Answer Posted / ravi
windows XP -client
Windows 2003 -SERVER
| Is This Answer Correct ? | 9 Yes | 1 No |
Post New Answer View All Answers
How do cryptography-based keys ensure the validity of data transferred across the network?
Discuss the different factors affecting congestion control algorithms. ?
Which device is needed to connect two LANs with different network Ids ?
Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.
What Equipment Do I Need for My VSAT Network?
Why do data link layer protocols position the checksum in the trailer and not in the header ?
Explain the advantage and disadvantage of ethernet ?
Explain pure-ALOHA and slotted- ALOHA systems. Give the expression for throughout for each,clearly explaining the various terms.
What is traffic shaping
Compare the maximum window size in go-back-N and selective-repeat ARQs.
What does ‘data transparency’ mean ? With the help of a flow chart, explain the process of bit de-stuffing at the receiver’s end.
what is the equivalent nx-os command for the "ip multicast-routing" ios command, and does the nexus 7000 support pim-sparse mode?
Write short note on any four of the following:
Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each.
Explain Wireless networks.