Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
Recent questions and answers in Computer Networks
0
votes
1
answer
344
views
When routing to another LAN, in addressing, only MAC address got changed. Justify your answer with proper figure.
answered
2 days
ago
in
Computer Networks
by
(user.guest)
0
votes
1
answer
52
views
Discuss optimal routing.
answered
2 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
21
views
Briefly describe how Ethernet's exponential backoff works. What is one reason why Ethernet's exponential backoff might be better than randomizing retransmission attempts over a fixed-length time interval?
answered
4 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
42
views
Suppose that routers were subjected to conditions that might cause them to fail fairly often. Would this argue in favor of a VC or datagram architecture?
answered
4 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
26
views
What is a Wireless Access Point
answered
4 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
52
views
Discuss how a hierarchical organization of the internet has made it possible to scale millions of users
answered
5 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
44
views
What are the goals of a network
answered
May 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
34
views
What is a network?
answered
May 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
63
views
What is the use of SSH?
answered
May 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
42
views
Examine problems in application layer
answered
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
31
views
What are the goals of TCP/IP Model?
answered
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
47
views
What are the design issues for the Layers in networking?
answered
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
28
views
What are some network applications?
answered
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
39
views
Define and give examples of distributed Computing systems.
answered
May 13
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
55
views
What are some applications that would benefit from the ATM's CBR service model
answered
May 13
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
66
views
Describe how packet loss can occur at input ports. Describe how packet loss at input ports can be eliminated (without using inline buffers)
answered
May 13
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
96
views
Identify the netid and hostid of the IP Address given its subnet mask in binary. Show your solution. 192.168.15.187 255.255.255.0
answered
May 13
in
Computer Networks
by
(user.guest)
0
votes
0
answers
37
views
we compress the video with the pattren gop(16:3)
asked
May 10
in
Computer Networks
by
anonymous
0
votes
1
answer
59
views
What are the types of transmission Media
answered
May 4
in
Computer Networks
by
(user.guest)
0
votes
1
answer
58
views
What is Data Communication
answered
May 4
in
Computer Networks
by
(user.guest)
0
votes
1
answer
56
views
What is byte stream?
answered
May 3
in
Computer Networks
by
(user.guest)
0
votes
1
answer
72
views
What are the Layers of OSI Model
answered
May 3
in
Computer Networks
by
(user.guest)
0
votes
1
answer
68
views
What is the BOOTP port number which is stored in relay agent?
answered
May 3
in
Computer Networks
by
(user.guest)
0
votes
1
answer
220
views
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ?
answered
May 3
in
Computer Networks
by
(user.guest)
0
votes
1
answer
84
views
What is the protocol data unit (PDU) for the application layer in the Internet stack?
answered
May 3
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
85
views
What could happen if a receiver tries to control the bursts from the transmitter by delaying sending acknowledgments until it has enough empty buffers?
answered
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
74
views
Due to the high variability of the Round Trip Time (RTT), the selection of the TCP timeout is a difficult task. What mechanism has been put in place to solve this?
answered
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
70
views
What does the FIN-WAIT-2 refer to?
answered
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
87
views
What does FIN-WAIT-1 mean?
answered
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
117
views
Is it possible for TCP to send data-less packets on an established connection
answered
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
137
views
Main purpose of the User Datagram Protocol (UDP)
answered
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
217
views
Why does the maximum packet lifetime, have to be large enough to ensure that not only the packet but also its acknowledgements have vanished?
answered
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
141
views
A new version of the TCP header that accommodates a round-trip time of 200ms, a network bandwidth of 100Mbps, a maximum segment lifetime of 150 sec, How many bits will you need for the advertised window field and for the sequence number field?
answered
Apr 20
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
99
views
What is the evolution of computer to mechanical electronic
answered
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
79
views
What is an intrusion detection system (IDS) and what are some general approaches that can be used to for it?
answered
Apr 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
82
views
Explain MPLS routing
answered
Apr 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
56
views
What is the major difference between IP and MPLS routing?
answered
Apr 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
92
views
Why is the TCP congestion control algorithm not appropriate for Ad-Hoc Networks? Briefly describe how the Ad-Hoc Transmission Control Protocol (ATCP) works.
answered
Apr 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
143
views
What are the problems that the TCP may face with the emergence of high speed networks and how can these be addressed?
answered
Apr 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
112
views
What are the Denial of Service attacks and what are possible approaches that attackers may use to exploit the network so they can succeed?
answered
Apr 13
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
201
views
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled with a rate 1 Mbps. The bucket is initially filled to capacity with 1 Mb. How long can the computer transmit at the full 6 Mbps?
answered
Apr 13
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
92
views
What is the Address Resolution Protocol( ARP)
answered
Apr 13
in
Computer Networks
by
(user.guest)
0
votes
0
answers
108
views
Suppose that a 1Mbps connection is shared by 5 well behaving TCP and 5 UDP sources.
asked
Apr 10
in
Computer Networks
by
anonymous
0
votes
0
answers
38
views
How do you think would heterogeneity, business and social change, security and trust change the future of software development.
asked
Apr 8
in
Computer Networks
by
anonymous
+1
vote
1
answer
97
views
Explain the working principle of a handshake output port
answered
Mar 28
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
59
views
Explain the term gate way
answered
Mar 28
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
70
views
What does ping mean
answered
Mar 25
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
84
views
Write a short note on lights on a modem
answered
Mar 25
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
65
views
What does the OSI model refer to
answered
Mar 25
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
80
views
What does DHCP refer to
answered
Mar 25
in
Computer Networks
by
(user.guest)
To see more, click for all the
questions in this category
.
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...