Find your question
and Get expert's answers*
Homework Help
*Click here to submit
Refer a Friend
Discount up to 15%*
Prepared References
Save up to 50%*
Homework Help >> Computer Networking
  Explaining the working of token ring and token bus

Answer the following questions.

Question 1) List and describe about various types of cabling used in networking.

Question 2) What do you mean by piggybacking? Describe the working of go back by n protocol of Data Link Layer.

Question 3) What do you mean by tunnelling? Describe various methods used for making frames.

Question 4) Describe the difference between connectionless and connection oriented services by taking appropriate examples

Question 5) List and describe briefly any two routing protocols in detail.

Question 6)(a) Compare the working of Token ring and Token bus.

(b) List and describe different types of switches used in communication.

Question 7) What is an IP address? List its various classes.

Question 8) Describe the concept of Classless Inter domain routing.

Question 9) Describe the functioning of different, layers of TCP/IP protocol architecture. Also list out various protocols which act at different layers of TCP/IP protocol architecture.




Answer

Explaining the working of token ring and token bus


Request for solution file

Course: Computer Networking

Ref. No:- TGS08384

Like US:-
Assignment Help

Ask an Expert & Get Answer

  • Quality work delivery
  • 100% Plagiarism free
  • Time on delivery
  • Privacy of work
Order Now
More Computer Networking Questions


What do you mean by error correction? Describe the procedure to correct the error using hamming code with suitable example.
IN SNORT If I only went to a few web sites, why are there so many alerts?
Discuss in scholarly detail, in general terms, what application areas are supported by Bluetooth. The answer need to be at least 300 words. Please inc
Explain the differentiation between WPA and WPA2. What are RTS and CTS frames and hence, describe how it works.
Nowadays, Green Computing and Green Communications technologies are used to make a green earth in IT industry. In dealing with security,
What do you mean by subnet masks? Explain with full description. Which IP address is called Loop back Address?
Write short notes on Electronic Mail? Explain IMAP, POP3,SMPTP protocol.
A large slotted ALOHA system generates 50 requests/sec which includes both originals & retransmissions. A time-slot is 40 msec. Find the Chance
An application layer protocol usually defines four things. What are such four things?
Describe the use of multiplexing in transport protocols. Explain the credit scheme used by TCP for flow control.