Networking concepts, Computer Networking

Assignment Help:

Networking Concepts

Q1 What are the main features of TCP connections? Why is it said that TCP provides full-duplex service?

Q2 What are the differences between TCP connections and UDP connections? Why is DNS run over UDP?

Q3 TCP creates a reliable data transfer service, in addition to IP's unreliable best-effort service. Study the related sections of the text, and in your own words, summarize how TCP provides a reliable data transfer service.

Q4 What is three-way handshake? Draw a diagram showing how a TCP connection is established through three-way handshake.

Q5 What does Address Resolution protocol do?

Q6 Network adaptors are manufactured by many companies in many countries. How can these companies ensure no two adaptors will have the same MAC address? Identify at least five network interface card makers, and find out how you can tell whether a card was made by either of these companies.

Q7 What is CSMA/CD? How does it work? Explain why RTT on a LAN is an important parameter for CSMA/CD to work.

Q8 What techniques can be used for error-detection in the data link layer?

Q9 What techniques can be used for error-correction in the data link layer?

Q10 What are base stations in wireless networking? What IEEE standards are used for wireless networking?

Q11 What are the differences and similarities between an IEEE 802.11 frame and an Ethernet frame?

Q12 To network a Windows desktop and a computer running RedHat Linux, what will you need and what steps will you take?

Q13 What does ISO stand for? What are the five areas of network management defined by the ISO?

Q14 What are the seven message types in SNMP?


Related Discussions:- Networking concepts

Internet protocols control protocols ipcp, Internet  Protocols  Control P...

Internet  Protocols  Control Protocols ( IPCP)  The  internet  protocols  control protocols  establishes  configures and terminates the TCP/ IP network  protocols  layer in a PPP

Name the strategies devised by ietf, Question: a) Show the shortest for...

Question: a) Show the shortest form of the following IPv6 address: 2340:0000:0000:000F:7000:119A:A001:0000 b) The IPv6 header includes a Class field and a Flow ID field. Bri

What is a pseudo TTY, What is a pseudo tty? A pseudo tty or false termi...

What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.

Explain the power of semantic web languages, What is the Power Of Semantic ...

What is the Power Of Semantic Web Languages? Ans) The major power of Semantic Web languages is that anyone can create one, simply by publishing some RDF that defines a set of

The ip addressing scheme, An Internet address (IP address) is a unique 32-b...

An Internet address (IP address) is a unique 32-bit binary number given to a host and used for all interaction with the host. Each packet transmit across an Internet contains the 3

Explain in brief -ring topolgy, Explain in brief -Ring Topolgy Comments 1 ...

Explain in brief -Ring Topolgy Comments 1 - A faulty connection amid two stations can cause network failure 2 - It's difficult to add a new station/device as it has to come betwe

Netware ipx addressing uses a network number, NetWare IPX addressing uses a...

NetWare IPX addressing uses a network number and a node number. Which  statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digi

Medium earth orbiting satellite, Medium Earth Orbiting satellite is an orbi...

Medium Earth Orbiting satellite is an orbit which is located just above the few hundred miles to a few thousands above the earth surface. It is of higher advantage than Low orbit s

Combine subtitution and transposition, how to own cipher to encrypt and dec...

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

What are the trends in network security, Q. What are the trends in Network ...

Q. What are the trends in Network Security ? Trends in Network Security Improved vigilance for virus infections Continual maturation of firewall technologies

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd