Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
How does Switch learn Mac Address when pc1 wants to communicate with pc2 and pc3? Explain the process with the help of diagram
0
votes
468
views
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
0
votes
0
answers
248
views
How does Switch learn Mac Address when pc1 wants to communicate with pc2 and pc3? Explain the process with the help of diagram
asked
Nov 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
2.1k
views
What is the bit and byte stuffing. Explain this concept with help of neat diagram
asked
Apr 14, 2021
in
Computer Networks
by
anonymous
+1
vote
0
answers
669
views
You have been asked to develop a system that will help with planning large-scale event and parties, using an activity diagram model the process context for such a system that shows the activities involved in planning a party
asked
Nov 10, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
341
views
When routing to another LAN, in addressing, only MAC address got changed. Justify your answer with proper figure.
asked
Apr 19, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.6k
views
Define Network Configuration. What are the various types of the network configuration, explain briefly with neat diagram. Also give the difference between peer to peer and client/server networks?
asked
Aug 26, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
811
views
With the help of examples, explain in details the concept and process of Value Based Software Engineering.
asked
Apr 22
in
Software Engineering
by
anonymous
+1
vote
1
answer
605
views
Explain why change is inevitable in complex systems and examples of software process activities that help predict changes and make the software being developed more resilient to change?
asked
Mar 29
in
Computer Architecture
by
anonymous
+1
vote
1
answer
2.1k
views
Explain in details internet,intranet and Extranet with neat diagram. Also write the challenges of intranets and extranets?
asked
Aug 26, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
510
views
What is MAC address? Explain the role of address resolution protocol(ARP)
asked
Nov 27, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
151
views
What inter-process communication medium allows processes to communicate without sharing the same address space?
asked
Jan 10
in
Compilers & Operating Systems
by
(user.guest)
0
votes
0
answers
246
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
225
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
119
views
With the support of a properly labeled diagram, briefly explain the engineering problem-solving follow process
asked
Nov 8, 2021
in
Computational Tools
by
(user.guest)
+1
vote
1
answer
4.1k
views
How does SMTP mark the end of a message body? How about HTTP? Can HTTP use the same method as SMTP to mark the end of a message body? Explain.
asked
Sep 25, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.8k
views
Which layers in the Internet protocol stack does a router process? Which layers does a link-layer switch process? Which layers does a host process?
asked
Jun 19, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
7.4k
views
Which layers in the Internet protocol stack does a router process? Which layers does a link-layer switch process? Which layers does a host process?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
378
views
Explain how aspect interference can arise and suggest what should be done during the system design process to reduce the problems of aspect interference.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
0
answers
355
views
Recall that TCP can be enhanced with TLS to provide process-to-process security services, including encryption. Does TLS operate at the transport layer or the application layer?
asked
Feb 3
in
Computer Networks
by
anonymous
+2
votes
1
answer
6.0k
views
An Ethernet MAC sublayer receives 1510 bytes of data from the LLC layer. Can the data be encapsulated in one frame? If not, how many frames need to be sent? What is the size of the data in each frame?
asked
Sep 24, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
3.8k
views
An Ethernet MAC sublayer receives 42 bytes of data from the LLC sublayer. How many bytes of padding must be added to the data?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
1.8k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
507
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 131.107.256.80
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
797
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid:
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
2.9k
views
Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
755
views
Explain with the help of an example why 5 uninformed search is not appropriate to solve CSP?
asked
Sep 3, 2020
in
Artificial Intelligence
by
anonymous
0
votes
1
answer
2.6k
views
True or false: When a BGP router receives an advertised path from its neighbor, it must add its own identity to the received path and then send that new path on to all of its neighbors. Explain.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.7k
views
What are the stages of Software development lifecycle to develop a software product.explain with the diagram ?
asked
Aug 31, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
883
views
Duplicate: Explain why a high-quality software process should lead to high-quality software products. Discuss possible problems with this system of quality management.
asked
Feb 1, 2021
in
Computer Networks
by
anonymous
+1
vote
0
answers
119
views
Discuss The Exceptio Non Adimpleti Contract Us With Regard To Its Definition, The Principles Of Reciprocity, How Reciprocity Is To Be Determined, As Well As When The Defence Can Be Raised?
asked
Sep 11, 2021
in
Law for Engineers
by
anonymous
0
votes
0
answers
255
views
Your friend also wants to know why congestion occurs and how to prevent it? Provide proper explanation.
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.5k
views
An address space uses three symbols: 0, 1, and 2 to represent addresses. If each address is made of 10 symbols, how many addresses are available in this system?
asked
Jul 3, 2020
in
Computer Networks
by
anonymous
0
votes
2
answers
5.3k
views
Why is an ARP query sent within a broadcast frame? Why is an ARP response sent within a frame with a specific destination MAC address?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
3.3k
views
Why will two ISPs at the same level of the hierarchy often peer with each other? How does an IXP earn money?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
392
views
What actions do the base station take to ensure that the loss probability of a transmitted frame does not increase when a mobile node gets farther away from a base station
asked
Dec 26, 2021
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
3.1k
views
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets from the file.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
224
views
When is a function said to be recursive? Explain the concept of recursion with examples
asked
Nov 14, 2021
in
Programming Languages & Algorithms
by
(user.guest)
+1
vote
1
answer
1.5k
views
Look over your received emails, and examine the header of a message sent from a user with an .edu email address.
asked
Sep 25, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
854
views
A software system will be built to allow drones to autonomously herd cattle in farms. These drones can be remotely controlled by human operators. Explain how multiple architectural patterns can fit together to help build this kind of system.
asked
Jul 10, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
209
views
In TCP Header format if a device wants to send 8 bytes of data. Is it valid or not? Explain why
asked
Oct 1, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
468
views
With reference to the Processor performance equation, explain how both the RISC and CISC based computer architectures designs seek to increase processor performance.
asked
Aug 23, 2019
in
Computer Architecture
by
anonymous
+2
votes
1
answer
228
views
Why to Learn java Programming? also explain the key advantages of java programming?
asked
Aug 31, 2021
in
Programming Languages & Algorithms
by
anonymous
+1
vote
1
answer
2.9k
views
The data rate of 10Base5 is 10 Mbps. How long does it take to create the smallest frame? Show your calculation.
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
4.9k
views
Imagine the length of a 10Base5 cable is 2500 meters. If the speed of propagation in a thick coaxial cable is 200,000,000 meters/second, how long does it take for a bit to travel from the beginning to the end of the network?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
1.3k
views
Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile nodes to use the same care-of address in mobile IP? Explain your answer.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
572
views
What is a switch statement and how does it differ from a multy-way "if and then else" structure?
asked
Feb 17, 2021
in
Programming Languages & Algorithms
by
anonymous
0
votes
1
answer
1.1k
views
Internet entities (routers, switches, DNS servers, Web servers, user end systems, and so on) often need to communicate securely. Give three specific example pairs of Internet entities that may want secure communication.
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
735
views
Section 15.4 includes a C program that calculates the greatest common divisor of two integers. Describe the algorithm in words and show how the program does implement the Euclid algorithm approach to calculating the greatest common divisor.
asked
May 16, 2021
in
Computer Architecture
by
anonymous
0
votes
1
answer
660
views
Explain the process of Analog to Digital conversion
asked
Nov 7, 2021
in
Computer Networks
by
(user.guest)
+3
votes
1
answer
1.6k
views
Explain the process of Analog to Digital conversion in wireless communications
asked
Jul 24, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
137
views
What are the problems that the TCP may face with the emergence of high speed networks and how can these be addressed?
asked
Apr 14
in
Computer Networks
by
(user.guest)
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...