Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
a) What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?
b) Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases (hub and switch), each port is rated at 100 Mbps. Assume that you use either the hub or the switch to create a small home network of 8 hosts. Which of the two networks (hub-based or switch-based) will be able to achieve a greater total network throughput (the total throughput is defined here as the sum of individual throughputs over all simultaneous communications between the hosts connected to the network)? Why?
c) Name the protocol (i.e. give its well-known acronym and full name) responsible for finding the MAC address of a host from its IP address.
How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.
Virtual Private Network (VPN) adds the features of both public and private networks. It is fixed to single organization and needs public network for connectivity. These connect
How many types of twisted pair cable are there We can find two types of twisted pair cables, namely: Unshielded Twisted Pair Cable (UTP) and Shielded Twisted Pair Cable (STP).
What is a OSI layer 2 device called a "barter"?
Reverse Address Resolution Protocol is used to get a layer 3 address if the MAC address is called which then facilitates the loading of the O/S.
Q. Explain Silly window syndrome? When either sending application sends data gradually or receiving application consumes data slowly - Illustration when 1 byte sent 40 bytes
identify different network topologies.
However what if you don't know about the IP address of the computer you wished to connect to? What if you have to access a web server referred to as www.abc.com? How does your web
UDP is connectionless, and does not give error checking. But remember, error checking can happen at other layers too.
Process communicating End systems communicate with each other by the processes. A process can be thought of a s program that is running within end systems. Process
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd