The following are the steps toward encapsulation. Put them in order:

1. User input 2. data 3. frame 4. segment 5. datagram 6. bits

a. 1-4-2-5-3-6

b. 1-5-4-2-3-6

c. 1-2-3-5-4-6

d. 1-2-4-5-3-6

Answer Posted / indu

D

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Define tunnel mode?

615


one server is down it doen't display anything what you do?

1392


How would you monitor and maintain the local area network, email, internet & intranet systems to ensure data security and prevent occurrence of faults?

1810


I am using solaris box, I need to delete a file from path /usr/tmp/ which r older than 24 hours?

1414


Explain the role of ieee in computer networking?

616






Difference b/w SCSI AND IDE

1639


Explain the importance of encryption on a network?

557


What is the importance of authentication?

529


Define tcp/ip?

584


When you connect two redundant links of switch to hub to form a loop , and when the switch receives its own BPDU what it will do.

3642


SonicWALL keep on fail over after upgrade from 6.2.2.2 to 6.2.6.0.anyone have encounter this and what is the next step to solve the issue

1132


What is mac addresses?

566


diff between /etc/inetd and smf?

1452


Define ipv6?

605


Scenario: “In a switch two hosts are connected to port number 1 and 2 respectively; both the ports are configured with same VLAN id. When data is sent from one host to another, in switch VLAN tagging will happen or not? Why?”

1430