What layers of the OSI model are implemented in hardware?
The physical and link layers (layers 1 and 2) are implemented in hardware. The remaining five layers use these two layers to communicate across a network, and are done by software.
A tcp connection is in 'established' state.................?
It is established after the 3-way handshake is complete and the channel is open between a sender and a receiver.
Why ip is called connectionless?
IP is connectionless because you don't want routing to reply to every routing request; it would slow things down to almost a stop. The router has to assume that the packet arrives where it was sent.
What are reasons why LANs are segmented?
LANs are segmented for the following reasons:
Configuring a workgroup is easy - give the workgroup and name and use that name in the workgroup section for the computer identification. The other choice is for a client-server (domain) based network. Therefore you only have two choices for computer identification; either as a workgroup or as a domain (client/server).
What routing protocols have the poorest convergence time?
You might try reading the PDF found at:
http://www.thinkmind.org/download.php?articleid=sysmea_v3_n34_2010_5
This will probably give you the information you seek.
Link aggregation should be implemented at which layer of the hierarchical network?
access, distibution and core
What is the router static routes cisco 6.8.1?
for R1-ISP
network - 192.168.23.0
mask - 255.255.255.192
next hop - 192.168.23.121 (R2's S/0/0/0 IP Address)
for R2-Central
network - 0.0.0.0
mask - 0.0.0.0
next hop - 192.168.23.122 (R1's S/0/0/0 IP Address)
Your R2-Central is right but your R1-ISP is wrong Sir!
correct R1-ISP
network - 172.16.0.0
mask - 255.255.254.0
next hop - 172.16.3.97
Why can't a network 192.168.1.136 with subnet for six client addresses connect?
IP Address
Additional info:
The IP address for a client may not be on the correct subnet; it is possible that the subnet mask is incorrect.
What is tokens as in token ring networks?
The token is a special 3 byte sequence that indicates the state of the ring; it may mark the ring as in-use, or free (anyone can use it), or health status.
Any client needs to have access to the token before transmitting or receiving on the ring network.
Smart jack.
How do you tell if the network requires wpa2?
In the list of available networks, right click the one you want to check and check properties. You will see all required information.
What are the advantages of FDDI over token ring?
Although they both use a rotating ring setup, the FDDI uses two to achieve better results and less chance of failure. FDDI also uses a timed protocol that leads to differences in frame format and how station traffic is controlled.
What does protocol binding order refer to?
Protocol binding order refers to the order in which a protocol will be matched to a data packet. If, for example, you have a network connection which is running several different protocols it is important to tell the system which protocol to try first.
If you are using Netware, TCP/IP, and any other protocols on the same network, if 70% of your network traffic (as an example) is TCP/IP, then you want the network operating system software to check if a packet is a TCP/IP packet first, and if not, try the other networking protocols.
With the binding order, you tell the adaptor the order of checking for the correct network protocol, starting with the one with the most traffic, and going down from there.
There are two (or three) schools of thought on this.
In base 2 (binary) there are 1024 bits in a kilobit, and 1024 kilobits in a megabit. So in that case you would divide by 1024 to convert kilobit to megabit.
Most often, especially in the media and common use of the public, you see base 10 (decimal) where 1 megabit = 1000 kilobit. This is not preferred, but its very common. In that case you would divide by 1000 to convert kilobit to megabit.
ip classless
actually each and every service is run by port numbers and these port numbers are generated dynamically and attached to the IP address for example
source address 1.1.1.1:1280 destination address 4.2.2.2:80
in above case the web server which runs on port 80 receives the request from 1.1.1.1:1280 and sends the relative info to the same 1.1.1:1280
hence the data is send to the particular system,
likewise the different services will run behind the scenes uses only one IP address
isolated by port numbers
What does it take to be an archetect?
You need these qualification to become a architect: