• Q : Protocol used by dhcp at transport layer....
    Computer Networking :

    Which protocol does DHCP use at Transport layer? IP, TCP, UDP or ARP.

  • Q : Main types of access control lists....
    Computer Networking :

    What are the two main types of access control lists (ACLs)? Standard, IEEE, Extended or Specialized.

  • Q : Explaining malicious attacks and threats against network....
    Computer Networking :

    Analyze and assess any potential malicious attacks and threats that might be carried out against network.

  • Q : Bus configurations found in pc....
    Computer Networking :

    Identify the two main bus configurations normally found in a PC. Describe why one has a limiting factor that affects the overall performance of the computer.

  • Q : Ways in which businesses use internet services and protocols....
    Computer Networking :

    Explain three ways in which businesses use Internet services and protocols. (Such as, what is VoIP and how is it used?). Describe the differences among LANS, WANS, CANS, and MANS.

  • Q : Explaining critical path and length of the critical path....
    Computer Networking :

    You have the project with following tasks: Task A takes 40 hours and could start after project starts. Task B takes 25 hours and must happen after the project starts. Task C should happen after Task

  • Q : Method uses clock to generate one-time passwords....
    Computer Networking :

    Propose one method which uses a clock to generate one-time passwords. Describe your method with sufficient details.

  • Q : Onshore and offshore banking....
    Computer Networking :

    Distinguish between a rollover and a revolver loan and give a description of the syndicated loan in Eurocurrency market? Can onshore and offshore banking co exist?

  • Q : Frequency hopping and direct sequence modulation....
    Computer Networking :

    Write down the three advantages of using optical fiber. Make dissimilarity between “Frequency Hopping” and “Direct Sequence Modulation”

  • Q : Packet-level and application-level firewall....
    Computer Networking :

    Describe four issues which are usually addressed in the Needs Analysis phase in building-block approach to network design. Sketch a typical hybrid star-bus topology paying attention how the clients an

  • Q : Suitability and properties of isdn and adsl....
    Computer Networking :

    Compare the suitability and properties of ISDN and ADSL for this link. Can they be used for communicating multimedia data? Give reasons. Why is it essential for routers to exchange their routing inf

  • Q : Typical hybrid star-bus network topology....
    Computer Networking :

    Draw a diagram of typical hybrid star-bus network topology. Explain a good Network Management System (NMS) Environment and describe the factors which make it good.

  • Q : Layers of osi model-key elements of protocol....
    Computer Networking :

    List out the layers of the OSI model and briefly explain the function of each layer. List all the three key elements of protocol. Give a brief description of each of these key elements.

  • Q : Function of mail access protocol....
    Computer Networking :

    What is the function of Mail Access Protocol? Explain briefly the two download modes of POP3. Write down the name of various layers of OSI-7 model.

  • Q : Functionality of a router and topology....
    Computer Networking :

    Explain, with the assist of a diagram, a Star topology of the network of your choice. Elaborate on the employ of a MAN and give an example of one. Describe the functionality of a router.

  • Q : Congestion control and flow control....
    Computer Networking :

    Explain briefly the differentiation between congestion control and flow control in relation to a connection-oriented protocol such as TCP.

  • Q : Popular electronic mail access protocols....
    Computer Networking :

    Write down the name of three popular electronic mail access protocols. What do you understand by the term DNS? Why does DNS employ a distributed approach as opposed to a single server?

  • Q : Function or architecture of a mashup....
    Computer Networking :

    Demonstrate with the help of a diagram the function or architecture of a Mashup. A Mashup server is more or less comparable to routers with link encryption, therefore raises the risk of man-in-the-mi

  • Q : Purpose of third-party modules for use with apache....
    Computer Networking :

    Explain Apache architecture using the suitable diagram. Describe the purpose of third-party modules for use with Apache. Describe the different components which can be found inside a configuration fil

  • Q : Client jamming and base station jamming....
    Computer Networking :

    Describe what you understand by the term IEEE 802.11? What is the differentiation between client jamming and base station jamming?

  • Q : Major problems with access points in wireless lan....
    Computer Networking :

    Wireless Access points have been recognized to have various security vulnerabilities which can lead to breach of Secured wired networks. IEEE 802.11 standards have identified numerous key points for

  • Q : Rts and cts frames....
    Computer Networking :

    Explain the differentiation between WPA and WPA2. What are RTS and CTS frames and hence, describe how it works.

  • Q : Choosing an appropriate network configuration....
    Computer Networking :

    A company intends to install a LAN in its headquarters building. Choose an appropriate network configuration for each of the following situations. In each case:

  • Q : Functionality of smtp-pop3 and mime....
    Computer Networking :

    Explain protocol? Describe the functionality of SMTP, POP3 and MIME in detail. Expalin active server page. Expalin the steps to access a database from active server page.

  • Q : Data communication lines or signals....
    Computer Networking :

    A multiplexer takes several data communication lines or signals and transforms them into one data communication line or signal at the sending location. Describe the fundamental methods of multiplexi

©TutorsGlobe All rights reserved 2022-2023.