Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is an Ethernet?
The Ethernet topology was developed at the University of Hawaii to connect computers on the many Islands. It was radio based design. Later, Robert Metacalfe went to Xeros's Palo Alto Research Center (PARC) laboratories and eliminated the radio portion and altered to co-axial cabling. Ethernet is one of the most popular LAN technologies in use today covering more than 85% of the networks. Ethernet system having of three basic elements:
4. The physical medium use to carry Ethernet signals among computers on the network
5. A set of rules (protocols) embedded in every Ethernet interface that will decide how multiple computers on the network will have access to the data on the medium.
6. An Ethernet frame that having of a standardized set of bits used to carry data over the system.
Triggers are special user defined actions usually in the form of stored procedures, that are automatically requested by the server based on data related events. It can perform diff
Explain clustering support Clustering support refers to the ability of a network operating system to link multiple servers in a fault-tolerant group. The main purpose of this i
To stop Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks? Ans) Every router builds its own
One of the design requirements is to isolate other network traffic and broadcast from finance department to improve security. In order for this to possible we will implement VLAN o
FIBER OPTIC EXTENSION: The LAN extension using fiber optic is given in the figure below: Figure The fiber-modem translates digital data into pulses of light the
What is the difference among TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) permits a local host to get files from a remote host but does n
Token Bus Sublayer Protocol Send for some time then pass token If no data after that pass token right away Traffic classes 0, 2, 4 and 6 (highest) Internal s
The following information was obtained from a host: IP address...............205.133.127.8/24 Default Gateway...... 205.133.127.1 DNS Server.............139.100.110.10
Selective Repeat (SR) Selective repeats is a connection oriented protocols in which transmitter and receiver have a window of sequence numbers. SR scheme avoids the unne
Q. Show the process of Mail Delivery? Mail Delivery -Consists of three stages -First stage - email goes from user agent to local server, where it is stored until it ma
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd