what are the different asymmetric algorithms?
No Answer is Posted For this Question
Be the First to Post Answer
What is the purpose of data link layer?
What is loop back ip in ipv6?
Which 2 commands shows the Cisco IOS filename? A.) show IOS B.) show ver C.) show flash D.) show mem E.) show NVRAM
Which layer hides details of network dependent information from the higher layers by providing transparent data transfer? A.) Transport B.) Physical C.) Data Link D.) Session E.) Application F.) Network
What is the difference between private ip and public ip?
What is the formula for metric of ospf?
What are the different types of password used in securing a cisco router?
How are internetworks created?
What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos
How many ports are present in a router?
How the STP determinw that which Port should be Root Port, which port should be Designeted Port , Blocking Port and Forwarding Port in Layer 2 STP topology........ Hi friends Thanks for posting the answer of above given questions i agree with all of you that BPDU is the Protocol that are used to determine this is clear to me.. But I want to Know the Process like Why it Blocked the port Fa0/1 Insted of Fa0/2 waiting for Answer Posting .... Thanks in Advance
Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable