Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is the different type of networking / internetworking devices?
Repeater:
Also called a regenerator, it is an electronic device that operates only at physical layer. It takes the signal in the network before it becomes weak, regenerates the original bit pattern and gets the refreshed copy back in to the link.
Bridges:
These operate both in the physical and data link layers of LANs of similar type. They separate a larger network in to smaller segments. They have logic that permit them to keep the traffic for each segment separate and therefore are repeaters that relay a frame only the side of the segment having the intended recipient and control congestion.
Routers:
They relay packets between multiple interconnected networks (i.e. LANs of dissimilar type). They operate in the physical, data link and network layers. They had software that enables them to determine which of the various possible paths is the best for a particular transmission. Gateways: They relay packets among networks that have different protocols (e.g. among a LAN and a WAN). They accept a packet formatted for one protocol and change it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.
What is point to point link? It refers to a direct connection among two computers on a network. A point to point connection does not require any other network devices other tha
discuss the communication model from the source to the destination including the detailed account of the task that must be performed in data communication system
Q. Building a Defense in networking? When building a defense you must use a layered approach that includes securing - The network infrastructure the communications protocol
categories of LAN
Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f
Bootp protocol normally use it in dhcp protocol, it is configured manually in order to give ip add or there relvent host. Rarp is a work just opposite of Arp. Rarp stand for rev
What is the purpose of cables being shielded and having twisted pairs? The main purpose of this is to stop crosstalk. Crosstalks are electromagnetic interferences or noise that
.test a number to be prime number in network security
a) Assume that the time required to transmit one packet (i.e. the packet length divided by link data rate) is 10ms and the Round Trip Time (from Source to Destination and back) is
The following DNA sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor (TF). The nucleotide segments capitalized in the giv
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd