Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain Logical Ring Physical Star topology for Token-Passing Standard.
It is definite that any break in the ring at any point will interrupt communications for all machines. To solve this problem, IBM developed a modified ring topology, which they say the logical ringphysical star. The central point of the physical star configuration is Token Ring hub called the multi-station access unit (MSAU, pronounced as masow). Workstations and servers attached to the MSAU by special STP adapter cables. IBM converted stars into a logical ring by linking all MSAU hubs together by special ring-in (RI) and ring-out (RO) ports.
Categories of address forms: STATIC: In this type the hardware manufacturer gives permanent physical address to every network manufacturer and interface must ensure th
Unguided Media: Wireless - A Wireless communication transporting electromagnetic waves without a physical conductor Wireless Propagation Methods - Ground - radio
Describe any good security technology A good security technology should be powerful enough to support the features that the administrators need, including rules validation to i
What is ICMP? ICMP is Internet Control Message Protocol. It gives messaging and communication for protocols within the TCP/IP stacks. This is also the protocol that manages err
What is SIA or stuck in active
Advantage of IP sec Tunnelling Mode IP Sec tunnelling mode has the following advantages: a.Security : Ts IP sec tunnelling mode secure somewhat but not the best. In a
NICs AND NETWORK HARDWARE: NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot b
Sonet Frame Transaction Transmitted one subsequent to another without any gap in between. First 2 bytes - alignment bytes. F628 in Hex. - define the beginning of every
What is Ring topology The network consists of a set of repeaters joined by point-to-point links in a closed loop. Each station attaches to the network at a repeater and can tra
Q. OSI Network Layer Addressing ISO/IEC and CCITT mutually administer the global network addressing domain. The primary hierarchical decomposition of the address is defined
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd