Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) Can we extend the range of Wifi with the use of some softwares, if yes, which one? Or is there any hardware to do so, how much will it cost?
2701Draw diagrams for the waveforms you would expect when the bit sequence 10111001 is transmitted on IEEE 802.3
3231With the aid of a diagram explain how CSMA/CD is implemented in a 10BASE T hub network. Why is Ethernet mostly used as a 'best effort' datagram service?
Sri Lanka Institute of Information Technology (SLIIT), Virtusa,
1 5976hey friends…. i m working in Avaya India Pvt. Ltd.(on third party payroll) as customer support engineer since last 1 year. Now i m thinking to do Protocol development course (LTE,MAC,RLC,RRC,3G etc). but i m a bit confuse that it will help me or not. whether i can get a good job or not. so please help me out by your suggestions...
1 2902How would you monitor and maintain the local area network, email, internet & intranet systems to ensure data security and prevent occurrence of faults?
HCL,
2319congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....
1668what are the different types of datasets related to the network intrusion detection system?
OVGU,
1589SonicWALL keep on fail over after upgrade from 6.2.2.2 to 6.2.6.0.anyone have encounter this and what is the next step to solve the issue
1623
Describe different types of networks.
What is ftp used for?
What happens to the theoretical transfer rate when a full duplex transmission mode is used?
How to make a port to a dedicated port through dll registration in a windows system
What is IP address range?
How do you find your ip address on windows?
Can tcp and udp share the same port?
what is rsa algorithm?
when affected the system from virus , which paths will be it stored in system ?
What does an ip address mean?
What is the core naming mechanism?
Explain the advantage and disadvantage of ethernet ?
Explain Synchronous transmission.
What is the role of single sign on in authentication technologies?
What is one advantage of mesh topology?