Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain Session Layer in osi model?
- The session layer defines how to control, start and end conversations (called sessions) between applications.
- This includes the control as well as management of multiple bi-directional messages using dialogue control.
- It as well synchronizes dialogue between two hosts' presentation layers and manages their data exchange.
- The session layer proffers provisions for efficient data transfer.
- Examples: - SQL and ASP (AppleTalk Session Protocol).
Question 1 Describe any five different types of computers Question 2 Explain Bus Type LAN. Its advantages and disadvantages and examples Question 3 Explain the s
What is the difference among flow control and error control? Ans) Flow control: adjust and confirm data flow rate for successful transmission. Error Control: a method to
Sending a message to a group multicast address is known as multicasting, and its routing algorithm is known as multicast routing.
Determine the benefits of security on internet or intranet Security has long been seen as a major threatening point in the implementation of the Internet or of Intranet technolog
What is WAN? A wide area network is defines a LAN of LANs. WANs connect LANs that might be on opposite sides of a building, across the country or around the world. WANS
How can you evaluate route tables on the router?
What is TDM? TDM is a digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate needed by the sending and receivi
What is a Web server? This new model of Client/Server having of thin, portable, "universal" clients that talk to super fat servers. In the easiest form, a web server returns do
Question: (a) Describe the following biometric techniques:- (i) Retina scan, (ii) Fingerprint, (iii) Iris Scan. Your answer should consider the following: the data storage requ
1. Consider these two potential additions to the MIPS instruction set and explain how they would restrict pipelining. a) cp d1(r1), d2(r2) copy contents of word at address
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd