answersLogoWhite

0

First go to the configuration mode ("conf t" for short )

Then provide ip addresses to both the routers

and perform routing like RIP,OSPF,EIGRP or static which ever u want to do

and then check by pinging each other.

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

What device exist in between host devices?

Devices that exist between host devices are commonly referred to as network intermediaries. These include routers, switches, and hubs, which facilitate communication and data transfer between hosts in a network. Routers direct data packets between networks, switches connect devices within the same network, and hubs serve as simple connection points for multiple devices. Each of these devices plays a crucial role in ensuring efficient and effective network communication.


How do radio waves enable the transmission of data over the internet?

Radio waves enable the transmission of data over the internet by carrying signals between devices, such as routers and modems. These waves travel through the air and are received by antennas on devices, allowing for the transfer of information wirelessly.


What is bgp protocol?

Border Gateway Protocol (BGP) is a way to transfer data and information between different hosts such the Internet or routers. It is commonly used between Internet Service Providers (ISPs).


What are the Advantages of routers over bridges?

Bridge device is similar to a router, but it does not analyze the data being forwarded. Because of this, bridges are typically fast at transferring data, but not as versatile as a router. For example, a bridge cannot be used as a firewall like most routers can. A bridge can transfer data between different protocols (i.e. a Token Ring and Ethernet network). A router on the other hand are like traffic police, they exam each packet of data, get the destination address and forwards it thru the network to the correct address.


Transfer files between 2 or more computers?

Obtain the IP addresses of the computers you would like to transfer data to, then use the network to transfer the data.


Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?

Modern networks used two devices for the data packets within the network will flow easily. The two devices are the routers and switches.


What is the data element for the Transport layer?

routers


Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?

HDLC


What kind of delivery uses a clocking circuit to control the timing of communications between two WAN devices such as routers?

The kind of delivery that uses a clocking circuit to control the timing of communications between two WAN devices, such as routers, is known as synchronous transmission. In synchronous transmission, data is sent in a continuous stream, synchronized with a clock signal, ensuring that both sender and receiver are aligned in timing. This allows for efficient and accurate data transfer, minimizing the risk of errors that can occur with asynchronous methods, where data is sent without a shared clock signal.


How do you copy game data to a profile?

well i know that fr an xbox 360 you can transfer data using a USB or transfer cable but for a USB it needs to be more than 786 MB to configure. so once you configure the flash drive (USB) go to system settings, memory, your hard drive then choose a game or any thing else. choose what you want out of the game (or whatever) then, plug it in to the xbox that the profile you want the data transferred to and the got to the same place and copy or move the data to that profile.. i hope it helped :)


How do you transfer 3DS data to the Wii?

You cannot transfer data between the 3DS and Wii as they are not the same console. You can only transfer data from the Wii to the Wii U or the Nintendo DSi (XL) to the 3DS and to 3DS XL.


Which software is used for a network administrator to make the initial router configuration securely?

Network administrators typically use terminal emulation software such as PuTTY or Tera Term to securely configure routers via SSH (Secure Shell). This allows for encrypted communication between the admin's computer and the router, ensuring that sensitive configuration data is protected. Additionally, some routers come with web-based interfaces that support HTTPS for secure initial configuration.