What is L2 Link and its significance regarding IP addressing.
Answers were Sorted based on User's Feedback
Answer / prasanta kumar jena
l2 link is data link layer. provide physical addressing.
responsible for reliable transmission of the pocket over link.
FRAMIMG- Determine the start and end pocket.
error detection- determine when a pocket contain error .
Error recovery- retransmission of the pocket containing
error
| Is This Answer Correct ? | 15 Yes | 4 No |
Answer / sagar
l2 LINK is a layer 2 link where switch or bridge is included
| Is This Answer Correct ? | 3 Yes | 1 No |
friends i have 3ree prob which is asked in ibm india in technical round 1 what is ftp(this was easy i had answered) 2 why we use ftp(i think it is a tough one) 3 how can we enable ftp in the widows xp. friend i need these question answer as soon as possible if it is possible to reply within the eveing then i always obeyliged to you i am espacily looking towards the jitendera sinha who make most of the valuable answer loking toward you nidhi mall
Which feature should a routing protocol have to support vlsm?
What is an example of a valid MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234.FEGA D. 00.00.12.34.FE.AA
Why Operating System Have only 65,535 port Numbers
Which command displays all the commands in the history buffer? A. CTRL H B. show buffer C. show history D. show history buffer
Which command specifies a second subinterface on serial interface 0? A. interface s 0.2 point-to-point B. interface 2 s.0 point-to-point C. suberinterface 2.s 0 point-to-point D. interface s 0 sub 2 point-to-point E. interface s 0.1 point-to-point sub 2
Given the global configuration command 'banner motd #7 Hello #', what do the '#' symbols represent? A.) Escape sequence to exit the menu. B.) Nothing, just part of the banner. C.) Tic Tac Toe Macro. D.) Delimiting Character E.) Message border character. F.) Number of times message to be displayed.
Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session
Can you explain the basic of encryption in VPN?
Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface
How do you view the routers current processor utilization? A.) show version B.) show processes cpu C.) show running-config D.) show startup-config E.) show cpu F.) show utilization
what are the different symmetric algorithms?