The layer of the OSI mode makes sure the data received at the very end of atrans
ID: 3582834 • Letter: T
Question
The layer of the OSI mode makes sure the data received at the very end of atransmission s exacty the same as the data orginaly transnitted a network access b session c transport d application QUESTION 94 URL stands for unfomm resource locator underutilized resource locaton understanding resource language user resource langauge QUESTION 95 RAIDis also sometimes referred to as e Redundant Am of ndependent Devices Responsive and Instrumental Devices Responsive Asymmetrical Intemal Devices Reactive Altemative Internal Devices QUESTION 96 is a set of protocois created to support the secure transfer of data at the IP layer. a Date Encryption Standard (DES) IPsec (IP c Transport Layer d Advanced Encryption Standard (AES) QUESTION 97 SMTP stands for Singular Mail Transfer Performance Synchronous ManualTransfer Protocol Simple Ma Transfer Protocol Synchronous Mai Tracing Protocol QUESTION 98 A number of techniques exist for performing, planning including linear projection computer simulation, benchmarking, and analyticalmodelng. money b financial C time d capacity QUESTION 99 IETF has defined two types of lPv6 addessing techniques that can embed lPv4adresses. What ae they? unicasting and amycasting e compounded and mboed compatible and mapped domained and unmapped QUESTION 100 A SCSI host adapter uses what to communicate with the devices attached to it? a cel relay packet-switching service a center race conf aner service a paralel bus a comma svitcherExplanation / Answer
86) DHCP -dynamically Assign Ip Addresses.
DHCP is Dynamically controlled by DHCP Server which look after theNetwork configuration parameters
87) Go-Back-N
Selective Repeat-Used to handle the flow and error control(fast sender and slow receiver) problem at data link layer.
when receive negative ACK.retransmit only the damaged frame.
In go back n when one frame is damaged resend all n-frames again.
The selective repeat is a more efficient protocol as it does not waste bandwidth
for the frames which are properly received but, its complexity and expense favors the use of the go-back-n protocol.
88) IPng (Internet Protocol next generation).
IP address size will increased 128 bits.
simplified header format.
89) T-1:
T1 carrier most commonly used digiral transimission,it dedicated to phone connection with data rate of 1.544Mbps.
90) Vigenere
It is one of the polyalphabetic subtution method used to encrypt plain text to cipher text.
91) Rivers Capacity-
Band width means carrying capacity of channel.
92) Question Not Visible
93) Network Access
Data is transferred as packets with logical network routes in an ordered format controlled by the network layer.
94) Uniform Resource Locator-
It locate the webpages using domain name service
95) Redundant array of Independent Devices-
provdes array of disks.
RAID provide different level of data organization.RAID-1,RAID-2..RAID-6.
96) IPSec (IPSecurity)-
IP is connection less service used for secure transmission of IP packets.
97) Simple Mail Transfer Protocol
Used to send and receive e-mails.(it have mail agent and mail transfer agent,post office protocols)
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.