Answer Posted / arunanshu
Ensures entigrity of Header Values. It is applied only on
the IP Header not Data.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Discuss the different factors affecting congestion control algorithms. ?
Explain Network Topologies and their uses.
Write short note on any four of the following:
what is piggy backing?
Explain Salient difference between ISO-OSI and TCP/IP models.
What MAU?
what are the two sub layers of data link layer called ?
Write two ways in which computer applications differ from network applications ?
Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.
Define Wireless Networks
1. What is LAN segmentation? Why it is used? What are the different techniques to create LAN segments?
what is disk interleaving? why is disk interleaving adopted?
Explain Traffic shaping using token bucket algorithm
hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash
Explain CSMA/CD