What are the steps of data encapsulation?
No Answer is Posted For this Question
Be the First to Post Answer
What is CIDR?
What not a name of an ISP? A. MSN B. Comcast C. Verizon D. McDonalds
Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it
Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward
Which protocol can do load balancing on unequal cost also?
Explain usage of ICMP in IP routing
What will happen in OSPF, While a new highet priority DR joining in already running area.That area already having DR and BDR.
What is a disadvantage of using a connection oriented protocal such as TCP? A. Packet acknowledgement may add overhead B. packets are not tagged with sequence numbers C. Loss or duplication of data packets is more likely to occur D. The application layer must assume responsibility for correct searchers of the data packets
why we assingn the wild card mask in the use of ospf and access list.
What is ping used for?
Assuming no subnetting, which two pieces of information can be derived from the IP address 144.132.25.10? (Choose two) A. It is a Class C address B. It is a Class B address C. The network address is 144.0.0.0 D. The network address is 144.132.25.0 E. The host spoon of the address is 25.10
How many ways to access router?