What is passive topology , Computer Networking

Assignment Help:

When the computers on the network basically listen and receive the signal, they are referred to as passive due to they don't amplify the signal in any way.

 


Related Discussions:- What is passive topology

What do you mean by modems, Q. What do you mean by Modems? Telephone M...

Q. What do you mean by Modems? Telephone Modems - A telephone line has a bandwidth of approximately 2400 Hz for data transmission

Enumerate the various internetworking facility, Enumerate the various inter...

Enumerate the various internetworking facility 1.) Give a link among networks. At minimum, a physical and link control connection is required.   (2) Provide for the routing

Shared variable programme structures, Shared variable programme structures ...

Shared variable programme structures  In this section, we talk about some more concepts related to the shared programme. Concept of Lock Locks are used for protected a

Data mining, The following DNA sequences are extracted from promoter region...

The following DNA sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor (TF). The nucleotide segments capitalized in the giv

Show the vulnerability of the internet, Q. Show the Vulnerability of the In...

Q. Show the Vulnerability of the Internet? More vulnerable than private network. Wide inter-network connection. Easy access by mass public world-wide. Lack of build in

Timesharing system, advantages and disadvantages of time sharing system

advantages and disadvantages of time sharing system

Focus of reliability control, Q. Focus of Reliability Control? - Implem...

Q. Focus of Reliability Control? - Implementation of the OSI model puts emphasis on providing a reliable data transfer service while the TCP/IP model treats reliability as an e

Describe in detail with example how data fragmentation works, Describe in d...

Describe in detail with example how data fragmentation works?

Circuit switched and packet-switched mode for sending a file, Two hosts are...

Two hosts are connected by a path made of four links as shown in the figure below. The links are of data rate R = 2 Mbps each. Host A has a file of size F = 1,000,000 bytes to tran

What command do we use to disable domain lookup, no ip domain-lookupcommand...

no ip domain-lookupcommand is use to disable domain lookup

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd