Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
a) What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?
b) Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases (hub and switch), each port is rated at 100 Mbps. Assume that you use either the hub or the switch to create a small home network of 8 hosts. Which of the two networks (hub-based or switch-based) will be able to achieve a greater total network throughput (the total throughput is defined here as the sum of individual throughputs over all simultaneous communications between the hosts connected to the network)? Why?
c) Name the protocol (i.e. give its well-known acronym and full name) responsible for finding the MAC address of a host from its IP address.
What are the features of Intranet Intranets provide access to electronic databases, documents, electronic training manuals, office circulars, internal job vacancies, etc. Any t
Electronic Mail One of the most popular internet services is electronic mail ( e mail). At the beginning of the internet era teh message sent by electronic mail were sh
What is the different type of networking / internetworking devices? 1. Repeater: Also known as a regenerator, it is an electronic device that operates only at physical layer.
What are the IP address ranges for public and private IP address?
It is a basic quantitative property of networks. Delay is a calculate how long it takes for a bit of data to cross across the network from one end to the other. It is calculated in
Define Choke packet and Implicit congestion signalling Choke packet: A choke packet is a control packet produced at a congested node and transmitted back to a source node to co
One of the design requirements is to isolate other network traffic and broadcast from finance department to improve security. In order for this to possible we will implement VLAN o
Consider an RTP session consisting of five users, all of which are sending and receiving RTP packets into the same multicast address. Each user sends video at 200kbps. a) What
Commands SMTP uses commands and response to transfer message between a client and a server. Each commands or reply is terminated by a two character ( carriage re
Q. Which steps are used at receiver end by check sum? The receiver follows these steps: The unit is divided into "k" sections each of "n" bits All sections are
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd