2 routing protocols that enable the deployment of VLSM by providing the extended network number length or mask along with route advertisement.
Answer / indu
Open Shortest Path First (OSPF) and Intra-Domain Intermediate System to Intermediate System (IS-IS)
| Is This Answer Correct ? | 0 Yes | 0 No |
what is definition of shadow copy
In What Protocol, message are just delivered. It is not reliable, and requires that transmission quality be augmented. It is fast, however.
How can I install windows xp in Multiple systems at one time. Is there any procedure ? Plz write briefly
3 types of mail access supported by IMAP4 are:
What is clustering support?
Full Duplex Connection consists of howmany independent streams of data.
In improved Distance Vector Protcols, there is a rule that no router will send a routing update via the interface it learnt of the route in the first place. This is called _____________ ?
Which of the following statements are correct ? a. TCP is connection oriented and UDP is connectionless b. UDP is connection oriented and TCP is connectionless c. Both TCP and UDP are connection-oriented d. Both TCP and UDP are connectionless
Scenario: “In a switch two hosts are connected to port number 1 and 2 respectively; both the ports are configured with same VLAN id. When data is sent from one host to another, in switch VLAN tagging will happen or not? Why?”
What provide communication between the computer and the main LAN cables and are located in the vampire taps attached to the cable.
Give the function of the osi session layer?
I am to introduce a new financial product through nationalised Banks.How I could monitor the dealings,ie.payment made or withdrawn from the accounts of our clients and how the customers could read the details of their accounts through the mobiles.