Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is the different type of networking / internetworking devices?
Repeater:
Also called a regenerator, it is an electronic device that operates only at physical layer. It takes the signal in the network before it becomes weak, regenerates the original bit pattern and gets the refreshed copy back in to the link.
Bridges:
These operate both in the physical and data link layers of LANs of similar type. They separate a larger network in to smaller segments. They have logic that permit them to keep the traffic for each segment separate and therefore are repeaters that relay a frame only the side of the segment having the intended recipient and control congestion.
Routers:
They relay packets between multiple interconnected networks (i.e. LANs of dissimilar type). They operate in the physical, data link and network layers. They had software that enables them to determine which of the various possible paths is the best for a particular transmission. Gateways: They relay packets among networks that have different protocols (e.g. among a LAN and a WAN). They accept a packet formatted for one protocol and change it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.
Q. Show the Character-level Encryption? - Substitutional - Monoalphabetic - simplest form; also called Caesar cipher - Every character is replaced with another character
Repeater Repeater is also named as active hub operates at physical layer of OSI model. Repeater is an electronic device that simply regenerates the signal. Signals travell
It is a basic quantitative property of networks. Delay is a calculate how long it takes for a bit of data to cross across the network from one end to the other. It is calculated in
Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det
Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data
features
Identify the purpose of the TCP three step handshakes Ans) The three step handshake establishes the parameters needed for a TCP connection. During the handshake process series n
How is route table populated by RIP protocol?
As• New Content (Week 5) o System Integration Implementation Plan ? Develop a detailed implementation plan that captures the following (address 4 of these): ? Testing activitie
What is the major issue with routing by rumor?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd