Which of the following correctly describe steps in the OSI data encapsulation process?
Which set of commands is recommended to prevent the use of a hub in the access layer?