Answer Posted / nikhil maggu
Jeetendra just want to correct you with your last step i.e
3rd step after receiving ACK(reply for request) the
sender(or 1st node) sendsback ACK again that as confirmation
for starting the session
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
In which access- list type you can't do editing?
What is difference between igp and eigrp?
Explain how an spf algorithm works?
which points are eliminated by the DBSCAN algorithm?
What are the different IPX access lists?
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
If bandwidth will increase what will happen?
What is the easiest way to remotely configure a router?
In eigrp metric parameters which 2 options are enable by default?
Explain the term 'multicast'.
If line up, but protocol down which layer should be troubleshot?
How many types of ethernet?
What is the update period for rip?
Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?
What is the main advantage of using switches?