Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Comparing Transport for TCP/IP and osi model?
- The features of TCP and UDP defined at TCP/IP Transport Layer correspond to many of the requirements of the OSI Transport Layer.
- There is a bit of bleed over for needs in the session layer of OSI since sequence numbers and port values can help to permit the Operating System to keep track of sessions however most of the UDP and TCP functions and specifications map to the OSI Transport Layer.
- The TCP/IP as well as OSI architecture models both employ all connection and connectionless models at transport layer.
- Nevertheless the internet architecture refers to the two models in TCP/IP as simply -connections? and datagram.
- However the OSI reference model with its penchant for -precise? terminology utilizes the terms connection-mode and connection-oriented for the connection model and the term connectionless-mode for the connectionless model.
User Datagram Protocol - UDP is a connectionless oriented transport protocol for use when the upper layers give error-recovery and reliability. UDP does not series data or re-assem
Q. Describe Differential Manchester? - Inversion at middle of bit interval is utilized for synchronization - Presence or else absence of additional transition at beginning o
What is Wireless Application Protocol?
What is Sliding Window? The sliding window is an abstract method that explains the range of sequence numbers that is the concern of the sender and receiver. In other words, he
what are the terms CSU, DSU and TSU?
Q. Explain about Nonboundary-Level Masking? Nonboundary-Level Masking Bytes in the IP address that correspond to 255 in the mask will be repeated in the subnet addres
what role would you assign for Pentium iii, 500 MHz processor, 256 MB memory, 1o GB hard drive
Enable Wireless Security Step : Configure Windows to use WEP authentication. Navigate to the Network Connections page again and right-click the Wireless Network Connection
Delivering message through LAN: We have to devise method for delivering message through LAN phase to single, specific destination device. Sending device uses a hardware addres
Notice repetition of information in routing table for node 1 as given above in the figure. We can see that switch has only outgoing connection, all traffic must goes that connec
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd