Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
How do you account for higher scalability and reliability of computer network?
Ans: Computer network will have a large number of computers, which can share database, software and other resources. In the event of failure of one computer, its workload will be taken over by other computers. So, it gives higher reliability than centralized computing system.
Requirement of software, database, hardware etc. increases gradually. In centralized computing system, if one computer is not able to serve the purpose, we have to replace it by new one. Replacement of new computer needs lot of investment and effort, which will be avoided in computer network system. If there is require for more, one can buy another powerful computer, add it to computer network and utilize it. The several resources like computers, peripherals, etc. will be added in a scalable manner.
What is the basic difference between latches and flip flops? Ans) flip flops have clock signal whereas latches dont require anyclock pulse..
Time out Timers are used to protect against lost packet. Each packet must have its own logical timers since only a single packet will be retransmitted after timeou
State how the different IP-QoS needs for controling traffic, data and voice applications can be supported in your technology choice from Q7. Describe the specific IP-QoS schemes -
Enumerate the various internetworking facility 1.) Give a link among networks. At minimum, a physical and link control connection is required. (2) Provide for the routing
Q. Basic working of Spanning Tree? Spanning Tree - Redundant bridges may be installed to provide reliability - To prevent infinite looping of packets between bridges,
What does a Standard IP Access-list use as test criteria Ans) Standard IP access list use only source address.
What is Piggy Backing? A process called piggybacking is used to get better the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also
Name the two commands that save the running-config to a TFTP server Ans) Two commands are:- a) copy running tftp b) write network
Describe the literal meaning of the term Intranet The literal meaning of the term Intranet as given in various dictionaries is as follows: In' tra net - n. 1) A network
The IP class procedure does not split the 32-bit address space into same size class and the classes do not have the same value of networks. A prefix of n bits gives 2n unique ne
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd