What is icmp protocol?
No Answer is Posted For this Question
Be the First to Post Answer
Which command do you use to set the Secret password to 'roundwood'? A.) enable login roundwood B.) enable password roundwood C.) enable privilege roundwood D.) enable secret= roundwood E.) enable secret login roundwood F.) enable secret roundwood
what is the subnet for the host ip address 172.16.210.0/22
On a network design project you determine that a new testing application requires multiple hosts. These hosts must be capable of sharing data between each host and an enterprise server at 10 Mobs bandwidth. Other divisions in the company use applications that require less than 2 Mobs bandwidth of the enterprise server. What is your most economical recommendation? A. That existing 10BaseT hubs be replaced with 1 00BaseT hubs to improve overall performance B. That a router can separate the testing application from the rest of the network, thus allowing the testing application more bandwidth. C. That a switch be installed, so that the enterprise server can be provided a 100 Mobs pod and each of the testing application hosts can be given dedicated 10 Mobs pods] D. That a bridge be placed between the enterprise server and all other users with the exception of the testing application
I simulate ten routers r1 to r10 straightly. I want I can ping from the loop of r1 to loop of r10, but I want I cant ping r1 and r10 from inside routers.?
hi jitendra i am sunil here and i am an engineering student from delhi i have lots of interest in computer network.i was in serch of doing communication through MAC adressess.can u help me?
Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) ROM D.) Console E.) Trace
What must be true for two routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D.) Configured for PPP
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
What is Route Poisoning?
What is syntax of ipv4?
what the exact definition of Ethernet.plz reply as soon soon as possible
Can anyone explain in details port fast, uplink fast & backbone fast features introduced by CISCO (The GOD FATHER of NETWORKING.... Hehehehehe).