Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Mesh Topology?
- Dedicated point-to-point links to each other device
- n (n-1)/2 links an every device will have n-1 I/O ports
- Advantages
- Dedicated links - no traffic problems
- Robust
- Privacy/Security
- Easy fault identification as well as isolation
- Disadvantages
- Additional amount of cabling and I/O ports requirement
- Installation as well as reconnection is difficult
- Expensive
What are the Access methods used in LAN: i. Switched access: It is used in LANs which are assigned around CBXs. Electronic switching is techniques are used to provide access
What is the difference between routable and non- routable protocols? Ans) Routable protocols can work with a router and can be used to build huge networks. Non-Routable protocol
Determine about the infrared spectrum (1) The spectrum for infrared is virtually unlimited, which shows the possibility of achieving extremely high data rates. (2) The infra
What are TP-Lite and TP-Heavy Monitors? Ans) TP-Lite is simply the integration of TP Monitor functions in the database engines.TP-Heavy are TP Monitors which handles the Client/
Question 1 Distinguish CISC and RISC Question 2 Write a short note on Asynchronous Transfer Mode of transmission Question 3 Explain various client/server applications using Ja
• This device creates one big collision domain and one large broadcast domain.
Throughput is a calculate of the rate at which data can be transmit through the network. The throughput capability of the underlying hardware is known bandwidth. Because every fram
You are designing a network for a retail customer; they plan to have 5 locations initially with the main store acting as the warehousing depot. Within the next year they are plann
Question: a) Consider the following MIP scenario. Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet. i. Discu
DNS Tunneling – Domain Name Server "If, on one system, it is possible to transmit bits to another in any form, and in turn receive a reply as a result of that transmission, th
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd