Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
Network Technology involves the use of data systems to manage and deliver digital resources over a computer network. From your point of view, which network technology is better for any case.
0
votes
189
views
asked
May 25, 2021
in
Computer Networks
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
0
votes
1
answer
1.3k
views
Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile nodes to use the same care-of address in mobile IP? Explain your answer.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.0k
views
Why a network protocol would want to use UDP over TCP? Give an example of an application that would benefit from using the UDP protocol
asked
Oct 6, 2021
in
Computer Networks
by
anonymous
+2
votes
1
answer
10.5k
views
Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end-to-end delay. Which of these delays are constant and which are variable?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
196
views
Use the trial control limits from part (a) to identify out of control points. If necessary, revise your control limits, assuming that any samples that plot outside the control limits can be eliminated
asked
Aug 28, 2020
in
Maths & Statistics
by
anonymous
–1
vote
1
answer
682
views
Duplicate: You have been asked to prepare and deliver a presentation to a non-technical manager to justify the hiring of a system architect for a new project. Write a list of bullet points setting out the key points in your presentation. Naturally.
asked
Feb 1, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
553
views
Duplicate: You have been asked to prepare and deliver a presentation to a non-technical manager to justify the hiring of a system architect for a new project. Write a list of bullet points setting out the key points in your presentation. Naturally,
asked
Feb 1, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
4.9k
views
Imagine the length of a 10Base5 cable is 2500 meters. If the speed of propagation in a thick coaxial cable is 200,000,000 meters/second, how long does it take for a bit to travel from the beginning to the end of the network?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.5k
views
Look over your received emails, and examine the header of a message sent from a user with an .edu email address.
asked
Sep 25, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
2.3k
views
Suppose Alice and Bob are sending packets to each other over a computer network.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
430
views
Outline the major differences between Java (or any other computer language with which you are familiar) and English, commenting on the “understanding” problem in each case.
asked
Sep 22, 2020
in
Artificial Intelligence
by
(user.guest)
0
votes
1
answer
1.9k
views
What does it mean for a wireless network to be operating in “infrastructure mode?” If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
266
views
why circuit switching is not suitable for data transmission and give him a better solution for data transmission
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
465
views
Imagine that u had been to an aquarium and seen a shark and an octopus. Describe this to a child who has never seen one. What resources and mechanism does the child use to comprehend nature of these marine animals
asked
Aug 15, 2021
in
Artificial Intelligence
by
anonymous
+2
votes
1
answer
1.1k
views
You are responsible for the design of a communications switch that has to provide 24/7 availability, but which is not safety-critical. Giving reasons for your answer, suggest an architectural style that might be used for this system.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
22.4k
views
Consider the following network. With the indicated link costs, use Dijkstra’s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.3k
views
Specify, design, and implement a software tool that will compute the cyclomatic complexity for the C/C++ programming language. Use the graph matrix as the operative data structure in your design.
asked
Jun 23, 2020
in
Software Engineering
by
anonymous
0
votes
0
answers
131
views
Assume your friend has asked you to recommend an OS for his/her computer. List any two (2) OS types that you would recommend and give one (1) reason each for your choice
asked
Nov 8, 2021
in
Computer Architecture
by
(user.guest)
0
votes
0
answers
411
views
Compute the total delay involved for a packet of size 1000 bytes to propagate over a link of distance 3000 km, propagation speed 3.0 x 108 m/s and transmission rate 2 Mbps.
asked
May 7, 2021
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.7k
views
Consider a channel that can lose packets but has a maximum delay that is known. Modify protocol rdt2.1 to include sender timeout and retransmit. Informally argue why your protocol can communicate correctly over this channel.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
395
views
Consider you have 10 data packet from 0 to 9. In Go-back-N and Selective repeat both have window size of 5. While transferring packet, ACK2 is lost. What will happened then? Show the scenario with proper figure.
asked
Apr 19, 2021
in
Computer Networks
by
anonymous
+2
votes
1
answer
6.3k
views
Is it possible for an application to enjoy reliable data transfer even when the application runs over UDP? If so, how?
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
93
views
What are some of the ways in which data may be transferred to and from the CPU and I/O devices
asked
May 13
in
Computer Architecture
by
(user.guest)
+1
vote
1
answer
8.3k
views
Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent from the source host to the destination host will travel over how many interfaces?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
236
views
Choose any piece of software which you use regularly. Briefly describe the requirements that the software meets (for you as the user). Suggest three ways in which the software could be improve for you.
asked
Apr 9, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
2.1k
views
Giving reasons for your answer, suggest which dependability attributes are likely to be most critical for the following systems...
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
4.4k
views
You have been asked to prepare and deliver a presentation to a nontechnical manager to justify the hiring of a system architect for a new project.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
6.5k
views
Briefly discuss why it is usually cheaper, in the long run, to use software engineering methods and techniques for software systems.
asked
Jun 27, 2020
in
Software Engineering
by
anonymous
0
votes
0
answers
1.1k
views
What are the propagation time and the transmission time for a 5-Mbyte message (an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 m/s.
asked
May 7, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
396
views
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
Apr 8, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
489
views
Explain why prototyping model is an adaptable model that can support both change avoidance and change tolerance activities. How does it differ from spiral model which in practice has not been widely used. Suggest why this might the case.
asked
Jun 17, 2020
in
Software Engineering
by
anonymous
+2
votes
0
answers
109
views
Critically explain the manage steps you will use to enable you manage your time to enable you achieve academic excellence in the mid-semester exam
asked
Aug 2, 2020
in
Discourse
by
anonymous
–1
vote
1
answer
1.4k
views
Duplicate: How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct. Would the same be true if you were developing a model of a new system?
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.9k
views
Skype offers a service that allows you to make a phone call from a PC to an ordinary phone. This means that the voice call must pass through both the Internet and through a telephone network. Discuss how this might be done.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
344
views
Compare and contrast in between Go-Back-N and Selective repeat? Which one is less complex while sending a lots of packets? Provide your opinion.
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
1.1k
views
What factors have to be taken into account in the design of a menu-based interface for ‘walk-up’ systems such as bank ATMs? Write a critical commentary on the interface of an ATM that you use.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
111
views
What are the Denial of Service attacks and what are possible approaches that attackers may use to exploit the network so they can succeed?
asked
Apr 13
in
Computer Networks
by
(user.guest)
0
votes
0
answers
400
views
Analyze the benefits (at least two) of branding that PepsiCo is enjoying through its various product offerings. Support your answer with reference from case.
asked
Dec 18, 2020
in
Others
by
(user.guest)
0
votes
1
answer
385
views
Write a SQL view to show the pid and movieid where the name of the actor is ‘Tom Hanks’ and the movie must belong to the ‘Action’ Genre.
asked
Dec 23, 2020
in
Database Management Systems
by
anonymous
0
votes
1
answer
1.3k
views
Describe the purpose of two types of OpenFlow messages (of your choosing) that are sent from a controlled device to the controller.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.8k
views
Discuss to the concept of data dependence and how it is done in any database architecture
asked
Nov 12, 2021
in
Database Management Systems
by
anonymous
+1
vote
0
answers
384
views
Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Dec 4, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.5k
views
Duplicate: Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Jul 20, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
12.6k
views
Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
246
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
225
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
687
views
Why is it that voice and video traffic is often sent over TCP rather than UDP in today’s Internet? (Hint: The answer we are looking for has nothing to do with TCP’s congestioncontrol mechanism.)
asked
Dec 11, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
200
views
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled with a rate 1 Mbps. The bucket is initially filled to capacity with 1 Mb. How long can the computer transmit at the full 6 Mbps?
asked
Apr 13
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.4k
views
Consider a new peer Alice that joins BitTorrent without possessing any chunks. Without any chunks, she cannot become a top-four uploader for any of the other peers, since she has nothing to upload. How then will Alice get her first chunk?
asked
Sep 26, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
2.9k
views
The data rate of 10Base5 is 10 Mbps. How long does it take to create the smallest frame? Show your calculation.
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
3.7k
views
Name the types of data dependencies that could be identified within the superscalar architecture and discuss their impact on computer architecture development by giving an example in each case.
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...