Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
FRAME FILTERING:
The very important task a bridge operates is frame filtering. If both the destination and source are on the same segment, it does not repeat the frame to the other code segment. A frame is forwarded to the other code segment, if it id destined to that part. Multicast and broadcast frames are also forwarded.
A bridge has a list for every segment that consists of physical addresses of the machine attached to that part. In this way a bridge finds on which code segment a destination device is attached.
As soon as a frame reachs to a bridge, it finds a source address from its header and automatically includes it in the list for that code segment. In this way a bridge creates up address lists. This is given in the figure below:
Figure
Encoding Process c= uG u: binary data sequence of length 4( input) G: Generator matrix which is 7*4 c: Codeword D
Fat tree It is a modified version of the tree network. In this group the bandwidth of edge (or the connecting wire among nodes) increases towards the root. It is a more practic
What are the basic LAN topologies? The three simple LAN topologies that are combined to shape any practical topology are called as basic LAN topologies. They are, Bus Topology
Point out the disadvantages of Ring Topology. The drawbacks of ring topologies are: a. It is considerably complex to install and reconfigure ring topology b. Media failur
"SAP" is used by the Cisco IOS for which encapsulation types? Ans) Three types:- Ethernet_802.2 Token-Ring FDDI_802.2
Parallel Construct The syntax of the parallel construct is as follows: #pragma omp parallel [set of clauses] where clause is one of the following: structured-block if(sca
Q. Show the Error control in TCP? Error control in TCP Detect lost segments, out-of-order segments, corrupted segments and duplicated segments Three tools: chec
Error Detection- 2D/LRC Adds an additional character (instead of a bit) A block of bits is prearranged in a table The Parity Bit for every data unit is calculate
design issues
Authoritative DNS Servers Every organization with publicly accessible hosts ( such as web server and mail several on the internet must provide publicly accessible D
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd