Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is an Ethernet?
The Ethernet topology was developed at the University of Hawaii to connect computers on the many Islands. It was radio based design. Later, Robert Metacalfe went to Xeros's Palo Alto Research Center (PARC) laboratories and eliminated the radio portion and altered to co-axial cabling. Ethernet is one of the most popular LAN technologies in use today covering more than 85% of the networks. Ethernet system having of three basic elements:
4. The physical medium use to carry Ethernet signals among computers on the network
5. A set of rules (protocols) embedded in every Ethernet interface that will decide how multiple computers on the network will have access to the data on the medium.
6. An Ethernet frame that having of a standardized set of bits used to carry data over the system.
Explain the uses of Firewall in computer For Intranet developers, restricting access of unauthorised users to the Web site has been the greatest challenge. In addition to preve
What is Ring Topology? The physical ring topology is a circular loop of point-to-point links. Every device connects directly to the ring or indirectly by and interface device o
Advanced Interface Module (AIM) socket This is an 100 pin internal socket. It is provide for plug in the Advance interface module card. Purpose of AIM card is concentrate in th
Determine about unique least-cost path If there is a unique least-cost path, the two algorithms will yield the similar result because they are both guaranteed to search the lea
Q. What is Transmission Control Protocol? Transmission Control Protocol TCP Services - Stream delivery service Permits the sending process to deliver data as a stream
ETHERNET FIELDS: In Ethernet fields the preamble and CRC is usually not given in frame. The destination address of each is the broadcast address. There is special value reser
Q. Explain about Traffic shaping ? Traffic shaping -Method to control the amount and the rate of the traffic sent to the network.? Leaky bucket Token bucket -
How do we explain the method of DPU, Segments, Datagram, Frame and packet?
Fragmentation - Wireless environment is very noisy - Corrupt frames must be retransmitted - Large frames must be divided into smaller ones to increase efficiency
Write the RIP timers in detail?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd