Answer:
MAC Addresses (Destination and Source MAC address)
Explanation:
A switch has 3 primary functions:
- Forward frames
- Learn addresses
- Avoid loops
An Ethernet frame has the header, data and trailer and there are two specific fields in the header that helps the switch to know where to send data in future transmissions.
- destination MAC address
- source MAC address
every Ethernet frame has this and when the frame hits a switch or any device, any device can look at it ( an Ethernet frame ) and know where it is suppose to go and where it came from.
Every switch has a MAC address table where it stores MAC addresses of different computers on the network.
Example:
When a PC1 sends a frame to PC2 through a switch, the switch looks at the header of the Ethernet frame for the source mac address and adds the source MAC address to its MAC address table and also the port that it came through.
simply put:
A switch looks at the source MAC address to see if it knows it already, if it does. Great! no need to add it again to it's address table.
If it doesn't, it adds it's source address and the port that the frame came from.
This basically how the switch populates its MAC address table.
The command is : <span>rm [Aa]*[Zz] </span>
Answer:
The operating system must by the use of policies define access to and the use of all computer resources.
Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.
Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:
- General Policies
- Server Policies
- VPN Policies
- Back-Up Policies
- Firewall Access and Configuration Policies
Cheers!
Answer and Explanation:
Reliability is important because if the service lacks lacks reliability this could mean losing a packet or acknowledgement which then requires retransmission.
Delay can be tolerable in different degrees by applications, for example online chatting or conferences need to have the minimum delay possible.
Jitter is the variation in delay for packets belonging to the same flow.
High Jitter: difference between delays is large
Low jitter: difference between delays is small.
Bandwidth depends on the application. In video conferences, for example, there is a need to send million of bits per second to refresh a colour screen while sending a email may not reach even a million.