Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is Ring Topology?
The physical ring topology is a circular loop of point-to-point links. Every device connects directly to the ring or indirectly by and interface device or drop cable. Message travel around the ring from node to node in a very organized manner. Every workstation checks the message for a matching destination address. If the address doesn't match the node easily regenerates the message and sends it on its way. If the address matches, the node accepts the message and sends a reply to the originating sender.
Name the OSI layer which performs code conversion, code formatting and encryption Ans) Presentation layer performs code conversion, code formatting and encryption
Can you describe Active and Passive route?
What is anonymous FTP? Anonymous FTP is a way of granting user access to files in public servers. Users that are permitted access to data in these servers do not require identi
Q. What is Bus Topology? Multipoint configuration One cable acts like a backbone to link all devices Advantages: Effortlessness of installation and less cabling
Computer Networks 1. Write about different network structures in use. 2. Explain the architecture and usage of ISDN. 3. Describe the concept of framing in Data Link Layer
What is CRC and Checksum CRC (Cyclic redudancy check) CRC, is the most powerful of the redundancy checking methods, is based on binary division. Checksum Checksum
Q. Working of TCP - buffers? TCP - buffers Sending & receiving buffers - Processes don't consume data at the same speed Sending site: - White section: unfilled
What are the Unix-based firewalls The Unix-based firewalls are considered most secured as compared to the Windows NT based ones. The firewalls bind the holes of the operating
Which switching technology can decrease the size of a broadcast domain? Ans) VLAN's are logical ways to break up a huge broadcast domain. To get from VLAN to VLAN you must ha
Determine the disadvantages of SOCKS protocol The main problem with SOCKS is that it lacks transparency to software developers and users. Implementation requires a change to
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd