gives the subnet mask, router address, and the DNS server as well. The protocol has numerous IP addresses that’s why each device has its address which is different from another device.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 19 20 21 22 23 … 29

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}