What routing protocols have the poorest convergence time?
You might try reading the PDF found at:
http://www.thinkmind.org/download.php?articleid=sysmea_v3_n34_2010_5
This will probably give you the information you seek.
Link aggregation should be implemented at which layer of the hierarchical network?
access, distibution and core
What is the router static routes cisco 6.8.1?
for R1-ISP
network - 192.168.23.0
mask - 255.255.255.192
next hop - 192.168.23.121 (R2's S/0/0/0 IP Address)
for R2-Central
network - 0.0.0.0
mask - 0.0.0.0
next hop - 192.168.23.122 (R1's S/0/0/0 IP Address)
Your R2-Central is right but your R1-ISP is wrong Sir!
correct R1-ISP
network - 172.16.0.0
mask - 255.255.254.0
next hop - 172.16.3.97
Why can't a network 192.168.1.136 with subnet for six client addresses connect?
IP Address
Additional info:
The IP address for a client may not be on the correct subnet; it is possible that the subnet mask is incorrect.
What is tokens as in token ring networks?
The token is a special 3 byte sequence that indicates the state of the ring; it may mark the ring as in-use, or free (anyone can use it), or health status.
Any client needs to have access to the token before transmitting or receiving on the ring network.
Smart jack.
How do you tell if the network requires wpa2?
In the list of available networks, right click the one you want to check and check properties. You will see all required information.
What are the advantages of FDDI over token ring?
Although they both use a rotating ring setup, the FDDI uses two to achieve better results and less chance of failure. FDDI also uses a timed protocol that leads to differences in frame format and how station traffic is controlled.
What does protocol binding order refer to?
Protocol binding order refers to the order in which a protocol will be matched to a data packet. If, for example, you have a network connection which is running several different protocols it is important to tell the system which protocol to try first.
If you are using Netware, TCP/IP, and any other protocols on the same network, if 70% of your network traffic (as an example) is TCP/IP, then you want the network operating system software to check if a packet is a TCP/IP packet first, and if not, try the other networking protocols.
With the binding order, you tell the adaptor the order of checking for the correct network protocol, starting with the one with the most traffic, and going down from there.
There are two (or three) schools of thought on this.
In base 2 (binary) there are 1024 bits in a kilobit, and 1024 kilobits in a megabit. So in that case you would divide by 1024 to convert kilobit to megabit.
Most often, especially in the media and common use of the public, you see base 10 (decimal) where 1 megabit = 1000 kilobit. This is not preferred, but its very common. In that case you would divide by 1000 to convert kilobit to megabit.
actually each and every service is run by port numbers and these port numbers are generated dynamically and attached to the IP address for example
source address 1.1.1.1:1280 destination address 4.2.2.2:80
in above case the web server which runs on port 80 receives the request from 1.1.1.1:1280 and sends the relative info to the same 1.1.1:1280
hence the data is send to the particular system,
likewise the different services will run behind the scenes uses only one IP address
isolated by port numbers
ip classless
What does it take to be an archetect?
You need these qualification to become a architect:
Why is promiscuous mode operation important for protocol analysis?
It allows the protocol analyzer to capture and inspect all traffic on the network medium, including errors and malformed packets
Full mesh
What would you recommend for the core switches?
Depending on the size of the network and actual traffic requirements technically a "core layer switch" can scale from a 2960 all the way up to and beyond a 6500.
Signal has 0-1 values. is this will be analog or digital signal?
If the values are only 0 and 1 then the signal is digital.