Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the Access methods used in LAN:
i. Switched access: It is used in LANs which are assigned around CBXs. Electronic switching is techniques are used to provide access.
ii. Multipleaccess: In multiple access schemes like CSMA, whenever a station gets ready for transmission, it first listens to bus to see if there is any ongoing transmission. If there is one, new transmission isn't initiated until bus becomes free. This makes sure that an ongoing transmission isn't corrupted by a new transmission.
iii. Token passing access: In this scheme, a token packet is introduced to network. This packet continues to circulate through network as long as no user accepts it. When a user works to transmit he waits for token packet to reach him and accepts token, this acceptance removes token packet from the network.
Q. What do you understand by OSI? Ans: The Open System Interconnection (OSI) reference model illustrates how information from a software application in one computer goes throug
What is Wired Equivalent Privacy?
Transparent Bridges & Learning Bridges - Builds table by examining destination as well as source address of each packet it receives - Learning bridges - If address is not
Advantage of IP sec Tunnelling Mode IP Sec tunnelling mode has the following advantages: a.Security : Ts IP sec tunnelling mode secure somewhat but not the best. In a
Unbound Transmission Media Unbound transmission media extend beyond the limiting confines of cabling. They give a good communication alternative for WANS. The lack of physical
THICK ETHERNET WIRING: It needs thick coax cable. AUI cable joins from NIC to transceiver. AUI cable take digital signal from NIC to transceiver. The transceiver creates anal
What is NETBIOS and NETBEUI in Networking? NETBIOS is a programming interface that permits I/O requests to be sent to and received from a remote computer and it keeps the netwo
What is ICMP? ICMP is Internet Control Message Protocol. It gives messaging and communication for protocols within the TCP/IP stacks. This is also the protocol that manages err
Groupware addresses the management of semi-structured information like text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct co
What is anonymous FTP and why would you use it Anonymous FTP enables users to join to a host without using a valid login and password. Generally, anonymous FTP uses a login kno
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd