Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What is network layer of osi model?
- Describe end-to-end delivery of packets.
- Defines logical addressing thus that any endpoint can be identified.
- Defines how routing works as well as how routes are learned thus that the packets can be delivered.
- The network layer as well defines how to fragment a packet into smaller packets to accommodate different media.
- Routers work at Layer 3.
- Instances - IPX, IP and AppleTalk.
ETHERNET FIELDS: In Ethernet fields the preamble and CRC is usually not given in frame. The destination address of each is the broadcast address. There is special value reser
Explain Persistence timer? To deal with the zero-size windows What if a receiver advertises that the window size is 0 (by sending ACK) and this ACK is lost? - A
Point out the disadvantages of Ring Topology. The drawbacks of ring topologies are: a. It is considerably complex to install and reconfigure ring topology b. Media failur
Transparent Bridges & Learning Bridges - Builds table by examining destination as well as source address of each packet it receives - Learning bridges - If address is not
Q Illustrate Return to Zero encoding? - In NRZ-I long strings of 0s may still be a problem - May comprise synchronization as part of the signal for both 1s and 0s - How?
Selective Repeat (SR) Selective repeats is a connection oriented protocols in which transmitter and receiver have a window of sequence numbers. SR scheme avoids the unne
Question Approximately what is the low frequency cut-off of the band-pass filter shown in the figure?
What is Client/Server? Clients and Servers are part logical entities that work together over a network to accomplish a task. Lots of systems with very dissimilar architectures
Why it is necessary to have layering in a network? A computer network is a very complex system. It becomes very difficult to execute as a single entity. The layered approach di
State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd