Computer Networks

  Home  Networking  Computer Networks


“Computer Networking related job interview questions and answers guide. Lean Computer Networks and get preparation for the job of Computer Networking field”



210 Computer Networks Questions And Answers

161⟩ There are four routers and 4 switches and 40 computers in an office. How will you connect each devices and configure those devices?

This is using different network build purpose, so connect first router to first switch and connect 10 nodes with first switch, this is one network ex:192.168.1.0 networkand connect second router to second switch with 10 nodes this is another network ex:192.168.2.0 network the same method third router, fourth router ,third switch and fourth switch ex:192.168.3.0 network and 192.168.4.0 network now u connect all networks in one segment thats all.

 221 views

163⟩ What is piggy backing in Computer Networks?

Piggybacking is gaining access to restricted communication channel by using session that another user has already established. Piggybacking can be defeated by logging off before leaving a workstation or terminal or by initiating a protected mode, such as via a screensaver, that requires re-authentication before access can be resumed.

 207 views

165⟩ Explain what does the Mount protocol do?

The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request.

 192 views

170⟩ Explain what is anonymous FTP and why would you use it?

Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.

 185 views

171⟩ Tell me what is terminal emulation, in which layer it comes?

Terminal emulation is the ability to make one computer terminal appear like some other terminal.

Terminal emulation is used to give the users the ability to log on and get direct access to legacy programs in a mainframe operating system.The emulation program runs like any other workstation application as a separate program task.

Terminal emulation comes in the application layer.

 183 views

172⟩ What is virtual channel in Computer Networks?

A virtual channel defines a single point to point connection, identified by its virtual channel identifier.An individual channel can be uniquely identified by its virtual channel and virtual path number. The insertion of VCs enables to implement policies for allocating the physical channel bandwidth, which enables to support quality of service in applications.

 167 views

174⟩ What is Beaconing in Computer Networks?

Beaconing is a process which allows the network to render their network problems by them-selfToken ring and FDDI(Fibre Distributed Data Interface) networks make use of this process.

It is also a signalling error condition in wireless/LAN networks,during a failure the packets are transmitted as beacons,this beacon identifies the neighboring transmission which is active and helps in generation of an auto reconfiguration,hence the node which come under failure domain, automatically initiate a diagnostic measure and try to bypass the failure.

 193 views

175⟩ Explain what are headers and trailers? How are they added and removed?

Headers and trailers are the concepts of OSI model.

Headers are information structures which identifies the information that follows, such as a block of bytes in communication.

Trailer is the information which occupies several bytes at the end of the block of the data being transmitted.They contain error-checking data which is useful for confirming the accuracy and status of the transmission.

During communication of data the sender appends the header and passes it to the lower layer while the receiver removes header and passes it to upper layer. Headers are added at layer 6,5,4,3 & 2 while Trailer is added at layer 2.

 179 views

176⟩ Explain what services does the internet layer provide?

The internet layer packs data into data packets known as IP datagrams, which contain source and destination address information that is used to forward the datagrams between hosts and across networks. The Internet layer is also responsible for routing of IP datagrams.

Its job is to allow the host to insert packets to the internet,when data is sent, each layer treats all the information it receives as data and adds control information to the front of that data. This control information is called a header, and the addition of a header is called encapsulation. When data is received, the opposite procedure takes place as each layer removes its header before passing the data to the layer above.

The protocols include IP (Internet Protocol), ICMP (Internet Control Message Protocol),ARP (Address Resolution Protocol) and RARP (Reverse Address Resolution Protocol)

 181 views

179⟩ Explain what is system recovery and system failure?

System recovery is a process of an overall plan for system recovery so that we are prepared if the system fails. System recovery is a tow part system,including system recovery backup and system recovery restore.The SR Wizard, located in Backup, does the backup portion. The wizard backs up the system state, system services, and all the disks that are associated with the operating system components.T he restore portion restores all the disk signatures, volumes, and partitions on (at a minimum) the disks that is need to start the computer.

A system failure will cause the system to freeze, reboot, or stop functioning altogether.System failure can occur because of a hardware failure or a severe software issue, example, when a hard disk drive fails, it will prevent the computer from being able to boot.When a system fail occurs we use system recovery to recover the system back to its condition.

 170 views