Networking AllOther Interview Questions
Questions Answers Views Company eMail

Explain Token ring

51

Explain Various fields in Ethernet frame format

59

Explain Difference between congestion control and QoS(or Quality of service)

161




Explain FDDI

48

Explain Traffic shaping using token bucket algorithm

65

Explain CSMA/CD

45

If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.

71

Why transport layer protocols like TCP and UDP are called end-to-end protocols. What is the difference between them?

193




Differentiate between Baseband co-axial cable and broad band coaxial cable

49

Differentiate between Optical fibre and twisted pair

68

Differentiate between SMTP and SNMP

70

What are the basic functions of the data link layer?

49

Write down the basic features of HDLC protocol? Could HDLC be used as a data link protocol for a LAN? Justify your answer.

111

The physical layer service is a non-confirmed service. Assume that some bits of data are lost during transmission over physical media, which layer will detect the loss and take some remedial measures. Explain any one method clearly depicting how this operation is performed.

64

What are the advantages of cell switching that is used in ATM?

116


Post New Networking AllOther Questions






Un-Answered Questions { Networking AllOther }

Explain Network Topologies and their uses.

50


what happens when two consigitive ports of switch are connacted using one cross cabel with each other?(how the whole network gets down)

1144


Explain Wireless networks.

57


Which layer is used to route packets

55


how to take backup of BIOS ?

1671


Explain Token ring

51


Why transport layer protocols like TCP and UDP are called end-to-end protocols. What is the difference between them?

193


Differentiate between static and dynamic channel allocation.

77


Explain The ATM reference model

63


What are the principles that were applied to arrive at the seven layers in OSI model?

67


If i want to crack any serial key using system information then how can i do it? Is it possible?

770


Explain network layer in ATM,

54


hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash

538


Hi i need one website name.Which is used to identify or find the system or person who or which are logged in to the Internet or working with Internet.We can watch and access their drives(memory) also through that website.Could you please tell me which is that website.Please answer me.Advance thanks

546


What is your most recent experience with VERTAS backup software?

522