Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
question a below is a capture of an ethernet ii frame which contains an ipv4 packet and a tcp segment give the source mac address for the frame in
question1 write short notes on reserved ip addresses and special use ip addresses2 explain about the packet switching mechanism based on virtual
question 1 describe the functioning of cloud computingquestion 2discuss on platform as a servicequestion 3discuss the steps involved in effective
probelm 1give the history and evolution of wireless communication systemcomplete explanationprobelm 2describe the process of components
problem 1bring out the differences between pop and imap4problem 2discuss user datagram protocolproblem 3explain the various steps in tcp congestion
problem 1describe the architecture of the tcpip protocol suiteproblem 2describe the principle of operation of rexec protocolproblem 3describe the
problem1 explain the term switching describe the following switching mechanismsa circuit switchingb packet switchingc message switchingdefining
problem1 explain the tcpip reference model with diagram2 describe the followingmaximum data rate of a channelsignal to noise ratio 3 describe the
problem 1show what are the benefits of project quality managementbullcustomer satisfactionbullreduced costbullincreased competitivenessbullfulfilment
question 1why do we need a law of contractaexplanationreasons to have a law of contractbexplain the close procurement project process- explanation
problem 1what is the function of auc in the gsm architecture explanation of hlraucarchitecture of gsm problem 2show the layered architecture of the
problem 1 show various features of a 1g networktotal three features for each feature of 1gproblem 2 describe how a cellular network works with
problem 1what does the snmp access policy show snmp community diagram snmp access policy problem 2does there exist any formal functional
problem 1list measurable entities on which the quality of service in a data communication network dependsproblem 2show the features of a typical
question a how does a 2-key rollover differ from the n-key rolloverb why is isolation so important in interfacingc explain what is software
questiona state the strong law of large numbersb data have been collected on response times in minutes at a fire station the data are27 18 08 14 12i
questiona data on four variables are stored in a file called file1dat the first line of the file is the variable names f x y and z give the r
questiona explain how the diffie-hellman key establishment protocol worksb prove that the diffie-hellman key establishment protocol is vulnerable to
questiona prove that every positive integer n can be factorized into a product of prime powersb state the fermat-euler theorem as needed in the rsa
questiona a string of ciphertext was enciphered using an aplusmnne transformation of single letters in a 28-letter alphabet consisting of a to z a
questiona briefly describe the steps involved in network simplex methodb in radix heap algorithm the technique of buckets is employed however this
questiona define what you understand by the following terms in network flowsi undirected pathii directed pathiii directed cycleiv treein each of the
questiona explain briefly what is meant client-server computingb distinguish among client process and server processc what are the four basic
questiona the aim of a computer network is to increase efficiency and reduce costs explain how networks of computers achieve the aboveb describe the
questiona security is a very crucial component in a distributed system describe three properties of a secure channelb during packet transmission