routing information
A traffic light is an example of what type of mechanism? A.) Collision detection B.) Flow control C.) Sequence numbering D.) Network management
You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255 B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255 C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0 D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255
completly describe th steps fo osi model when you enter http:/youtube.com
An user from the LAN is able to ping the default gateway of the router and other sites in the internet. but not able to ping only the google site, no acc list configured and no firewall and no problem with DNS atall. What may be the problem with router?
hi jitendra i am sunil here and i am an engineering student from delhi i have lots of interest in computer network.i was in serch of doing communication through MAC adressess.can u help me?
Which of the following are logged when IP access list logging is enabled? A.) source address B.) protocol C.) source port D.) destination address E.) access list number F.) destination port
Hi Everyone,i have done b.e. and i am CCNA certified, i am searching jobs related to ccna. Although i don't have experience in networking field, i found very difficult to search job(posted my resume in all job portals). I am very much interested to work in networking field, please guide me, my mail id: karnailthakur@gmail.com; Please let me know any company taking ccna freshers(Preferably delhiNCR location). Thanks guys...
1.hi all, my question is how maximum number of ports can exist in a switch? 2.Which type of switching good in using and why?
What is the virtual path?
In which protocol supenetting is enable by default?
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
What are the different ways authentication mechanism in VPN?