Answer Posted / neeraj
this is the ring topologies method.
Is This Answer Correct ? | 3 Yes | 6 No |
Post New Answer View All Answers
What are the things that can be accessed in a CISCO router’s identifying information?
What is the ieee standard for wireless networking?
What s the formula for metric of ospf?
What do we check while configuring the server?
What is an autonomous system?
What is the maximum value of administrative you can use?
What is the name of algorithm of eigrp protocol?
Why we use filter option?
Which command we give for see routing table?
What are the steps of conversion for data encapsulation?
What is the update period for rip?
Explain the difference between bus topology and hub?
What is mac address size of ipv6?
Your company has been assigned the IP address of 201.222.5.0 and require having 20 subnets. As the company’s network administrator, find the following: a) the subnet mask (2 marks) b) the number of useable subnets (2 marks) c) the subnetwork address for the 4th subnet (2 marks) d) the first usable IP address for the 4th subnet (2 marks) e) the last usable IP address for the 4th subnet (2 marks) f) the broadcast address for the 4th subnet. (2 marks)
What is the checksum?