answersLogoWhite

0

The routers must agree on the network type.

The routers must use the same dead interval

User Avatar

Wiki User

14y ago

What else can I help you with?

Continue Learning about Computer Science

What checks need to be carried out on the components before removing them from the machine?

Check if all jobs that needed to be done are completed. check all dimensions (if possible) and check the surface finishes on the job


What is schedule feasibility?

A project will fail if it takes too long to be completed before it is useful. Typically this means estimating how long the system will take to develop, and if it can be completed in a given time period using some methods like payback period. Schedule feasibility is a measure of how reasonable the project timetable is. Given our technical expertise, are the project deadlines reasonable? Some projects are initiated with specific deadlines. You need to determine whether the deadlines are mandatory or desirable.


What is the function of shareware?

Shareware is a type of software distribution method where users are allowed to try a program before purchasing it. It typically offers limited features or a trial period for free, after which users are required to pay for the full version. Shareware serves as a marketing strategy for software developers to promote their products and encourage users to buy the complete version for full functionality.


What is the purpose and functionality of a blocking system call?

A blocking system call is used in computer programming to pause the execution of a program until a certain condition is met. This allows the program to wait for input or output operations to complete before continuing. The purpose of a blocking system call is to synchronize the flow of a program and ensure that tasks are completed in the correct order.


What is a router?

A device that forwards data packets from one local area network (LAN) or wide area network (WAN) to another. Based on routing tables and routing protocols, routers read the network address in each transmitted frame and make a decision on how to send it based on the most expedient route (traffic load, line costs, speed, bad lines, etc.). Routers work at layer 3 in the protocol stack, whereas bridges and switches work at the layer 2. Routers are used to segment LANs in order to balance traffic within workgroups and to filter traffic for security purposes and policy management. Routers are also used at the edge of the network to connect remote offices. Multiprotocol routers support several protocols such as IP, IPX, AppleTalk and DECnet. Routers can only route a message that is transmitted by a routable protocol such as IP or IPX. Messages in non-routable protocols, such as NetBIOS and LAT, cannot be routed, but they can be transferred from LAN to LAN via a bridge. Because routers have to inspect the network address in the protocol, they do more processing and add more overhead than a bridge or switch, which both work at the data link (MAC) layer. Most routers are specialized computers that are optimized for communications; however, router functions can also be implemented by adding routing software to a file server. For example, the NetWare operating system includes routing software that can route from one subnetwork to another if each one is connected to its own network adapter (NIC) in the server. The major router vendors are Cisco Systems and Nortel Networks. Within an enterprise, routers serve as an internet backbone interconnecting all networks. This architecture strings several routers together via a high-speed LAN topology such as Fast Ethernet or Gigabit Ethernet. Within the global Internet, routers do all the packet switching in the backbones. Another approach within an enterprise is the collapsed backbone, which uses a single router with a high-speed backplane to connect the subnets, making network management simpler and improving performance. In older Novell terminology, a router is a network-layer bridge. Routers also used to be called "gateways." For more understanding of how the network layer 3 works within the protocol stack, see TCP/IP abc's. See layer 3 switch, route server, router cluster and routing protocol.

Related Questions

What does love your neighbor but cut down your hedge mean?

never saw your neighbor before and


Can your neighbor adopt you?

No Why do you think that your neighbor can adopt you. and you spelled "neighbor" wrong. at least get the spelling right before asking the damn question


Is it best to receive a completed before paying an invoice?

It is best to receive a completed statemnet before paying an invoice.


Is best to receive a completed before paying an invoice?

It is best to receive a completed statemnet before paying an invoice.


Is it best to receive a completed--before paying an invoice?

It is best to receive a completed statemnet before paying an invoice.


Have you completed your Australia Travel Declaration before your trip?

Yes, have you completed your Australia Travel Declaration before your trip?


Can an executor of a will distribute assets before probate is completed?

No, an executor of a will cannot distribute assets before probate is completed.


What is the neighbor of Taurus?

The neighbor of Taurus in the zodiac is Aries, which comes before Taurus, and Gemini, which comes after Taurus.


Should you pay a handyman before the job is completed?

You should absolutely never pay a handyman before the job is completed.


Had completed correct or wrong?

Had completed is correct. This is a past perfect verb phrase. They had completed the test before the afternoon.


Meaning of love thy neighbor tattoo?

"Love Thy Neighbor" tattoos mean hate your brother before you hate your foe.


How to Buy a Used Linksys Wireless G Router Manual?

Before you buy a Linksys wireless G router manual, you can think about trying out the different routers available to you. This can be expensive, but buying used routers could be a way for you to save some money on this. Try not to buy any routers that seem to have damage on them.