Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is the different type of networking / internetworking devices?
1. Repeater: Also known as a regenerator, it is an electronic device that operates only at physical layer. It gets the signal in the network before it becomes weak, regenerates the original bit pattern and gets the refreshed copy back in to the link.
2. Bridges: These function both in the physical and data link layers of LANs of similar type. They separate a larger network in to smaller segments. They contain logic that permit them to keep the traffic for every segment separate and thus are repeaters that relay a frame only the side of the segment having the intended recipient and control congestion.
3. Routers: They relay packets between multiple interconnected networks (i.e. LANs of dissimilar type). They operate in the physical, data link and network layers. They have software that enables them to verify which of the several possible paths the best for a particular transmission is.
4. Gateways: They relay packets between networks that have different protocols (e.g. among a LAN and a WAN). They accept a packet formatted for one protocol and change it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.
Explain BGP
What are gateways? Gateways give connectivity among two or more network segments. It is usually a computer that runs the gateway software and gives translation services. This t
can we solve the problem using bounded buffer space if the propagation delay is arbitrarily large ?
User Datagram Protocol - UDP is a connectionless oriented transport protocol for use when the upper layers give error-recovery and reliability. UDP does not sequence data or re-ass
Question - 1 Define MIS and its objectives. What are the characteristics of MIS? Question - 2 Explain data processing Question - 3 What are the recent developments in database
Options Negotiation To use any of the options first requires option negotiation between the client and server. Four control characters are used for this purpose.
c program to implement the ospf
Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which
MPMM is a Project Management Methodology which gives a complete "framework" for managing projects. This framework gives you with a step-by-step walkthrough of the phases, activitie
Sole Access Protocol The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below:
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd