The following are the four steps in establishing an X.25
virtual circuit. Place them in the correct order.

A. The PSE (Packet Switch Exchange) passes the packet to the
next remote DCE

B. The local DCE packet binder sends packet to the closest
PSE (Packet Switch Exchange)

C. The source DTE sends packet to the local DCE

D. The remote DCE examines the packet header of destination DTE



The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct..

Answer / guest

Answer: C, B, A, and D

The correct order of the four steps used in establishing an
X.25 virtual circuit are as follows:

1.)The source DTE sends packet to the local DCE

2.)The local DCE packet binder sends packet to the closest

PSE (Packet Switch Exchange)

3.)The PSE (Packet Switch Exchange) passes the packet to the

next remote DCE

4.)The remote DCE examines the packet header of destination

DTE

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCDA Interview Questions

Which condition does not create LAN media problems? A. Protocol doesn?t scale well B. Long wait for the token C. Excessive collisions D. Too many devices

1 Answers  


In which category should Frame Relay be placed within the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments

1 Answers  


What PPP frame initiates the network layer protocols to be used during a connection?

1 Answers  


What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted form B. CHAP sends passwords unencrypted to save connection time C. CHAP does not attempt to verify whether the user is authorized to access the requested resource D. ID?s and passwords are automatically stored in cache

1 Answers  


Our company order a cisco ws-c3750x-48t-s(here i bought from http://www.3anetwork.com/cisco-ws-c3750x-48t-s-price_p104.html), As for the switch, in addition to the port module and optical module can be extended, what else module can also be extended?

0 Answers   Aptron,






how many switches can be cascaded

2 Answers  


What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management

2 Answers  


What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link

2 Answers  


You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling

1 Answers  


What is not a function of the distribution layer? A. Routing between VLANs B. Implement tools such as access lists, packet filtering, and queuing C. Implement security and network policies D. Provide workgroup/user access to the network

1 Answers  


When designing a flat switched network you can have: A. the same number of IP and IPX nodes without performance degradation B. more IP than IPX nodes on the same segment C. more IPX than IP nodes on the same segment D. more AppleTalk than IP nodes on the same segment

1 Answers  


Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0

1 Answers  


Categories