Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What is data link of osi model?
- The data link layer offers access to the networking media and physical transmission across the media and this enables the data to locate its intended destination on a network.
- The data link layer offers reliable transit of data across a physical link by using the Media Access Control (MAC) addresses.
- The data link layer utilizes the MAC address to define a hardware or data link address in order for multiple stations to share the same medium and still uniquely identify each other.
- Concerned with network access, network topology, error notification, ordered delivery of frames and flow control.
- Instances Frame Relay, Ethernet and FDDI
DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers
Ring: It is a simple linear array where end nodes are associated. It is equal to a mesh with wrap around connections. The data transfer in a ring is generally one direction. So,
Token Ring Implementation Sequence of 150-ohm shielded twisted-pairs sections Output port on every station connected to input port on the next Frame is passed to
If the number of incoming clients invokes exceeds the number of processes in a server class, the TP Monitor might be dynamically start new ones and this is known as Load balancing.
what is gateway?
This new model of Client/Server having of thin, portable, "universal" clients that talks to superfast servers. In the simple form, a web server returns documents when clients ask f
Q. Show the IP Address Representation? IP Addressing IP Address Representation Binary notation - IP address is displayed as 32 bits Dotted-decimal notation -
A data link is shared by 20 data sources. Each source is active only 10% of the time and produces 1Mbps data rate when active. The sources start their transmissions at random. a
How do we control USB by a network?
Uses of fragmentation and reassembly The More bit is used for fragmentation and reassembly. If this bit is 0, then either there has been no fragmentation of this packet or this
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd