Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain Difference between broadcast domain and collision domain?
Ans) Broadcast Domain
Send the packet to all the Present Network
IT might be send by the person
It might broadcast by the switch when the address not found in the Network.
For breaking broadcast domain we can Use Router
Collision Domain:
Broadcast Domain is the area where when single device in the network sends the data or packet it will received by all the devices present over the network.
DISTANCE-VECTOR ROUTING: It is easy to implement. Packet switch modifies its own routing table first. It is used in RIP. LINK-STATE ALGORITHM: It is ve
Can you define what IPSec is?
Q. What is Source Routing? Source Routing - Sender of packet defines bridges and routes that packet should take - Complete path of bridge IDs and destination address i
Recognize the command to show the status of the Frame Relay virtual circuit Ans) Router# show frame-relay pvc
Star Topology Devoted point-to-point links to central controller (hub) Controller acts like exchange Advantages - Less expensive - Robustness Disadv
SONET STS SONET defines a hierarchy of signalling levels called as STSs (Synchronous Transport Signals). Every STS level supports a certain data rate specified in megabits p
Q Illustrate Unipolar line coding? - Simplest method is inexpensive - Utilizes only one voltage level - Polarity is habitually assigned to binary 1 a 0 is represented by
State the reason for Intranet system breaks down Care must be taken to ensure that proper spare parts are available even after about five years of commissioning. In addition t
Simple Mail Transfer Protocols (SMTP) The application layer protocols for electronic mail is SMTP( Simple mail transfer protocols). Internet electronic mail has man
Question: a) The cpio utility has three operating modes. What are they? b) The characters of the permission string are broken up into three groups of three characters. Ex
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd