Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


1 whatis te1,te2 and nt1 what is threre functions

2 what are the isdn protocols

3 whait is spid



1 whatis te1,te2 and nt1 what is threre functions 2 what are the isdn protocols 3 whait is spi..

Answer / jitendera kuamr sinha

te1-terminal equpmnt type 1
this the type of device that can undestand isdn standered
and we can plug it direct in to network
te2 terminal equp type2
this type of device refer to those that partilay understand
isdn standere to uses te2 we used the ta device that called
TA that is terminal addeper
nt1-it is network terminal equp and used to convert 4 wire
n/w to 2 wire n/w used by isdn

isdn protocols
isdn protocols difined by itu-t.
protocol stared by "e" deal with using isdn with telephone
n/w

protocol started by q cover switching and signaliing


protocol started with l deals with concept and service


spid-it is dialble number of isdn and it is based open dn
that is dictonary number a point is notable that for every
isdn nuber this number is alway unique/

thanks

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is mac address size of ipv6?

0 Answers  


which term use to allow user to conect the remote n/w with ppp dail up conection ras sap sonet mane answer rsa

1 Answers  


What is the default bandwidth of a serial connection? A.) 1200 baud B.) 1.544 Mbps (T1) C.) 10 Mbps D.) 96Kpbs

2 Answers  


How many valid host IP addresses are available on the following network/subnetwork? 176.12.44.161/30 A. 2 B. 30 C. 254 D. 16,382 E. 65,534

4 Answers   Cisco,


why we have to implement access list in router ??????what is the benifit and how it is configure

3 Answers   NIC, TCS,


What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS

1 Answers  


Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation

1 Answers  


What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.

1 Answers  


What is a benefit of a virtual LAN (VLAN)? A. It increases the number of broadcast domains B. It decreases the number of broadcast domains C. It increases the numberr of collision domains D. It decreases the number of collision domains E. Since it is a vitual Interface it never shuts down

4 Answers   jetking,


can anyone tell me which r the companies hiring freshers ( ccna ) in mumbai

1 Answers   HCL,


Identify the command that saves the configuration stored in RAM to NVRAM? A.) copy running-config startup-config B.) copy tftp running-config C.) copy startup running D.) copy active to backup

1 Answers  


What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16

2 Answers  


Categories