Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Ask a Question
Recent questions in Computer Networks
0
votes
0
answers
How is the throughput affected by best effort delivery
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
How big would the window size have to be for the channel utilization to be greater than 98 percent
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Explain ICMP and its message types.
asked
in
Computer Networks
by
anonymous
+1
vote
0
answers
What is the bit and byte stuffing. Explain this concept with help of neat diagram
asked
in
Computer Networks
by
anonymous
+1
vote
0
answers
What is the disadvantage of using Nagle's algorithm on a badly congested network?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
in
Computer Networks
by
anonymous
–1
vote
1
answer
Duplicate: Explain the 7 Layers of the OSI model
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Which address class(es) will allow you to have more than 1000 hosts per network?
asked
in
Computer Networks
by
anonymous
+1
vote
0
answers
Create and stimulate WAN using two or more router.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
List out different types of multiplexing. Explain one of them for channels k =7 with appropriate figure.
asked
in
Computer Networks
by
anonymous
+1
vote
1
answer
What is Network topology? Explain the different topology types
asked
in
Computer Networks
by
anonymous
+1
vote
1
answer
Explain the objectives of an operating system
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
ALGORITHM FOR ACTIVITIES.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
What is the purpose of the random nonces in the TLS handshake?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
What is the future of networking and security
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
What is your vision for the future of networking and security
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
The internet implements various protocols to facilitate routing in inter-Autonomous Systems and intra-Autonomous Systems. On what basis is this done?
asked
in
Computer Networks
by
anonymous
–1
vote
1
answer
Duplicate: Explain why a high-quality software process should lead to high-quality software products. Discuss possible problems with this system of quality management.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
What would be the valid IP range of 8th subnet of 192.169.10.0/28. The zero subnet should be considered valid for this question.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
What would be the valid IP range of 8th subnet of 192.169.10.0/28.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
In the above scenario which protocol would he use for clients, users and team mates? And Why? Explain with proper justification.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Compare and contrast in between Go-Back-N and Selective repeat? Which one is less complex while sending a lots of packets? Provide your opinion.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Perform the subnetting on the below IP Address and find out the number of networks, network of, first host, last host, and broadcast id of each network.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Perform the subnetting on the below IP Address and find out the number of networks, network of, first host, last host, and broadcast id of each network.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Perform the subnetting on the below IP Address and find out the number of networks, network of, first host, last host, and broadcast id of each network.
asked
in
Computer Networks
by
(user.guest)
0
votes
0
answers
What would be the valid IP range of 8th subnet of 192.169.10.0/28. The zero subnet should be considered valid for this question.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
why circuit switching is not suitable for data transmission and give him a better solution for data transmission
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Can you explain which kinds of problems they faced?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Calculate the checksum for the following bits: Data 1- 0110101111000100 Data 2- 1111010100001101 Data 3- A B C D
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Your friend also wants to know why congestion occurs and how to prevent it? Provide proper explanation.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Can you explain which kinds of problems they faced?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
A 2 Gbps link supports a maximum of 5000 users under circuit switching. At what rate are the users generating data
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
A bare bone forwarding table in VC network has four columns, what is meaning of value in each columns?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Why is it that voice and video traffic is often sent over TCP rather than UDP in today’s Internet? (Hint: The answer we are looking for has nothing to do with TCP’s congestioncontrol mechanism.)
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
find out the number of networks, network of, first host, last host, and broadcast id of each network of this IP Address:192.168.10.0/28
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
The first segment has sequence number eighty; the second had sequence number one hundred. How much data is in the first segment?
asked
in
Computer Networks
by
anonymous
+1
vote
1
answer
What do you mean by persistant and non-persistant connection
asked
in
Computer Networks
by
anonymous
+1
vote
1
answer
What is MAC address? Explain the role of address resolution protocol(ARP)
asked
in
Computer Networks
by
anonymous
–1
vote
1
answer
Duplicate: Determine the correct class of the following IP addresses: Address Class? 191.107.2.10 172.16.16.15 200.200.5.2 3.3.57.0 131.107.2.89 b) Which address class(es) in above table will allow you to have more than 1000 hosts per network?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Configure the topology and make sure every pc is reachable
asked
in
Computer Networks
by
anonymous
Page:
1
2
3
4
...
8
next »
Welcome to
CPEN Talk
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
Categories
All categories
Artificial Intelligence
(67)
Compilers & Operating Systems
(72)
Computational Tools
(0)
Computer Aided Design
(4)
Computer Architecture
(317)
Computer Networks
(287)
Computer Vision & Robotics
(17)
Database Management Systems
(29)
Hardware Systems & Electronics
(13)
Maths & Statistics
(17)
Numerical Methods
(1)
Programming Languages & Algorithms
(50)
Software Engineering
(379)
Tutorials
(1)
Opinion
(8)
Others
(22)
[ Sponsored Posts ]
(1)
...