The following are the steps toward encapsulation. Put them in order:
1. User input 2. data 3. frame 4. segment 5. datagram 6. bits
a. 1-4-2-5-3-6
b. 1-5-4-2-3-6
c. 1-2-3-5-4-6
d. 1-2-4-5-3-6
Which protocol encapsulates IP datagrams on a serial line ?
what is the error we get if one of the disk is failed in raid1 how can i restore the data from another disk
what is VPN ?
Your previous Network Administrator had subnneted your class C network into many subnets. Only info you have is that one of the IP range was 200.252.144.33 through 128.252.144.46. How many subnets did he make ? what was the mask ?
Which file holds the netmask number ?
what is networking?
senario: There are two switches connected via trunk port.One end station is connected to each switch via access port. All the ports are in same VLAN.All the ports have same speed 1Gbps.Start sending 1Gbps traffic from one end station to other. Determine percentage of traffic received by destination end station.
Which layer of the OSI model defines how cable is attached to a network adapter card?
In what protocol, data is sent from client to server to tell their state.
Define the role of ieee in computer networking?
What agent acts as an interface between the user and mail transfer agent.
what is different between instalation and configuration?