Flash Memory
TFTP server
The Gnutella Network is a network used primarily to exchange files on a peer to peer basis.
To which of the following does an IP access list permit or deny conditions?
IP addresses
Telnet traffic
Upper-layer IP protocols
In Information Technology- A network is a group of computers that both share and receive data from one another. A really good example of this is the internet. One official definition of the word network is "a group or system of interconnected people or things."
Which VLANs are allowed over the link when a new trunk link is configured on an IOS-based switch?
By default, all defined VLANs are allowed on the trunk.
what is ANDing process Anding is a process in which we AND "IP address" with "subnet mask" to get Network ID.
What command will allow you to see the connections made from your router to remote device?
The command would be show connections.
an unidentified network is one where the SSID cannot be detected
What layer protocol does RIP use?
RIP is a IGP protocol that allows routers to advertise what they know about their routes to other routers. Since routers operate at the network layer (3), so does RIP.
How many bits would you borrow to subnet 172.16.100.0 to have at least 500 hosts?
we need to borrow 7 bits to subnet 172.16.100.0 to have at least 500 hosts and the subnet mask will be 255.255.254.0
type : banner motd
A broadcast storm is what occurs when the number of broadcasts on a broadcast domain reaches a certain level that causes the network to shut down for useful traffic entirely.
metric,
network mask,
neighbor router ID,
administrative distance
Why is it difficult for routing loops to occur in networks that use link-state routing?
Each router builds a complete and synchronized view of the network.
Which command allows you to verify the encapsulation type for a frame-relay link?
show framerelay lmi
What is a Steering Roll Connector?
A steering roll connector is the piece of the steering column that connects the column with the steering wheel. It is not a big piece, but plays an important roll in safety and vehicle control.
How explain the the basis for determining the Minimum Frame Size in Ethernet?
Size is 64 bytes.
Destination Address (6 bytes)
Source Address (6 bytes)
Frame Type (2 bytes)
Data (46 bytes)
CRC Checksum (4 bytes)
46 bytes must be transmitted at a minumum, with additional pad bytes added to meet frame requirements.
There is a fundamental minimum frame size imposed by the headers, but that isn't it.
Think back to the days when ethernet was a multi-drop fat yellow coax, rather than the mesh of switched point to point cat5 links it is today.
A sender needed to send the packet and determine whether or not it got received by others on the wire. Reasons why it might not get received were mostly down to collisions with other transmitters transmitting on the same wire at the same time.
To determine if there was a collision, the sender listened to his own transmission to see if it could be recieved. If it was garbled due to a collision, it would know. Hence the name CSMA/CD (Carrier Sense Multiple Access with *Collision Detect*).
However transit time down the wire isn't instantaneous. If you could send a tiny packet at the same time as someone at the far end of the wire, a receiver in the middle of the wire might receive both signals at the same time, garbled, yet they pass over each other and get received by the far ends just fine. So they think the guy in the middle got it, but it didn't, thus breaking the Ethernet model on which 802.1D relies.
To prevent this, you want the head of the packet to transit from one end of the wire and back again before the tail of the packet finished transmission. If there's a transmission anywhere on the wire overlapping, you'll hear it collide at your receiver.
The maximum transmission time is lengthened by repeaters. You need to account for the time to transit through the maximum number of wires and repeaters on a LAN segment.
The header length issue is a red herring. The transit time is independent of bit rate. So as bit rates go up, the header length goes down. So trying to use header size to determine that the packet is long enough is not safe. Safe at 10MBPS might not be safe at 100MBPS, hence the need for a time based packet length minimum.
In short, the packet has to be long enough for the collision detect part of the CSMA/CD algorithm to work.
How do you know which bits are host bit in a subnet mask?
Since a subnet mask is used to separate the network id from the host id, any 1 bits indicate the network portion and the 0 bits indicate host portion. As an example, in the subnet mask:
255.255.0.0
This indicates the first two octets are used for the network, and the last two octets (ipV4) are used for host portion of an address.
What is the purpose of the word 'blah'?
Blah
* noun # worthless nonsense; drivel. # Blahs A general feeling of depression, discomfort, or dissatisfaction. * adj # dull and uninteresting. # low in spirit or health.