Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Write down the two types of multicast protocols for ad hoc wireless networks based on type of operation. Describe in detail Weight-Based multicast protocol.
How does NRZ – L differ from NRZ – I? Explain the mode for propagating light along optical channels.
What do you mean by Distributed Systems. What do you understand by Topology? Explain it with suitable example.
What do you mean by ARP and RARP? Write detailed notes on The Point-to-Point Protocol.
Describe Multicast Routing Protocols MOSPF, DVMRP in detail.
Write short notes on Electronic Mail? Explain IMAP, POP3,SMPTP protocol.
What do you mean by Hub? Describe Passive and Active Hubs in detail.
What do you mean by RSA Public-key Cryptosystem? Describe RSA encryption algorithm with the help of an illustration.
Describe effects of limited bandwidth, delay distortion ad noise.
Define the term Frame Relay? Give some of its characteristic? As well, describe the frame format of various fields of the Frame Relay?
What are the merits of layered architecture of the network model?
What are the possibilities for the location of care-of-address (COA)?
What do you mean by anchor point? What is generic routing encapsulation?
Write down the examples for service scenarios identified in WATM? Write down the major problem for WATM during handover?
What is called the exponential growth of the congestion window?
Describe classical TCP improvements and snooping TCP. What do you mean by Dynamic source routing?
What is the function of bastion host? Write down the classes of intruders and explain in detail.
What do you mean by honey pots? Explain with suitable example. What do you mean by IP address spoofing?
Illustrate the Characteristics or features of the Queue System and describe M/M/1 Queue model.
Describe in detail various multiple accessing methods used in the computer networks.
Compare and contrast the TCP/IP protocol with the ISO-OSI protocol.
By using MIT public key cryptosystem with a = 1, b = 2, c = 3 and so on. Determine e and encrypt the string “abcdefghij” for p = 5, q = 11 and d = 27.
In a digital system, 8-input links are multiplexed by using STDM. Each of the input sources is making 1024 bits per second.
Write down the principal difference between the synchronous and asynchronous communication?
What do you mean by the term software design? Give the diagram of translating analysis model to design model and describe it.