Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1: Why transport layer protocols such as TCP and UDP are termed as end-to-end protocols. What is the basic difference between them?

problem 2: Distinguish between:

a) Baseband co-axial cable and broad band coaxial cable
b) Optical fiber and twisted pair
c) SMTP and SNMP

problem 3: What are the fundamental functions of the data link layer? prepare down the fundamental features of HDLC protocol? Could HDLC be used as the data link protocol for a LAN? Validate your answer.

problem 4: The physical layer service is a non-confirmed service. Suppose that some bits of data are lost throughout transmission over physical media, which layer will detect the loss and take some corrective measures. Describe any one technique clearly depicting how this operation is functioned.

problem 5: What are the benefits of cell switching which is used in ATM?

problem 6: Outline and describe the main fields in Ethernet IEEE 802.3 frame. What are the key objectives of preamble?

problem 7: Find out the average number of transmission needed to send a frame of length 1600 bytes correctly, if the bit error rate is 1 x 10-6.

problem 8: Describe what is meant by the term ‘integrated service digital network’. Provide three reasons a company might select an ISDN link in preference to a leased line.

problem 9: Subnet the class C network address 198.67.25.0 into eight subnets. Why are the all ones and all zeroes subnets not employed?

problem 10: What do you understand by the word ‘structured cabling’? Illustrate the main rules which must be used when installing a cable. Show that maximum cabling area for LAN for horizontal cabling runs is around 200m.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M97035

Have any Question? 


Related Questions in Computer Network & Security

1 list and describe the four types of computer networks

1. List and describe the four types of computer networks from largest to smallest.  2. Define client/server computing, packet switching, and TCP/IP.  Explain how these three things make the Internet so powerful and robus ...

1a briefly explain how an integrity check value icv may be

1. (a) Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors. (b) When using an ICV, explain why (i) a message might be transmitted correctly but the receiver believes t ...

Case projectnbsp law firm companynbsp law firm lincoln

CASE PROJECT:  LAW FIRM Company:  Law Firm: Lincoln Partners, Esq. A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth.  The Law firm curre ...

Security management assessmentimplementing basic security

Security Management Assessment Implementing basic security management is an important task for system administrators, as security is important to today's organizations. IT specialists are on the front lines of protecting ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Benefits of cloud-based office productivity softwarebased

Benefits of Cloud-based Office Productivity Software Based on what you have learned about using cloud-based office productivity software, create a 5-slide presentation to the department head or CEO to convince him or her ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

1 when an organization undertakes an infosec-driven review

1. When an organization undertakes an InfoSec-driven review of job descriptions, which job descriptions must be reviewed? Which IT jobs not directly associated with information security should be reviewed? 2. List and de ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Firewall fundamentalsactions for firewall

Firewall Fundamentals Actions for 'Firewall Fundamentals Firewalls are considered the key element in securing networks. A firewall is usually a computer that sits on two different networks and passes allowed traffic betw ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen