Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
BRIDGES:
A bridge is a hardware device also needed to connect two LAN code segments to extend a LAN. A bridge uses two NICs to connect two code segments. It listens to all traffic and knows frame format. It also transfers only correct complete frames and removed the collided and error frames.
A typical bridge has two NICs, a CPU a storage and a ROM. It only executes the code stored in its ROM.
STARTUP AND STEADY STATE:
When a bridge first lodes the address lists are empty. The bridge forwards frames to the other code segment if it may not know its destination address in its lists.
After period of time when the bridge has accepted at least one frame from each computer, it has the lists created it forwards frames as far it is useful.
PLANNING A BRIDGE NETWORK:
In a steady state, a bridge gives simultaneous use of every segment. When designing a LAN, bridges may be installed to convert the LAN into segments to enhance performance.
For example: Frequently contacting devices may be attached to the similar segment. The frame traffic on one segment does not affect the other code segments.
Q. Example on Multiplicative Decrease? w = 1 for (each new ACK received) w = w+1 until (loss detected or w >= ssthresh) Not so slow - Exponential increase
State about transcontinental ?ber A transcontinental ?ber link may have many gigabits/sec of the bandwidth, but latency will also be high due to speed of light propagation abov
There are two types of ends in WAN (1)DTE (DATA TERMINAL EQUIPMENT) (2)DCE(DATA COMMUNICATION EQUIPMENT)
ARP sent the request in broadcast, response is unicast When a source sends ARP request the switch broadcast the ARP req. if it doesn't have the destination mac address in its ma
Post Office Protocol and Lightweight Directory Access Protocol POP: Post Office Protocol is a used by mail clients to download messages from a mail server on the Internet. L
Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser
The progress of any industry and indeed countries as well, today is linked to the effective performance of its equipments, processes and systems. Reliability engineering, not only
Connection Establishment TCP transmits data in full duplex mode. When two TCP is two machines are connected they are able to send segments to each other simultaneously. This
DNS ID hacking The Dns use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In orde
implementing cnet sliding window protocol with 6 nodes
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd