Already have an account? Get multiple benefits of using own account!
Login in your account..!
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Class B or SAS (single-attachment stations) attach to one ring Class A or DAS (dual attachment stations) attach to both rings.
SASs is attached to the primary ring by a concentrator which provides connections for multiple SASs. The concentrator makes sure that a failure or power down of any given SAS doesn't interrupt the ring. This is particularly useful when PCs or similar devices that frequently power on and off connect to the ring.
Every FDDI DAS has two ports designated A and B. These ports connect the station to the dual FDDI ring so each port provides a connection for both the primary and the secondary ring.
Describe in proper details about OSI Model ? Explain the functions and protocols and services of each layer ?
Q. Which steps are used at receiver end by check sum? The receiver follows these steps: The unit is divided into "k" sections each of "n" bits All sections are
Name the basic components of the router?
Question 1 Discuss the following Switching Mechanisms- Circuit switching Message switching Packet switching Question 2 Discuss the following IEEE standard
Commands SMTP uses commands and response to transfer message between a client and a server. Each commands or reply is terminated by a two character ( carriage re
Measure the performance (both latency and throughput) of TCP and UDP protocol stack running on a pair of PCs or Workstations in the Lab, and compare the results of your software
The term signaling is used to define communication about the network, as opposed to interaction that just uses the network. A computer uses signaling with reserved VCI/VPI numbe
MAC (media access control) and LLC (logical link control) are both layer 2 protocols.
Features 1. Simple to install; 2. Simple to configure; 3. Multiple applications from one user can implement; 4. Multiple users can each use PVM concurrently; 5. C, C++, and
What is ESP (Encapsulating Security Payload)?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd