Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Describe the operation of Selective Repeat ARQ with neat sketches. Describe services offered by ISDN supporting existing voice & non-voice services.
A large slotted ALOHA system generates 50 requests/sec which includes both originals & retransmissions. A time-slot is 40 msec. Find the Chance of success in first attempt.
Describe the term Information and Communication Technology. Explain the various generations of computers and give an account of major developments in each generation.
What are the functions of authentication and Encryption in GSM? How is system Security maintained? Describe the architecture of GSM Network. Describe all the entities.
Examine the appropriateness of the Hofferbert model of policy-making with that of Hodgkinson. Illustrate your answer with examples.
The Government of Mauritius has improved the regulatory framework to comply with international best practices by introducing different pieces of legislation such as the Computer Misuse and Cyb
Provide four examples of “Traditional Internet Applications” and four “Newer Internet Applications”.
Make a distinction between “Connectionless Protocols” and “Connection-Oriented Protocols”. Provide two merits and two demerits of “Connection-Oriented Protocols”.
Compare IPv4 and IPv6 packet header. List the NVT character set with meanings for option negotiation in TELNET. Write a detailed note on connections in FTP.
From the case study we can deduce that there is a need to have vulnerabilities for a hacker to break in the system. Hence, what are the dissimilar significant steps which require to be followed to m
How can unified communications be useful? Describe four examples that would show the usefulness of unified communication.
Referring to the diagram which is given below, configure Routers 1, 2, and 4 with Internet Protocol (IP) addresses, and ping between them to test connectivity. Write down complete commands and the o
Explain the process and benefits of Autonegotiation. Name all the three major components to Multilayer Switching (MLS).
What are the two main types of fiber employed in Ethernet network, and describe their uses. What is the significance of the Ethernet Cross-Over cabling?
What are the major reasons for selecting MIP compared to DHCP or SIP for large scale architectures? Explain the triangular routing problem in MIP mechanism.
Explain the implementation process of Access Control List (ACL) in a network environment? Elaborate step by step.
What are the security strategies you can create for your web application? In what way you can secure your network against virus and Hoax Virus Warnings?
Explain the basic goals of privacy. Also explain the function of patent in network management.
PGP stands for: Private Good Privacy, Public Good Privacy, Process Good Privacy or Pretty Good Privacy.
What is the publishing language for World Wide Web. What are the three basic foundation tags for the HTML document.
Illustrate out the functions of modulator and source encoder in digital communications system. By using suitable examples, make a distinction between the simplex and half duplex mode of communication.
PSTN is what kind of network? Circuit switched network, Public switched network, Packet switched network or Private switched network.
The main elements of protocol are the syntax, timing and semantics. Provide a brief explanation of each of these main elements.
What four types of active attacks and list all their respective attacks to which security services? Make a distinction between authentication and non-repudiation.
Describe how CSMA/CD operates and illustrate how Ethernet deals with collisions. Provide the structure of a typical Token Ring frame and describe how communication is effected in a Token Ring Network.