Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
a) Consider that a host is sending a frame of 1200 bytes to another host found 20 Kilometers away. (Assume that switching delay is negligible)
i) Calculate the total latency (from the first bit transmitted by sending host to the last bit buffered by receiving host) on a 100Base-FX Ethernet network with a "store-and-forward" switch in the path. Assume that the link introduces a propagation delay of 2 x 108m/s and that the switch begins retransmitting immediately after it has finished buffering the frame completely.
ii) Same as (i) but assume that the switch implements "cut-through": it is able to begin retransmitting the frame as soon as the first 100 bits have been buffered.
iii) Give a suitable type of transmission media that can be used for this communication.
Explain the working of ISDN Stands for Integrated Services Digital Network. It is a way to move more data over existing regular phone lines. ISDN is rapidly becoming availab
Explain the Acknowledged connectionless service This is a cross between the previous two services. It provides that datagrams are to be acknowledged, but no prior logical conne
Q. Explain Types of Redundancy Checks? Parity Check Simple Parity Check Two Dimensional Parity Check / Longitudinal Redundancy Check (LRC) CRC (Cyclic Redund
You are designing a network for a retail customer; they plan to have 5 locations initially with the main store acting as the warehousing depot. Within the next year they are plann
Communication, Resource sharing and Media (When many host share their resources with every other OR when many devices connect with each other for resource sharing )
Recognize the two commands that copies the configuration in NVRAM to RAM Ans) a) Copy startup-config running-config b) Configure memory
Post Office Protocols Version In computing the post office protocol version 3 (POP3) is an application layer internet standard protocols used by local e mail clients
Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o
Write discussion on Associative mapping - computer architecture.
What is Bookmark A list of pages a user likes to frequently visit. Netscape® Navigator and Explorer® have a "bookmark" menu item which allows users to add favourite sites vi
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd