1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
1 year ago
11

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip), which of the follo

wing becomes even more essential to the assurance of the network? a. boundary routing b. classless inter-domain routing (cidr) c. internet protocol (ip) routing lookups d. deterministic routing
Computers and Technology
1 answer:
Dominik [7]1 year ago
4 0

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip) internet protocol (ip) routing lookups will be even more essential to the assurance of the network.

Understanding WAN

WAN stands for Wide Area Network is a network that is used as a network that connects between local networks.  Local computer networks are not only physically adjacent to each other, but share the same group of IP addresses.  

The local network can be one room, one office or even one city.  While the WAN itself is a network that connects these local networks within a city, province or even between countries.  The difference between WAN and LAN networks is in the type of media used.  Generally local networks or LANs use similar network media.

While the WAN is connected to devices with different transmission media and protocols.  The WAN coverage area is also very wide, but unites the network as if it were in one room.  WAN networks have lower data transfer rates than local networks or LANs. WAN network technology relies on companies providing long-distance telecommunications services.  WAN networks use many kinds of network technologies with a mix of analog and digital signals for data transmission.  Of course this is different from a local network or LAN which uses a connection between computers that are physically connected to each other with the same protocol and transmission media.  The components in the WAN and their functions will be discussed later.

Learn more about WAN at brainly.com/question/14793460.

#SPJ4.

You might be interested in
Reading view is similar to ____ view because each slide displays individually, but the slides do not fill the entire screen.
Akimi4 [234]
Reading view is similar to (SLIDE VIEW) because each slide displays individually, but the slides do not fill the entire screen.
Slide view is the presentation of images or data in a projector screen that makes it bigger and visible.
7 0
3 years ago
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
solmaris [256]

Answer:

disable SSID broadcast and change the network name

Explanation:

Based on my experience with information technology and wireless networks my recommendation would be to disable SSID broadcast and change the network name. Disabling SSID will prevent the network name from appearing on devices that are searching for a network to connect to, and by changing the name it will also prevent anyone who knows the previous name from connecting unless they know the new name. Both of which will drastically increase security.

8 0
3 years ago
Which of these is the best example of an asset?
ArbitrLikvidat [17]

I believe it's the second answer:

The antique diamond necklace someone is wearing

5 0
3 years ago
1. Suppose the memory address in an embedded system has 12 bits. How many unique memory locations can this 12-bit address access
const2013 [10]

Answer:

14 bits memory address - 4096 bits.

16 bits memory address - 16384 bits.

Explanation:

The computer system memory is a hardware component that provides the necessary memory space and location to run software application on the computer system. The memory address location comes in various sizes.

A 14 bit memory can address 2^14 bits which is 4096 bits, since each 14 bit line carries a bit on which line. So for a 16 bit memory address, 2^16 bits location is addressed.

3 0
3 years ago
A broadcast network is one in which a transmission from any one attached station is received by all other attached stations over
love history [14]

Answer:

In a broadcast network such as radio network for example a walkie talkie, the broadcasted transmission is received equally by all receivers indiscriminately which may lead to dissemination of classified information to an unauthorized receiver, therefore, the network layer is required is needed to ensure proper routing of the information

Similarly, when the all the broadcasters in one location are each trying to send messages to different receivers at another given location, there would be potential for network congestion and it would be difficult to send information through the network

When there is need for priority service the presence of a network layer is needed in the network

However, when the above functions performed by the network layer is not required, then, the network layer can be excluded, such as the communication between layers 4 - 7 of the OSI model

Explanation:

8 0
3 years ago
Other questions:
  • What is one problem you should keep in mind when researching information on the Internet?
    6·2 answers
  • I want to discard my old computer and securely erase the data from my hard drive.
    12·1 answer
  • How is a ink pen better than a digital pen.
    8·1 answer
  • Nate wants to copy the style of his contact address to the normal template. Complete the paragraph to describe how he can access
    6·1 answer
  • Rewrite each condition below in valid Java syntax (give a boolean expression): a. x > y > z b. x and y are both less than
    7·1 answer
  • Digital on a smart phone means the camera is actually zooming in on the photo itself not the subject that you are shooting true
    8·1 answer
  • Referat noaptea la școala cu sfârșit de groază​
    10·1 answer
  • Which of the following variable names follows the rules for naming variables?
    13·1 answer
  • Question 1 (3 points)
    6·2 answers
  • What's the best item in the binding of isaac?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!