1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
3 years ago
9

The information gathered by a probe, analyzed locally, and transmitted to a remote network management, is called

Computers and Technology
1 answer:
Pavlova-9 [17]3 years ago
5 0

Answer:

Remote Network Monitoring (RMON)

Explanation:

The information gathered by a probe, analyzed locally, and transmitted to a remote network management, is called Remote Network Monitoring (RMON).

The Remote Network Monitoring (RMON) was developed in the early 1990s by Internet Engineering Task Force (IETF), which comprises of operators, network designers, researchers and vendors, saddled with the responsibility of designing, developing and promoting internet standards. It is a standardized method for monitoring, analyzing and troubleshooting network traffic on a remote ethernet transport (typically, through its port) to find network connection issues such as network collisions, dropped packets, and traffic congestion. A Remote Network Monitoring (RMON) is an extension of the Simple Network Management Protocol (SNMP) used to gather and manage informations or data about network systems performance.

In order to remotely monitor and gather informations about networks, a RMON probe which can either be a software or hardware is embedded into a network device with a Transmission Control Protocol and Internet Protocol (TCP/IP) such as a switch or router.

Basically, there are two (2) main versions of the Remote Network Monitoring (RMON);

1. RMON 1.

2. RMON 2.

You might be interested in
If one employee is assigned to a project and each project has only one employee working on it, there is a(n) ____ relationship b
Len [333]

Answer:

One-to-one is the answer because there is one project and one employee working on one project.

5 0
3 years ago
The different generation of computer explain in breif?​
Firlakuza [10]

You can download answer here

tinyurl.com/wpazsebu

7 0
3 years ago
Read 2 more answers
How do you properly turn off a computer?
Ugo [173]

Answer:

with the power button or do the sleep or shut down

and by the type of computer

Explanation:

sry if its wrong

have a good day:)

-XxMissNobodyxX

7 0
2 years ago
Read 2 more answers
We want to implement a data link control protocol on a channel that has limited bandwidth and high error rate. On the other hand
Korolek [52]

Answer:

Selective Repeat protocols

Explanation:

It is better to make use of the selective repeat protocol here. From what we have here, there is a high error rate on this channel.

If we had implemented Go back N protocol, the whole N packets would be retransmitted. Much bandwidth would be needed here.

But we are told that bandwidth is limited. So if packet get lost when we implement selective protocol, we would only need less bandwidth since we would retransmit only this packet.

6 0
3 years ago
A function named function1 is defined in a module named module1. Suppose function1 has no parameter. Which of the following Pyth
Oduvanchick [21]

Answer:

Option C i.e., both A and B is the correct option to the following question.

Explanation:

Because in the following statement which is for the Python Programming Language, they can define the function i.e., "function1" without any argument and they can call that function with the help of another module then, they can call that function by using both methods. So that's why the following option is correct.

7 0
3 years ago
Other questions:
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • In a formatted text file, ________ signal(s) the beginning and end of a formatting command.
    12·1 answer
  • Some drugs, like Tylenol, are available over the counter because they are safe in any dose.
    8·1 answer
  • A virus that is embedded in the automatically executing scipts commonly found in word processors, spreadsheets, and database app
    13·2 answers
  • A(n) ____________ for a computer program is a set of steps that explains how to begin with known information specified in a prob
    5·1 answer
  • What does the following code print to the console?<br> if 88 * 100:<br> print("cardio")
    8·1 answer
  • 9.3 Code Practice
    13·2 answers
  • A constructor must have a return statement.<br><br> True<br><br> False
    14·2 answers
  • Which Operating System is used most often in households?
    6·2 answers
  • Consider the following code segment:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!