Which layer manages protocol access to the Network layer?
A.) Datalink - MAC Sublayer
B.) Datalink - LLC Sublayer
C.) Transport
D.) Session
E.) Network
Answers were Sorted based on User's Feedback
Answer / zibrayal.s.mulla
E) network ,
because the situation among the n/w .those answers can be
helpful in data transmission protocol ....
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / guest
Answer: B
Having two Datalink sublayers provides physical media
independence.
The MAC sublayer encapsulates to the Physical Layer.
The LLC sublayer encapsulates to the Network Layer.
| Is This Answer Correct ? | 0 Yes | 1 No |
what is uplink port why are we use this port,this port having extra feature or only use to redundant link or other please explain it ,,,,,,,,,,,,,,,, bcz i am very confuse ..... Thanks
Which layer defines the physical topology? A.) Application B.) Transport C.) Network D.) Data Link E.) Physical F.) Session
On Cisco catalyst 5000 how would you set the second port on the controller in the first slot to full duplex? A.) Set port duplex 1/1 full B.) Set port duplex 1/2 full C.) Set port duplex 0/1 full D.) Set port duplex 0/2 full
while trouble shooting a network conectivty prob a technician observes that steady link light on the both work stations nic and the switch port which the workstation is conected.however when the ping comand is issuede from the work station the out message is request time out at which layer of osi model does the prob most likly exist 1 sessiom layer protocol layer datalink kayer acess layer network layer application layer i have ansered n/w layer but i am niot sure i have also posted privous question jitendera kumar sinha
Explain what is formula of hold down time of eigrp protocol?
Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
routing information
Why is distributed processing useful?
Access lists are numbered. Which of the following ranges could be used for an IP access list? A. 600 - 699 B. 100 - 199 C. 1 - 99 D. 800 - 899 E. 1000 - 1099
Which type of Ethernet framing is used for TCP/IP and DECnet? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP
After how long eigrp protocol advertise its routing table?
What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data