Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain Full Duplex data transmission?
- Have two separate Communication channels as well as use each one for simplex Data traffic (in different directions).
- If this is through we have two separate physical circuits each with a "forward" channel (for data) and a "reverse" channel (for acknowledgements).
- In both cases the bandwidth of the reverse channel is approximately entirely wasted and in effect the user is paying for two circuits but using only the capacity of one.
- A better idea is to utilize the same circuit for data in both directions and in this model the data frames from A to B are intermixed with the Acknowledgement frames from A to B.
- By gazing at the kind field in the header of an incoming frame the receiver can tell whether the frame is data or acknowledgement.
What is Bit Stuffing? Bit stuffing is the process of adding one extra 0 whenever five consecutive is follow a 0 in the data, so that the receiver does not mistake the pattern 0
Systolic Array : This interconnection network is a kind of pipelined array architecture and it's intended for multidimensional flow of data. It is used for applying fixed algorithm
Problem: (a) Application Layer protocols can be classified as connection-oriented or connectionless-oriented. i. What do you understand by the term protocol? ii. Give an e
Topologies in computer network ?
Advantages of OSPF OSPF an is having different advantages. These are as follows. OSPF is an open standard supported by many vendors. OSPF converges quickly. OSPF au
A socket is an abstraction that shows an endpoint of communication. Most applications that consciously use TCP and UDP do so by making a socket of the appropriate type and then per
Fully connected : It is the most powerful interconnection topology. In this every node is directly associated to all other nodes. The limitation of this network is that it needs t
Sender requests connection from network. Other receiver agrees to connection. Computers interchange data through connection. One-endpoint requests network to split connection when
In this part we shall give a short description of the routines in the PVM 3 user library. Each PVM program should include the PVM header file "pvm3.h" (in a C program) or "fpvm3.h"
HEADERS AND FRAME FORMAT: LAN technology standards describe frame format for every technology. All contemporary standards use the following basic format. a) Frame header b
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd