Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
NICs AND NETWORK HARDWARE:
NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot be needed with FDDI.
Some NICs may be used with different but same type hardware for example thin, thick and 10 Base-T Ethernet100Mbps, and 10Mbps Ethernet.
CONNECTION BETWEEN NIC AND PHYSICAL NETWORK:
TWO ALTERNATIVES:
NIC have all circuitry and connects directly to network phase. A cable from NIC joins to additional circuitry that then attaches to the network phase.
THIN ETHERNET VERSUS 10BASE-T:
Thin Ethernet and 10Base-T are type of Ethernet. The network method is not limited to one kind of connection.
Can you Describe what the use of IGMP Protocol is?
Recognize the two commands that copies the configuration in NVRAM to RAM Ans) a) Copy startup-config running-config b) Configure memory
What do you meant by "triple X" in Networks? The function of PAD (Packet Assembler Disassembler) is defined in a document known as X.3. The standard protocol has been explaine
A modified NRZ code known as enhanced-NRZ (E-NRZ) operates on 7-bit words; inverting bits 2,3,6 and 7; and adding one parity bit to each word. The parity bit is chosen to make the
Facts about Fiber Optic Cables 1. Outer insulating jacket is made of Teflon or PVC. 2. Kevler fiber helps to strengthen the cable and prevent breakage. 3. A plas
Access Networks and Physical Media Access networks are the physical links(S) that connect an end systems to its edge router. Which is the first router on a path fr
Name the Twisted pairs cables Twisted pairs cables (Shielded and Unshielded), Coaxial cable and Fiber optic cable. ?Testing of the points ?Testing of the entire network t
What are the dissimilar ways authentication mechanism in VPN?
Urgent Pointer This 16 bite which is valid only f the urgent flag is set is used when the segment contains urgent data. If defines the number that must be added t
Question: Wireless Access points have been known to have various security vulnerabilities that can lead to breach of Secured wired networks. IEEE 802.11 standards have identifi
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd