Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Virtual Circuit Switching?
Virtual Circuit Switching
- All packets belong to a message (or) session is preserved.
- Single route is selected between source/destination.
- All packets obtain that route to reach destination.
- It requires a call setup to establish a virtual circuit. (Either permanent or switched type)
- Uses virtual circuit identifier for routing.
Q. Describe about Packet Switching? Packet Switching - Data are transmitted in separate units - Called Packet - Packets are variable length blocks - The max leng
Q. What is Source Routing? Source Routing - Sender of packet defines bridges and routes that packet should take - Complete path of bridge IDs and destination address i
State the congestion avoidance process Notifies the source that congestion avoidance process should be initiated where applicable for traffic in the opposite direction of the r
Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric
State the difference between Byte streams and message Byte streams and message are different. In a message stream, network keeps track of the message boundaries. In a byte stre
Distance covered, Based on size, ownership and physical architecture - LAN (Local Area Network) - Suitable for smaller geographical area - MAN (Metropolitan Area Network) - S
NETWORK MANAGEMENT & SECURITY 1. Describe a basic communication model. 2. State the following terms: a. Configuration Management b. Fault Management c. Security Management
Acknowledgment number This 32 bit field defines the byte number that the from the segment is expecting to receive the segment is expecting to receive from the other par
The distance over which data moves within a computer may differ from a few thousandths of an inch, as is the case within a one IC chip, to as much as lot of feet along the backplan
Disadvantages of IP sec Tunnelling mode IP sec tunnelling mode has the following disadvantage a.Encryption of small packets generates a lot networks over head thu
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd