Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Is An Advantage Of Network Devices Using Open Standard Protocols?
What is an advantage of network devices using open standard protocols? Now, let us learn what actually the network protocol is and how does it work. Network protocols are where the modern protocols get worked. For example, let us think of network protocols as the common languages that enable the comRead more
What is an advantage of network devices using open standard protocols?
Now, let us learn what actually the network protocol is and how does it work. Network protocols are where the modern protocols get worked.
For example, let us think of network protocols as the common languages that enable the computer to communicate across the networks.
The network protocols have a set of rules that defines how the data is formatted transmitted and then received. So the computer networks like servers routers and endpoints can communicate regardless of the infrastructure. the network protocols then break down the large processes into very narrowly defined functions and tasks across every level of the network.
Without the standardized network protocols, the computers wouldn’t know how to engage with each other and with the internet. The networks are generally of three types of protocols. They are communication, management, and then security. Within all three categories, there are thousands of additional network protocols that can handle a range of tasks from authentication, file retrieval, and routing.
Some of the common network protocols include the post office protocol 3, simple mail transport protocol (SMTP), file transport protocol (FTP) in the telnet. We have a set of corporating network protocols is called the protocol suite, similar to the TCP/IP suite. The TCP/IP consists of the four layers, that support the different protocols and then work together to enable internet connectivity.
The network protocols are specially designed for security, which makes them vulnerable to malicious attacks. Some of the attacks are eavesdropping, poisoning, and false root advertising. But fortunately, firewalls and the anti-virus programs, and virus software can combat all these vulnerabilities. But what network protocols do we use?
Let us learn different protocols which are used on computer networks. There are billions of devices that are connected to the internet, that can communicate with each other for two computers to talk to each other they must speak the same language internet that need to be well planned and then structured. The network protocol provides a set of rules for the easy exchange of information. It can exchange information very reliable and in a very secure way.
See less• Machine cinfugurations
• speed of the transfer
• types of the cables
• physical topologies
• Internet access method
Each layer of the OSI model has its own set of protocols and for the communication within the layer. It then interfaces with the next layer of the protocol. Now let us know some of the popular protocols that are used across the OSI layer.
• The first protocol is the ethernet. The ethernet is the most important for the land type of communication and it serves the physical and then the data link layer.
• Point to point is another type of protocol, it enables the transmission of the TCP/IP traffic over the serial connection.
• The TCP/IP suite is another type of protocol, it is used for the current standard for communication for both local and Wan. It is the communication model of the suit is the client-server model.
• The TCP is also a protocol that fragments the messages into smaller packets and sends them over the network.
Which Twisted Pair Category Can Support 10gig Ethernet?
Which twisted-pair category can support 10gig ethernet? The category 6a cable is used in order to support the 10 gig ethernet. Generally, we have different types of networking cables that are present to connect to the different types of devices. The most common cables that are present in the networkRead more
Which twisted-pair category can support 10gig ethernet?
The category 6a cable is used in order to support the 10 gig ethernet. Generally, we have different types of networking cables that are present to connect to the different types of devices. The most common cables that are present in the networking are coaxial cables, twisted pair cables, optical cables, parallel and serial cables.
All these networking cables are used for the network topology, hardware, software, and network size. Networking keyboards, connectors, and their specifications belong to the physical layer or layer one of the OSI model. Now let us discuss the twisted pair cable specifically along with the shielded twisted pair and the unshielded twisted pair. Normally, shielded twisted pair(STP) twists appear on the shoulder, the twists appear on the solid cable vs the stranded cable. And let us discuss a brief introduction to the category rated cables.
Most of the modern network keyboards are made from eight wires which are twisted in pairs. And these pairs are twisted to eliminate the cross talk and helps to improve the data transmission performance. These twisted pairs are the four different color-coded that insulated the copper wire in orange, blue, green, brown. In each wire has a solid color and the other one is predominantly white with the color stripe.
We have more wire pair twists per foot which mean we have more resistance to the crosswalk. This also has a higher quality so that these are more expensive. The twists per meter or afoot, we call it the twist ratio. If we have the higher twist ratio, then we have fewer crosswalks but it has the greater attenuation. We need to maintain a balance between minimizing crosswalks and reducing attenuation. These twisted pair cables then can be shielded or can be unshielded. Let us learn the shielded twisted pair in detail.
The below figure represents the structure of the shielded twisted pair. The outer layer, we call it the plastic and the shield. The second layer that is present we call the braided shielding. This is a type of metallic substance that protects the cable from electromagnetic interference or by the EMI. We also have an aluminum foil shielding underneath the braided shielding.
In the figure, the foil shielding wraps an individual set of wires. Some may also contain foil shielding for all the wires that are present while some of the cables don’t have any foil shielding Shielded twisted pair. The shielded twisted pair that consists of the foil shielding have the individual or overall is called the fully shielded twisted pair (FTP).
The individual fielding helps to prevent the EMI and the cross talk from the neighboring wires. Each copper conduct wire is also covered by the plastic insulator. The STP is recommended where EMI is strong. These shielded twisted pairs are mostly used for horizontal cabling. When we compare the STP with the UTP. It has only fewer layers than the UTP. Plastic shield and wire insulators are the two layers of the UTP.
See lessHow Do Dhcp Servers Respond To A Dhcpdiscover Message?
How do DHCP servers respond to a DHCP discover message? Before we discuss the DHCP, let us know to look at an example of the TCP/IP network configuration. By taking windows as the example let us start a window command prompt and type IP config/all and press enter. After pressing enter we can see theRead more
How do DHCP servers respond to a DHCP discover message?
Before we discuss the DHCP, let us know to look at an example of the TCP/IP network configuration. By taking windows as the example let us start a window command prompt and type IP config/all and press enter.
After pressing enter we can see the computer’s physical address, IP address, subnet mask lease obtained. We can use these configuration credentials for a couple of days. We can also see the IP addresses of the default gateway, DHCP server, and DNS servers. These are useful for connecting the Internet. Now let us know how does the computer or more specifically the wireless adapter gets this network connection information.
The DHCP stands for Dynamic host configuration protocol that allows the DHCP server to set the TCP/IP network automatically and for the configuration of the client computer. Without the presence of the DHCP technology, we can set up all the configuration values manually by the computer. And this process of setting up the client computer is called static addressing. We can know the difficulty if we do not use the DHCP network.
Now let us know how the DHCP works. When the client computer boots up in the broadcast DHCP discover the message it doesn’t matter how where the client computer is present. It may be at home or at an unknown location. It would send the packet by looking for the DHCP server. If the client has no idea that there is a DHCP server present nearby, then the broadcast is the only way to notice the destination IP address. The DHCP discover packet asks if there is any DHCP server present out there and informs that it wants to connect to the Internet.
And coming to the next step, if there is any DHCP server present close by and if it hears the DHCPDiscover message then the DHCP server responds by sending a message called the DHCPOFFER message. The DHCPOFFER is a broadcast UDP packet. It simply replies as it heard the message and tells that it can lease the IP address. And we can connect to the local network. It also tells the IP address of the default gateway and the DNS servers so that we can go to the Internet.
Coming to another step, the DHCP client responds with the DHCPREQUEST. It says that it accepts all the TCP/IP information and the lease term.
And in the next step, the DHCP server replies to the DHCPACK message. It is nothing but the acknowledgment packet. It says OK and tells to use the network and register the MAC address or the other information in the DHCP database. And this is the process of the DHCP.
The DHCP is the dynamic way of giving the client computer network connection credentials between the DHCP servers. And the clients have broadcast UDP and not in the TCP. The client uses port 68 and the server can use port 67. Type the IP config/release and then reload a browser, if you are using windows. We can see it as the no internet connection. Now type IP config/renew now we can see that the internet is back.
See lessWhat Is The First Action In The Boot Sequence When A Switch Is Powered On?
What is the first action in the boot sequence when a switch is powered on? After the switch is powered on, we load the power and self-test the program in the boot sequence. Now, let us know how this device gets works. Firstly let us compare the boot-up process of the computer with the boot-up procesRead more
What is the first action in the boot sequence when a switch is powered on?
After the switch is powered on, we load the power and self-test the program in the boot sequence. Now, let us know how this device gets works.
Firstly let us compare the boot-up process of the computer with the boot-up process of the router. Many of us may not know the boot-up process of the PC or at least the details of the Boot-up process, however, the boot-up process of the PC is very precise. since the router is essentially a PC, now we are going to find out the boot-up process is very similar. The Boot-up process must be known for several reasons.
There are features on the router that we need to take an advantage of especially when we need to perform the password recovery or it can be restoring a broken operating system.
We just need to know how to repair all this on the router and on the PC. But repairing the PC is a bit different, we have a lot of documentation, we do not need to know the order of our PC boots up.
On the both PC and in the router, the first process to perform is to POST. The post is nothing but the power-on.
It is a test that runs to make sure that all the components get work. suppose if one of the components fails, the post device won’t boot. We need to know that if the POST doesn’t pass devices, there is something wrong and we should get it fixed. after the POST runs on the PC, the next thing that loads is the Basic Input/Output System. we call it the BIOS.
The bios are the basic set of instructions in order to get the system running. Suppose we have a bunch of hardware in the system and in order to use the hardware, we need an operating system. But in order to get the operating system loaded on the hardware, we need an operating system to tell us where the hardware is present.
But to put the operating system on the hardware, we need an operating system to do that. Here the BIOS be the kickstart to the system. It loads a minimal set of instructions into the memory that can be used to call the operating system on the PC. Once the BIOS loads it finds the operating system and it does that looking through all the drives on the PC and the user gets to specify the order that your PC looks through the drives to find an operating system.
Suppose we can have bios set up so that the PC first boots from the USB drive than from a CD-ROM drive. If we have one installed, it boots from the hard drive and if the hard drive isn’t present, then it will try to boot a network boot. Inside of the BIOS, we specify the boot order and we can run the multiple operating systems from multiple different devices.
See lessWhich Switching Method Uses The Crc Value In A Frame?
Which switching method uses the CRC value in a frame? The switch can receive the complete frame when we use the store and forward method to its destination address. The store and forward method is used in the CRC value in the frame. Let us learn different types of switching methods. It uses differenRead more
Which switching method uses the CRC value in a frame?
The switch can receive the complete frame when we use the store and forward method to its destination address.
The store and forward method is used in the CRC value in the frame. Let us learn different types of switching methods. It uses different switching methods for the switching traffic. We use these switching methods to check the frame before it gets passed. We have three different types of switching methods. They are
• Cut through method
• Fragment free method
• store and forward method
As we said earlier the store and forward method is used for the CRC value in the frame. Let us learn how the store and forward method works. Before we send the frame, it reads the information that is present in the frame. After reading the frame it stores the information into the buffer.
To check the errors that are present in the frame, the cyclic redundancy check is prepared. If we find any errors in the frame, the frame is gets dropped. But if we do not find any errors, it is checked by the switching table and the frames get forwarded.
Let us take an example to understand the concept in detail. If we are working as security in charge in any particular area. To avoid entering the wrong people, we must not only identify the image of the person, but also the name and address of the person. But this method consumes a large amount of time and leads to greater delay. This is the working of the store forward switching method. The default setting of the store forward switching method is 2900 series of switches.
The store and forward switching method want to make sure and it’s not corrupt before it starts forward. Or else it would waste a lot of bandwidth in it. If we forward any corrupted frames, it waits for the entire frame to be sent and then checks the frame sequence. And now switch is going to calculate an algorithm and creates an FCS on its own. FCS is nothing but the frame check sequence. Here if the FCS in the frame is equal to the FCS calculated by the switch. Then the switch concludes that it is a reasonably valid frame.
We can say that store and forward is a telecommunication technique where we can send the information to an intermediate station. We keep the information at the intermediate station and later we send it to the final destination address. The intermediate station or a node verifies the integrity of the message before it’s going to forward to it.
This Technique is used in networks with connectivity especially in environments that require high mobility. It is also suitable in situations when there is a long delay in the transmission and having high error rates or if there is no end-to-end connection.
There are no real-time services are provided for this type of network. Normally the store and forward networks predate the use of the networks. We use point-to-point equipment to send the messages which we are stored at the receiving end.
See lessWhich Command Displays The Statistics For All Interfaces Configured On A Router?
Which command displays the statistics for all interfaces configured on a router? We use the show interface command to display the statistics for all the interfaces that are configured on the router. Now, let us learn some of the fast ethernet interfaces especially the show interface command that shoRead more
Which command displays the statistics for all interfaces configured on a router?
We use the show interface command to display the statistics for all the interfaces that are configured on the router.
Now, let us learn some of the fast ethernet interfaces especially the show interface command that shows the settings like speed duplex and errors. Let us learn what is exactly each of the settings means. Let us take two routers that are running on the gns3. We can take any two routers unless it has fast ethernet interfaces and with the IP address 1.1.1.1/24 and 1.1.1.2/24 as shown in the below figure.
Now let’s set the hostname something as R1 and let go into the fast ethernet interface with an IP address 1.1.1.1 255.255.255.0 and no shut. Now let perform the same thing on another hostname r2. Now all the ethernet interfaces are coming up. Now, we should go back to the privileged mode and do the show interfaces.
It shows all the interfaces that are present, some of the IP addresses, physical data links. Here instead of doing the show interfaces that show everything. We can also do the show interface fast ethernet zero/zero which shows the information about the particular interface. Now we can see the fast/ethernet zero zero and an IP address, mac address, Mtu bandwidth. All this information is more for the documentation quality of service and helps in the routing protocols.
The bandwidth we see is mostly used for documentation purposes and quality of service purposes. The MTU of 1500 bytes is the maximum transmission unit, it defines how large a packet can get before it gets fragmented. We also have a delay, reliability. We can also see the half-duplex with the 10 megabits 100BaseTX/FX. The half-duplex represents is waiting to send the information i.e it doesn’t just send the information blindly. It looks at each line and checks whether everything is fine or not and then sends it.
The full-duplex represents that it can send and receive the information at the same time without any problem. We can also see the current speed of the line. The 100BaseTX/FX represents the actual wire type. We can also look at the maximum possible speed of the particular interface in which it is present.
So it says that we can move up to 100 megabits per second. It also shows the information that it last received and either from a frame or a packet. We can see the input/output queue, queuing strategy, last clearing of the show interface, five-minute input and output rates. We can also see the number of errors that a line has got or received.
If there are no errors, it is set as zero. We can see the collisions if any collisions have occurred. The collision is due to a duplex mismatch, if one is present in half and another one is present in full then will definitely collision gets occur. so we need to do a show interface and look at the counters if the counters are gone up. Another thing is we can clear the counters by using the command called “clear counters”.
See lessWhat Is Not One Of The Ways In Which Networks Are Commonly Segmented?
What is not one of the ways in which networks are commonly segmented? Let us know a clear understanding of what actually the network segmentation is before we discuss the ways that are not used for the segmentation. Network segmentation is the idea of creating subnets within the network. Now, what aRead more
What is not one of the ways in which networks are commonly segmented?
Let us know a clear understanding of what actually the network segmentation is before we discuss the ways that are not used for the segmentation.
Network segmentation is the idea of creating subnets within the network.
Now, what actually the segmentation is? and for what purpose the network segmentation is used. It is used for many things like compartmentalizing the network or simply the organizing of the network.
Let us take an example to understand the concept in detail. The network segmentation keeps the computer teams from talking and sharing the information with the teams in financial computers.
This segmentation allows for the more efficient use of the bandwidth by reducing the size of the broadcast and domains and removes unusual traffic on the network.
The main benefit of having the segmented network is to it increases security by reducing an organization attack. When a computer wants to communicate with the other computer or a device, it should go through the firewall and the central router that is connected to all the devices.
This gives more control over the network traffic. We use physical segmentation, virtual local area network, and many more. But we do not use the device manufacturer as one of the ways for the network segmentation.
A device manufacturer is a physical device created by the end-user. It holds feature-based and software-based licensing that can create a different device from the same platform. The device segment is only used for the purpose of creating physical devices.
The main aim of network segmentation is to improve performance and security. It divides the segmentation into multiple smaller parts. It can also protect the devices from harmful attacks and data traffic.
The device manufacturers ensure reliability. There are different types of device manufacturers like semiconductors, transistors resistors, amplitudes, transducers, and many more. These created devices will be sent directly or through a channel to the user.
The device manufacturers give many gains like providing high-quality products and goods, giving better government incentives, reducing the energy cost, decrease in labor cost, providing intellectual property management, and many more. It is only used to maintain quality products and decrease the cost of the above-mentioned applications.
The device manufacture is not able to involve in the network segmentation, since it is only used in quality products and reducing costs.
The Network segmentation is quite different from the device manufacturer. As we discussed earlier, segmentation is only used to increase the overall security. Mostly the retailers and the health care providers use the network segmentation, where the device, manufacturers are mostly used in the government incentives and for decreasing cost in different fields.
The device manufacturer is quite different from the network segmentation. The Techniques that we use in-network segmentation are physical segmentation, Virtual Local area networks. These are used to provide some of the security policies. These help to manage the risk and that makes it difficult for the attackers to attack any device.
See lessWhen An 802.1q Tag Is Added To An Ethernet Frame, Where Is It Placed?
When an 802.1q tag is added to an ethernet frame, where is it placed? We insert it between the source's address and the ethernet type field. Today, let us discuss the basics of tagging and trunking. Let us talk about the different terminologies such as the dot1q VLAN tag, trunk ports, and excess porRead more
When an 802.1q tag is added to an ethernet frame, where is it placed?
We insert it between the source’s address and the ethernet type field. Today, let us discuss the basics of tagging and trunking.
Let us talk about the different terminologies such as the dot1q VLAN tag, trunk ports, and excess ports. let us take one example of how it works. Normally we refer to 802.1q as a dot1q, it is a networking standard that supports the VLANs on the ethernet network. This standard defines a network between the two switches in order to tell which traffic belongs to which of these networks.
Let us take an example to understand the concept in detail. suppose we consist of the four PCs. Let say PC1, PC2, PC3, PC4. we also assume two switches i.e switch 1 and switch 2 which are labeled. And let us assume an airplane. Switch 1 has a port FA 0/24 and switches 2 has 0/24. Now all these PCs are tied into the switch straight through the cables.
The PC1 goes to port 1 on the switch, PC2 goes to port 2, PC3 goes to port 3 and PC4 goes to port 4 on the switch. When we connect a PC to the switch that switches port is going to assign as an access port. Let us say that we assign VLAN 2 to port 3, so it says that the switch port mode access switch is the member of the VLAN 2.
And the PC that connected to it also be part of the VLAN 2. similarly the PC 1, the PC 1, and PC3 are part of the VLAN 2 which are on separate switches. Now, let us take port 2 as the access port that is connected to the VLAN 3. Now, we have two VLANs on both the switches but if the pc1 and pc2 want to talk with each other it will make it a difficult task.
Let us say that the PC1 has the IP address as 10.0.0.1 and PC3 has an IP address as 10.0.0.3. We give completely different IP addressing space to the PC4 as 20.0.0.4, it is connected to the different VLANs. And take 20.0.0.2 for the PC2. Now, let us know what actually the problem is.
Here when the PC1 sends the broadcast out, it should go to every single other device in that same VLAN. so the broadcast comes into the switch and its other side. So we need to specify the interfaces. We are gonna set up the trunk ports. The trunk ports are expecting to carry the traffic that needs to go across for the multiple VLANs. The tagging keeps track of the broadcasts from the VLAN 2 or VLAN three.
When a PC1 sends a broadcast to the switch, it is received by the switch on the access port, the switch actually knows the broadcast belongs to which VLAN. Instead of broadcast to all, it simply sends it to through the trunk.
See lessEthernet 100basefx Networks Use What Type Of Cabling?
Ethernet 100basefx networks use what type of cabling : Fiber optic cablings are used for the ethernet 100 base fx networks. Now, let us learn about the concept of the ethernet 100basefx networks. The ethernet 100basefx networks are very standard for implementing the fast ethernet type of networks. TRead more
Ethernet 100basefx networks use what type of cabling :
Fiber optic cablings are used for the ethernet 100 base fx networks. Now, let us learn about the concept of the ethernet 100basefx networks. The ethernet 100basefx networks are very standard for implementing the fast ethernet type of networks.
The 100basefx works based on the extensions of the 802.2 specifications and it is an 802.3U. The ethernet 100basefx was developed by the IEEE standard. 100 base Tx and the 100 base Fx are referred to as the 100baseX. Now let us know why we call it the 100 base fx networks. Here the 100 refers to the media type designations that refer to the transmission speed of the 100Nbits per second.
And the word Base stands for the baseband. And the letter T and F represents as the twisted pair or the fiber that acts as a medium and passes the signals.
And the last character X in FX or TX is referred to as the line code method. The fast ethernet is used for the 100 base – X. Here the letter X acts as the placeholder. We can place FX or TX variants in it. Now let us discuss 100 bases TX and 100 base FX in detail.
The 100 base TX is wired together in the form of the star topology. It uses the unshielded twisted pair (UTP) or it can also use the shielded twisted pair (STP) with the 100 Mbps hubs or by the Ethernet switches.
The unshielded twisted pair is used in most cases. If we are using the unshielded twisted pair, then it must be the category 5 cabling, we can also call it the cat 5 cabling or enhances category 5 cabling.
The 100baseTX uses the two types of twisted pairs. One pair of wires is used for the transmission and the other type of pair is used for the reception. Here transmission and reception are representing as sender and the receiver. By using the proper equipment, 100baseTX is cable supporting both the half-duplex ethernet and the full-duplex ethernet signaling technologies.
The maximum length of any segment of the UTP cabling that connecting the station to a hub is 100 meters. This makes sure that the round-trip signaling specifications are met. By violating, these specifications can produce late collisions that can disrupt the network communications. The ETA/TIA recommends only 90 meters of the cabling between the stations and the wiring closet.
By allowing 10 meters more of the cabling for the patch cables that are used to connect the patch panels to hubs or switches. The pinning of the RJ-45 connectors is used for the 100 Base-TX wirings. The 100 base TX wiring is the same as that of the 10Base T wiring. The 100 base FX uses fiber cabling. Here from the name we can know which cabling is used by the placeholders X. If it is FX then it using the fiber cabling and if we use TX, then we can known that it is a twisted pair.
See lessWhich Of The Following Asymmetric Cryptography Algorithms Is Most Commonly Used?
Which of the following asymmetric cryptography algorithms is most commonly used? We use RSA asymmetric key algorithm is most commonly used. Now, let us learn in detail about the asymmetric algorithm. In starting years, cryptography is based on the symmetric keys where the sender encrypts the messageRead more
Which of the following asymmetric cryptography algorithms is most commonly used?
We use RSA asymmetric key algorithm is most commonly used. Now, let us learn in detail about the asymmetric algorithm. In starting years, cryptography is based on the symmetric keys where the sender encrypts the message and sends it to the receiver.
The Receiver then decrypts the messages by using the specific key. The sender and receiver use the same key to communicate with each other. Encryption is like mapping for some of the messages by using a specific key to the ciphertext message.
In order to decrypt the ciphertext, we use the same key as we used to encrypt the data. So when two persons want to communicate with each other securely, they share identical keys. But it is difficult to establish a shared key or it requires extra communication overhead when using the Diffie helmen key exchange. Suppose if a single person needs to communicate with many persons. The person should maintain different shared keys with all the other persons. This becomes a difficult process. So the RSA algorithm has been introduced.
The sender uses a private secret key and sends the message to the receiver. If the receivers want to send a message to the sender then the receiver mixes a secret key to the public message sent by the sender and sends the resulting mixture back to the sender. Now sender adds the private key to the message sent by the receiver by taking the secret key of the receiver. This is how it works.
But a mathematical solution was needed to make this work. The modular exponentiation was introduced as clock arithmetic in the Diffie helmen key exchange. For example, take a number and raised it to some exponent that is divided by the modulus and output the remainder. This can be used to encrypt the messages.
Let say sender A has a message that is converted into the number M, then we multiply the number by itself by E times. Here E represents the public exponent that divides the result by some random number n and outputs the remainder of the division.
M^e mod N=c is the mathematical solution. This is the easy calculation that we can perform
In the above mathematical solution, it is easy to know the value of e and N. But to find the value of M, we need to perform the trial and error method. It is easy to perform, but difficult to reverse. The key makes the process easy to reverse the encryption.
To reverse, we need to raise the result with some other exponent as below. c^d mod N that results in the initial operation that we applied to M and returns the original message.
Let us take an example let Sender B has a message to send to Sender A. The sender B converted the message into the form of a number by using the padding scheme. Let call the result N. Now the sender A generates the public and private key by selecting two random numbers at first and multiples them to get N. Then we can find the result.
See less