Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question 1 Explain classification of computer Network by range
Question 2 Explain three major problems of Transmission lines
Question 3 What is the maximum data rate of a noiseless channel? Explain
Question 4 Write about Simplest protocol and Stop and wait protocol
Question 5 Explain following concepts a) Slotted or impure ALOHA b) 10Base2: Thin Ethernet
Question 6 Differentiate between static and dynamic routing
Question 7 a) explain about Congestion prevention policies b) What is reverse path forwarding? Explain
Question 8 Explain about subnet addressing format
Question 9 Write notes on a) ports b) Domain name service (DNS)
Question 10 Discus about widely used e-mail secure systems?
Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric
At the minimum level most networks sends individual packets of data and the network needs each packet to follow an exact format dictated by the hardware, which is known service par
What are the important topologies for networks? BUS topology: In this every computer is directly linked to primary network cable in a single line. Advantages: Inexpensive,
TCP Connections TCP is an end to end point to point transport used in internet. being a point to point protocols means that there is always s single sender a single
What is Multi-mode fiber Multi-mode fiber uses LEDs like the light-generating devices while single-mode fiber generally uses lasers. FDDI specifies the utilization of dual r
1. A systematic study of failures will help in identifying areas that may cause : i. Loss of adjacent parts/ equipment/ whole equipment. ii. Loss of production and rev
State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all
Q. Difficulties in Internetwork Communication? - Data arrive at interface f1 of s1 - How does s1 know that they must be sent out from interface f3? - There is no provisio
Question 1 Contract Net Protocol is the best known and most widely used cooperation protocol Explain how contract net works Discuss the benefits and limitations of con
Groupware addresses the management of semi-structured information like text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct co
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd