Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Computer Networks
1. Differentiate WAN and LAN.
2. Describe the TCP/IP Reference Model with diagram.
3. Explain Circuit switching and message switching.
4. List the functions of (i) Routers (iii) Bridges.
5. State the terms Error Detection and Correction with respect to Data Transmission. Also describe the following concepts with respect to Error Detection and Correction:
a. Parity Bits b. Cyclic Redundancy Check
6. Write short notes on
(i) Non-Persistent CSMA (ii) 1-Persistent CSMA (iii) P - Persistent CSMA.
Advanced Interface Module (AIM) socket This is an 100 pin internal socket. It is provide for plug in the Advance interface module card. Purpose of AIM card is concentrate in th
What are the important topologies for networks? BUS topology: In this every computer is directly linked to primary network cable in a single line. Advantages: Inexpensive,
Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or
Q. How is computer networks used in teleconferencing? Teleconferencing: Teleconferencing allows conference to happen without the participants being in the same place. Applica
802.11a OFDM a) Orthogonal frequency-division multiplexing utilizing a 5-GHz band b) Same as FDM except all sub bands are used by only one source at a given time c) Secu
What are the key elements of protocols? The key elements of protocols are a. Syntax It refers to the structure or format of the data that is the order in which they a
What are the popular topologies other than basic Topologies? Apart from basic topologies some other topologies worth considering are: mesh topology (each device linked to all o
Alice sends a message to Bob, encrypted with a symmetric key. Bob decrypts the message and finds it is a purchase order for an expensive workstation. When the time comes to deliver
Unused Reserved This is a 6 bite field reserved for future use.
IEEE 802.4-Token bus Physical line or tree however logical ring. Stations know "left" as well as "right" stations. One token "passed" from station to station. Only station with
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd