Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
describe about the network equipment and connectivity network equipment and connectivity should address various networking equipments such as routers
define the analog audio and video conferencing systemswhen analog audio and video conferencing systems were used the procurement and installation was
what are the value added servicesmany organisations are demanding higher services also called value added services such as faxing minimal cost call
explain about the intranet hardware and softwareintranets not only provide a secure environment for companies but also provide an excellent working
state the example of security audit as case study linda narrates one of her experience about a security audit she was performing a spot audit where
why routine security audits are essentialit is essential that regular security audits are conducted to find out physically which computer is
security risks present on the networks lots of risks are present everywhere on internet as well as on intranet if it is not known what is being done
state the term - lot of care required while programmingit is a common and well-known saying that many developers of secure systems leave a back door
how firewall configuration makes all the difference the greatest blunder that any company make is to just install a firewall and think that they have
determine the disadvantages of socks protocolthe main problem with socks is that it lacks transparency to software developers and usersimplementation
illustrate the products based on socks protocolthere are a number of products based on socks specifications such as auto socks available in the
name the protocol which is networking middlewaresocks is a networking middleware a circuit-level gateway acting as a proxy and is placed at the
illustrate about the working of socks protocolsocks is an open industry-standard protocol advanced by the authenticated firewall traversal working
define the term socks- network securityas it is well known each type of network security protects data at a different layer of the osi model built-in
connection to backbone lanin most cases interconnection with stations on a wired backbone lan is needed for infrastructure wireless lans this is
explain in brief about the throughputthe medium access control protocol should make as well-organized use as possible of the wireless medium to
explain the terms - lan extension and ad hoc networklan extension a wireless lan integrated with a wired lan to extend the coverage area of the lan
determine the level of fibre channel standardthe fibre channel standard is organized into five levelsfc-0 the physical interface and media level
what is use of carrier sense multiple access carrier sense multiple access with collision detection csmacd is a form of medium access control in
what is the meaning of p-persistentif the medium is idle transmit with probability p and delay one time unit with probability 1 - p if the medium is
determine the definition of hdlchdlc has only one address field in a lan any station may transmit to any other station the receiving station needs to
store-and-forward switch the layer 2 switch accepts a frame on an input line buffers it briefly and then routes it to the appropriate output
explain the acknowledged connectionless servicethis is a cross between the previous two services it provides that datagrams are to be acknowledged
what is unacknowledged connectionless servicethis service is a datagram-style service it is a very simple service that does not involve any of the
what is star topologyeach station is directly connected to a common central node typically each station attaches to a central node via two