Download Solution Ignou MCA Solved Question Paper
Tag: solved
Differentiate between Leaky bucket and Token bucket traffic shaper. Why is traffic shaping needed ?
Download Solution Ignou MCA Solved Question Paper
Explain the function and working model of Kerberos with the help of a diagram.
Download Solution Ignou MCA Solved Question Paper
Explain and illustrate sliding window Protocol with window size of 5. How does the scheme improve the efficiency of transmission ?
Download Solution Ignou MCA Solved Question Paper
Explain and illustrate sliding window Protocol with window size of 5. How does the scheme improve the efficiency of transmission ?
Download Solution Ignou MCA Solved Question Paper
Explain the function and working model of Kerberos with the help of a diagram.
Download Solution Ignou MCA Solved Question Paper
Describe how MACAW is an improvement over MACA ?
Download Solution Ignou MCA Solved Question Paper
Explain how a network congestion is controlled using slow start algorithm in TCP with help of an illustration. Is congestion control and flow control are equivalent?
Download Solution Ignou MCA Solved Question Paper
Write Dijkstra’s algorithm and explain how does it work. Use the algorithm to find the length of a shortest path between the vertices A and F in the weighted graph shown in Figure 1. Show all the intermediate steps.
Download Solution Ignou MCA Solved Question Paper
Write Dijkstra’s algorithm and explain how does it work. Use the algorithm to find the length of a shortest path between the vertices A and F in the weighted graph shown in Figure 1. Show all the intermediate steps.
Download Solution Ignou MCA Solved Question Paper