13.07.2015 Views

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4. Describe the protocol used on the Internet.5. Why is a layered architecture used for network communications?6. Explain the differences between the end-user-to-network interfaces <strong>and</strong>their usefulness in the ISDN architecture.7. What is the difference between ‘‘peer protocol’’ <strong>and</strong> ‘‘virtual circuit’’ in areference model?8. Is it correct to consider the interconnectivity architecture as two ‘‘halfgateways’’?9. Design a security system that protects your system from unwarrantedintrusion from other networks <strong>and</strong> mail-order marketers.10. What is stored in a routing table?Copyright © 2002 by Marcel Dekker, Inc. All Rights Reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!