Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

how we can access 2 networks at a time from a system

lets say 1)local network and 2)internet

Answer Posted / raj

Through Router

Is This Answer Correct ?    27 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

When is a translating bridge used ?

1692


Explain Network Topologies and their uses.

1621


What is ISO-OSI reference model ? Compare it with TCP/IP reference model.

1718


Explain any three error detection and correction techniques.

1860


What do you understand by the term ‘structured cabling’. State the main rules that should be used when installing a cable. 31. Show that maximum cabling area for LAN for horizontal cabling runs is approximately 200m.

1629


What is pool in networking?

1103


Which layer is used to detect and correct errors

1633


Write a short note on ISDN?

1985


What are the reasons for using layered protocols ?

3666


Write down the basic features of HDLC protocol? Could HDLC be used as a data link protocol for a LAN? Justify your answer.

3513


when I issue the "show ip route bgp" command, I see my routes being learned via ospf and bgp. How can I verify on the nx-os which one will always be used and which one is a backup?

1147


What are the other names of IEEE 802.11 protocol or standard?

1619


What is a transparent bridge?

1549


Which device is needed to connect two LANs with different network Ids ?

1721


Explain leaky bucket algorithm and compare it with token bucket algorithm.

2628