Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Show the Communication between Switches?
Communication between Switches
- Must know which station belongs to which VLAN as well as membership of stations connected to other switches
- Tables may be updated by broadcast frames and may be periodically sent amongst switches
- Frame tagging may be used to define the destination VLAN
- TDM may be used to segment channels for each VLAN
State the reason for Intranet system breaks down Care must be taken to ensure that proper spare parts are available even after about five years of commissioning. In addition t
Which command saves the configuration stored in RAM to NVRAM Ans) copy running-config startup-config is the command which saves the configuration stored in RAM to NVRAM
What are the two broad class classifications under which Networks can be divided? All computer networks fit in one of the two dimensions namely: a) Transmission Technol
Connections in ATM are known virtual circuits or virtual channels These are known virtual, since connections are created in ATM by starting values in memory locations (tables) in A
Determine the concept of placing antenna on hieght First, starting deployment simply placed cells in regions where there was high density of vehicle or human population. Once t
Network layer duties Internetwork - Physical and Data link layers are jointly responsible for data delivery on the network from node to node
Deadlock Avoidance To avoid deadlocks two types of strategies are used: 1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared res
Routing Table Each router now uses the shortest path tree to construct its routing table . each router uses the same algorithm and the same link state database its own sh
Define the terms Unicasting, Multiccasting and Broadcasting? If the message is sent from a source to a one destination node, it is called Unicasting. If the message is sent
How does the cut-through switching technique work? Ans) Cut-Through switching copies only the destination address which is the first 6 bytes after the =frame preamble into its b
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd