Networking AllOther Interview Questions
Questions Answers Views Company eMail

Explain leaky bucket algorithm and compare it with token bucket algorithm.

2062

Explain ATM reference model.

1128

Explain different kinds of Switching techniques.

1152

Differentiate between Link state and Distance Vector Routing algorithm.

1106

Explain network layer in ATM,

1171

Differentiate between IEEE 802.3, IEEE 802.4 and IEEE 802.5 standards.

4252

Explain any three error detection and correction techniques.

1251

Explain various cabling techniques used in IEEE 802.3 standard.

1627

Explain the following ARQ techniques in detail 1. Stop and wait ARQ 2. Selective repeat ARQ

1894

Assuming classful addressing, find the no of subnets and the no of hosts per subnet for the following blocks: (i) 122.45.77.32/20 (ii) A class B block having mask of 255.255.192.0

2058

What Goals do you have in this career?

npcc,

1039

What is MAC address

Elgi Equipments,

806

What is multicast routing

Elgi Equipments,

692

What are the two types of transmission technology available

Elgi Equipments,

700

What is Mail Gateway

Elgi Equipments,

686


Post New Networking AllOther Questions

Un-Answered Questions { Networking AllOther }

how do u share printer through FTP(fire transfer protocol)?

1663


Compare the maximum window size in go-back-N and selective-repeat ARQs.

1723


Differentiate between Baseband co-axial cable and broad band coaxial cable

1070


What is multicast routing

692


What is the function of data link layer?

705






hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash

1430


what is scsi?. what we do if scsi/scsi drive failed?.

1882


What is a minimum data size of an Ethernet frame ?

1136


what are the major componets of client server application?

1639


what is the equivalent nx-os command for the "ip multicast-routing" ios command, and does the nexus 7000 support pim-sparse mode?

739


Draw the IP datagram header format. “IP datagram has a checksum field still it is called an unreliable protocol”. Justify?

1961


hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash

1641


Which layer is used to detect and correct errors

1108


not able to connect to SBI Visa payment server...Getting message like "Server not found"...."proxy protected by firewall"....how to resolve this issue?

3343


Explain Traffic shaping using token bucket algorithm

1084