This type of access method is generally used by Ethernet to regulate network traffic on a main cable segment.
1 3174What provide communication between the computer and the main LAN cables and are located in the vampire taps attached to the cable.
1 2645A subnet mask is used to mask a portion of the IP address so that TCP/IP can distinguish the __ ID from the __ ID.
1 2679A modem modulates digital signals into analog and __ analog signals back into digital signals.
1 2778Which communication is not synchronized and uses a start and stop bit to separate character strings.
1 2710Your network's id is 128.251.6.0 and subnet mask 255.255.255.0 . What is most likely your router's IP address ?
1 2886You have a Class C network. You have subnetted it into 2 subnets. How many hosts per subnet do you have ?
1 2859Post New Networking Administration Questions
Define ipv6?
Response of switch when we send different vlan data from different port using same mac id.
How do you manage a long term demanding stressful work environment?
Do you know what is the maximum segment length of a 100base-fx network?
Which technologies are involved in establishing wan links?
Explain the osi role in computer networking?
Define the number of network ids in a class c network?
What is firewalls?
How dynamic host configuration protocol aid in network administration?
List the advantage of address sharing?
Explain the difference between csma/cd and csma/ca?
Explain the difference between hub and a switch?
Have you worked in an assignment based environment, e.g. work request or trouble ticket system, and if so, describe that environment?
Give some drawbacks of implementing a ring topology?
Can you please explain the difference between csma/cd and csma/ca?