Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Link Layer
To move to packet from one node( host or packet swtich0 to net node in the route the network layer relies on the services of the link layer. Particularly at each node the network layer passes the datagram down to the link layer which delivers the datagram to the next node along the route the link layer passes the datagram up to the network layer.
The services provided by the link layer depend the specific link layer protocol that is employed over the link. For example some protocol provide delivery on a link basis that is from transmitting node over link to receiving node. Note that this reliable delivery service is different from the reliable delivery service of TCP, which provides reliable delivery from one end system to another. Example of link layers include Ethernet and the point to point protocol (PPP). As Datagram's typically need to traverse several links to travel from sources to destination a datagram's may be handle by different link layer protocol at different links along its route. For example a datagram may be handled by Ethernet on one link and by PPP on the next link. The network layer will receive a different service from each of the different link layer protocols. Link layer packets are known as frames.
MAC address called Physical address Because it's not changeable
Q. Define Unicast - Multicast and Reserved Addresses? Unicast, Multicast, and Reserved Addresses Unicast address - identifies a specific device Multicast address
Determine the rate of communication line The dog could carry 21 gigabytes or 168 gigabits. A speed of 18 km/hour that is equal to 0.005 km/sec. The time to travel the distance
Q. What is Bus Topology? Multipoint configuration One cable acts like a backbone to link all devices Advantages: Effortlessness of installation and less cabling
What are General Middleware? It contains the communication stacks, authentication services, distributed directories, network time, RPC, Queuing services with the network OS ext
FIBER OPTIC EXTENSION: The LAN extension using fiber optic is given in the figure below: Figure The fiber-modem translates digital data into pulses of light the
The are various limitations of employing Wireless LAN technology in any multistory building in middle of Melbourne or any other big city are: • Range: The main problem of Wire
Time out Timers are used to protect against lost packet. Each packet must have its own logical timers since only a single packet will be retransmitted after timeou
Shortest path The dijkstra algorithms four steps to discover what it called the shortest path tree . a.The algorithm beings to build the tree identifying its root.
802.11b HR DSSS a) High-rate DSSS using a 2.4 GHz band b) Similar to DSSS excluding for encoding method c) Uses complementary code keying (CCK), encoding 4 or 8 bits to
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd