answersLogoWhite

0

Search results

rip version 1 is classfull routing protocol. in classfull routing protocol is not able to carry its subnet mask whatever the ip belong from a class. it wil take its by default subnet mask.if the ip address belong to class b and the subnet mask is published as /28. in classless routing protocol this ip address would be displayed as /16 not like /28

1 answer


except sap all r protocol. so sap is required answer..

smtp: simple mail transfer protocol

wap: wireless application protocol

arp: address resolution protocol

sap is an enterprise software

1 answer


What protocol is used by web servers and on which port ?

2 answers


Still have questions?
magnify glass
imp

Transformers Robots in Disguise - 2001 Battle Protocol 1-1 was released on:

USA: 8 September 2001

1 answer


Patricia B. Jensen has written:

'Historical overview of data communication with analysis of a selective repeat protocol'

1 answer


1) Wireless Application Protocol

2) Wireless Access Point

3) Wireless Access Protocol.

1 answer


1 tcp transmission control protocol

2 udp protocol

1 answer


Assuming IPv4 ICMP. Ping uses IP for transport. Ping in itself is an "Echo Request", which is a function of the ICMP protocol. The IP Packet will carry the ICMP protocol from end-to-end.

ICMP has a protocol number of 1, so the "Protocol" field in the IPv4 header will contain "1" as a reference to the ICMP payload.

For IPv6, ICMPv6 is used, and the transport will be IPv6.

1 answer


(B^-1)B = 1

B^(-1xB) = 1/(B^B)

1 answer


1) SMTP- simple mail transfer protocol

2) GMTP- Group mail transfer protocol

3) FTP- File Transfer Protocol

4) TFTP- Trivial File Transfer Protocol

5) User Process

1 answer


A protocol is a set of rules for describing how to successfully exchange information between two systems.

1 answer



You can cite it as an article from the UNFCCC website.

"Kyoto Protocol." United Nations Framework Convention on Climate Change. Web. 26 Nov. 2009. .

2 answers


SSH uses such port.

1 answer



-1, because

if you factor out -1 from a-b you get -1(-a+b). when you reduce, -a+b = b-a so those cancel out and you are left with -1

1 answer


- In your own words, define the term 'protocol' and what is the difference between

protocol and protocol suite

1 answer


Well it has 2 meanings

1. file transfer protocol

2. If your George Lopez it means F*** that Puto!

2 answers


b+b+b+b+b is equal to 5b. That is because there are five b's being added up. 1+1+1+1+1 is 5 because there are five 1's being added up.

1 answer


By definition (-1)*(-1)=1.
(-a)*(-b)
(-1)*(a)*(-1)*(b)
(-1)*(-1)*(a)*(b)
(a)*(b) ■

1 answer


CAN protocol is synchronous, as it relies on a fixed timing mechanism for communication between nodes. This timing mechanism establishes when messages can be transmitted and ensures they arrive at the intended recipient without delays.

2 answers


9 and 10

First the main formulas:

a+b=19

a-b=1

Find out what one of the variables are.

We can choose "a" or "b" from either of the two formulas.

Let's choose "a" from the a-b=1 formula.

a - b = 1 [formula]

a-b (+b) = 1 (+b) [solve for "a" by removing "b"]

a = 1+b

Plug that "a" into the other formula a+b=19.

a + b = 19

(1+b) +b = 19

1 + 2b = 19

1 + 2b - 1 = 19 -1

2b = 18

b = 9

Plug that into our formula solved from before for "a"

a = 1 + b

a = 1 + (9)

a = 10

1 answer



i believe (not quite sure) that it is at the application layer (layer 1)

2 answers


There are various protocols

ftp: file transfer protocol

smtp: simple mail transfer protocol

pop3: post office protocol

ip: internet protocol

tcp: transmission control protocol

ospf: open shortest path first

igrp: interior gateway routing protocol

eigrp: enhanced interior gateway routing protocol

rip: routing information protocol

http: hyper text transfer protocol

udp: user datagram protocol

icmp: internet control message protocol

1 answer


HTML is a protocol

1 answer


A protocol can be defined as a set of rules determining the format and transmission of data or a set of rules that governs data communication. A protocol defines what is going to be communicated.

The key elements of protocol are

1. Syntax

2.Semantics

3.Timing

2 answers


Routing Information Protocol (RIP) and Interior Gateway Routing Protocol (IGRP) are two very popular Distance Vector routing protocols

4 answers



The answer is Protocol's. Protocol is the set of rules for formatting the data across the network.

5 answers


b- handles call setup, call routing, and call termination

1 answer


If we have y=a(b)^t as the equation then take b from this equation

case !: If b <1

then b=1-r

r=1-b

this r is the decay factor

case 2:If b >1

then b=1+r

r=b-1

this is the growth factor

1 answer


Oh, dude, B to the power of -1 is just 1 divided by B. It's like flipping B upside down and giving it a little math makeover. So yeah, B to the power of -1 equals 1/B. Math can be pretty chill sometimes, you know?

2 answers


Multiplicative identity
a*1 = a

Reciprocality
a * b = 1
then a and b are reciprocals: a = 1/b and b = 1/a

Associativity
a * (b * c) = (a * b) * c

Commutativity
a * b = b * a

Distributivity
a * (b + c) = a*b + a*c

1 answer


b(b^2 + 1)(b^4 - b^2 + 1)

1 answer


OSPF is a classless link-state routing protocol.

RIP version 1 and IGRP are both classful distance vector routing protocols, EIGRP is a hybrid protocol that supports classless addressing.

1 answer


A set of rules used for transferring data over the Internet is called a "protocol".
Hypertext transfer protocol, HTTP.

5 answers


8b^2 -9b +1

8b^2 -8b -b +1

8b(b-1) - 1(b-1)

(8b-1)(b-1)

1 answer


A hypertext protocol is a protocol relating to hypertext.

The most well-known hypertext-related protocol would be the Hypertext Transfer Protocol, which is used to transfer hypertext from one machine to another.

2 answers



PPPis more secure than SLIP. PPP uses two authetication Protocols :

1. Password Authetication Protocol (PAP)

2. Challenge Handshake Authetication Protocol (CHAP)

So if you use SLIP on network that unauthorized user can gain acces to.

1 answer



It must be x*(x+1).

To see this, suppose that there existed a smaller common multiple formed by taking

a*x and b*(x+1),

where a =/= b since multiplying by the same number won't give you a common multiple.

Then we have

a*x < x*(x+1) => a < (x+1)

b*(x+1) < x*(x+1) => b < x

=> a*b < x*(x+1).

Also, a*x = b*(x+1) => x = b/(a-b) & (x+1) = a/(a-b). Therefore

x*(x+1) = a*b/(a-b)^2 < x*(x+1)/(a-b)^2

=> (a-b)^2 < 1

=> (a-b) < 1.

The problem here is that this requires that a=b, which cannot be. Therefore, x*(x+1) is the smallest common multiple of both x and (x+1)

1 answer


An example would be HTTP

2 answers


a protocol that's ramdom.

1 answer


Point-to-Point Protocol

1 answer



The answer is b+1. Therefore the algebraic expression for this is b+1

1 answer


b + 1 is b plus 1 as an algebraic expression.

1 answer