Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is wide-mouth frog?

Answer Posted / annoyket

the answer above is not the one.....obviously!!
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to
each other while also preventing eavesdropping or replay
attacks, and provides for detection of modification and the
prevention of unauthorized reading.

Is This Answer Correct ?    3 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Differentiate between stop-and wait ARQ and Go-back-N protocol.

4368


What do you mean by link to link layers of OSI reference model? Explain their functions briefly?

2111


What is logical link control

1312


Explain network equipment used in wired-LANS and explain the function of Hub, Switch, and bridge.

1837


what is disk interleaving? why is disk interleaving adopted?

2662


Differentiate between IEEE 802.3, IEEE 802.4 and IEEE 802.5 standards.

5008


what are the major componets of client server application?

2263


what is Voltage levels of rs232x?

1279


Explain Token ring

1637


List out the main responsibilities of the network layer.

1903


Which device is needed to connect two LANs with different network Ids ?

1781


1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?

2805


A binary signal is sent over a 3-khz channel whose signal-to-noise ratio is 20 db.Calculate the maximum achievable data rate ?

2956


What is traffic shaping

1257


Why transport layer protocols like TCP and UDP are called end-to-end protocols. What is the difference between them?

3339