1 whatis te1,te2 and nt1 what is threre functions
2 what are the isdn protocols
3 whait is spid
Answer / jitendera kuamr sinha
te1-terminal equpmnt type 1
this the type of device that can undestand isdn standered
and we can plug it direct in to network
te2 terminal equp type2
this type of device refer to those that partilay understand
isdn standere to uses te2 we used the ta device that called
TA that is terminal addeper
nt1-it is network terminal equp and used to convert 4 wire
n/w to 2 wire n/w used by isdn
isdn protocols
isdn protocols difined by itu-t.
protocol stared by "e" deal with using isdn with telephone
n/w
protocol started by q cover switching and signaliing
protocol started with l deals with concept and service
spid-it is dialble number of isdn and it is based open dn
that is dictonary number a point is notable that for every
isdn nuber this number is alway unique/
thanks
| Is This Answer Correct ? | 3 Yes | 0 No |
What are the two types of transmission technology available in ccna?
Wild card mask always in odd value or even?
We know that TCP provides connection oriented services, what else does it provide? A.) FECN & BECN B.) Path discovery. C.) Flow control and error checking. D.) Name resolution. E.) File manipulation.
What is matric?
You are given the following address: 153.50.6.27/25. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.255.128, B,153.50.6.0, 153.50.6.127 B. 255.255.255.128, C,153.50.6.0, 153.50.6.127 C. 255.255.255.128, C,153.50.6.127, 153.50.6.0 D. 255.255.255.224, C,153.50.6.0, 153.50.6.127
Which statements are true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not at the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth
Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link. A.) RFC 1661 B.) High Level Datalink Protocol (HDLC) C.) Challenge Handshake Authentication Protocol (CHAP) D.) SS7 E.) Link Control Protocol (LCP)
What is the bit length and expression form of a MAC address? A. 24 bits expressed as a decimal number B. 24 bits expressed as a hexadecimal number C. 36 bits expressed as a binary number D. 48 bits expressed as a decimal number E. 48 bits expressed as a hexadecimal number
Which command assigns the login password CISCO on the console terminal line? A. line vty 0 login password cisco B. line console login password cisco C. line login terminal password cisco D. line console 0 login E. line console 0 login password cisco
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
Mention what is the difference between tcp and udp?
7. What is an advantage to using switches in your network? A. Addressing of hosts by DHCP B. Ease of administration C. Stops broadcast storms D. Works like a repeater