if i had a video conferencing device why should it is
needed to configure a static IP for that,will it not work
on the local lan.

Answers were Sorted based on User's Feedback



if i had a video conferencing device why should it is needed to configure a static IP for that,wil..

Answer / nikhil maggu

Jitu adding furthermore to your part, video conferencing is
a continuous flow of voice & data packets.
Whenever u communicating with another device or person you
require an IP, here we can refer originator(source) &
terminator(destination) thing.

So whenever we do video conferencing you originate a packet
to some destination & on the same a reply / acknowledgment
is awaited from other party. So whenever reply comes it
comes to IP from which the original packet was raised.

So, if you are on LAN rather than WAN, the packet will hover
in the network but can't able to find the exact destination
if static IP(terminator) not there.

I guess static NAT(not dynamic) can also work fine as far as
my understanding with voice networks it works fine, same
should go with video also.

Is This Answer Correct ?    2 Yes 0 No

if i had a video conferencing device why should it is needed to configure a static IP for that,wil..

Answer / jitendera

i even donot work on the vidieo conf device but if it can
work on wan so no problem should be in lan

ip address is no thing it is the address from which we want
to cmmunicate so it is a basics that it need ip address for
communication
we use the staic ip for easy so that we can remember as we
used to give server ip staic so that evey body can rember

ok?

Is This Answer Correct ?    1 Yes 2 No

Post New Answer

More CCNA Interview Questions

What is GRE in PPTP?

0 Answers   CCIE,


The Integrated Services Digital Network (ISDN) Basic Rate Interface (BRI) provides which of the following? A.) 1.544 Mbps B.) 23B + 1D Channel C.) 24B + 1D Channel D.) 2B + 1D Channel E.) 23B + the Disney Channel

2 Answers  


Which IP Address Class can have 64,000 subnets with 64,000 hosts per subnet? A. Class B B. Class A C. Class C D. Class D

2 Answers  


in which way the datas will transfer from one host to another host by using osi layer?

3 Answers  


Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)

0 Answers  






Do you found the Cisco Certification 642-067 exam Guide ?

1 Answers  


HI friends mine one of the friends have ask a good question i also donot know the answer so i am putting here Please poet the answer no matter it is wright or wrong put yours view here The question is like that when we are going to configure ospf then there are three way 1st way router ospf 10 netwrok 192.168.1.0 0.0.0.255 area 0 network 192.168.2.0 0.0.0.255 area 0 the 2nd way is like that router ospf 10 netwrok 192.168.0.0 0.0.255.255 area 0 but he inrodused the thrird way like router ospf 10 netwrok 192.168.00000001.0 < ?.?.?.?>area 0 router ospf 10 netwrok 192.168.00000010 <?.?.?.?>area 0 now problem is that what should i put the mask in this way so i puted ? sign Please solve this problem i think this is good one plz donot see for answer please contribute any thing i am reqesting Than you Jitendera kuamr sinha

5 Answers  


which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?

0 Answers  


if i had a video conferencing device why should it is needed to configure a static IP for that,will it not work on the local lan.

2 Answers   HCL,


Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols

1 Answers  


Which command do you use to set the Secret password to 'roundwood'? A.) enable login roundwood B.) enable password roundwood C.) enable privilege roundwood D.) enable secret= roundwood E.) enable secret login roundwood F.) enable secret roundwood

1 Answers  


Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john

1 Answers  


Categories