Why you require connecting two computers for file sharing, Computer Networking

Assignment Help:

You require connecting two computers for file sharing. Is it possible to do this without using a hub or router?

Yes, you can connect two computers together using only one cable. A crossover type cable can be use in this scenario. In this setup, the data transmit pin of one cable is linked to the data receive pin of the other cable, and vice versa.

 


Related Discussions:- Why you require connecting two computers for file sharing

What is source routing, Q. What is Source Routing? Source Routing ...

Q. What is Source Routing? Source Routing - Sender of packet defines bridges and routes that packet should take - Complete path of bridge IDs and destination address i

Analogue and digital, This assignment consists of both combinational logic ...

This assignment consists of both combinational logic circuit and analog counterpart to perform logical operations based on the given conditions. The first objective of this assignm

What is cryptography, The science and art of manipulating messages in order...

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

Routing principle - network layer and routing , Routing Principle The p...

Routing Principle The principle  criterion of  successful routing is of course correctness but it not only criterion. You might  prefer to take the most direct route ( the  one

Explain priority and reservation of token passing, Priority and Reservation...

Priority and Reservation Higher priority stations may possibly access the token sooner Each station has a priority code Since token passes by station waiting to t

What is groupware, What is Groupware Groupware are a collection of sof...

What is Groupware Groupware are a collection of software tools that encompass a broad range of applications. Even though groupware broadly consists of applications like calend

describe the mips instructions - computer architecture, 1.  Detail for eac...

1.  Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps.  Do not forget to mention how and during which steps each in

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Troubleshoot and correct vtp and configuration errors-ccna, Troubleshoot an...

Troubleshoot and Correct VTP and Configuration Errors When all errors are corrected, you should be capable to ping PC4 from PC1, PC5 from PC2, and PC6 from PC3. You should also

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd