Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Show Network Topology in digital system?
This deals with the geometrical arrangement of nodes (endpoints consisting of physical devices such as terminals, printers, PCs, andmainframes) interconnected by links (transmission channels). Network topologies may be classified as bus topology (multidrop topology), star topology, ring topology, tree topology, and distributed (mesh or hybrid) topology, as illustrated in Figure. Bus topology is used predominantly by LANs, whereas star topology is commonly used by private-branch exchange (PBX) systems. Ring topology may have centralized control (with one node as the controller) or decentralized control (with all nodes having equal status). Tree topology is used in most of the remote-access networks, whereas distributed topology is common in public and modern communications networks. A fully distributed network allows every set of nodes to communicate directly with every other set through a single link and provides an alternative route between nodes.
The Internet is physically a collection of packet switching networks interconnected by gateways along with protocols that allow them to function logically as a single, large, virtual network. Gateways (often called IP routers) route packets to other gateways until they can be delivered to the final destination directly across one physical network. Figure shows the structure of physical networks and gateways that provide interconnection. Gateways do not provide direct connections among all pairs of networks. The TCP/IP is designated to provide a universal interconnection among machines, independent of the particular network to which they are attached. Besides gateways that interconnect physical networks, as shown in Figure, Internet access software is needed on each host (any end-user computer system that connects to a network) to allow application programs to use the Internet as if it were a single, real physical network. Hosts may range in size from personal computers to supercomputers.
Explain various steps for analysing an algorithm. The several steps involved in analysis of an algorithm are: 1. For any algorithm, the first step should be to show that it
What are disadvantages of the asynchronous reset and synchronous reset? Disadvantages of asynchronous reset: Make sure that the release of the reset can arise within one c
In digital ICs, Schottky transistors are preferred over normal transistors because of their ? Ans. Lower propagation delay in digital ICs, as shottky transistors reduce
State and prove Demorgan’s First theorems: Ans. Statement of First Theorem of De Morgan: = A‾. B‾ Proof: The two sides of the equation i.e. = is represented with logic
Convert decimal 153 to octal. Equivalent in octal will be ? Ans. (153) 10 = (231) 8
Q. What is Dithering? CMYK provides only 8 colours (C, M, Y K, Violet= C + M, Orange= M + Y, Green = C + Y, and colour of paper itself!). What about other colours? For these t
Q. Limitation identified in Amdahls law? There is one main limitation identified in Amdahl's law. As said by Amdahl's law workload or problem size is forever fixed as well as n
Write the HTML code for the following table: T E M P E R A T U R E C I T I E S
Define variants of Turing Machine? Variants are Non deterministic turing machine. Mutlitape turing machine. Enumerators
Subtraction of 0011.1001 - 0001.1110 using 2's complement method Ans. Firstly 1's complement of 0001.1110 is 1110.0001 and 2's complement is 1110.0010. If a last carry
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd