Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question :
(a) Describe, with the aid of a diagram, a hybrid topology of a network of your choice.
(b) Briefly explain the similarity and differences between a switch and a hub.
(c) How is the TCP/IP reference model different from the OSI reference model? And why is the TCP/IP model widely used?
(d) "HTTP is stateless". Discuss this statement.
(e) Given that a webpage consists of 2 pictures and 1 animation, what would be the Response Time, in terms of RTT, if HTTP 1.1 is used to load the complete webpage?
(f) Your service has been called for as a network designer for a high-tech LAN to be set up in a new branch of an offshore company. The local service provider has assigned the following to you: Network ID = 203.122.0.0 and Subnet Mask = 255.255.240.0.
The manager of the offshore company requires you to create two subnets A and B for the LAN.
(i) Specify the Subnet Mask after the borrowing the subnet bits. (ii) Specify the Broadcast Address and Network Address of subnets A and B. (iii) Evaluate the range of IP addresses for subnets A and B. (iv) Specify the IP address of the 17th Host in the 2nd Subnet.
Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij
Recognize the two commands that copies the configuration in NVRAM to RAM Ans) a) Copy startup-config running-config b) Configure memory
PARTS COUNT METHOD This prediction method is applicable at preliminary stages, during bid proposal and early design phases; when insufficient information is available regardin
Q. Show the properties of Microwaves? Microwaves - Frequencies among 1 and 300 GHz - Unidirectional - Narrow focus requires sending as well as receiving antennas to
Classification of Access Networks Access networks can loosely be classified into three categories 1. Residential Access 2. Company Access 3. Wireless Access
In reg-mem architecture, clock cycle is 10 ns wide. It is proposed that reg-reg architecture be used instead, that reduces the clock cycle by 2 ns. However, it requires an addition
Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re
What is usage of Sequence Number in Reliable Transmission? The protocol specifies that frames need to be numbered. This is done by using sequence numbers. A field is added to t
The major features of TCP are following: Reliability : TCP ensures that any data sent by a sender arrives at the destination as it was sent. There cannot be any data loss or mo
State the methods to keep the attackers at bay Another best methods to keep the attackers at bay is known as network address translator or NAT. The philosophy behind the design
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd