Subscribe




Enter Email address for Daily FREE Job Notifications, Placement Papers, Interview Questions... :

Monday, November 19, 2012

0

Networking Basics Interview Questions - Set 03

  • Monday, November 19, 2012
  • Radha Krishna
  • Share

  • Networking Basics Interview Questions
    Following are the Networking Basics Interview Questions presenting here are collected from various students, professors, websites.


    41. What are the categories of Transmission media?

    a. Guided Media
      i. Twisted - Pair cable
        1. Shielded TP
        2. Unshielded TP
      ii. Coaxial Cable
      iii. Fiber-optic cable
    b. Unguided Media
      i. Terrestrial microwave
      ii. Satellite Communication

    42. What are the types of errors?

    a. Single-Bit error
      In a single-bit error, only one bit in the data unit has changed
    b. Burst Error
      A Burst error means that two or more bits in the data have changed.


    43. What is Error Detection? What are its methods?

    Data can be corrupted during transmission. For reliable communication errors must be deducted and Corrected. Error Detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. The common Error Detection methods are
      a. Vertical Redundancy Check (VRC)
      b. Longitudinal Redundancy Check (VRC)
      c. Cyclic Redundancy Check (VRC)
      d. Checksum

    44. What is Redundancy?

    The concept of including extra information in the transmission solely for the purpose of comparison. This technique is called redundancy.

    45. What is VRC?

    It is the most common and least expensive mechanism for Error Detection. In VRC, a parity bit is added to every data unit so that the total number of 1s becomes even for even parity. It can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd.

    46. What is LRC?

    In LRC, a block of bits is divided into rows and a redundant row of bits is added to the whole block. It can detect burst errors. If two bits in one data unit are damaged and bits in exactly the same positions in another data unit are also damaged, the LRC checker will not detect an error. In LRC a redundant data unit follows n data units.

    47. What is CRC?

    CRC, is the most powerful of the redundancy checking techniques, is based on binary division.

    48. What is Checksum?

    Checksum is used by the higher layer protocols (TCP/IP) for error detection


    49. List the steps involved in creating the checksum.

    a. Divide the data into sections
    b. Add the sections together using 1's complement arithmetic
    c. Take the complement of the final sum, this is the checksum.

    50. What are the Data link protocols?

    Data link protocols are sets of specifications used to implement the data link layer. The categories of Data Link protocols are 1. Asynchronous Protocols
    2. Synchronous Protocols
      a. Character Oriented Protocols
      b. Bit Oriented protocols

    51. Compare Error Detection and Error Correction:

    The correction of errors is more difficult than the detection. In error detection, checks only any error has occurred. In error correction, the exact number of bits that are corrupted and location in the message are known. The number of the errors and the size of the message are important factors.

    52. What is Forward Error Correction?

    Forward error correction is the process in which the receiver tries to guess the message by using redundant bits.

    53. Define Retransmission?

    Retransmission is a technique in which the receiver detects the occurrence of an error and asks the sender to resend the message. Resending is repeated until a message arrives that the receiver believes is error-freed.

    54. What are Data Words?

    In block coding, we divide our message into blocks, each of k bits, called datawords. The block coding process is one-to-one. The same dataword is always encoded as the same codeword.


    55. What are Code Words?

    "r" redundant bits are added to each block to make the length n = k + r. The resulting n-bit blocks are called codewords. 2n - 2k codewords that are not used. These codewords are invalid or illegal.

    56. What is a Linear Block Code?

    A linear block code is a code in which the exclusive OR (addition modulo-2) of two valid codewords creates another valid codeword.

    57. What are Cyclic Codes?

    Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword is cyclically shifted (rotated), the result is another codeword.

    58. Define Encoder?

    A device or program that uses predefined algorithms to encode, or compress audio or video data for storage or transmission use. A circuit that is used to convert between digital video and analog video.

    59. Define Decoder?

    A device or program that translates encoded data into its original format (e.g. it decodes the data). The term is often used in reference to MPEG-2 video and sound data, which must be decoded before it is output.

    60. What is Framing?

    Framing in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address. The destination address defines where the packet has to go and the sender address helps the recipient acknowledge the receipt.



    0 Responses to “Networking Basics Interview Questions - Set 03”

    Post a Comment

    review www.uandistar.org on alexa.com