设为首页 加入收藏

TOP

Computer Networks面试题附带详细答案(三)
2014-11-15 22:00:04 来源: 作者: 【 】 浏览:54
Tags:Computer Networks 试题 附带 详细 答案
5.255


Class B 128.0.0.0 - 191.255.255.255


Class C 192.0.0.0 - 223.255.255.255


Class D 224.0.0.0 – 239.255.255.255


Class E 240.0.0.0 - 247.255.255.255



The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.


The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offer by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.



Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources.


Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration



In this each computer is directly connected to primary network cable in a single line.


Advantages:


Inexpensive, easy to install, simple to understand, easy to extend.



In this all computers are connected using a central hub.


Advantages:


Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.



In this all computers are connected in loop.


Advantages:


All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.



A network in which there are multiple network links between computers to provide multiple paths for data to travel.



In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.



In a Ethernet network, between any two points on the network ,there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated.



In token Ring , hub is called Multistation Access Unit(MAU).



Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router



It provides a framework for discussing network operations and design.



One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.



Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.



Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.



Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.



One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.



Sending a mess

首页 上一页 1 2 3 4 下一页 尾页 3/4/4
】【打印繁体】【投稿】【收藏】 【推荐】【举报】【评论】 【关闭】 【返回顶部
分享到: 
上一篇百度web前端面试经历 下一篇一位西交计算机同学的求职总结

评论

帐  号: 密码: (新用户注册)
验 证 码:
表  情:
内  容: