What are the steps of conversion for data encapsulation?
No Answer is Posted For this Question
Be the First to Post Answer
Which protocol will send a message to routers if a network outage or congestion occurs? A.) ARP B.) TCP C.) IP D.) ICMP
What is the logical link control?
what is eigrp and what is the benfit of eigrp over igrp what is route summryization if one the router route is not showing the what should be problem how to resolve these problem what is fessible suceer. is the load balncing is one of the property of eigrp what is the metihod of authantication what is the diffrnec betwee pap and chap what is stp command for enabling stp and rstp why switching loop occur what is the main factor of ocuring switch loop what is the mechnaism for stoping the roting loop what is best diffrence betwwen ospf v1 nad ospf v2 what is vtp what is the diffrence between vtp version 1 and veron 2 what is the ip address what is the diffrence betwwen ip address mac address what is dhcp and how it work what is 3 way hand shake what is the difrence betwwen network id and brodcast id what is the network id for 184.108.40.206/29 what is the command for enabling vlan on 3650 csco switch
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP
Which statement about an IP network is true? A. A broadcast source MAC address contains all zeros B. A MAC address is part of the physical layer of the OSI model C. MAC addresses are used by bridges to make forwarding decisions. IP address are used by routers. D. IP addresses allow a flat addressing scheme. MAC addresses use a hierarchical addressing scheme.
Ping uses which Internet layer protocol? A.) RARP B.) ICMP C.) ARP D.) FTP
hi shain/sudeep and rest of all plz answer these question for help some one as soon as possible what is stub area what is transit area let there are three area in ospf a0 a2 and a3 if a2 and a3 is coneted through each other will they comnicate
Explain how many types of ends in wan?
Can you describe the Authentication Header (AH) Protocol?
What are the different types of password used in securing a cisco router?
Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic
What are 10baset ethernet lans?