Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Priya Hamsa

Bronze
Ask Priya Hamsa
13 Visits
0 Followers
0 Questions
Home/ Priya Hamsa/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: September 16, 2021In: Q & A

    Refer To The Exhibit. What Is The Maximum Possible Throughput Between The Pc And The Server?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 3, 2021 at 1:05 pm

    Refer To The Exhibit. What Is The Maximum Possible Throughput Between The Pc And The Server? 128 kb/s is the minimum possible throughput between the pc and the server. Today, let us discuss the network throughput in detail. The throughput is nothing but the number of bits that are transferred from tRead more

    Refer To The Exhibit. What Is The Maximum Possible Throughput Between The Pc And The Server?

    128 kb/s is the minimum possible throughput between the pc and the server. Today, let us discuss the network throughput in detail. The throughput is nothing but the number of bits that are transferred from the sender to the receiver, hence the unit of throughput can be eight bits per unit time. We have two types in the throughput, let us discuss each of them in detail. The two types are instantaneous throughput and the other one is average throughput. Instantaneous is nothing rate at any given point of the time. And the average is defined as the rate over long periods of time. The term rate is nothing but the number of bits that are going to be transmitted in the given period of time.

    Let us take an example to understand this concept in detail. Here let us consider a server that stores a file with the length F bits, this server wants to send it to the client. And now between the client and the server, we have two types of links. The first type of link has a capacity of subscripts bits per second. And second, the link has a capacity of c bits per second. Let us assume it is water that is flowing through a pipe. And assume server as a reservoir, here we have F bits that we need to transmit and these F bits will flow through a pipe i.e link at a rate of s bits per second. and it flows through the other link at a rate of C bits per second. Now, we need to know at what rate the server can flow the bits to the client.

    As we discussed earlier, the link between the server and the client can able to carry bits at different rates, let say the capacity at the length 1 is less than the capacity at the length 2. So the link 1 will decide how much flow is passing through the server to the client, so the value of link 1 can be determined through the throughput.

    And in another scenario, if we consider the capacity at link 1 is higher than link 2, so the amount of flow that passed through link 1 will be more than the amount of flow that passing through link 2, hence the throughput will be determined by the capacity of the second pipe. Therefore, the one which has the minimum capacity will determine the throughput for the flow that passes between the client and the server. Let say we have ten servers, ten clients, all these are connected by having a different connection that is directly connected to the internet. here we have options like entire packets can flow through multiple devices, the flow capacity will be equally shared between all the ten servers. So all these servers are going to use this capacity. The end-to-end connection for each throughput will depend on the value of the devices that are connected.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: September 16, 2021In: Q & A

    What Two Different Types Of Firmware May Be Used On Motherboards?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 3, 2021 at 1:04 pm

    What Two Different Types Of Firmware May Be Used On Motherboards? The BIOS and the UEFI are the two types of firmware that are used on the motherboards. Today, let us discuss each of these types in detail. The term UEFI stands for unified extensible firmware interface. It is called the next-generatiRead more

    What Two Different Types Of Firmware May Be Used On Motherboards?

    The BIOS and the UEFI are the two types of firmware that are used on the motherboards. Today, let us discuss each of these types in detail. The term UEFI stands for unified extensible firmware interface. It is called the next-generation interface between the operating system and the platform firmware. The UEFI will replace the antiquated legacy basic input/output system which is shortly called BIOS. The UEFI standard was created by the UEFI consortium. It consists of around 140 technological companies. The main aim to develop the UEFI is to simplify and secure the pre boot environment that preventing the injection of any dangerous code. It is also used to improve interoperability between the systems.

    The BIOS has some of the basic limitations that will relate to modern hardware. The BIOS is only limited to the 16-bit processor mode. And it has a memory of one megabyte of the addressable memory. But the UEFI, on the other hand, will supports either the 34 bit or it will support 64-bit processor mode. It can able to access all the system memory.

    The BIOS will use the Master Boot Record which is shortly called the MBR. It is used for the disk partitioning scheme and the UEFI uses the newer partitioning scheme called the GPT.

    The UEFI is able to support the disk sizes which are greater than the two terabytes with its maximum disk and the partition size, which is 8 to 7 bytes. But by converting the operating system drive partition from MBR to the GPT, is a type of destructive process where the new partitioning scheme that needs to be formatted and the operating system needs to be completely reinstalled.

    Without any right process and rules, this process will be an expensive manual effect. We have many security advantages by running the UEFI than the BIOS on the Windows 10 operating system. For example, the secure boot will process against the boot kits, we also have a device guard, credential guard, biometric authentication, and the end-users will also appreciate the startup times that are faster.

    And the BIOS is another type of firmware, the term BIOS stands for the basic input-output system. It is a small piece of the code that is present on a chip of the system board. When we turn on the computer, the bios is the first software that runs on the operating system. It will identify the hardware of the computer and then will connect it to the operating system. This process is called the boot process. By entering the bios setup utility, it will allow changing the process of the boot and its hardware settings. Only the experienced users must change the settings of the BIOS. The limitations that are present on the BIOS have led to the creation of the new interface called the UEFI. The UEFI is similar to the bios. The BIOS has a graphical user interface with network capability. It is also backward and forward compatible.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: September 16, 2021In: Q & A

    What Is A Valid Ip Address Of The 10.128.0.0/9 Network?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 3, 2021 at 1:04 pm

    What Is A Valid Ip Address Of The 10.128.0.0/9 Network? Today, let us learn the verification of the IP address, we can verify the IP addresses by using a command line, if we want to use the command line, we have to use a command called as IPConfig inside of the command line. The IP config will normaRead more

    What Is A Valid Ip Address Of The 10.128.0.0/9 Network?

    Today, let us learn the verification of the IP address, we can verify the IP addresses by using a command line, if we want to use the command line, we have to use a command called as IPConfig inside of the command line. The IP config will normally display the IP address, subnet mask, and the default gateway information in it.

    And if we need more detailed information like the mac address and the DNS address of any particular device. For this open the command prompt and try to verify the IP config command, we can use any network interface card among all. Let’s take a wireless LAN adapter, this adapter will be connecting to the internet. Under the wireless adapter, you can able to see the IP address, default gateway, subnet mask, and the local IPv6 addresses. The default gateway is nothing but the routing address.

    We can also use the IPConfig /all, it will give more information like the DHCP server, DNS servers, mac address, and many more. This is one of the ways to quickly verify the IP address.

    For another way, we can simply go to the control panel and search for the network status on the bar. We can go to the adapter options and move to the specific network interface card and click on the status in order to verify the IP address, here we can see the same information as earlier.

    And to change the IP address, we go to the TCP IPv4 properties. But what is actually the IP address?, what is the use of the IP address?

    Now, let us look into the use of the IP address in detail.

    For suppose when a computer wants to send a message to the other computer, or when a user wants to retrieve the information from the internet, we need an address to the computer and this address is called the IP address.

    Let us understand this in detail with an example. For suppose if someone wants to send a mail, the sender must have the receiver’s home address, in the same way, the computer also requires an address so that the computers can send the file which we want to download. This address is called the IP address. The IP address is nothing but a string of numbers that are written in a certain format.

    Now, this IP address is identified by the computers that are present on the internet and hence we can able to download all the information that we require from the internet. The term IP stands for internet protocol so it is called the internet protocol address but what it means? The internet protocol has some set of rules, we can able to communicate with others via a computer only because of Internet protocol for the computer. The Internet will send all the information that we required to the IP address. We also have different versions of the Internet protocol that are IPv4 and IPv6.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: September 16, 2021

    At What Layer Of The Osi Model Do The Ip, Icmp, And Arp Protocols Operate?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 2, 2021 at 11:52 am

    At What Layer Of The Osi Model Do The Ip, Icmp, And Arp Protocols Operate? At the network layer of the OSI model, the IP, ICMP, and ARP protocols are operated. Today, let us discuss the network layer of the OSI model and the Ip, Icmp, and arp protocols. Normally, there are three protocols that helpRead more

    At What Layer Of The Osi Model Do The Ip, Icmp, And Arp Protocols Operate?

    At the network layer of the OSI model, the IP, ICMP, and ARP protocols are operated. Today, let us discuss the network layer of the OSI model and the Ip, Icmp, and arp protocols. Normally, there are three protocols that help the network layer of the protocol. They are, internet protocol version four(Ipv4), Internet control message protocol(Icmp),Internet group management protocol(IGMP).

    The internet protocol is mainly used for the packetizing, forwarding, and delivering of the packet. These are the three functions that the internet protocol will look into.

    Another type is called the internet control message protocol. This protocol will handle all the errors in it. When we are going to deliver the packets to the destination address, we will encounter some of the errors.

    The other one is the Internet group management protocol. This protocol will mainly help in multicasting.

    As we discussed earlier, at the network layer of the protocol, we have IGMP, ICMP is placed at the top. The Internet protocol and the ARP are placed at the bottom. The ARP mostly helps in resolving the link-layer addressing. It can map the link-layer addresses to the Internet protocol.

    The Internet protocol is an unreliable datagram protocol. Simply it is similar to the post office delivery. Here when we post a letter to the destination address, the sender will not be known whether the letter reached the destination address or not. In the same way, the internet protocol is also an unreliable protocol, which means the sender doesn’t know whether the packet has reached the destination address or not.

    To resolve this issue when we deliver the IP protocol with the TCP protocol, then we can easily deliver the issues. The IP is also called the connectionless protocol.

     

    The other one is the ICMP protocol which is the internet control message protocol. The primary function of this ICMP protocol is to detect the errors, which means whenever the two devices are connected over the internet, the ICMP will generate the errors in order to share those with the ending of the devices. This is also used for network diagnostics. It is also divided into two fields like the traceroute and the ping.

    The other one is ARP. Its stands for address resolution protocol. The ARP is used to resolve the Ip addresses to the mac address. Here the mac address is nothing but the physical address of the device. It is a unique number that we will assign to every network card interface. For example, when a device wants to communicate with the other device on a local area network. For this, we need a mac address for that device. So for this purpose, the devices will use the address resolution protocol in order to acquire the mac address.

    For example, when computer A wants to communicate with computer B. If computer A knows the Ip address for computer B, but to communicate with computer B we still need the mac address. Hence, the address resolution protocol is used.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: September 16, 2021

    When Using Satellite Services For Your Wan Connection, What Statement Is Accurate?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 2, 2021 at 11:40 am

    When Using Satellite Services For Your Wan Connection, What Statement Is Accurate? The satellite services will have jitter issues and may also suffer from latency. Now, let us know what is jitter issues and latency mean?. Jitter is nothing but any deviation that occurs in the signal pulses in a digiRead more

    When Using Satellite Services For Your Wan Connection, What Statement Is Accurate?

    The satellite services will have jitter issues and may also suffer from latency. Now, let us know what is jitter issues and latency mean?. Jitter is nothing but any deviation that occurs in the signal pulses in a digital signature with a high frequency. This may be in terms of the amplitude or by the width of the signal or by the facing time.

    The jitter will create all the unwanted effects. The unwanted effects are nothing but having poor processor performance, having the data loss, monitor flickering, and the data flickering between any two devices.

    In an IP network, the deviation that occurs as a signal pulse is called the latency of the data packet flow. Here the packets can take a longer time to travel from one of the systems to another. Let us know some of the possibilities where the jitter might occur. It can mainly be caused by some of the outdated network hardware, which means old hardware devices, which don’t have enough bandwidth. It can also have some of the over crowded traffic.

    Having a poor network connection may also cause the jitter and having no packet prioritization. There are many different types of jitter. Let us know each of these types in detail. The constant is a type of jitter issue that occurs while in every packet transmission. Another type of jitter issue is transient. The transient is a significant delay of the packet. The other type is called short term, here the short term delay in some of the number of the packets.

    We cannot notice the small amount of the jitter. Now, let us know how satellite service through wan connection will suffer latency. Here the tern latency is nothing but the delay. The latency is defined as the time taken for the message to arrive at the destination address from the time it starts sending. We have many components in the latency. They are transmission delay, propagation delay, queuing delay, processing delay. Here the combination of all these delays is called latency.

    The satellite wan connection is nothing but the internet from the outer world or from outer space. It has high speed mainly at the ruler areas. The satellite internet works with high speed, let us take an example to understand how it works. when we search for a URL on a website, now this request will travels through the cables that are connected to it and reach the dish that is connected at the top of the home. The dish will give a clear view of the satellite. Having interruptions in middle like trees and houses may affect the quality. The dish will send the requested data to the satellite, then the satellite beams the data to the network operation center which is present on the earth, and retrieves the data that is needed for the request. And all this will take a fraction of seconds. So the latency becomes a factor for the satellite internet.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: September 16, 2021

    When The Same Default Tracking Code Is Installed On Pages With Different Domains, What Will Result?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 2, 2021 at 11:39 am

    When The Same Default Tracking Code Is Installed On Pages With Different Domains, What Will Result? When the same default tracking code is installed on pages with different domains, then it will associate all the users and sessions with their domains. Today, let us know how to install the tracking cRead more

    When The Same Default Tracking Code Is Installed On Pages With Different Domains, What Will Result?

    When the same default tracking code is installed on pages with different domains, then it will associate all the users and sessions with their domains. Today, let us know how to install the tracking code on the pages. Installing the tracking code on the website to get the data later form. It is important to install the tracking code properly so that analytics data that you need to make business decisions. Now, let us learn the same default tracking code installation o the pages.

    The same default tracking code installation is not globally on the website but it is present on the conversion pages. So that the data can be tracked properly and then we check it out. Let us take an example to understand this clearly. Suppose you are the director of a company and there is a marketing team and suppose you are running Facebook ads and some other digital advertising that we can track the data on how everything is going to perform so that we can inform the marketing business teams.

    Now we are going to install the conversion tracking code on the conversion page. Here first we are going to install the tracking code manager plug-in to the website. and then we are going to take the global code that comes from other social media platforms and paste it into the global portion within the settings of the plugin. Here we can see the instructions with the google adword code.

    Now we learn how to place the tracking code on the HTML page and how to test whether it is working or not. Here we use the C panel file manager and we can also use the FTP software FileZilla. But most of the hosting providers will be having the C panels.

    Now, let us open the C panel dashboard and then we just click the file manager and then we locate our HTML page and right-click on the file, and choose the edit option. Here we can see the HTML code for the simple page. To identify the Tracking Code in google analytics, go to the admin and at the bottom left corner, we can find the tracking information. Click on the tracking info and select the tracking code.

    After finding the Tracking code, copy the whole code snippet and paste t just above the head tag in the HTML code that we saved earlier in the C panel file manager. After this go back to the analytics and simply press on send test traffic or simply we can open an incognito window with the website URL. We can see one active user on the tracking ID status. If it can track the active users that are present on your website then we can say that the tracking code is successfully get installed on the page. But when the same default tracking code is installed on pages with different domains then it associates all the users and its sessions to associate with their domains.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: September 16, 2021

    What Unit Is Used To Measure The Frequency Of Memory, Fsb, And The Processor?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 2, 2021 at 11:39 am

    What Unit Is Used To Measure The Frequency Of Memory, Fsb, And The Processor? Hertz is the unit used to measure the frequency of the memory, FSB, and the processor. Today let us discuss what is frequency, FSB, and the processor. Everything around us will be a form of the signal which can be measuredRead more

    What Unit Is Used To Measure The Frequency Of Memory, Fsb, And The Processor?

    Hertz is the unit used to measure the frequency of the memory, FSB, and the processor. Today let us discuss what is frequency, FSB, and the processor. Everything around us will be a form of the signal which can be measured and used in some way. Now, let us talk about what actually the frequency is ?.

    The frequency is like a tool that is used to describe the signals. The basic definition of frequency is like a number of times anything that repeats over and over again. When we say higher frequency, then it must be repeating more times. The unit hertz can be defined as the one per second. The basic formula for the frequency is

    Frequency = No.of times/second.

    The above formula can represent that frequency is the inverse of the number of seconds it takes. If we divide 1 by frequency we will get a measurement called the period. Simply, the period is the one how long the repetition takes place.

    The random access speed has a clock memory that corresponds to how much data throughput it can handle each second. The memory also will be having timings that can be expressed by the string of the numbers. These numbers are the measures of the latency, which is the number of clock cycles that it takes for the RAM to do the things.

    Front Side Bus

    Connecting the CPU to the northbridge is called the front-side bus. And the connecting northbridge to the ram is called the memory bus. The front side bus is like a computer communication interface that is used in inter-chip-based computers. The computers can also have a backside Bus that can connect the CPU to the cache. This bus and the cache that is connected are faster than the system memory for accessing.

    The speed of the front side bus will be often used as an important measurement for the performance of the computer.

    The front side bus is mostly used on the PC-related motherboards where the data address buses are used in the embedded systems. The front side bus is measured in the Mhz.

    Processor

    The processor is the one that performs the operations by taking the inputs from the users. The processor is like the brain of the computer. How fast the operations are performed is known as the frequency of the processor. The frequency of the processor can be measured in gigahertz GHz. The processor can be a separate chip or can be multiple circuit boards on the computer. And the processor that is used for the personal computer is also called the microprocessor.The processor has two parts. They are the Control unit and the other one is the arithmetic and logical unit. The ALU can perform all the mathematical and logical operations and the control unit can be used to manage the commands. The processor can also communicate with the other input/output devices and the storage devices. The processor has small and high-speed memory which calls it the registers. The registers will store the data temporarily.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: September 16, 2021

    What Part Of A Mac Address Serves As The Extension Identifier, Or Device Id?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 2, 2021 at 11:39 am

    What Part Of A Mac Address Serves As The Extension Identifier, Or Device Id? The last 24 bits of the mac address servers as the extension Identifier or the device Id. Today, let us discuss the know about the basic definition and the use of the mac address. All the Ethernet standards and mac addresseRead more

    What Part Of A Mac Address Serves As The Extension Identifier, Or Device Id?

    The last 24 bits of the mac address servers as the extension Identifier or the device Id. Today, let us discuss the know about the basic definition and the use of the mac address. All the Ethernet standards and mac addresses operate at the data link layer. But what is mac address?. The word mac stands for media access control. The mac address is the unique type of identifier that we assign to the network interface card, shortly called the NIC. The below figure shows the structure of the mac address.

    Unlike the IP address, the mac address cannot be changed, simply the max addresses can be represented as the physical address. The mac addresses are unique and cannot be changed. The mac address is 48 but long. The mac address can have two sections. They are two parts. Organizational unique identifier, which is of 24 bits. This can identify the vendor. And the last 24 bits have the unique value that is assigned by the vendor. This can make the address unique.

    The mac address can be of three types. The first one is the unicast mac address, which has a particular unique address. And the other one is the multicast mac address. The multicast mac address can be used for the application protocol. The multicast can be sent to all the devices, but only those with the application of the protocol which will listen to it.

    We also have another type of address that is the broadcast address. the broadcast address can be sent to all the devices that are within the network. The below figure 1.2 represents the structure of the broadcast address. We always have more than one way to show the structure of the mac address. The below are the three ways we can represent the mac address

    08:00:27:EC:10:61

    08-00-27-EC-10-61

    08.00.27.EC.10.61

    • The first one is separated by the colons, this is the way how an operating system like Linux represents the mac address.
    • The second one is separated by the slashes, this is the way Microsoft will display the mac address.
    • And the third one is separated by the dots, this is the way how cisco represents their mac address.

    Here, why do we need the mac addresses, let us take an example to understand this concept, when we want communication between the two computers in a single network. This can be done by layer 2 of the mac address. But when we come out of this network, we need the IP address. These IP addresses are the layer 3 devices, the routers mainly focus on the IP addresses to find the address of the destination.

    Hence, simply we can say that the mac addresses are mainly used for communication in the local areas. And IP addresses can be used as global communication. IP Config /all can be used in the command prompt to find the mac address on our local computers. The structure of the mac address may be different based on the operating system we are checking in.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: September 16, 2021

    In An 802.11 Data Frame, What Is The Size Of The Frame Check Sequence Field?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 2, 2021 at 11:37 am

    In An 802.11 Data Frame, What Is The Size Of The Frame Check Sequence Field? In an 802.11 data frame, the size of the frame check sequence field is 6 bytes. Today, let us discuss the 802.11 data frame in detail. The below figure represents the 802.11 data frame. If we observe the data frame, we canRead more

    In An 802.11 Data Frame, What Is The Size Of The Frame Check Sequence Field?

    In an 802.11 data frame, the size of the frame check sequence field is 6 bytes. Today, let us discuss the 802.11 data frame in detail. The below figure represents the 802.11 data frame. If we observe the data frame, we can see that it has frame control, duration, address 1, 2, and 3 sequential, address 4, and then the checksum. As we can see below, the frame control has some of the subfields that include the version, its type, its subtype, to the destination address, from the destination address, MF, retry power, more, W and O.

    Here we can see that all the 802.11 data frames are represented in the form of bytes and all its subfields are represented in the form of bits. Now, let us discuss each of these in detail.

    The first field is frame control, the frame control is the size of two bytes that contains 11 subfields. This field will have all the control information of the frame. All this control information is present in its subfields.

    • The first subfield is version, this version is the protocol subfield which is set to zero. It contains all the future versions of the 802.11 data frame that can operate simultaneously.
    • Another subfield is a type which is of size 2 bits, this field mainly specifies the type of frame it is storing in it.
    • Following the type filed, we have a sub-type which is of 4 bits. this field says whether the field is requested to send or it is clear to send. Initially, the value will be set to zero.
    • To DS represents whether the frame is going to the access point and from ds represents whether the frame is going away from the access point.
    • The other filed is more fragments, when we set its value to 1 then that indicates more to follow.
    • Another one is retried, the retry is nothing but the retransmission of the previous frame.

    The last field in the 802.11 data frame is the frame check sequence, which can identify error detection, we add the extra error detection code to the frame in a communication protocol. These frames are normally used to send the upper layer of the data and finally the application data from the source to the destination address. The detection doesn’t say any error recovery.

    The Ethernet will say to discard the frame if any damage has occurred but it doesn’t specify any action to retransmit the frame. The frame check sequence will identify the errors that come from the various sources. Based on the data that is present in the frame, the frame check sequence will calculate the source node. After it reaches the destination address, the destination address will recalculate and compares with the previously calculated value before it started sending.

    After we compare the two frames, if the value is not equal then it is considered as an error and if they are equal then we can say that no errors or corruption occurred in the data frame.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: September 16, 2021In: Q & A

    What Kind Of Port Must Be Requested From Iana In Order To Be Used With A Specific Application?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on October 2, 2021 at 11:37 am

    What Kind Of Port Must Be Requested From Iana In Order To Be Used With A Specific Application? The registered port must be requested from the IANA in order to be used with a specific application. Today, let us discuss what is IANA in detail. The term IANA stands for internet-associated numbers authoRead more

    What Kind Of Port Must Be Requested From Iana In Order To Be Used With A Specific Application?

    The registered port must be requested from the IANA in order to be used with a specific application. Today, let us discuss what is IANA in detail. The term IANA stands for internet-associated numbers authority. The internet has signed the numbers of the authority functions. All these are preferred by a single person called John pastel. He has all the outputs and the index cards, on this he has kept the names of all the large computers along with the numbers that are associated with them.

    After this, 20 years later we all know that the internet has grown remarkably. And it became like it no longer can be managed by a single person. Now, it is all managed by the ICANN. ICANN stands for internet corporation for the assigned names and the numbers.

    We have several IANA functions, let us discuss each of them in detail. The first one is managing the allocation of the internet numbers and their resources. The second one is administrating the domain name system that is associated with those numbers. The third type of function is maintaining the registry of the technical protocol parameters that help to keep the internet unified.

    All these IANA functions will play a critical role by ensuring to get all the required needs on the internet. This is done by using the system of unique identifiers. Let us take an example to understand this concept in detail. The internet protocol and the IP address 192.0.43.22 are considered as the ICANN’s unique type of identifier, but the domain name is ICANN.org. This is the way to remember it easily by simply remembering the domain name. Now type this domain name into the browser and the searched domain name on the browser will reach the server-side, this server-side will translate into the form of the number and connect the computer to the ICANN.org.

    For example, we have two kinds of IP address, they are Ipv4 and the other one is Ipv6. Initially, 4 billion IPv4 addresses are created by assuming that will be enough, but due to the insufficient number of the iPv4 address, the Ipv6 comes into the field that can be enough to last for every individual. We can also allocate the blocks of the numbers to the five regional internet registers across the world. They are AFRINIC, APNIC, ARIN, LACNIC, RIPE NCC. All these are called autonomous system numbers because they can able to identify all the networks which can route them.

    It is done by connecting to the other networks and that is controlled by the other organizations. And to manage the domain name systems in the IANA we can maintain the database. We also have different kinds of sub-level domains. AI, AR, AW, BO, BR, BZ, and many more. We have generic TLDs like .com, .org. We also have international domain names shortly called IDN’s, this contains the domains name of the non-latin names. This is to enable the users to access the information in their own languages.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 6 7 8 9 10 … 15

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut