Networking AllOther Interview Questions
Questions Answers Views Company eMail

Why TCP/IP reference model is more popular than OSI model ?

2581

Which layer is used to route packets

1273

Which layer is used to convert packets to frame

1145

Which layer is used to detect and correct errors

1107

Which layer is used to run services like FTP, Telnet etc.

1448

Discuss Shannon’s capacity. What implications does it have ?

1299

Discuss how satellite network differs from traditional networks such as Ethernet, Tokenbus.

1132

What is packet switching ? Explain two different approaches of packet switching. ?

1797

Discuss the different factors affecting congestion control algorithms. ?

2800

How does a token ring network work ? In what way is it different from Ethernet ?

1024

Describe and distinguish between FDMA, TDMA, and CDMA.

1235

Discuss the following terms with respect to ATM: VPI, UNI, asynchronous, AAL, Cell, PVC.

1328

What is sliding window protocol ?

Motorola,

1301

Differentiate between stop-and wait ARQ and Go-back-N protocol.

3571

Differentiate between ISO-OSI and TCP/IP reference model.

1 1647


Post New Networking AllOther Questions

Un-Answered Questions { Networking AllOther }

how many types of backups are there & explain them in theory mode & practical mode?

1633


hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash

1637


What are the advantages of cell switching that is used in ATM?

1951


Explain Attenuation?

683


If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.

2439






Explain the advantage and disadvantage of ethernet ?

2016


What are the basic functions of the data link layer?

1261


Discuss the different factors affecting congestion control algorithms. ?

2800


what is disk interleaving? why is disk interleaving adopted?

2135


Explain Network Topologies and their uses.

1093


How do cryptography-based keys ensure the validity of data transferred across the network?

5690


Explain The ATM reference model

1325


Explain any three error detection and correction techniques.

1244


When creating a static route, what is the gateway used to define?

1530


1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?

2291