Explain leaky bucket algorithm and compare it with token bucket algorithm.
No Answer is Posted For this Question
Be the First to Post Answer
a node has the ip address 138.50.10.7 and 138.50.10.9. But it is transmitting data from node1 to node2 only. The reason may be a)a node cannot have more than one address b)class A should have second octet different c)classB " " " " " d)a,b,c
Login security can be given by
Compare satellite with fiber as a communication medium and enumerate the application areas where satellite still holds a niche(or special)marker.
In which of the 7 layers of OSI will a service handling conversion of characters is from EBCDIC to ASCII be normally implemented ?
Which device is needed to connect two LANs with different network Ids ?
What is the difference between software deployment and DFS
What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP or IP?
Why transport layer protocols like TCP and UDP are called end-to-end protocols. What is the difference between them?
On a nexus, is the metric-type keyword not available in the "default-information originate" command?
How to create dynamic users on simple Asterisks server for simple extension based x-change?
Can anybody send me pls questions for Windows system administrator?
hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash