Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem 1) prepare brief notes on:

(a) What is the role of DNS?

(b) What is the meaning of Socket?

(c) What are the applications of Transport layer in OSI model?

(d) What do you mean by SLIP?

(e) prepare down the difference between analog and digital signals.

(f) What is the meaning of SMTP?

(g) Describe the star, bus and ring topology of LAN.

(h) Define push feature of TCP.

(i) Compare the advantages and disadvantages of baseband and broadband transmission.

(j) Why CSMA/CA cannot used in wireless network?

problem 2) Describe the difference between message switching and frame relay.

problem 3) What is the difference between guided and unguided transmission media? describe the guided transmission media and its advantages over unguided media.

problem 4) What is meaning of error control and its types? describe in detail.

problem 5) What do you mean by FDDI? Describe its working and applications.

problem 6) What is Routers describe its working and applications?

problem 7)(a) What is error detection. Describe CRC in detail with the help of ex.

(b) Describe the sliding window flow control in Detail.

problem 8) prepare down the advantages of UDP over TCP. describe how TCP is encapsulated in an IP datagram.

problem 9) prepare a brief note on the following:

i) Bridges.

ii) HDLC and SDLC

iii) ARP and RARP protocol

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M98373

Have any Question? 

Related Questions in Computer Network & Security

Assignment data and pbx physical layer cabling designa

Assignment: Data and PBX Physical Layer Cabling Design A building you plan to use as an office has four floors; each floor is a rectangle 1000 ft. long and 300 ft. wide.  The vertical separation between the floors is 20 ...

Any encryption algorithm like caesar cipher algorithmshould

Any Encryption algorithm (like caesar cipher algorithm)should be used and implemented for the information given in the document. Cryptography Assignment Given the following S-Boxes: S1= [ 15        10            2        ...

Network routing and switching assignment- instructionsyou

Network Routing and Switching Assignment- Instructions You must do this assignment individually, that is, on your own. Type all your answers in the Template for Your Answers Section of this document and upload only that ...

Tcpip network assignmentneed 8 ppt slides with at least 2

TCP/IP Network Assignment Need 8 ppt slides with at least 2 references. Your manager has tasked you to create two network diagrams that illustrate the Remote Employee Connection options for VPN connectivity. These diagra ...

Project- sample cyber security profileevery organization

Project- Sample Cyber Security Profile Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the curre ...

The handbook must be original student content and workin

The handbook must be original student content and work. In addition to describing the company to which the employee handbook applies, also address the issues of privacy, employee or applicant testing, and performance eva ...

Develop a network security policy for a global organization

Develop a network security policy for a global organization. The security was violated in different situations. There are various elements in which need to be discussed and researched to design and outline the policy. Di ...

Goals1 to understand the challenges of protocol design2 to

Goals: 1. To understand the challenges of protocol design. 2. To discover and appreciate the challenges of developing complex, real-world network applications. 3. Make sense of real-world sockets programming APIs. 4. To ...

1overviewthe learning objective of this assignment is for

1 Overview The learning objective of this assignment is for students to get familiar with the concepts in the security techniques such as symmetric and asymmetric encryption, hashing and certificates in Public Key Infras ...

Problem 1 consider the following protocol there exists a

Problem 1: Consider the following protocol. There exists a trusted server, T, that shares a secret key with any participant in the network. That is, for a participant A, A and T share a secret key K A . The protocol allo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate