Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
CYCLE OF BRIDGES:
A bridges network can join several segments. One bridge is useded to connect every segment to the rest of the bridge network. This is given in the figure below:
DISTRIBUTED SPANNING TREE:
If a bridge network creates a cycle, then not all bridges on the network have be allowed to forward broadcast packets.
The bridges configure themselves automatically to select which bridge will forward broadcast frames and which bridge will not forward packets. The bridges interact with each other on the network and use Distributed Spanning Tree (DST) algorithm to select which bridge will not forward frames if a cycle happens.
a) Peer-to-Peer Network Computers can act as both servers sharing resources and as clients using the resources. b) Server-based Network Give centralized control of netwo
introduction
What is a private IP address? Private IP addresses are allocated for use on intranets. These addresses are used for internal networks and are not routable on external public ne
Q. Explain about Domain Name System? -In the past, mapping of IP addresses was static using a host file -Impossible in today's dynamic environment -Domain Name System (DN
10Base2 an Ethernet term meaning a maximum transmitting rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 200 meters (185mts).
Quetion: A 22 nF capacitor is initially charged to 10V. It is then discharged by connecting a 100kW resistor across it. Approximately how long does it take for the voltage on t
Take the maximum packet lifetime, T. It's stated that T must be big enough to make sure the packet and its ACK have vanished. Why do we have to have the ACK?
The compression protocols for PPP are:- A. Stac B. Predictor
Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij
WAN interface card(WIC) slots Two fixed WIC slots are present in 2600 series router except 2691. It has contained 3 WIC slots. Network Module Expansion Slot( NM) slot
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd