Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

CCNA R & S

Share
  • Facebook
1 Follower
3 Answers
3 Questions
Home/CCNA R & S
  • Recent Questions
  • Most Answered
  • Answers
  • No Answers
  • Most Visited
  • Most Voted
  • Random
  1. Asked: July 22, 2022In: CCNA R & S

    Why use a Class C Mask for a Class A or B IP Address ?

    Vipin Chauhan
    Vipin Chauhan Level 30
    Added an answer on November 30, 2022 at 11:30 am

    Class C masks are used to specify the subnet size for Class A and B IP addresses. This is done to create multiple subnets within a larger network. By using a Class C mask, you can split a Class A or B network into smaller subnets, allowing for more efficient use of the available IP addresses.

    Class C masks are used to specify the subnet size for Class A and B IP addresses. This is done to create multiple subnets within a larger network. By using a Class C mask, you can split a Class A or B network into smaller subnets, allowing for more efficient use of the available IP addresses.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: September 15, 2021In: CCNA R & S

    What Is Not One Of The Three Characteristics Of Tcp In Its Role As A Reliable Delivery Protocol?

    Priya Hamsa
    Best Answer
    Priya Hamsa Bronze
    Added an answer on September 16, 2021 at 9:16 am

    What Is Not One Of The Three Characteristics Of TCP In Its Role As A Reliable Delivery Protocol? The transmission control protocol is the connection-oriented protocol. That uses flow and error control mechanisms. It performs at the transport layer of the OSI model which is a reliable transport protoRead more

    What Is Not One Of The Three Characteristics Of TCP In Its Role As A Reliable Delivery Protocol?
    The transmission control protocol is the connection-oriented protocol. That uses flow and error control mechanisms. It performs at the transport layer of the OSI model which is a reliable transport protocol. The main aim of the transmission control protocol is to ensure the data reached the destination in the same order as we sent or not. It checks whether the reached data is in the same order as we sent or not. In the transport layer, the data is transferred in the form of segments and each segment carries the data and the control information.
    Now, let us know how the TCP connection is established. The transmission control protocol transmits the data in both directions. So it is called the full-duplex. In a full-duplex, the data can be transmitted in both directions. When two transmission control protocols are connected to each other. Each TCP is used to initialize the communication. This is called SYN and approval of the ACK from each of the ends in order to send the data.

    We use the three-way handshaking protocol in order to establish the connection between the two transmission control protocols. Let us take an example to understand the three-way handshake protocol in detail. Let say we have one client and server. The client will send a synchronized data packet to the server. The main purpose of this step is to know if the server is available for the new connection or not. Next, the server needs to keep all the ports open to establishing a new connection. After receiving the SYN data packet to the server, the server replies back with the acknowledgment and the synchronized packet. When the client receives the acknowledgment packet from the server. The client again sends the acknowledgment to the server as it received its acknowledgment.
    The concept of framing is quite different. It is not the characteristic of the Transmission control protocol. Framing is one of the services that is offered by the data link layer. Let us know how the framing works and why it is not one of the characteristics of the framing. Suppose we have two nodes node A and node B and each node will consist of an adapter, the adapter will send the data that is received from the data link layer into the signals. The signal will flow through the cable or by the medium that is received by the physical layer of node B. The application layer creates the data that is a set of the zeroes and ones, then it goes to the transport layer. The transport layer adds some sets of the zeroes and the ones. It is then handed over to the network layer and also add the network layer header we will call the packet. It adds zeroes and ones are added at the header part. and zeroes and ones are added to the trailer part. In Framing the data is transmitted in the form of bits which is the point-to-point connection.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: September 15, 2021In: CCNA R & S

    The First Part Of An Ethernet Frame Is Known As The?

    Priya Hamsa
    Priya Hamsa Bronze
    Added an answer on September 16, 2021 at 9:15 am

    The First Part Of An Ethernet Frame Is Known As The? Before we discuss the ethernet frame in detail, let us discuss the frame in the network field. Simply, a frame is a data packet or it can be a data unit. Technically, a frame is called a PDU. PDU stands for the protocol data unit that is present aRead more

    The First Part Of An Ethernet Frame Is Known As The?
    Before we discuss the ethernet frame in detail, let us discuss the frame in the network field. Simply, a frame is a data packet or it can be a data unit. Technically, a frame is called a PDU. PDU stands for the protocol data unit that is present at the data link layer of the OSI model. The PDU is named differently at different layers of the OSI model. For example at the transport layer, the PDU is called the TCP segment or it can call as the UDP datagram. Most of the applications use the transmission control protocol. So the segment is often used in order to represent the protocol data unit at the layer. At the network layer, we call PDU a packet or it can be called the IP packet. And at the data link layer, the PDU is called the frame.
    We use the different TCP and IP technologies with the different frames in terms of the header information and the MTU(maximum transmission unit) of the data or it can be a payload capability. The ethernet frame is different from the token ring frame and the wifi frame is different from the wi max frame. Each type of frame is different from the other frame. Even among all the ethernet families, the frames act differently. Some of the implementations like gigabit ethernet and the higher speed ethernet use larger frames. This frame is called the jumbo frame.

    In order to maintain communication between the two devices, there must be the same type of frames. Now, let us learn about the ethernet structure and frame in detail. The ethernet structure consists of seven parts. They are preamble, recipient mac address, sender mac address, type, data, pad, and the FCS. The first part of the ethernet structure is the preamble.

    The preamble is the 64-bit header information that tells the receiving node that a frame is coming and where the frame is get started. The second part is the recipient destination mac address that is followed by the sender mac address. This type of field tells the recipient, the basic type of data such as IPv4 and IPv6. The data field is the payload that is carried by the frame. The payload of the ethernet frame refers to the IP packet that is delivered from the network layer. For the ethernet frame, the payload limit is 1500 bytes. the next field is the pad, the pad is the extra bits to make the frame that is at least bigger than the 64 bytes i.e any data unit which is smaller than the 64 bytes would be considered as the collisions. The receiving device would simply ignore it. The last field in the Ethernet frame is the FCS. FCS stands for frame check sequence, it is mainly used for error checking and for the integrity verification of the frame. The preamble is the first filed in the ethernet frame, it is mainly used to tell if any frame is coming or not.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}