Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What is data link of osi model?
- The data link layer offers access to the networking media and physical transmission across the media and this enables the data to locate its intended destination on a network.
- The data link layer offers reliable transit of data across a physical link by using the Media Access Control (MAC) addresses.
- The data link layer utilizes the MAC address to define a hardware or data link address in order for multiple stations to share the same medium and still uniquely identify each other.
- Concerned with network access, network topology, error notification, ordered delivery of frames and flow control.
- Instances Frame Relay, Ethernet and FDDI
What is the Terminal Emulation, in which layer it comes? Ans) The use of software, installed on PC or LAN server, that permits the PC to function as if it were dumb terminal dir
QUESTION (a) Four important benefits of Multi-Agent Systems are modularity, efficiency, reliability and flexibility. Briefly explain these benefits (b) Agents work together
Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which
Transmission Control Protocol - TCP is a connection oriented transport layer protocol with built unreliability. It considers a large block of data and breaks it down into segments
Domain Name A domain name is a way to recognize and locate computers connected to the Internet. This is a text name of a computer in network or Internet. Domain names are chan
What is the implication of increasing and decreasing subnet Bits?
Q1. What advantages do you see in having a layered concept of computer networks? Which layers or OSI structure deals with identification of a host? Explain the proces
Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut
What is Round Trip Time? The duration of time it takes to send a message from one end of a network to the other and back, is known as RTT.
Can you describe RSVP?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd