Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain Full Duplex data transmission?
- Have two separate Communication channels as well as use each one for simplex Data traffic (in different directions).
- If this is through we have two separate physical circuits each with a "forward" channel (for data) and a "reverse" channel (for acknowledgements).
- In both cases the bandwidth of the reverse channel is approximately entirely wasted and in effect the user is paying for two circuits but using only the capacity of one.
- A better idea is to utilize the same circuit for data in both directions and in this model the data frames from A to B are intermixed with the Acknowledgement frames from A to B.
- By gazing at the kind field in the header of an incoming frame the receiver can tell whether the frame is data or acknowledgement.
FIBER OPTIC EXTENSION: The LAN extension using fiber optic is given in the figure below: Figure The fiber-modem translates digital data into pulses of light the
Distributed systems are composed of a number of physically separate machines connected by one or more communication links. Unlike parallel systems, there's no shared clock or memor
Name the physical interfaces that PPP can be configured on a Cisco router: Ans) A. Asynchronous serial B. HSSI C. ISDN D. Synchronous serial These four of th
Physical Configurations Transport signal multiplexer de multiplexer. It either signal from multiple sources into a STS singles or de multiplexes and STS signal into diffe
What are the key functions of data link layer? Data link layer transfers data in a structured and reliable manner so that the service given by the physical layer is utilized by
Quetion: An amplifier increases the peak-to-peak voltage of a signal from 1 V to 20 V. What is the amplifier's gain in dB?
Enable Wireless Security Step : Configure Windows to use WEP authentication. Navigate to the Network Connections page again and right-click the Wireless Network Connection
Q. Illustrate about Sliding Window Protocols? - Sliding window - Keeps the unacknowledged outstanding frames in sender - Keeps the expected frames in receiver - Sequen
How Does Network Topology Affect The Cost And Network Performance, Computer Science.
Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd