Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Computer Networks
1. Differentiate WAN and LAN.
2. Describe the TCP/IP Reference Model with diagram.
3. Explain Circuit switching and message switching.
4. List the functions of (i) Routers (iii) Bridges.
5. State the terms Error Detection and Correction with respect to Data Transmission. Also describe the following concepts with respect to Error Detection and Correction:
a. Parity Bits b. Cyclic Redundancy Check
6. Write short notes on
(i) Non-Persistent CSMA (ii) 1-Persistent CSMA (iii) P - Persistent CSMA.
Computer Networks A computer networks can be defined as set of computer that interact among the individual computers sharing resources or information. Reference models
Transparent Bridges & Learning Bridges - Builds table by examining destination as well as source address of each packet it receives - Learning bridges - If address is not
INTERNETWORKING - TCP/IP 1. State the following terminologies: a) Node b) Router c) Host d) Subnet e) Network 2. What do you understand by IEEE 802 Local Area network 3.
The Data link layer performs the following: Responsible for physically passing data from single node to another. Translates messages from the upper layers into data frames and adds
Write discussion on Associative mapping - computer architecture.
In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is removed from the data and the user interface. In theory, the 3-tier Client/Se
Connection Establishment TCP transmits data in full duplex mode. When two TCP is two machines are connected they are able to send segments to each other simultaneously. This
Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut
Q. Illustrate the Model for Network Security? - A message is transferred from one party (Principal) to another. - A logical information channel is founded between the t
Hardware requirement for an intranet To setup a WAN, one would need to have some type of communication between different sites. National ISDN, Very Small Aperture Terminal (VSA
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd