Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
why routine security audits are essentialit is essential that regular security audits are conducted to find out physically which computer is
security risks present on the networks lots of risks are present everywhere on internet as well as on intranet if it is not known what is being done
state the term - lot of care required while programmingit is a common and well-known saying that many developers of secure systems leave a back door
how firewall configuration makes all the difference the greatest blunder that any company make is to just install a firewall and think that they have
determine the disadvantages of socks protocolthe main problem with socks is that it lacks transparency to software developers and usersimplementation
illustrate the products based on socks protocolthere are a number of products based on socks specifications such as auto socks available in the
name the protocol which is networking middlewaresocks is a networking middleware a circuit-level gateway acting as a proxy and is placed at the
illustrate about the working of socks protocolsocks is an open industry-standard protocol advanced by the authenticated firewall traversal working
define the term socks- network securityas it is well known each type of network security protects data at a different layer of the osi model built-in
connection to backbone lanin most cases interconnection with stations on a wired backbone lan is needed for infrastructure wireless lans this is
explain in brief about the throughputthe medium access control protocol should make as well-organized use as possible of the wireless medium to
explain the terms - lan extension and ad hoc networklan extension a wireless lan integrated with a wired lan to extend the coverage area of the lan
determine the level of fibre channel standardthe fibre channel standard is organized into five levelsfc-0 the physical interface and media level
what is use of carrier sense multiple access carrier sense multiple access with collision detection csmacd is a form of medium access control in
what is the meaning of p-persistentif the medium is idle transmit with probability p and delay one time unit with probability 1 - p if the medium is
determine the definition of hdlchdlc has only one address field in a lan any station may transmit to any other station the receiving station needs to
store-and-forward switch the layer 2 switch accepts a frame on an input line buffers it briefly and then routes it to the appropriate output
explain the acknowledged connectionless servicethis is a cross between the previous two services it provides that datagrams are to be acknowledged
what is unacknowledged connectionless servicethis service is a datagram-style service it is a very simple service that does not involve any of the
what is star topologyeach station is directly connected to a common central node typically each station attaches to a central node via two
what is ring topologythe network consists of a set of repeaters joined by point-to-point links in a closed loop each station attaches to the network
determine about the tree topologya generalization of the bus topology the transmission medium is a branching cable with no closed loops the tree
illustrate the working of networking bus topologyall stations attach by appropriate hardware interfacing called as a tap directly to a linear
write the definition of sana san is a separate network to handle storage requirements the san detaches storage tasks from specific servers and makes
determine the term - backend lanbackend networks are used to interconnect large systems like mainframes supercomputers and mass storage devices the