Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question :
(a) Describe, with the aid of a diagram, a hybrid topology of a network of your choice.
(b) Briefly explain the similarity and differences between a switch and a hub.
(c) How is the TCP/IP reference model different from the OSI reference model? And why is the TCP/IP model widely used?
(d) "HTTP is stateless". Discuss this statement.
(e) Given that a webpage consists of 2 pictures and 1 animation, what would be the Response Time, in terms of RTT, if HTTP 1.1 is used to load the complete webpage?
(f) Your service has been called for as a network designer for a high-tech LAN to be set up in a new branch of an offshore company. The local service provider has assigned the following to you: Network ID = 203.122.0.0 and Subnet Mask = 255.255.240.0.
The manager of the offshore company requires you to create two subnets A and B for the LAN.
(i) Specify the Subnet Mask after the borrowing the subnet bits. (ii) Specify the Broadcast Address and Network Address of subnets A and B. (iii) Evaluate the range of IP addresses for subnets A and B. (iv) Specify the IP address of the 17th Host in the 2nd Subnet.
Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until
Q. Illustrate Stop-and-Wait Automatic Repeat request? - Simplest flow as well as error control mechanism - The sending device keeps a duplicate copy of the last frame transm
Q. Describe about Cryptography? - Some media cannot be protected from unauthorized reception (or interception) - Encryption involves transforming the original information in
What is meant by Middleware? Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle
Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut
Question: Wireless Access points have been known to have various security vulnerabilities that can lead to breach of Secured wired networks. IEEE 802.11 standards have identifi
What is a jam signal A jam signal is broadcasts to network by the transmitting stations that detected the collision to ensure that all stations know of the collision. Every st
Higher bandwidth Fibre optic cable an support dramatically higher bandwidths than either twisted pair or coaxial cable currently data rates and bandwidth utilizatio
What is Sonet Synchronous Optical Network is a fiber optic technology that can transmit high-speed data audio, used for text and video. Single clock handles timing of transm
What is the importance of implementing a Fault Tolerance System? Are there limitations? A fault tolerance system makes sure continuous data availability. This is done by elimin
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd