1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
1 year ago
11

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip), which of the follo

wing becomes even more essential to the assurance of the network? a. boundary routing b. classless inter-domain routing (cidr) c. internet protocol (ip) routing lookups d. deterministic routing
Computers and Technology
1 answer:
Dominik [7]1 year ago
4 0

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip) internet protocol (ip) routing lookups will be even more essential to the assurance of the network.

Understanding WAN

WAN stands for Wide Area Network is a network that is used as a network that connects between local networks.  Local computer networks are not only physically adjacent to each other, but share the same group of IP addresses.  

The local network can be one room, one office or even one city.  While the WAN itself is a network that connects these local networks within a city, province or even between countries.  The difference between WAN and LAN networks is in the type of media used.  Generally local networks or LANs use similar network media.

While the WAN is connected to devices with different transmission media and protocols.  The WAN coverage area is also very wide, but unites the network as if it were in one room.  WAN networks have lower data transfer rates than local networks or LANs. WAN network technology relies on companies providing long-distance telecommunications services.  WAN networks use many kinds of network technologies with a mix of analog and digital signals for data transmission.  Of course this is different from a local network or LAN which uses a connection between computers that are physically connected to each other with the same protocol and transmission media.  The components in the WAN and their functions will be discussed later.

Learn more about WAN at brainly.com/question/14793460.

#SPJ4.

You might be interested in
How can public-key encryption be used to distribute a secret key?
navik [9.2K]
If you encrypt the secret key with someone else's public key, then only that person can decrypt it with his private key. The encrypted content can be freely shared with anyone, however only the intended recipient can retrieve the secret key since he is the only one with the proper private key.
8 0
2 years ago
To decrease the size of text so it will fit into a text box without overflowing, select the
Trava [24]

Answer:

It is is A

Explanation:

Becuase if you shrink a text thats just the answer

5 0
3 years ago
Read 2 more answers
1st row has 3 possible answers software program, web page, and web browser
Maurinko [17]

Answer:

1st row: software program

2nd row: a user's computer

hope i've helped.

7 0
3 years ago
The Internet consists of interconnected computer networks throughout the world that everyone can use.
KiRa [710]
False, I'm pretty sure people in North Korea cant use it...
8 0
2 years ago
Read 2 more answers
A dns query failure is referred to a higher level domain name server under what condition
zalisa [80]
Within the Flags detail is a flag titled recursion desired. This flag shows whether or not the local DNS should continue to query other DNSs if it is not able to resolve the current query. As DNS is local, it may or may not have the enough information to allow the address to be resolved. If the recursion flag is set, the local <span>DNS will continue to query higher level DNSs until it is able to resolve the address.  In short, t</span>he condition is when a flag is raised and it doesn’t have enough <span>information to allow the request.</span>
5 0
2 years ago
Read 2 more answers
Other questions:
  • Is a fundamental building block of a relational database because this object stores all of the data
    15·1 answer
  • Who is responsible for customer service?
    14·1 answer
  • When you move a paragraph in a document that includes text with a footnote, what happens to the footnote reference?
    7·2 answers
  • Which of the statements below are true about Digital Signatures?
    15·1 answer
  • In cryptography, the term "Secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner
    12·2 answers
  • Whenever Jim starts his laptop he sees some commands and numbers appearing on his screen these instructions are being processed
    9·1 answer
  • You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha
    9·1 answer
  • Write a Java program called Decision that includes a while loop to prompt the user to enter 5 marks using the
    12·1 answer
  • Will mark Brainliest!! What is the best hard disk compacity? Why?
    7·1 answer
  • Any correct answers will be helpful.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!