Networking concepts, Computer Networking

Assignment Help:

Networking Concepts

Q1 What are the main features of TCP connections? Why is it said that TCP provides full-duplex service?

Q2 What are the differences between TCP connections and UDP connections? Why is DNS run over UDP?

Q3 TCP creates a reliable data transfer service, in addition to IP's unreliable best-effort service. Study the related sections of the text, and in your own words, summarize how TCP provides a reliable data transfer service.

Q4 What is three-way handshake? Draw a diagram showing how a TCP connection is established through three-way handshake.

Q5 What does Address Resolution protocol do?

Q6 Network adaptors are manufactured by many companies in many countries. How can these companies ensure no two adaptors will have the same MAC address? Identify at least five network interface card makers, and find out how you can tell whether a card was made by either of these companies.

Q7 What is CSMA/CD? How does it work? Explain why RTT on a LAN is an important parameter for CSMA/CD to work.

Q8 What techniques can be used for error-detection in the data link layer?

Q9 What techniques can be used for error-correction in the data link layer?

Q10 What are base stations in wireless networking? What IEEE standards are used for wireless networking?

Q11 What are the differences and similarities between an IEEE 802.11 frame and an Ethernet frame?

Q12 To network a Windows desktop and a computer running RedHat Linux, what will you need and what steps will you take?

Q13 What does ISO stand for? What are the five areas of network management defined by the ISO?

Q14 What are the seven message types in SNMP?


Related Discussions:- Networking concepts

Explain the importance of authentication, Explain the importance of authent...

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

Dns tunneling – domain name server, DNS Tunneling – Domain Name Server ...

DNS Tunneling – Domain Name Server "If, on one system, it is possible to transmit bits to another in any form, and in turn receive a reply as a result of that transmission, th

Explain mesh interconnection networks, Mesh : This is two dimensional netwo...

Mesh : This is two dimensional networks.  In this all processing elements are organised in a two dimensional grid. The processor in the row i and column j are indicated by PE i .

Password authentication protocols (pap), Password Authentication Protocols ...

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

What is unacknowledged connectionless service, What is Unacknowledged conne...

What is Unacknowledged connectionless service This service is a datagram-style service. It is a very simple service that does not involve any of the flow- and error-control mec

Explain the term - primary memory and hard disk, Explain the term - primary...

Explain the term - primary memory and hard disk A peculiar situation arises when the existing server arrives at a stage when it cannot handle the requests quickly and most of i

Explain in brief about crc, What is CRC The CRC is computed while trans...

What is CRC The CRC is computed while transmission and appended to output stream as soon as last bit goes out onto wire. If the CRC were in header, it will be necessary to make

Networking concepts and applications, iLab 2: Office Network Expansion ...

iLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Da

Error correction, discuss the concept of redundancy in error detection and ...

discuss the concept of redundancy in error detection and correction

What is a pointer and does java support pointers, What is a pointer and doe...

What is a pointer and does Java support pointers? Pointer is a reference handle to a memory location. Improper handling of pointers leads to memory leaks and reliability issues

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd