Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Basic working of Spanning Tree?
Spanning Tree
- Redundant bridges may be installed to provide reliability
- To prevent infinite looping of packets between bridges, a spanning tree algorithm is used to identify any redundant paths
- Path with lowest cost will be identified and used as the primary route that communications will be routed through; in the event of blocking or bridge failure, secondary routes may be used.
Initialization Imagine that all routers in our sample internetwork comes up at the same time. Each router sends a greeting packet to its neighbours to find out the sta
Q. Illustrate Data-Link Layer in osi layers model? Data-Link Layer: This layer takes the data messages or frames from the Network Layer and gives for their actual transmissio
What are called Fat clients and Fat servers? If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal softwa
What is the use of a default gateway? Default gateways give means for the local networks to connect to the external network. The default gateway for connecting to the external
What the Semantic Web is? Ans) The Semantic Web is a vision, that thinks to join together dispersed bits of data on the internet, very much like web pages are presently joined
Router(config-if)# no cdp enable is the command to disable CDP on an interface
Q. Describe Differential Manchester? - Inversion at middle of bit interval is utilized for synchronization - Presence or else absence of additional transition at beginning o
Q. Explain the Public-Key Cryptography? Public-Key Cryptography - Each user has the same encryption algorithm and key - Decryption algorithm also key are kept secret
Transition Phases A PPP connection goes through phases which can be shown in a transition phase . Dead: In the dead phase the link is not being used. There is no ac
What are MAC addresses? MAC, or Media Access Control, uniquely identifies a device on the network. It is also called as physical address or Ethernet address. A MAC address is m
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd