Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Computer Networks
1. Differentiate WAN and LAN.
2. Describe the TCP/IP Reference Model with diagram.
3. Explain Circuit switching and message switching.
4. List the functions of (i) Routers (iii) Bridges.
5. State the terms Error Detection and Correction with respect to Data Transmission. Also describe the following concepts with respect to Error Detection and Correction:
a. Parity Bits b. Cyclic Redundancy Check
6. Write short notes on
(i) Non-Persistent CSMA (ii) 1-Persistent CSMA (iii) P - Persistent CSMA.
Describe unbound transmission media. Unbound transmission media are the media of transmitting data without using any cables. These are not bounded by any physical geography. Ex
Explain the terms - LAN extension and Ad hoc network LAN extension: a wireless LAN integrated with a wired LAN to extend the coverage area of the LAN complex; Cross-building
What is Telnet It is a protocol or set of rules that uses to connect one computer to another computer in network. It is also called as a remote login. The telnet operates on cl
What is the difference between routable and non- routable protocols? Routable protocols can work with a router and can be used to make huge networks. Non-Routable protocols
Can you describe the concept of IP multicasting or multicast IP address?
Mean node-node path The mean node-node path is two times the mean node-root path. Number the levels of the tree with the root as 1 and the deepest level as N. The path from t
Internet Mail Access Protocol Another mail access protocols is internet mail access protocols version 4 ( IMAP4). IMAP4 is similar to POP3 but it has more feature
What are TP-Lite and TP-Heavy Monitors? Ans) TP-Lite is simply the integration of TP Monitor functions in the database engines.TP-Heavy are TP Monitors which handles the Client/
What is mesh network? A network in which there are many network links among computers to provide multiple paths for data to travel.
How does the cut-through switching technique work? Ans) Cut-Through switching copies only the destination address which is the first 6 bytes after the =frame preamble into its b
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd