Hi Jitendera, I continuously read your answers which is more knowlegable than books... Q.I am facing some problems in subnetting.can you plzz explain the subnetting process.. will be remain thankful
4 7220take a pen and copy before solving that question there is a router name Ra there is two switch sw1 and sw2 sw1 is coneceted through fa0/1 interface of router Ra sw2 is conected through the fa1/1 serai interface of router s0/1 conected through the isp with it ip address 192.168.1.1 now therer are three host conexted through the sw1 and having ip host1=10.1.2.1 host2=10.1.2.2 host3=10.1.2.3 now there is also 3ree host conected through switch 2 i.e sw2 having ip host4=10.1.1.1 host 5=10.1.1.2 host 6=10.1.1.3 now i think u have made corect confrigation.now questios is started network admin configure the Ra router in that fassion Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255 Ra(config)#line vty 0 4 ra(config)#access-class 2 in now question is that why should network admnistratoe do it in this maneer A to give access sw1 host to acess internet B to prevent sw1 host from acessing comand promt c to prevent sw2 host from accessing console of router ra D to give sw2 host access to the enternet e prevent sw1 host from accessing internet f to prevent sw1 host from acessing the sw2 host network isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6) | | (sw1)------host 1,2,3 this is not exect digarm but help to derive the diagram plz answer as soon as possible
AT&T,
6 7937while trouble shooting a network conectivty prob a technician observes that steady link light on the both work stations nic and the switch port which the workstation is conected.however when the ping comand is issuede from the work station the out message is request time out at which layer of osi model does the prob most likly exist 1 sessiom layer protocol layer datalink kayer acess layer network layer application layer i have ansered n/w layer but i am niot sure i have also posted privous question jitendera kumar sinha
3 6306intial information of packey occur on which layer application sessions physical mine answer physical
1 3694which term use to allow user to conect the remote n/w with ppp dail up conection ras sap sonet mane answer rsa
1 3514
What is the default behavior of access-list?
Explain what is the size of hello packets in eigrep protocol?
What are the different IPX access lists?
What is collision?
What is the difference between csma/ca?
What is etherchannel?
What is cisco?
What is quality of ipv6?
what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?
What is the size of IP address?
Explain what is overlaod?
which points are eliminated by the DBSCAN algorithm?
what are the different asymmetric algorithms?
Hi Friend. i have to let you know that now i have been selected for cisco india in bangalore. i am thanking to all of you guys that u have been posted such good question and the respective answer. from today i will be not able to visit this site on regular basic and hopeing that you will continue to post the question.the question you are posting is not very usefull to you but also usefull to another. i am again thanking to all of you and hope for best for your feature. Jitendera kumar sinha Network engineer-L2 cisco india Bangalore
What are the different types of passwords used in securing a CISCO router?