Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Why congestion occurs?
Congestion
Emerge if the load on the network is greater than the capacity of the network
- Load that is the number of packets sent to the network
- Capacity that is the number of packets a network can handle
Why congestion occurs?
- Because routers and switches have queues that hold the packets before and after processing
Congestion control: keep the load below capacity
The packet is place at the end of the input queue
The processing module moves the packet from the queue and forwards the packet
The packet is put in an appropriate output queue
What is meant by Symmentric Multiprocessing (SMP)? It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided into thread
Q. Unshielded Twisted Pair - transmission media? - A most common kind suitable for both voice and data transmission - Categories are determined by chain quality - Cat 3 c
Mail Message Format When an e mail is sent from one person to another a header containing peripheral information precedes the body of the message itself. This contained
Telephone companies (Telco's) stated ATM to meet various goals. It gives universal service for all support and subscribers for all users for video, voice and data. It has a single
Describe the concept of broad cast and multi-cast?
Q. Show the Error Correction by Hamming Code? Hamming Code is able to be applied to data units of any length and uses the relationship between data and redundancy bits For i
Mesh It is of two dimensional network. In this every processing elements are arranged in a two dimensional grid. The processor are in rows i and column j are denoted by PEi
DLCI- Data Link Connection Identifier. A frame-relay service provider usually assigns DLCI values that are used by frame-relay to distinguish among different virtual circuits on th
identify different network topologies.
Q. Describe Network security and Internetworking security? Network Security - Layers 5-7 - Securing the localized private domain. Network Administration, File Permissions
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd