Networking concepts, Computer Networking

Assignment Help:

Networking Concepts

Q1 What are the main features of TCP connections? Why is it said that TCP provides full-duplex service?

Q2 What are the differences between TCP connections and UDP connections? Why is DNS run over UDP?

Q3 TCP creates a reliable data transfer service, in addition to IP's unreliable best-effort service. Study the related sections of the text, and in your own words, summarize how TCP provides a reliable data transfer service.

Q4 What is three-way handshake? Draw a diagram showing how a TCP connection is established through three-way handshake.

Q5 What does Address Resolution protocol do?

Q6 Network adaptors are manufactured by many companies in many countries. How can these companies ensure no two adaptors will have the same MAC address? Identify at least five network interface card makers, and find out how you can tell whether a card was made by either of these companies.

Q7 What is CSMA/CD? How does it work? Explain why RTT on a LAN is an important parameter for CSMA/CD to work.

Q8 What techniques can be used for error-detection in the data link layer?

Q9 What techniques can be used for error-correction in the data link layer?

Q10 What are base stations in wireless networking? What IEEE standards are used for wireless networking?

Q11 What are the differences and similarities between an IEEE 802.11 frame and an Ethernet frame?

Q12 To network a Windows desktop and a computer running RedHat Linux, what will you need and what steps will you take?

Q13 What does ISO stand for? What are the five areas of network management defined by the ISO?

Q14 What are the seven message types in SNMP?


Related Discussions:- Networking concepts

Osi reference model - fundamentals of networks, OSI Reference  Model ...

OSI Reference  Model Normal 0 false false false EN-IN X-NONE X-NONE

The transport layer - fundamentals of networks, The transport Layer Co...

The transport Layer Communication  between  computers is handled by the transport layer which  is comprised of transmission control  protocol (TCP) and the users  datagram pro

Define the network security, Q. Define the Network Security? The Intern...

Q. Define the Network Security? The Internet and Web technology presents enormous promise for e-commerce. Web now is used to handle important business assets that became the

When the router runs out of buffer space, Source quench is the process wher...

Source quench is the process where the destination router, or end internetworking device will "quench" the date from the "source", or the source router. This usually occurs when th

Topology, bus topology disadvantage?

bus topology disadvantage?

Thick ethernet wiring, THICK ETHERNET WIRING:  It needs thick coax cab...

THICK ETHERNET WIRING:  It needs thick coax cable. AUI cable joins from NIC to transceiver. AUI cable take digital signal from NIC to transceiver. The transceiver creates anal

Explain different protocols of internet, WEB TECHNOLOGY 1. Explain diff...

WEB TECHNOLOGY 1. Explain different protocols of internet. 2. Differentiate between DHTML and HTML. 3. What do you understand by Event-driven Programming? Classify differ

Threats to information can include, Threats to information can include ...

Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data

Assignment help, Hello there i have an assignment in Data communication an...

Hello there i have an assignment in Data communication and networks. I have done most of the assignment but i am stuck in one part which is designing a network in a university cam

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd