Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is the different type of networking / internetworking devices?
1. Repeater: Also known as a regenerator, it is an electronic device that operates only at physical layer. It gets the signal in the network before it becomes weak, regenerates the original bit pattern and gets the refreshed copy back in to the link.
2. Bridges: These function both in the physical and data link layers of LANs of similar type. They separate a larger network in to smaller segments. They contain logic that permit them to keep the traffic for every segment separate and thus are repeaters that relay a frame only the side of the segment having the intended recipient and control congestion.
3. Routers: They relay packets between multiple interconnected networks (i.e. LANs of dissimilar type). They operate in the physical, data link and network layers. They have software that enables them to verify which of the several possible paths the best for a particular transmission is.
4. Gateways: They relay packets between networks that have different protocols (e.g. among a LAN and a WAN). They accept a packet formatted for one protocol and change it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.
Question 1 Explain GSM digital cellular System model Question 2 Explain cellular Digital Packet Data(CDPD) system with the help of CDPD network reference model Question 3
The disadvantages and advantages of Private and Public networks are shown in the table below:
Routing Table Each router now uses the shortest path tree to construct its routing table . each router uses the same algorithm and the same link state database its own sh
Explain how DHCP work?
Illustrate the downside of groupware The downside of groupware is that they are very costly and with the increase in complexity or additional features, the cost increases propo
State the methods to keep the attackers at bay Another best methods to keep the attackers at bay is known as network address translator or NAT. The philosophy behind the design
This ICT-related issue that has been raised in the contemporary media, and the article is required to be included as part of the essay: Undertake further research about this top
telecommunication processors
Q. Host System in TCP-IP model? - Standards adopted because of widespread use like (Internet) - The protocols came first plus the model was really just a description of the
Q. Show the Distribution of Name Space? Distribution of Name Space --Information for domain name space must be stored on multiple servers (DNS servers) to be efficient
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd