Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
We want to connect the people who have knowledge to the people who need it, to bring together people with different perspectives so they can understand each other better, and to empower everyone to share their knowledge.
Create a network to implement the DHCP server in cisco …
Follow Below Link: https://sikshapath.in/question/create-a-network-to-implement-the-dhcp-server/
Follow Below Link:
See lessElaborate sliding window flow control mechanism with example. Also differentiate …
Q1.Elaborate sliding window flow control mechanism with example. Also differentiate it with stop and wait method. Answer: check question no 4 of the given link: https://sikshapath.in/question/if-the-original-data-to-send-is-10011001-11100010-00100100-10000100-how-would-it-be-possible-to-detect-erroRead more
Q1.Elaborate sliding window flow control mechanism with example. Also differentiate it with stop and wait method.
Answer:
check question no 4 of the given link:
Q2.Enlist the reasons for congestion occurrence in network?
Answer:
Unneeded traffic
Unneeded traffic is a common cause of network congestion. This will show up on networks in different ways. For example, someone streaming Netflix or YouTube videos at work would count as “unneeded” in a lot of situations, and causes congestion since video traffic uses a lot of bandwidth.
Poor Network Design/Mis-Configuration
A more serious cause of network congestion is poor design or device Mis-Configuration. Take for example a broadcast storm, where a large volume of broadcast and/or multicast traffic is seen on the network within a short time, resulting in severe performance degradation.
Since broadcasts are contained within subnets, the larger the subnet the more serious the effect of a broadcast storm. Therefore, a network that has been designed with large subnets without giving proper consideration to broadcast storms can result in network congestion.
Over-Utilized Devices
Devices such as routers, switches, and firewalls have been designed to handle certain network throughput. For example, the Juniper MX5 has a capacity of 20Gbps. Apart from the fact that this is a theoretical value (the capacity in the production environment will be slightly lower), this is also the maximum capacity.
Therefore, constantly pushing ~20Gbps of traffic through that device means that the device will be over-utilized and will likely result in high CPU utilization and packet drops, leading to congestion on the network.
Security Attack
Various security attacks can cause network congestion, including worms, viruses, and Denial of Service (DoS) attacks.
Q3.Discuss different techniques to control the congestion in the network.
Answer:
Monitor and Analyze Network Traffic
The starting point for solving most network congestion issues, especially for too many devices, over-utilized devices, or an insufficient network design, is monitoring and analyzing network traffic. This will help identify where congestion may exist and highlight under-utilized regions that are ripe for re-allocation to improve performance. With deeper insights into network traffic, it’s possible to take intelligent steps toward reducing network congestion.
Bandwidth
Speaking of bandwidth, network congestion is less likely when the network can transmit more data, making increasing bandwidth an obvious solution. However, a network, like a chain, is only as strong as the weakest—or in this case the slowest—component.
Segmenting and Prioritizing
Traffic monitoring produces an additional benefit: the capacity to design or re-design a bespoke, optimized network for any business. To do that, segment the network into smaller sub-networks to create space for practical priorities and increase efficiency. This permits more accurate monitoring as it produces a more viable network, increasing or reducing data traffic as needed to impact the areas most affected by network congestion.
Assess Your Devices
The number, type, and bandwidth usage of network devices affects the whole network’s data processing. In some cases, some network users might accidentally be incorrectly using devices, while other users could be using “legacy devices” that are not well-supported. Older and inefficient device usage both contribute to network congestion, so assess each device to reduce or even prevent network congestion.
Describe the functionof the following pins and their use in …
(i)NMI : It is a single non-maskable interrupt pin (NMI) having higher priority than the maskable interrupt request pin (INTR)and it is of type 2 interrupt. When this interrupt is activated, these actions take place − Completes the current instruction that is in progress. Pushes the Flag register vaRead more
(i)NMI :
It is a single non-maskable interrupt pin (NMI) having higher priority than the maskable interrupt request pin (INTR)and it is of type 2 interrupt.
When this interrupt is activated, these actions take place −
(ii) LOCK :
(iii) TEST :
(iv) RESET :
Design a structure chart for Email server.
Just tap on below attachment button to download the answer file:
Just tap on below attachment button to download the answer file:
See lessAnalyse the instructions below and comment on Addressing mode: MOV …
MOV CX, AX : Register addressing mode MOV AX, [1592H] : Direct addressing mode ADD CX, [AX+SI] : Based-index addressing mode MOV BX, [SI+16] : Indexed addressing mode ADD BX, AX : Register addressing mode
MOV CX, AX : Register addressing mode
MOV AX, [1592H] : Direct addressing mode
ADD CX, [AX+SI] : Based-index addressing mode
MOV BX, [SI+16] : Indexed addressing mode
ADD BX, AX : Register addressing mode
See lessCompute the derivatives df/dx of the following functions. Describe your …
Answer: A. B.
Answer:
A.
B.
See lessFind the smaller out of two numbers. Find the larger …
Follow the given link for the answer: https://sikshapath.in/question/ato-find-the-smallest-of-two-8-bit-numbers-bto/
Follow the given link for the answer:
Configuration of TCP/IP Protocols using cisco packet tracer
Vote Up Answers: Support Us! For the answer just tap on below attachment button:
Vote Up Answers:
Support Us!
For the answer just tap on below attachment button:
See lessExplain Biological Neural Network and Artificial Neural network?
Follow the below link for answer: https://sikshapath.in/question/explain-biological-neural-network-and-artificial-neural-networkartificial-intelligence/
Follow the below link for answer:
Where do we implement Artificial Intelligence Fuzzy Logic?
Fuzzy Logic (FL) is a method of reasoning that resembles human reasoning. This approach is similar to how humans perform decision-making. And it involves all intermediate possibilities between YES and NO. The conventional logic block that a computer understands takes precise input and produces a defRead more
Fuzzy Logic (FL) is a method of reasoning that resembles human reasoning. This approach is similar to how humans perform decision-making. And it involves all intermediate possibilities between YES and NO.
The conventional logic block that a computer understands takes precise input and produces a definite output as TRUE or FALSE, which is equivalent to a human being’s YES or NO. The Fuzzy logic was invented by Lotfi Zadeh who observed that, unlike computers, humans have a different range of possibilities between YES and NO, such as:
Generally, we use the fuzzy logic system for both commercial and practical purposes such as:
So, now that you know about Fuzzy logic in AI and why we actually use it, let’s move on and understand the architecture of this logic.
The Fuzzy logic works on the levels of possibilities of input to achieve a definite output. Now, talking about the implementation of this logic: