1. What is LAN segmentation? Why it is used? What are the different techniques to create LAN segments?
2846Explain Any Standalnoe Application with rispect to OSI model, letus Consider Voice Recognition....!! One Has To tell function of all layers with rispect to given Application.
CMC,
2476what is the command to check how many port numbers are running with their specific protocols in linux pc
2445How to create dynamic users on simple Asterisks server for simple extension based x-change?
HCL,
2310what happens when two consigitive ports of switch are connacted using one cross cabel with each other?(how the whole network gets down)
2972Am planning to do a course on Remote Infrastructure Management.Is it a good field. And one more thing. Am planning to join Talent Sprint, Hyd. How good is this institute. Please help fast
3354Post New Networking AllOther Questions
What is autonomous system
What is your most recent experience with VERTAS backup software?
What is a Multi-homed Host
What is Proxy ARP
Define Consumer Satellite Products
1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
How does a token ring network work ? In what way is it different from Ethernet ?
Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each.
The physical layer service is a non-confirmed service. Assume that some bits of data are lost during transmission over physical media, which layer will detect the loss and take some remedial measures. Explain any one method clearly depicting how this operation is performed.
What is MAC address
Explain The ATM reference model
Explain network topologies ?
how to take backup of BIOS ?
Explain FDDI
Which layer is used to route packets