Explain leaky bucket algorithm and compare it with token bucket algorithm.
No Answer is Posted For this Question
Be the First to Post Answer
How data flow from source to destination, Explain each step from layer to layer?
5 Answers Akamai Technologies, Juniper Networks, Satyam,
Explain pure-ALOHA and slotted- ALOHA systems. Give the expression for throughout for each,clearly explaining the various terms.
Differentiate between ISO-OSI and TCP/IP reference model.
Dear Sir, I have installed 40 HCL thin clients model BVX 4000 on windows 2003 server in the RDP mode, Processor is xeon 3040 1.667 GHZ, with 320 GB SATA Hard Disc and and 1 GB RAM ECC DDR II RAM , in have also expanded the RAM to 8 GB. but still the Graphics and ppt are opening in frames. please do suggest me how can i use these thin Clients to work in the normal pc mode so that the graphics( Photos .JPEG images and normal power point presentations.? Regards ather.
what is upsizing and downizing?
what is the function of msconfig in our system...?
What are the ways to troubleshoot the network, techniques, commands?
What are the two types of transmission technology available
hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash
When we are developing interface program in oracle apps what we have to do if there is no interface table.
Explain network topologies ?
Explain Token ring