1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zaharov [31]
2 years ago
8

Briefly explain the following terms and concepts:

Computers and Technology
2 answers:
morpeh [17]2 years ago
7 0

Answer:

Answer below

Explanation:

Maximum transmission unit (MTU)

A maximum transmission unit (MTU) is the largest packet or frame size that is usually specified in Eight-bit bytes, which can be sent in a packet or frame-based network such as the internet.  

Longest Prefix Match

Longest prefix match is an algorithm used by routers in Internet Protocol to lookup the IP prefix that will likely be the terminal point of the next hop from the router.

CIDR and Subnet Mask

CIDR, known in full as Classless inter-domain routing, is a set of IP standards that is used to make customized identifiers for networks and individual devices.  

A subnet mask separates the internet protocol (IP) address into the network address and host address.

 

Switching Fabric

Switching fabric is simply an arrangement of the elements of a communication network also known as network topology, whereby the nodes of the network are seen to interconnect with one or more network switches.

koban [17]2 years ago
6 0

Answer:

Answer is briefly explained.

Explanation:

MTU:

Each system has a MTU that directs the greatest size an individual system parcel can be for transmission. On the off chance that the parcel is bigger than the MTU it will be divided and sent as different bundles or dropped if the don't section banner is set. The MTU is determined to each system section and can be distinctive on each system between the PCoIP host and customer. Regularly on Ethernet the MTU is 1500 yet on an ADSL association it possibly 1492.

Longest Prefic Match:

Longest prefix match (additionally called Maximum prefix length match) alludes to an algorithm utilized by routers in Internet Protocol (IP) systems administration to choose a section from a sending table.

Since every passage in a sending table may determine a sub-organize, one goal address may match more than one sending table section. The most explicit of the matching table sections — the one with the longest subnet cover — is known as the longest prefix match. It is called this since it is likewise the passage where the biggest number of driving location bits of the goal address match those in the table section.

CIDR and Subnet Mask:

The CIDR number originates from the quantity of ones in the subnet mask when changed over to binary.

The regular subnet mask 255.255.255.0 is 11111111.11111111.11111111.00000000 in paired. This means 24 ones, or/24 (articulated 'slice twenty four').

A subnet mask of 255.255.255.192 is 11111111.11111111.11111111.11000000 in paired, or 26 ones, henceforth/26.

Switching Fabric:

Switched Fabric or switching fabric is a system topology where organize hubs interconnect by means of at least one system switches (especially crossbar switches). Since an exchanged fabric organize spreads arrange traffic over different physical connections, it yields higher complete throughput than communicate systems, for example, the mid 10BASE5 variant of Ethernet, or most remote systems, for example, Wi-Fi.

Difference between forwarding and routing:

a. Forwarding doesn't transmit information on active connections, however routing does.

b. Forwarding finds reasonable way for a parcel than routing.

c. Forwarding is a piece of dynamic while routing isn't.

d. Forwarding is utilized in communication

You might be interested in
What is MARC? Discuss structure of MARC
nordsb [41]
What do you mean? I don't understand.
7 0
2 years ago
6
Mama L [17]

Answer:

=IF(D3>50; E3; F3) and =IF(A1>60;"Pass";"Fail") are valid IF formulas.

Explanation:

P.S - The exact question is -

To find - Select the correct answer from each drop-down menu. Which IF formulas are valid? _____ and _____ are valid IF formulas.

FIRST BLANK

=IF(D3>50; E3; F3)

=IF(D3>50);( E3; F3)

=IF(10<5;23);("Incorrect")

SECOND BLANK

=IF(A1>60;"Pass";"Fail")

=IF(A1>60); ("Pass"; "Fail")

=IF(A1>60; ("Pass"; "Fail"))

Solution -

An IF structure is built following this pattern:

IF(TEST;IF TRUE;IF FALSE)

So,

The correct option is -

=IF(D3>50; E3; F3) and =IF(A1>60;"Pass";"Fail") are valid IF formulas.

7 0
2 years ago
Help help help help help help
Shkiper50 [21]

Answer:

maybe overexposure???

Explanation:

6 0
2 years ago
What is the purpose of creating a primary key in a database
ss7ja [257]

Answer:

Basically it creates a unique identifier for each row in your table and that can help you link your table to other tables using primary key as link

Explanation:

"Primary key allows you to create a unique identifier for each row in your table. It is important because it helps you link your table to other tables (relationships) using primary key as links."

7 0
3 years ago
1. It is a requirement to install a routing protocol that monitors the network for routers that have changed their link state. T
Nady [450]

Answer:

1. Open Shortest Path First (OSPF)

2. Border Gateway Protocol (BGP)

3. Routing and Remote Access Service (RRAS)

4. Frame relay

5. Synchronous

6. Virtual

7. Committed Information Rate (CIR)

8. Integrated Services Digital Network (ISDN)

9. Asynchronous Transfer Mode (ATM)

10. Basic Rate Interface (BRI).

8 0
3 years ago
Other questions:
  • What are the benefits of using a multiview sketch?
    11·1 answer
  • Which is a value of the Scrum Manifesto?
    9·1 answer
  • Which of the actions below will not create more room on your hard drive?
    11·1 answer
  • ALGUEM SABE COMO MUDA O NOME DE PERFIL!?!?!? SE SOUBER ME AJUDA!!
    14·1 answer
  • Consider three different processors P1, P2, and P3 executing the same instruction set. P1 has a 3 GHz clock rate and a CPI of 1.
    8·1 answer
  • Apps are designed by___.
    11·2 answers
  • Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which optio
    5·2 answers
  • The hostel in which you plan to spend the night tonight offers very interesting rates, as long as you do not arrive too late. Ho
    5·1 answer
  • You have installed Windows Server 2016 on a new server and want to centralize user logons and security policies. What type of so
    13·1 answer
  • Maria needs to use a requirement-gathering method that will help her provide a set of questions to the client. Which method shou
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!