Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Hubs/Repeaters
Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality starts to deteriorate as segment exceeds their maximum length. A hub gives the signal amplification required to permit a segment to be extended a greater distance. Passive hub simply forwards any data packets they receive over one port from one workstation to all their remaining ports. Active hubs, also sometimes referred to as "multiport repeaters", regenerate the data bits in order to handle a strong signal.
Q. What is Topology? - Physical/logical arrangement - Topology of a network is the geometric depiction of the relationship of all the links and linking devices to one anothe
It is possible for a datagram to generate ICMP errors after it has been fragmented. For example, suppose that each of two fragments cannot be delivered. Seemingly, this would mean
Hybrid of Client Server and P2P Architecture Both of the architecture are commonly used architecture. However many applications are organized as by brides of the clie
Work-Sharing Constructs A work-sharing construct distributes the implementation of the associated region between the members of the team that encounters it. A work-sharing cons
Clos network This network was organized by Clos (1953). It is a non-blocking network and gives full connectivity like crossbar network but it also requires significantly minim
What is OSI and what role does it play in computer networks? OSI (Open Systems Interconnect) serves as a reference model for data communication. It is made up of 7 layers, with
Calculate data bandwidth requirements from and to each site.
TELNET Protocols The TCP/ IP protocol suite includes a simple textual remote terminal protocols called TELNET that allow a user to log into a computer across an interne
Checksum This 16 bits field contain the checksum. The calculation of the checksum for TCP follows the same procedure as the described for UDP. However the inclusion
Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd