Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
(a) Show by means of a diagram the Ethernet frame structure and describe the six fields of the Ethernet frame structure.
(b) Explain the operation of the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) contention technique used by Ethernet.
(c) Explain the characteristics of CSMA/CD in terms of:
i. Order of transmission. ii. Length of wait time before transmission takes place. iii. Network saturation. iv. Capture effect.
(d) What is the purpose of the terminator at each end of a bus in a bus topology.
(e) Explain the operation of a Token Ring topology for a LAN. Your answer should include
i. A description of the token passing process. ii. The specific IEEE standard. iii. The problems inherent with a ring topology.
What is the difference between routable and non- routable protocols? Ans) Routable protocols can work with a router and can be used to build huge networks. Non-Routable protocol
Internet Mail Access Protocol Another mail access protocols is internet mail access protocols version 4 ( IMAP4). IMAP4 is similar to POP3 but it has more feature
As in PRAM, there was no direct communication medium among the processors, therefore another model called as interconnection networks have been designed. In the interconnection net
List of protocols in Network topology,
A fairly renowned approach in this area is OpenMP, a recently developed industry standard for shared memory programming on architectures with uniform memory access characteristics.
LOW-Earth Orbiting have more advantageous in Mobile based communication devices like PDAs, Cell phones and automobile communications. The LOW-Earth Orbiting is a satellite of orbit
Question 1 Discuss the following Evolution of Data Communication Elements of Data Communication System Question 2 Explain the following
Security risks present on the networks Lots of risks are present everywhere on Internet as well as on Intranet, if it is not known what is being done. Every day a number of
The disadvantages and advantages of Private and Public networks are shown in the table below:
What are the two types of Transmission technologies, basis on which computer networks can be categorized? Broadly there are two types of transmission technology: 1. Broadc
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd