Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain Full Duplex data transmission?
- Have two separate Communication channels as well as use each one for simplex Data traffic (in different directions).
- If this is through we have two separate physical circuits each with a "forward" channel (for data) and a "reverse" channel (for acknowledgements).
- In both cases the bandwidth of the reverse channel is approximately entirely wasted and in effect the user is paying for two circuits but using only the capacity of one.
- A better idea is to utilize the same circuit for data in both directions and in this model the data frames from A to B are intermixed with the Acknowledgement frames from A to B.
- By gazing at the kind field in the header of an incoming frame the receiver can tell whether the frame is data or acknowledgement.
Question 1 Write short notes on Reserved IP addresses and Special use IP addresses 2 Explain about the packet switching mechanism based on Virtual Circuit 3 Explain about
Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are
Define the terms Unicasting, Multiccasting and Broadcasting? If the message is sent from a source to a one destination node, it is called Unicasting. If the message is sent
Describe some common threats to the hardware Theft of a computer, printer, or other resources. Tampering by a disinterested or frustrated employee who takes every chan
It is one of the models based on PRAM. In this model, the processors access the memory locations concurrently for reading as well as writing operations. In the algorithm, which use
Recalling two FEC schemes for internet phone described. Suppose the first scheme generates a redundant chunk for every four original chunks. Suppose the second scheme uses a low-ra
what is due care
Layered Architecture The best way to understand any complex system is to break it into pieces and then analyze what they do and how they interact. The most logical app
Q. What do you mean by Substitutional Ciphers? Substitutional Ciphers Monoalphabetic Substitution Polyalphabetic Substitution - Transpositional - character
Network Consultant, My name is Jason Long. I am the CEO of IL Corporation. IL is an investment firm that performs financial services to many organizations. We currently have a
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd