Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Show the Responsibilities of session layer?
Session layer: Main functions of this layer are to establish, synchronize and maintain the interaction between two communication hosts. It ensures that once a session is established it should be closed gracefully. It also checks and establishes connections between hosts of two different users. Session layer also decides whether both users can send and receive data at the same time or whether only one host can send and the other can receive. Responsibilities of session layer are:
• Sessions and sub sessions: This layer divides a session into sub session for avoiding retransmission of whole message by adding checkpoint feature.
• Synchronization: This layer decides the order in which data needs to be passed to transport layer.
• Dialog control: this layer also decides which user application transmits data and at what point of time and whether communication is simplex, full duplex or half duplex.
• Session closure: this layer makes sure that session between hosts is closed gracefully.
can i get the comparison of microprocessors architecture?
Uniform Path Cost Search - artificial intelligence: A breadth first search will find the solution with the shortest path length from the initial state to the goal state. In fa
Q. Explain about Parity bit? Parity bit is an error detection bit added to binary data such that it creates total number of 1's in the data either odd or even. For illustration
What is schedulers? A process migrates between the various scheduling queues throughout its life time. The OS must select processes from these queues in some fashion. This sel
There are two goals to AI; the major one is to produce an artificial system that is about as good as or good than a human being at dealing with the actual world. The second goal is
Explain the Communications of Request/Response Communications requirements for message or procedural- based interaction are very similar. Application interaction (client-server
1. Insert the following characters with their respective priorities (shown as ordered pairs) into an empty treap: (K, 17), (F, 22), (P, 29), (M, 10), (N, 15), (L, 26), (G, 13),
What are priority Queues? There are many queues in which we can insert items or delete items from any of the position based on some property. Now, those queues based on the pro
What is Public Key Cryptography Public-key cryptography is a form of modern cryptography which permits users to communicate safely without lastly agreeing on a shared secret
How it is useful in real scenario???
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd