Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Example on TCP numbering?
Envision a TCP connection is transferring a file of 6000 bytes.
The first byte is numbered 10010.
What are the sequence numbers for every segment if data are sent in five segments with the first four segments carrying 1000 bytes as well as the last segment carrying 2000 bytes?
The subsequent shows the sequence number for each segment
Segment 1-- sequence number 10 010 (range: 10010 to 11009)
Segment 2-- sequence number 11 010 (range: 11010 to 12009)
Segment 3-- sequence number 12 010 (range: 12010 to 13009)
Segment 4-- sequence number 13 010 (range: 13010 to 14009)
Segment 5-- sequence number 14 010 (range: 14010 to 16009)
Error detection and correction The digital traffic stream of second generation systems also lends itself to the use of error detection and correction methods. The result can be
Address is a full unique identifier. Connectionless delivery needs address on every packet. Connection-oriented delivery may use a short hand that shows the connection rather th
LRC - Performance Detects every burst errors up to length n (number of columns) If two bits in one data unit are damaged as well as two bits in exactly same positions
Synchronous Synchronous traffic is able to consume a portion of the 100 Mbps total bandwidth of an FDDI network while asynchronous traffic can consume the rest. Synchronous
Explain the working of Transceivers Transceivers are used to connect nodes to the several Ethernet media. Most computers and network interface cards having a built-in 10BaseT o
Q. Illustrate Nonboundary-Level Masking with example? Nonboundary-Level Masking Example IP address 45 123 21 8 Mask 255 192 0 0 Subnet 45 64 0 0 123 0
The Internet Layer The internet layer is responsible for routing the data packets to the appropriate destination. Internet protocol (IP) is responsible for ensuring dat
no ip domain-lookupcommand is use to disable domain lookup
1. A systematic study of failures will help in identifying areas that may cause : i. Loss of adjacent parts/ equipment/ whole equipment. ii. Loss of production and rev
What is EGP (Exterior Gateway Protocol)? It is the protocol the routers in neighboring autonomous systems use to recognize the set of networks that can be reached within or by
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd