1 whatis te1,te2 and nt1 what is threre functions
2 what are the isdn protocols
3 whait is spid
Answer / jitendera kuamr sinha
te1-terminal equpmnt type 1
this the type of device that can undestand isdn standered
and we can plug it direct in to network
te2 terminal equp type2
this type of device refer to those that partilay understand
isdn standere to uses te2 we used the ta device that called
TA that is terminal addeper
nt1-it is network terminal equp and used to convert 4 wire
n/w to 2 wire n/w used by isdn
isdn protocols
isdn protocols difined by itu-t.
protocol stared by "e" deal with using isdn with telephone
n/w
protocol started by q cover switching and signaliing
protocol started with l deals with concept and service
spid-it is dialble number of isdn and it is based open dn
that is dictonary number a point is notable that for every
isdn nuber this number is alway unique/
thanks
| Is This Answer Correct ? | 3 Yes | 0 No |
What is mac address size of ipv6?
which term use to allow user to conect the remote n/w with ppp dail up conection ras sap sonet mane answer rsa
What is the default bandwidth of a serial connection? A.) 1200 baud B.) 1.544 Mbps (T1) C.) 10 Mbps D.) 96Kpbs
How many valid host IP addresses are available on the following network/subnetwork? 176.12.44.161/30 A. 2 B. 30 C. 254 D. 16,382 E. 65,534
why we have to implement access list in router ??????what is the benifit and how it is configure
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
What is a benefit of a virtual LAN (VLAN)? A. It increases the number of broadcast domains B. It decreases the number of broadcast domains C. It increases the numberr of collision domains D. It decreases the number of collision domains E. Since it is a vitual Interface it never shuts down
can anyone tell me which r the companies hiring freshers ( ccna ) in mumbai
Identify the command that saves the configuration stored in RAM to NVRAM? A.) copy running-config startup-config B.) copy tftp running-config C.) copy startup running D.) copy active to backup
What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16