Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Show Network Topology in digital system?
This deals with the geometrical arrangement of nodes (endpoints consisting of physical devices such as terminals, printers, PCs, andmainframes) interconnected by links (transmission channels). Network topologies may be classified as bus topology (multidrop topology), star topology, ring topology, tree topology, and distributed (mesh or hybrid) topology, as illustrated in Figure. Bus topology is used predominantly by LANs, whereas star topology is commonly used by private-branch exchange (PBX) systems. Ring topology may have centralized control (with one node as the controller) or decentralized control (with all nodes having equal status). Tree topology is used in most of the remote-access networks, whereas distributed topology is common in public and modern communications networks. A fully distributed network allows every set of nodes to communicate directly with every other set through a single link and provides an alternative route between nodes.
The Internet is physically a collection of packet switching networks interconnected by gateways along with protocols that allow them to function logically as a single, large, virtual network. Gateways (often called IP routers) route packets to other gateways until they can be delivered to the final destination directly across one physical network. Figure shows the structure of physical networks and gateways that provide interconnection. Gateways do not provide direct connections among all pairs of networks. The TCP/IP is designated to provide a universal interconnection among machines, independent of the particular network to which they are attached. Besides gateways that interconnect physical networks, as shown in Figure, Internet access software is needed on each host (any end-user computer system that connects to a network) to allow application programs to use the Internet as if it were a single, real physical network. Hosts may range in size from personal computers to supercomputers.
Q. Show the Divide and Conquer approach? Divide and Conquer approach is the way of making a complicated problem easier. In this approach larger problem (System) is divided int
The alignment of a type 'c' field in a report is? ? Left Aligned.
Minimum Spanning Tree: Given a weighted graph G, it is often desired to make a spanning tree T for G, like the sum of weights of the edges in T is the least. Like tree is known as
Q. What is Shadow Mask? Shadow Mask is a metal sheet that has fine perforations (holes) in it and is situated a short distance before phosphor coated screen. The Phosphor dots
Explain how SAP GUI handles output screen for the user. The SAP front-end s/w can either run on the similar computer or on dissimilar computers given for that purpose. User t
Credit cards and smart cards Credit cards comprise a magnetic stripe on the back made up of iron-based particles in a plastic film. Stripe is split up into 3 tracks which a
Design of structure chart - Standard quality structure charts result in programs that are modular, reusable and simple to execute. - Measures include: Cohesion
For what is defparam used? Though, during compilation of Verilog modules, parameter values can be altered separately for every module instance. This allows us to pa
How AI think rationally& acting rationally
Q. Working of Fully Parallel Associative Processor? Fully Parallel Associative Processor: This processor accepts the bit parallel memory organisation. There are 2 kinds of this
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd