Computer Networks

  Home  Networking  Computer Networks


“Computer Networking related job interview questions and answers guide. Lean Computer Networks and get preparation for the job of Computer Networking field”



210 Computer Networks Questions And Answers

103⟩ What is NVT in Computer Networks?

It is a set of rules defining a very simple virtual terminal interaction. The NVT (Network Virtual Terminal) is used in the start of a Telnet session.

 207 views

104⟩ Explain what is the subnet mask of this network?

The Default subnet mask for this Ip address is 255.255.254.254 as this is class B IP address. But the the subnet mask is 255.255.254.128/23.Since, 2^7=128and the Frame size will be 2^1=2Subnet ID= 130.237.14.0Broadcast ID= 130.237.15.255Correct me if I am wrong.

 212 views

106⟩ What is the process of OSI Model, when two computer communicate with each other?

OSI model could be big. I will explain it in TCP/IP model, which is used in modern computersThe TCP/IP model has the following Layers.ApplicationTransportNetworkData LinkPhysicalApplication:When 2 PCs want to communicate they often use an application to communicate. Applications are user interfacing and is in a format understandable by the user.The application layer provides a user with various application services, which a user decides upon the communication. Lets just say PC A wants to send a word document to PC B. Word is an application that a user users at the application layerTransport:This layer multiplexes data. The need for multiplexing, is that there could be many services that would want to communicate with different destinations. This layer in the TCP/IP model, uniquely identifies to the recieving device what application layer program the data sent is destined to.Along with this this layer also provides a user with different reliabilty modes depending upon the protocol usedNetwork:This layer is responsible for logical addressing to identify the network where the reciveing station isData link:This layer is where the data gets another tag with the physical address of the device, to identify exactly what PC the data is destined to in the network identified by the network layer. The physcial address often depends upon the technolgy that you are using (ethernet, token ring, frame relay, PPP etc).Also the data gets split in to series of bits of 0s and 1s and sent to the lower layerPhysical:This is the layer where the data in form of bits recieved from the data link layer gets transmitted in form of electrical signals to the destination

 185 views

108⟩ Explain what is the function of a WAP gateway?

Implementation of the WAP stack Converting protocols Converting markup languages Compiling WMLScript programs Encoding WML into a binary bitstream Providing access control Caching Domain name resolution services (DNS) Security features

 205 views

109⟩ What is VLAN and INTERVLAN? Why do we use these techniques?

VLAN(Virtual Local Area Network) is a logical grouping of network users and resources connected to administratively defined ports on a switch. VLAN's break up broadcast domains in layer 2 switch network.Virtual LANs (VLANs) divide one physical network into multiple broadcast domains. But, VLAN-enabled switches cannot by themselves, forward traffic across VLAN boundaries. So you need to have routing between these VLANs which is called interVLAN routing. You can achieve this by using either a Layer 3 switch or a router.

 219 views

112⟩ Tell me what is VPN? Is RAS and VPN one and the same?How do I determine that My computer is part of correct network and is getting a Valid IP?

SD RAM:SDRAM is Single Data Rate meaning that SDRAM can accept one command and transfer one word of data per clock cycle. Typical speeds of SDRAM are 100 and 133 MHz.DDR SDRAM:DDR SDRAM transfers data twice per clock cycle, hence the name double data rate. DDR clock speeds range between 200 MHz (DDR-200) and 400 MHz (DDR-400). DDR-200 transfers 1600 MB/s, while DDR-400 transfers 3200 MB/s.DDR2 SDRAM:DDR2 SDRAM is twice as fast as DDR which means twice as much data is carried to the module for each clock cycle. Also consumes less power as compared to the DDR memory.

 225 views

113⟩ What does negotiation mean when discussing network protocols?

The Difference Between Half and Full Duplex."Duplex" simply means you're able to send and receive data (most often the human voice) from the same device whether that be with your phone, 2-way radio, or PC.Half-duplex devices let you send and receive, but only one-way at a time. If you've ever used a walkie-talkie, then you know what half-duplex conversations sound like. You have to push the TALK button to send your message. But as long as you are holding the TALK key, you can't hear what anyone else is saying. You must release the button to receive.Full duplex actually, full duplex is nothing new. In fact, you already know exactly what it sounds like. Your corded or cordless phones are full-duplex devices letting you and your caller speak simultaneously without any dropouts in either one of your voices.Half- and Full-Duplex ModeEach switch port can operate in either half-duplex or full-duplex mode.Half Duplex = send or receive dataFull Duplex = send and receive dataAutonegotiationThe switch supports the autonegotiation of both speed and duplex mode. As a result, when the switch is connected to another network device that is capable of autonegotiation, the two devices communicate common speeds and duplex modes to each other. Then, the highest common capabilities for both devices become the operating modes. The switch has the following operating priorities:1. 100 Mbps, full-duplex mode2. 100 Mbps, half-duplex mode3. 10 Mbps, full-duplex mode4. 10 Mbps, half-duplex mode Note: Hub operates in Half Duplex Mode, whereas the switch operates in both Half and Full Duplex Mode.

 205 views

114⟩ What is attenuation in Computer Networks?

When we transmit any signal, the signal strength is degraded because of losses, interference, this is called attenuation of the signal. To reduce attenuation, repeaters are used to boost the signal strength.

 209 views

115⟩ TCP is reliable in communication whereas IP is Non-reliable. Why it is integrated into one and given as TCP/IP protocol?

Reliability not achieved at lower layers shall be implemented at the higher layers and more importantly each Layer in TCP/IP protocol suite is responsible for some network operations. IP though unreliable it implements routing of network information across the nodes upto the destination. But TCP cannot do this it implements only the end-to-communication (i.e) the source and destination without taking care of the intermediate nodes across which the network information should pass through which is done by IP layer. Therefore IP is integrated with TCP.

 228 views

116⟩ Explain what are the important topologies for networks?

BUS topology:

In this each computer is directly connected to primary network cable in a single line.

Advantages:

Inexpensive, easy to install, simple to understand, easy to extend.STAR topology:In this all computers are connected using a central hub.

Advantages:

Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.

RING topology:

In this all computers are connected in loop.

Advantages:

All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.

 211 views

118⟩ What is cladding in Computer Networks?

Material placed on the exterior of wood frame and sash components to provide ease of maintenance. Common cladding materials include vinyl and extruded or roll-formed aluminum

 208 views

119⟩ Explain what is passive topology?

When the computers on the network simply listen and receive the signal, they are referred to as passive because they don't amplify the signal in any way. Example for passive topology - linear bus.

 216 views

120⟩ Explain what is the difference between .pst and .ost files used in outlook?

.pst files are all the emails (and files attatched to those emails), calendar, contacts, tasks, etc. stored locallyon your machine..pst are created when using Outlook to manage your email (Gmail, hotmail, yahoo, aol,etc.) they can also be created within an Exchange environment, however, Microsoft doesn't recomment this due to the .pst being very unstable and if your pc were to crash you would loose all of your emails. In an Exchange environment, using .pst removes the emails from the Exchange server and stores them locally..ost files are simply a copy of your mailbox that is stored on the Exchange server. Think of this as a type of email cache file. This leaves the emails on the server, but also stores a copy of emails since your last sync on the local machine.

 213 views