No.
|
Active Hub
|
No.
|
Passive Hub
|
1
|
Active Hub acts as multiport
Repea...............
|
(0)
By
Milan Pandya
in
Networking
on
7/15/2015 2:21:36 AM
Read more...
|
Bus Topology
|
Bus topology is simplest form of network topologies. in this types of topology all nodes are connected to the single cable by the help of interface connector .this central cable is the backbone cable of the network and is known as BUS. All the nodes communicate with each other to the bus.
A signal form the source is broadcasted and it travels to all workstation connected to the bus cable although the message is bro...............
|
(0)
By
rutva shukla
in
Networking
on
9/18/2015 1:28:20 AM
Read more...
|
Difference between client server and web based application?
|
Different between client server and web based application
|
(0)
By
pooja kanojiya
in
Networking
on
7/17/2015 10:16:02 AM
Read more...
|
Q 5)Define topology name any four topologies in computer network?
|
Ans = Topology is the way that various component of a network like (node,links,etc) are arranged topology
define the layout,virtual shape or structure of network not only physically but also logically .The way in which
different system and nodes are connected and communicate with each other is determined by topology.
Type...............
|
(0)
By
bezad kasad
in
Networking
on
9/15/2015 1:37:07 AM
Read more...
|
Q 7) what do you mean by bandwidth and transmission rate?
|
Ans = In network communication the amount of data that can be sent across a wire in a given time each communication that passes along the wire decreases the amount of available bandwidth.
Bandwidth is a measurement of bitrate of available or consumed data communication resource expressed in bits per second or multiples of it.
|
(0)
By
bezad kasad
in
Networking
on
9/15/2015 1:42:16 AM
Read more...
|
Q 8)why do we require a twist in a twisted pair cable?
|
Ans= The twisted cable pair are twisted to cancel the effect of external magnetic field. Which can destroy the signal the twists cancels that effect
Twisted pair is the ordinary copper wire that connects home to reduce cross talk or electromagnetiinduction between pair of wires.
|
(0)
By
bezad kasad
in
Networking
on
9/15/2015 1:39:35 AM
Read more...
|
Diffrence betwwen unicast and mulicast communication whicg class of ip/address is used byb multitask communication
|
Q:satellite communication.
|

Ans:satelite communications is similar to terrestral microwave except that the satelite acts as one of the station. the satelite dose the funcation of an antena and the repiter together. ->in this figure,ground station a can send the information b waya satelite two frequency bound are used for sign...............
|
(0)
By
Panina Gamit
in
Networking
on
9/22/2015 4:54:55 AM
Read more...
|
Gateway
|
Gateway is combination of hardware and software, network point that acts as an entrance to another network.
A computer network is a collection of interconnected computing devices that can exchange data and share resources
A network’s protocol specifies a common set of rules and signals, Such as Ethernet or Token ring...............
|
(0)
By
hetal more
in
Networking
on
9/3/2015 4:24:05 AM
Read more...
|
Switches:-
|
A network switch is the small h/w devices that joins multiple computers within one local area network (LAN). Technically, network switches operate at second layer of the OSI standard, called “data link layer”.
It handle the message in frames. The switch is analyses the frames coming in on its entry ports and filter the data in o...............
|
(0)
By
hetal more
in
Networking
on
9/3/2015 4:27:16 AM
Read more...
|
Router :
|
In the environment consisting of several network segments with different protocols and architecture, a bridge may not be adequate for ensuring fast communication among all of the segments. A complex network needs a device, which not only knows the address of each segment, but also segment (called routing). Such device is called a router.
&n...............
|
(0)
By
hetal more
in
Networking
on
9/18/2015 2:04:52 AM
Read more...
|
EXPLAIN OSI MODEL.(physical layer,network layer,data link layer)
|
Introduction of OSI Model with all layers:
Established in 1947, the international standards organization (ISO) is a multination body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the open systems interconnection model. it was first i...............
|
(0)
By
sharmin haveliwala
in
Networking
on
9/19/2015 5:41:18 AM
Read more...
|
Explain TCP packet format.
|
(1)source port number
This 2 byte number signifies .The port number of the source computer.
(2)Destination port number
This 2 byte number signifies the port number of destination computer.
(3)sequence number
This 4 byte thread defines the number assigned to the first byte of
the data position contain in this Tcp packet.
(4)Acknowledgment number
&...............
|
(0)
By
Rahul Gamit
in
Networking
on
9/11/2015 11:07:20 PM
Read more...
|
Explain Advance TCP/IP.
|
1) Dynamic Host Configuration Protocol [DHCP]
Using DHCP each device that will used TCP/IP on your network must have a valid, unique IP address this address can be manually configured or can be automated through DHCP.DHCP is implement as a DHCP sever and DHCP client. The server is configure...............
|
(0)
By
Kuldip Gamit
in
Networking
on
9/19/2015 11:45:56 PM
Read more...
|
- Comparison of Client operation Systems
|
- Server Operating System Comparisons
|
Explain features of Public key Cryptography.
|
In combination, signature and encryption can be used to provide three features that customers demand, particularly for business to business E-commerce,
[1].Privacy:-
Properly Encrypted data can’t be read by anyone except the intended recipients. Because public key can be posted freely, complete strangers can communicate privat...............
|
(0)
By
Hiral Gamit
in
Networking
on
9/21/2015 1:10:38 AM
Read more...
|
Secret key cryptography
|
In a secret key system, two people who want to communicate use a single shared key that must be kept secret. The same key is used to encrypt
and decrypt data, so if a user loses the secret key or if it’s stolen, the data it encrypts becomes vulnerable secret key systems
tend to be fast and flexible, but their dependence on a single key makes them better suited for applications where you can
change the ...............
|
(0)
By
Hiral Gamit
in
Networking
on
9/21/2015 1:06:49 AM
Read more...
|
Public key cryptography
|
Instead of the single secret key used in a secret key system, public key systems use two keys, combined into a single key pair:
- A public key, which is designed to be spread freely around.
- A private key (also called a secret key), which must be held only by its owner and should never be publicly disclosed.
These keys complement each other, for example, if you encrypt something with your public k...............
|
(0)
By
Hiral Gamit
in
Networking
on
9/21/2015 1:12:46 AM
Read more...
|
| | | | |