Outline and discuss the main fields in Ethernet IEEE 802.3 frame. What are the main objectives of preamble ?
1878What is the average number of transmission required to send a frame of length 1600 bytes correctly, if the bit error rate is 1 x 10-6.
1554Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.
1581Subnet the class C network address 198.67.25.0 into eight subnets. Why are the ‘all ones’ and ‘all zeroes’ subnets not used ?
1828What do you understand by the term ‘structured cabling’. State the main rules that should be used when installing a cable. 31. Show that maximum cabling area for LAN for horizontal cabling runs is approximately 200m.
1598What are the various classes of IP addressing? Calculate the maximum number of class A, B and C network Ids.
1703Post New Networking AllOther Questions
Draw the IP datagram header format. “IP datagram has a checksum field still it is called an unreliable protocol”. Justify?
Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.
what happens when two consigitive ports of switch are connacted using one cross cabel with each other?(how the whole network gets down)
Which one you will use to implement critical section? Binary Semaphore
1. What is LAN segmentation? Why it is used? What are the different techniques to create LAN segments?
Which layer is used to convert packets to frame
whtch file system support the tcp/ip , http protocal and ftp protocal?
Which layer is used to run services like FTP, Telnet etc.
What is the difference between IE 6 & 8?
What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP or IP?
What are the advantages of cell switching that is used in ATM?
Question What is datagram, datagram packets and datagram sockets?
What is NVT (Network Virtual Terminal)
What MAU?
How do cryptography-based keys ensure the validity of data transferred across the network?