Post New Networking AllOther Questions
How do cryptography-based keys ensure the validity of data transferred across the network?
What are the two reasons for using layered protocols?
How kernal work in operating system?
what is upsizing and downizing?
What is virtual channel
1.Explain the main purpose of IP address? 2.List two purposes for a web browser? 3.Explain an advantage and a disadvantage of multiple search engines? 4.Describe two roles of Internet Services Providers (ISPs)?
What is count to infinity problem ?
Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each.
what is the command to check how many port numbers are running with their specific protocols in linux pc
Discuss the following terms with respect to ATM: VPI, UNI, asynchronous, AAL, Cell, PVC.
What is the function of data link layer?
Which layer is used to run services like FTP, Telnet etc.
What is tdm?
What is OSPF
Subnet the class C network address 198.67.25.0 into eight subnets. Why are the ‘all ones’ and ‘all zeroes’ subnets not used ?