Answer Posted / crchauhan
i think it is about 1,2,3,tier architectures....so u need
to search about this one.
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
what is piggy backing?
If i want to crack any serial key using system information then how can i do it? Is it possible?
What are the reasons for using layered protocols ?
Define Enterprise Networks
Enumerate the main responsibilities of data link layer ?
Differentiate between stop-and wait ARQ and Go-back-N protocol.
If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.
Why TCP/IP reference model is more popular than OSI model ?
Subnet the class C network address 198.67.25.0 into eight subnets. Why are the ‘all ones’ and ‘all zeroes’ subnets not used ?
What do you mean by link to link layers of OSI reference model? Explain their functions briefly?
Explain leaky bucket algorithm and compare it with token bucket algorithm.
Why transport layer protocols like TCP and UDP are called end-to-end protocols. What is the difference between them?
What is source route
Can a switch be used to connect two LANs with different network IDs ?
Is the nyquist theorem true for optical fibre or only for copper wire ? Explain.