Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain IBM's SNA Architecture
SNA is a computer networking architecture that was formed by IBM to give a network structure for IBM mainframe, midrange, and personal computer systems. SNA explains a set of proprietary communication protocols and message formats for the exchange and management of data on IBM host networks.
NICs AND NETWORK HARDWARE: NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot b
What are reasons behind using layered protocols Reasons for using layered protocols, using them leads to breaking up design problem into smaller more manageable pieces and lay
Q.Role of Host System? Hosts on OSI implementations don't handle network operations (simple terminal) but TCP/IP hosts participate in most network protocols. TCP/IP hosts do su
Q. Show the Data Encryption Standard? Data Encryption Standard - Bit-level encryption method designed by IBM - Adopted as standard for nonmilitary and nonclassified us
Q. Define the Network Security? The Internet and Web technology presents enormous promise for e-commerce. Web now is used to handle important business assets that became the
What are gateways? Gateways give connectivity among two or more network segments. It is usually a computer that runs the gateway software and gives translation services. This t
(a ) Std "A" 16.4 m C-BAND EARTH STATION (1996) This is the main system of this station and provides connectivity to most of the countries through dedicated transponder channe
As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans) the authentication method
Take the maximum packet lifetime, T. It's stated that T must be big enough to make sure the packet and its ACK have vanished. Why do we have to have the ACK?
NetWare IPX addressing uses a network number and a node number. Which statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digi
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd