Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem 1) prepare brief notes on:

(a) describe the function of DNS ?

(b) What do you mean by a term Socket?

(c) What are the applications of Transport layer in OSI model?

(d) What do you mean by a term SLIP?

(e) describe the difference between analog and digital signals.

(f) What do you mean by a term SMTP?

(g) describe the star, bus and ring topology of LAN.

(h) Define push feature of TCP.

(i) prepare down the advantages and disadvantages of baseband and broadband transmission.

(j) Why CSMA/CA can’t used in wireless network?

problem 2) Describe the difference between message switching and frame relay.

problem 3) What is the difference between guided and unguided transmission media? Describe the guided transmission media and its advantages over unguided media.

problem 4) What is meaning of error control and its types? Describe in detail.

problem 5) What is FDDI? Describe its working and applications.

problem 6) What is Routers describe its working and applications?

problem 7)(a) What is error detection. Describe CRC in detail with the help of ex.

(b) Describe the sliding window flow control in Detail.

problem 8) List the advantages of UDP over TCP. Describe how TCP is encapsulated in an IP datagram.

problem 9) prepare a brief note on the following:

i) Bridges.

ii) HDLC and SDLC

iii) ARP and RARP protocol.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M98296

Have any Question? 

Related Questions in Computer Network & Security

Your report should detail the following section and points

Your report should detail the following section and points below commensurate with the marks allocated and be addressed primarily to the management of CCA Pty Ltd who are not security or IT experts. Some issues may requi ...

Any encryption algorithm like caesar cipher algorithmshould

Any Encryption algorithm (like caesar cipher algorithm)should be used and implemented for the information given in the document. Cryptography Assignment Given the following S-Boxes: S1= [ 15        10            2        ...

Assignmentoverviewyou will provide a detailed network

Assignment Overview You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria: • Each Classroom Computer Lab will be on a separate network ( ...

Taskprovide short answers to the following six questions

Task Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document (MS Word or PDF, NOT both) along with title page and submit it online using EAS ...

Performance architecture papercontinuing with a company you

Performance Architecture Paper Continuing with a company you selected in Week Two, evaluate network management components on a global scale. Write a 2- to 3-page paper that evaluates and discusses the following: • Impact ...

Topic proposal for term paper - in order to show

Topic Proposal for Term Paper - In order to show understanding on network-related issues, each student is expected to complete a paper on a relevant network topic of the students choosing and interest. For this assignmen ...

Questions-q1 write short note on1 gigabit ethernet2 fiber

Questions- Q1. Write short note on: 1. Gigabit Ethernet 2. Fiber Distributed Data Interface (FDDI) Q2. Define and explain address resolution protocol (ARP). Describe ARP packet generation. Q3. What is the use of TCP cong ...

Using power flow analysis for network Using Power Flow Analysis for Network

Using Power Flow Analysis for Network Reconfiguration Electricity distribution networks connect the high-voltage transmission system to users. Conventional distribution networks have been developed over the last 50 years ...

1 why is the top-down approach to information security

1. Why is the top-down approach to information security superior to the bottom-up approach? 2. What is the difference between a threat agent and a threat? 3. What was important about Rand Report R-609? 4. What type of se ...

Cyber crime and security 2168alleged computer hacker gary

Cyber Crime and Security (2168) Alleged computer hacker Gary McKinnon of the United Kingdom has publicly admitted to compromising computer systems belonging to NASA and the Department of Defense. Using information from y ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate