Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Mesh Topology?
- Dedicated point-to-point links to each other device
- n (n-1)/2 links an every device will have n-1 I/O ports
- Advantages
- Dedicated links - no traffic problems
- Robust
- Privacy/Security
- Easy fault identification as well as isolation
- Disadvantages
- Additional amount of cabling and I/O ports requirement
- Installation as well as reconnection is difficult
- Expensive
Q. Calculate Utilization percentage of the link? - System: Stop and wait ARQ - Bandwidth: 1Mbps - Round trip for one bit: 20ms - Frame length: 1000 bits Utilizatio
TP Monitor does mainly two things extremely well. They are Process management and Transaction management? They were originally introduced to run classes of applications that co
What is meant by Middleware? Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle
Link State Packet When a router floods the network with information about its neighbourhood. It is said to be advertising. The basis of this advertising is a short pack
Recognize the command to disable CDP on an interface Ans) Router(config-if)# no cdp enable
advantage og stored program control automation
What to do to connection with external communication For dealing with external communication, the Web server must have a static IP. Having a static IP could also be a problemat
TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOLOGY: It is described by the specific network technology. PHYSICL TOPOLOGY: It relays on the wiring scheme. NE
Q. What is data link of osi model? - The data link layer offers access to the networking media and physical transmission across the media and this enables the data to locate it
Command Structure: Commands are all-upper-case strings, either 4 or 6 characters in length. Table 1 shows the commands, and (for method commands) the parameters, return values, ex
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd