Posts

Showing posts from January, 2011

BCA MCA ALL SEMESTER ANSWERS ON DEMAND FOR FREE

If you have any problem in solving your problems during assignments or you want to find the solution to the answer please write the particular question of your assignment and we will respond to you with correct answer. Have a nice day and best of luck to your future.
Image
Join IGNOU ASSIGNMENT @ www.SirfDosti.com

MAKE MONEY FROM HOME

Earn upto Rs. 9,000 pm with PaisaLive.com! Hi , I have something interesting for you - you can easily earn regular income online via PaisaLive.com! It’s really amazing! You get paid to open & read the contents of PaisaLive mails. You also receive special discount coupons, promotions and free passes to various events in your city. Join now and get Rs. 99 instantly, just for joining. What more, as a special bonus you get paid for inviting your friends also! Create your PaisaLive Account by clicking below and spent just 15 minutes and earn money. http://www.PaisaLive.com/register.asp?1149451-5925202 PaisaLive - Get Paid to read emails {Insert your Name Here}

mcs042

Image
What is count to infinity problem? Explain through an example. Count-To-Infinity Problem Followed illustration shows an imagined network and denotes the distances from router A to every other router. Until now every thing works fine. The illustration shows that link (A, B) is broken. Router B observed it, but in his routing table he sees, that router C has a route to A with 2 hops. The problem is, that router B doesn't know that C has router B as successor in his routing table on the route to A. That occurs followed count-to-infinity problem. B actualizes his routing table and takes the route to A over router C. In the next picture, we can see the new distances to A. In C's routing the route to A contains router B as next hop router, so if B has increase his costs to A, C is forced to do so. Router C increases his cost to A about B + 1 = 4. Now we see the consequence of the distributed Bellman-Ford protocol: Because router B takes the path over C to A, he reactualizes h

MCA 1st semester

Answer of Assignment of current April 2011 session will be posted soon please keep visiting.

BCA 2nd Semester

Solution of assignment of june 2011 will be posted soon. Know about particular topic please go through comments.

BCA 1st Semester

Solution of BCA 1st Semester of April 2011 session will be posted soon. Please keep visiting.

IGNOU MCA 4th Semester

Image
MCS-042 Explain the operation of leaky and token bucket algorithms? The Token Bucket(Leaky Bucket) Model This is introduction and basic explanation of  the model, it is not completed . First part is similar to the document which submitted by Dr. Chimento. The other parts briefly explain the idea. This document tries to explain basic token bucket model(some document use leaky bucket), its parameters and its usage in diffserv environment. Token bucket represents the   Policing function of  Traffic Conditioning Block of diffserv. A token bucket flow is defined by (r,b), r denotes the rate at which tokens(credits) are accumulated and b is the depth of the token pool(in bytes).                                                               b           Token wait   Packets