What is the difference between TFTP and FTP application layer protocols?
DELL, Elgi Equipments, HCL, Wipro,
8 19526When you look at a Cisco switch like Cisco 2950, why are the ports labeled with an 'X' behind the number? Like 1x, 2x.....23x, 24x, and what does it mean when there is no 'X'?
1720Post New Networking AllOther Questions
what is buffering and flooding in NIC ?
Explain leaky bucket algorithm and compare it with token bucket algorithm.
I need to know the driver name associated with the DSN ? In java we can get it by using getDriverName()(implemented by 3rd party vendors.) method ? but i need the implemetation to get the driver name? so can u give me the code ? how to get the code ?
Hi i need one website name.Which is used to identify or find the system or person who or which are logged in to the Internet or working with Internet.We can watch and access their drives(memory) also through that website.Could you please tell me which is that website.Please answer me.Advance thanks
Can a switch be used to connect two LANs with different network IDs ?
Write down the basic features of HDLC protocol? Could HDLC be used as a data link protocol for a LAN? Justify your answer.
According to you which is the most important OSI layer?
What is OSPF
What is the advantage of Ring network ? Compare it with ethernet
If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.
What is sliding window protocol ?
What are the other names of IEEE 802.11 protocol or standard?
Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each.
How do cryptography-based keys ensure the validity of data transferred across the network?
Explain Attenuation?