Answer Posted / ranjit singh
networks are layered so that it can be differentiated that
how the data is being organized and deorganized during the
transfer and how the work is being accompolished by the
whole osi model.....
Is This Answer Correct ? | 9 Yes | 0 No |
Post New Answer View All Answers
Describe and distinguish between FDMA, TDMA, and CDMA.
Contrast link state and distance vector routing protocols, giving an example of each.
On a nexus, is the metric-type keyword not available in the "default-information originate" command?
Give two examples of a ‘collision-free’ protocol ?
Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.
What are the various classes of IP addressing? Calculate the maximum number of class A, B and C network Ids.
Am planning to do a course on Remote Infrastructure Management.Is it a good field. And one more thing. Am planning to join Talent Sprint, Hyd. How good is this institute. Please help fast
What is virtual path
What are the other names of IEEE 802.11 protocol or standard?
Compare the maximum window size in go-back-N and selective-repeat ARQs.
Compare satellite with fiber as a communication medium and enumerate the application areas where satellite still holds a niche(or special)marker.
Why is a data link layer switch preferred over a hub ?
If i want to crack any serial key using system information then how can i do it? Is it possible?
1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
What does ‘data transparency’ mean ? With the help of a flow chart, explain the process of bit de-stuffing at the receiver’s end.