Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Bridges work at the Data Link Layer of the OSI model or more specifically what layer.

Answer Posted / indu

Media Access Control

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to manage a network using a router?

1078


how i can Design a client–server network with two servers operating at 100Base- T Fast Ethernet speed and the clients operating at regular 10Base-T Ethernet speed using a 10/100 Mbps NIC. The hub is located in a wiring closet, but the servers and clients are not. Assume that a satisfactory performance is achieved at 40% utilization of the LAN.

2592


Describe the working environment you are currently in, e.g. frequent interruptions, frequent priority shifting, team or individual?

1847


Tell me what is the equivalent layer or layers of the tcp/ip application layer in terms of osi reference model?

909


Define data encapsulation?

1105


What is meant my data qutoe error In ms office

2756


salient feature of network administrator

1890


Define lan?

1000


in vcs, which network[private or public] channel bandwidth is high?

1647


Explain the maximum length allowed for a utp cable?

1072


What is nat?

1005


how to set kernal parameters in solaris 10&9?

1948


VLAN tagging/un-tagging process –where and when it happens?

2092


in solaris file sysrm is full what u do?

1948


Is there any website? Which can theft or watch any system or computer hardware drives(memory)while they are accessing Internet.If it is avilable what is it? Please answer me.Advance thanks

1869