Author: Vunris Volmaran
Country: Czech Republic
Language: English (Spanish)
Genre: Art
Published (Last): 25 September 2013
Pages: 130
PDF File Size: 16.48 Mb
ePub File Size: 15.70 Mb
ISBN: 586-7-39412-419-4
Downloads: 76293
Price: Free* [*Free Regsitration Required]
Uploader: Fenrishura

At the lowest level, a network can consist of two or more computers directly connected by some physical medium adn as coaxial cable or optical fiber. Which transmission medium works at 2 giga bits per second.

Basic Networking Interview Questions for Freshers Experienced PDF

June 11, Reply. Nice and help full Reply. You can assign restrictions to computers, such as what resources it is allowed access, or what particular time of the day they can browse the internet. This is the reason why a wire carrying electric signals gets warm. The decibel dB measures the relative strengths of two signals or one signal at two different points. The default gateway for connecting to the external network is usually the address of the external router port.

Clustering support refers to the ability of a network operating system to connect multiple servers in a fault-tolerant group. It can show the physical address as well as the IP address. Speed of transmission is very high. It is used for security purpose. Open System Interconnection is a refine model which contains rules every industry have to follow. Network Interface, Internet, Transport, and Application.

Unlike radio waves at computer networking interview questions and answers for freshers pdf download frequencies, microwaves do not pass through buildings well. This provides a secure means of limiting the access from unwanted intruders on the network. At any time, if a station has information to send to other station, it uses a specific method defined by the protocol to make a decision on whether or not to send. These packets are stored in the memory for sometime.

To overcome for this problem, amplifiers computer networking interview questions and answers for freshers pdf download used to amplify the signal.

It is also in this process that the source and destination addresses are attached into the headers, along with parity checks. Suppose central authority has given names ABC. Departments in the organization. May networrking, Reply. October 4, Reply. Commands are sent from the client computer networking interview questions and answers for freshers pdf download the server and Responses are sent fteshers the server to the client. IndiaBIX provides you lots of fully solved Networking interview questions and answers with Explanation.

October 30, Reply. Explain Echoplex – It is a method used to detect error in data link layer and is also called echo checking.

Networking Interview Questions and Answers PDF

Means signal components at the receiver have phases different from frexhers they had at the sender. NOS, or Network Operating System, is specialized software whose main task is to provide network connectivity to a computer in order for it to be able to communicate with other computers and connected devices.

Simple sine waves can be used to carry electric energy from one place to another or we can use a single sine wave to send an alarm to a security center when a thief opens a door or window in the house.

A hub acts as a multiport repeater. There are 7 OSI layers: The mail remains in the mailbox after retrieval.

A network administrator has many responsibilities that can be summarize into 3 key functions: January 11, Reply. When a signal travels through a medium, it loses some of its energy due to resistance of the medium.

This includes networking devices, network interfaces, cablings and connectors. Analog connections — using conventional telephone lines; Digital connections — using digital-grade telephone lines; switched connections — using multiple sets of links between sender and receiver to move data.

Two packet types are defined: Which transmission medium radiates and how it can be avoided? Give the frame format for data link layer. Its main task is to automatically assign an IP address to devices across the network. Unauthorized access to the system.