as we know that isdn bri port come with either a u
interface or some thing s/t interface what is the
diffrenmce between them
Answers were Sorted based on User's Feedback
Answer / jitendera kumar sinha
very basic questions is that
the u interface is 2 wire isdn convations and plug directly
to the isdn connection
wher as s/t interface have 4 wire isdn conection and to use
it we used a device some time called TA to convret 4 wire
to 2 wire isdn connetions
so siimple
Is This Answer Correct ? | 5 Yes | 0 No |
What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic D.) Distance Vector
Name the command we use for ping in ipv6?
Which command should you use to confound a router so that it can become a TFTP server host for a router system image that is run in a Flash? A. copy flash tftp B. config tftp server C. write, network -router name- D. tftp-server system -file name- E. setup server tftp -system name-
What is the name of distance vector algorithm?
What are the conversion steps of data encapsulation?
Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1
Which show command should you use to view Frame Relay Local Management Interface (LMI) Frame statistics? A. show lmi B. show ip route C. show interface D. show statistics E. show frame-relay lmi
What is the function of the Application Layer in networking?
What is the syntax to add a banner to the Cisco router? A.) motd banner # B.) banner C.) banner motd # D.) banner #
Which of the following is an example of a Transport Layer protocol? Ethernet IP TCP RS-232
What are two functions of the ICMP protocol? (Choose two) A. to map IP addresses to Ethernet addresses B. to map common names to network addresses C. to forward SNMP alerts to management consoles D. to generate an echo reply in response to a ping test E. to send a host or pod unreachable message from a router to the source of an undeliverable packet
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.