This type of access method is generally used by Ethernet to regulate network traffic on a main cable segment.
1 3251What provide communication between the computer and the main LAN cables and are located in the vampire taps attached to the cable.
1 2714A subnet mask is used to mask a portion of the IP address so that TCP/IP can distinguish the __ ID from the __ ID.
1 2744A modem modulates digital signals into analog and __ analog signals back into digital signals.
1 2862Which communication is not synchronized and uses a start and stop bit to separate character strings.
1 2790Your network's id is 128.251.6.0 and subnet mask 255.255.255.0 . What is most likely your router's IP address ?
1 2976You have a Class C network. You have subnetted it into 2 subnets. How many hosts per subnet do you have ?
1 2921Post New Networking Administration Questions
Explain the major disadvantage of a star topology?
Explain about vpn?
What are the fields of VLAN tag?
why we r going to freezing service group and system, what are the freezing steps & how to freezing service group?
Define data encapsulation?
Which protocol can be applied when you want to transfer files between different platforms, such between unix systems and windows servers?
Draw network configuration and protocol layer interface architecture for a multiprotocol bridge that interconnects an Ethernet LAN to a token-ring LAN.
If a switch has been configured with two vlans, how many broadcast domains will be there
Explain client/server?
Define rip?
one client is uanble to connect web server it is located in some remote location what are the problems how to troubleshoot the problem
Is it possible to connect two computers for file sharing without using a hub or router?
List the advantage of address sharing?
what solution for High Utilization Cisco router 2851 ? please Need Help ASAP.
Give the function of the osi session layer?