Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Flow control in TCP?
- Byte oriented
If no window a sender is able to send all bytes without regarding the condition of the receiver
- If data are consumed too gradually then receiver buffer becomes full - drop the packet (retransmit)
- The sender should adjust itself to the number of the free locations in the receiver buffer
Receiver window
Define the term - public knowledge information It is essential to distinguish between public knowledge information and the more detailed pieces of information relating to spec
Q. Resolution of domain name system? - Mapping a name to an address or else an address to a name - Resolver is a DNS client used by an address to provide mapping - In re
What is subnet mask? A subnet mask is combined with an IP address in order to recognize two parts: the extended network address and the host address. Such as an IP address, a s
To monitor ipx traffic on a network, what command would we use? Ans) show ipx traffic
How does a Token-Passing Protocol works? The token-passing protocol relies on a control signal known as the token. A token is a 24-bit packet that circulates throughout the net
Q. Explain about Multiplicative Decrease ? Multiplicative Decrease (MD) if a time-out take places the threshold is set to one maximum segment size (TCP Tahoe, TCP Reno).
The most difficult representatives of shared memory programming models are thread libraries present in mainly of the modern operating systems. Some examples for thread libraries ar
Briefly describe NAT and RIP NAT is Network Address Translation. This is a protocol that gives a way for multiple computers on a common network to share one connection to the I
What is Uniform Resource Locator Address of location for accessing Web pages. Clicking on an icon or "hot text" is the most common means of accessing and using a URL. Typing
The project idea is : Analyze Snort or PCAP data from a public WIFI hotspot (describe traffice seen and what it is, protocols, ports, etc). This is what is expected. Initially r
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd