answersLogoWhite

0

What else can I help you with?

Related Questions

Which protocol should be blocked to prevent trojan and malicious traffic?

allow Ip out for all protcols block Ip in for all protcols block ICMP in/out allow HTTP However trojans can find another ways to enter the system, so you must use a good internet security product with firewall.


Industrial hygiene sampling protcols require the followng personnel be informed of the sampling resutls in their wrk area?

Supervisors, and Employees


What are the two most common interior gateway protocols?

The most common Network routing protcols used for interior routing is OSPF and RIP. RIP is still common because of its compability whit older hardware and software.


What are the different telephones and technology?

Go to this link. It discusses VoIP which is a type of telephone which doesnt charge as it uses the protcols from the internet.http://en.wikipedia.org/wiki/VoIPAnswerThere are analog and digital telephones (IP phones) used in the communication industry. To make analog phone compatible to IP service an Analog adapter in needed in order for the voice signal to run over the internet connection.


Why is a communication protocol important?

Unless we have an ageement between the two communicating parties information may get lost or miscommunicated. This agreement is the protocol. Communications protocols usually have a number of parts e.g. Handshake, encoding method, compressions methods, packet / frame structure, addressing etc. Anyone can write a protocol, but in order for it to be useful, people (systems) must use it widely. This is why protocols are often defined by standards bodies, but some protocols e.g. SSL can be used widely even though they are not specifically from a standards body. In short - if we don't have a protcols we won't be able to communicate between different devices.


What are the link state protcols limit the scope of route changes by?

Link state protocols limit the scope of route changes by using a hierarchical structure and dividing the network into areas or domains. Changes in one area are contained within that area and do not propagate throughout the entire network, reducing the impact of route changes on the entire network. This helps in minimizing network convergence time and reducing network traffic related to route advertisement.