Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is the different type of networking / internetworking devices?
Repeater:
Also called a regenerator, it is an electronic device that operates only at physical layer. It takes the signal in the network before it becomes weak, regenerates the original bit pattern and gets the refreshed copy back in to the link.
Bridges:
These operate both in the physical and data link layers of LANs of similar type. They separate a larger network in to smaller segments. They have logic that permit them to keep the traffic for each segment separate and therefore are repeaters that relay a frame only the side of the segment having the intended recipient and control congestion.
Routers:
They relay packets between multiple interconnected networks (i.e. LANs of dissimilar type). They operate in the physical, data link and network layers. They had software that enables them to determine which of the various possible paths is the best for a particular transmission. Gateways: They relay packets among networks that have different protocols (e.g. among a LAN and a WAN). They accept a packet formatted for one protocol and change it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.
The compression protocols for PPP are:- A. Stac B. Predictor
Virtual channel is normally a link from one source to one destination, although multicast connections are also allowed. The other name for virtual channel is virtual circuit.
Sharing information To understand how distance vector routing works examine the internet shown in the clouds represents local area network . the number inside each c
Dotted decimal representation is a syntactic form the IP software uses to express 32-bit binary numbers when communicating with humans. Dotted decimal presents every octet in decim
List the steps included in creating the checksum. a. Separate the data into sections b. Add the sections together using 1's complement arithmetic c. Take the complement o
The most difficult representatives of shared memory programming models are thread libraries present in mainly of the modern operating systems. Some examples for thread libraries ar
Carrier Sense Multiple Access/Collision Avoidance a) Necessary since wireless LANs cannot implement CSMA/CD b) Collision detection requires increased bandwidth requirements
TCP Connection Management TCP connection management encompasses the procedures for establishing and terminating connection (FTCP is connection oriented protocols). In TCP c
Reverse Address Resolution Protocol is used to get a layer 3 address if the MAC address is called which then facilitates the loading of the O/S.
What are TP-Lite and TP-Heavy Monitors? Ans) TP-Lite is simply the integration of TP Monitor functions in the database engines.TP-Heavy are TP Monitors which handles the Client/
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd