1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmainna [20.7K]
4 years ago
13

Is bit stuffing necessary in the control or address field in theHDLC protocol? why?

Computers and Technology
1 answer:
steposvetlana [31]4 years ago
7 0

Answer:

Many network and communication protocols require bit stuffing for the following purposes: to avoid the interpretation of data as control information. For example, with six consecutive 1 bits, X.25 uses the bit stuffing,signal the beginning and end of a frame.

High-level Data link control (HDLC) is a bit-oriented protocol for point-to-point and multi-point communication.P/F bits are present in HDLC control field.

So,Yes bit stuffing is necessary in control field.

You might be interested in
What is a resistor?<br> O A switch<br> O A light bulb<br> O A battery
MrMuchimi

Answer:

A Battery would be the correct awncer

8 0
3 years ago
Why would Network Systems employees be employed by the government?
Ghella [55]
Well knowing how the government is with security id go with A. as it makes a lot of sense unlike B and D and if they were looking for software the question would mention it
8 0
3 years ago
Read 2 more answers
You are implementing a wireless network in a dentist's office. The dentist's practice is small, so you choose to use an inexpens
Oksana_A [137]

Answer:

You should disable WPS in the access point's configuration.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

In wireless access points, the encryption technologies used for preventing unauthorized access includes WEP, WPA, and WPA2.

In this scenario, you notice that an access point supports Wi-Fi Protected Setup (WPS) using a PIN and you are concerned about the security implications of this functionality. Therefore, to reduce this risk you should disable Wi-Fi Protected Setup (WPS) in the access point's configuration.

This ultimately implies that, the wireless access point will operate in an open state and as such would not require any form of password or PIN for use.

3 0
3 years ago
_______________ is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data,
sleet_krkn [62]
Answer:
The answer is "Cloud Computing"
Explanation:
Cloud computing refers to the process of storing and accessing data and programs through the internet rather than on your hard disk. I hope this helps! ^-^
8 0
2 years ago
When did edison invent the incandescent light bulb?
arlik [135]
Edison revealed his incandescent light bulb on December 31, 1879<span>, in Menlo Park, California.</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • A ____ paragraph places the first character of a text line near the left border of a placeholder.
    14·1 answer
  • The font size on presentation slides should not be smaller than _____ -point.
    10·1 answer
  • Which guideline should you follow when selecting the font for a presentation?
    6·1 answer
  • What is a collection?
    5·1 answer
  • Which device prints large, three-dimensional high-quality color graphics?
    15·1 answer
  • What e-mail protocol does Marina and Rita’s Cupcakes use and why is it important?
    5·1 answer
  • Create a table in your own database using the following statement.
    5·1 answer
  • 97. How many bits is a ki obyte?<br> a. 1000<br> b. 1024<br> c. 8192<br> d. 8124<br> 5
    15·2 answers
  • WHAT DO YOU KNOW?<br> Why would you want to change your Table<br> Properties?
    15·1 answer
  • Why header files are needed in every c program ?expalin​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!