Computer Networks

  Home  Networking  Computer Networks


“Computer Networking related job interview questions and answers guide. Lean Computer Networks and get preparation for the job of Computer Networking field”



210 Computer Networks Questions And Answers

62⟩ How to configure Proxy Server in Windows?

To configure proxy server in windows first install the 2 lan cards one for internet connection and another one for sharing internet connection to clients pc . now first configure Internet connection and then give the IP to 2nd lan card for ex. 192.168.0.1 to 2nd lan card now Now attach the cat 5 cable to the 2nd lan card to switch to give connectivity to ur network and do this configuration on client computers now right click on internet explorer then go to properties and then go to connections and click there lan settings buttons and then in proxy server give the ip of 2nd lan card of proxy server

 203 views

63⟩ How to share Internet using a proxy server?

U can share internet through proxy also but there is less no. of pc..as u told and u r using devices i recomened ...u can do without using proxy server...by the ICS ..option after enabling ICS..u will get by-default IP address u can set that IP address to all pc in Default Gateway & Prefered DNS..after that u can use easily...and speed performance is too good....

 178 views

64⟩ Tell me what is SLIP (Serial Line Interface Protocol)?

The need for a data link layer protocol to let IP operate over serial links was identified very early on in the development of TCP/IP. Engineers working on the Internet Protocol needed a way to send IP datagrams over serial connections linking computers together. To solve the problem they created a very simple protocol that would frame IP datagrams for transmission across the serial line. This protocol is called the Serial Line Internet Protocol, or SLIP for short.SLIP performs only one function: framing of data for transmission. It does nothing else

 204 views

66⟩ What is MUX and explain how mux works?

It selects one of many analog or digital data sources and outputs that source

into a single channel.

An electronic multiplexer functions as multiple input, single output switch. A

multiplexer has multiple inputs and a selector that connects a specific input to

the single output.

In telecommunications, a multiplexor is a device that performs multiplexing,

i.e. that combines multiple analog message signals or digital data streams into

one signal.

 199 views

68⟩ Explain how to change in domain name?

This article describes how to change a computer's Domain Name System (DNS) server or servers from the command line, either locally or remotely. This operation requires you to use the Regfind.exe tool from either the Microsoft Windows NT Server Resource Kit or the Microsoft Windows 2000 Server Resource Kit. MORE INFORMATIONWARNING: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.To change a computer's Domain Name System (DNS) server or servers from the command line, type: regfind -p HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipparameters "old DNS value" -r "new DNS value(s)"Where old DNS value is the value the server currently has, and new DNS value(s) is the new value you want to use. The format is dotted decimal notation.You can also perform the same operation to a computer remotely by typing the following command: regfind -m computer name -p HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipparameters "old DNS value" -r "new DNS value(s)" Where computer name is the NetBIOS name or the Internet Protocol (IP) address of the remote computer.Note You do not have to restart the computer for the DNS changes to take effect.For more information about the Regfind tool and its capabilities, at a command prompt, type: regfind /?

 191 views

69⟩ Consider a system where a program can be separated into two parts code and data. The CPU knows whether it wants an instruction (instruction fetch) or data (data fetch or store). Therefore, two base-limit register pairs are provided one for instructions and one for data. The instruction base limit register pair is automatically set to read only, so programs can be shared among different users. Discuss the advantages and disadvantages of this scheme?

Please share your answers.

 221 views

75⟩ Explain what is Kerberos?

Hey folks,Kerberos is an authentication service, it has really robust architecture built in it.The basic components in kerberos include the Keydistribution service from which the client communicates to get a token to reach a server, this enables the way to keep the passwords secure from not transferred a lot of times across the network.Once u get a key to interact to the servers you use that session key with an encryption on it, so its really a cool authentication service.By the way its not only developed at MIT it is also by our Proff Clifford Neuman at University of Southern California, where i am..chaitnaya

 201 views

79⟩ What is the difference between POP3 and IMAP Mail Server?

Post Office Protocol 3 POP3 works by reviewing the inbox on the mail server, and downloading the new messages to your computer. IMAP(Internet Message Access Protocol) downloads the headers of the new messages on the server, then retrieves the message you want to read when you click on it. When using POP3, your mail is stored on your PC. When using IMAP, the mail is stored on the mail server. Unless you copy a message to a "Local Folder" the messages are never copied to your PC. works by reviewing the inbox on the mail server, and downloading the new messages to your computer. IMAP downloads the headers of the new messages on the server, then retrieves the message you want to read when you click on it

 220 views

80⟩ Tell me what is subnetting? why is it used?

A portion of a network that shares a common address component. On TCP/IP networks, subnets are defined as all devices whose IP Address have the same prefix. For example, all devices with IP addresses that start with 100.100.100. would be part of the same subnet. Dividing a network into subnets is useful for both security and performance reasons. IP networks are divided using a subnet mask

 204 views