Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


The Network layer works with which of the following:

A.) Globules

B.) Bits

C.) Packets

D.) Segments

E.) Frames

Answers were Sorted based on User's Feedback



The Network layer works with which of the following: A.) Globules B.) Bits C.) Packets D..

Answer / guest

Answer: C

Physical - bits

Datalink - frames

Network - packets

Is This Answer Correct ?    5 Yes 0 No

The Network layer works with which of the following: A.) Globules B.) Bits C.) Packets D..

Answer / haja bahurudeen m

Answer : C

L1 - Bts
L2 - Frame
L3 - Packet
L4 - Segment
L5,L6,L7 - Data

Is This Answer Correct ?    2 Yes 0 No

The Network layer works with which of the following: A.) Globules B.) Bits C.) Packets D..

Answer / sam

physical layer -from transfer raw bits to data link layer
data link layer- getting bits and convert frame then send to
network layer
network layer- receiving frame and convert packet after send
to l4
l4 - receiving a frame and convert segment and transfer l5
l5,l6,l7-receiving segment and convert data after give to user

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Tell me when we use standard access-list?

0 Answers  


What is ping used for?

0 Answers  


Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list

1 Answers  


What is the draw back of ospf protocol?

0 Answers  


Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion

2 Answers  


Can you explain the broader steps of how L2F establishes the tunnel?

0 Answers   CCIE,


On which interface we always apply access-list?

0 Answers  


What is difference between standard and extended access-list

17 Answers   College School Exams Tests, HCL, Wipro,


What is the function of the Transport layer and which protocols reside there? A.) MAC addressing - IP B.) Interhost communication - SQL, NFS C.) Best effort Packet delivery - TCP, UDP D.) End-to-end connections - TCP, UDP

1 Answers  


What is trigger rip and from which ios version it starts?

0 Answers  


What type of transmission bus topology support?

0 Answers  


Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation

1 Answers  


Categories