Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is the different type of networking / internetworking devices?
1. Repeater: Also known as a regenerator, it is an electronic device that operates only at physical layer. It gets the signal in the network before it becomes weak, regenerates the original bit pattern and gets the refreshed copy back in to the link.
2. Bridges: These function both in the physical and data link layers of LANs of similar type. They separate a larger network in to smaller segments. They contain logic that permit them to keep the traffic for every segment separate and thus are repeaters that relay a frame only the side of the segment having the intended recipient and control congestion.
3. Routers: They relay packets between multiple interconnected networks (i.e. LANs of dissimilar type). They operate in the physical, data link and network layers. They have software that enables them to verify which of the several possible paths the best for a particular transmission is.
4. Gateways: They relay packets between networks that have different protocols (e.g. among a LAN and a WAN). They accept a packet formatted for one protocol and change it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.
Configure Spanning Tree Step 1: Examine the default configuration of 802.1D STP. On each switch, display the spanning tree table with the show spanning-tree command. R
Q. Define Unicast - Multicast and Reserved Addresses? Unicast, Multicast, and Reserved Addresses Unicast address - identifies a specific device Multicast address
The application layer This layer enables users to access the network by providing a few services to the user some of the protocols and services available to the user ar
How can I identify the difference types of networks
Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to
Transition Phases A PPP connection goes through phases which can be shown in a transition phase . Dead: In the dead phase the link is not being used. There is no ac
Process Switching It applies the brute force method to switch packets wih consumption of large amount of CPU time List of items are needed when switching packets Routing
What do mean by tunnel mode? This is a mode of data exchange wherein two communicating computers do not use IPSec themselves. Instead, the gateway that is linking their LANs to
Virtual channel is normally a link from one source to one destination, although multicast connections are also allowed. The other name for virtual channel is virtual circuit.
Describe Network Topology and VPN Network Topology refers to the layout of a computer network. It presents how devices and cables are physically laid out, as well as how they j
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd