Types of networking / internetworking devices
Explain various types of networking / internetworking devices?
Expert
Repeater :
It is also known as regenerator, it is an electronic device which operates at physical layer. It receives the signal within the network before it becomes weak, redevelops the original bit pattern and places the refreshed copy back into the link.
Bridges :
It operates both within the physical and data link layers of LANs of similar type. They divide the larger network into smaller segments. They consists of the logic which permit them to keep the traffic for every segment separate and so are repeaters which relay a frame only the side of the segment consisting the intended recipient and the control congestion.
Routers :
They relay the packets among the multiple interconnected networks. They function within the physical, data link and network layers. They consist of the software which enables them in order to estimate which of various possible paths is best for the particular transmission.
Gateways :
They transfer the packets among the networks which have several protocols. They recognize a packet formatted for the one protocol and transform it to the packet formatted for other protocol before transmitting it. They function in all the seven layers of OSI model.
Explain the term Hypertext Transfer Protocol (or HTTP)? Answer: Hypertext Transfer Protocol (or HTTP) is a networking protocol for collaborative, distributed, hyperm
Communications Channels: It is a pathway over which information can be communicated. It might be stated by a physical wire which connects communicating devices, or through radio, laser, or other radiated energy source which has no obvious physical pre
What is a Weak Key for Block Cipher?
Transport Layer in OSI Model: The Transport layer implements reliable data transport services. The different functions of Transport Layer are illustrated below: • The transport layer is meant for transmitting
Write down the advantages of the I-TCP.
FTP Spoofing attack: In the background of network security, a spoofing attack is a circumstance in which one person or program effectively masquerades as another by falsifying data and thus gaining an illegitimate benefit.
Describe the term DNS resource record?
What is the difference between forwarding of a unicast IP packet and the forwarding of a multicast IP packet?
Define Optical fiber and describe its Advantages and Disadvantages?
Give a brief explanation of web service with example.
18,76,764
1940157 Asked
3,689
Active Tutors
1418165
Questions Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!