Network Engineer

  Home  Engineering  Network Engineer


“Network Engineer job test questions and answers guide. The one who provides the best answers with a perfect presentation is the one who wins the job hunting race. Learn Network Engineer and get preparation for the new job”



142 Network Engineer Questions And Answers

61⟩ What is Encoder?

A device or program that uses predefined algorithms to encode, or compress audio or video data for storage or transmission use. A circuit that is used to convert between digital video and analog video.

 128 views

62⟩ List the categories of multiplexing?

☛ Frequency Division Multiplexing (FDM)

☛ Time Division Multiplexing (TDM)

1: Synchronous TDM

2: ASynchronous TDM Or Statistical TDM.

☛ Wave Division Multiplexing (WDM)

 131 views

63⟩ Explain multiplexing?

Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.

 123 views

64⟩ Explain semantic gap?

Defining a useful channel involves both understanding the applications requirements and recognizing the limitations of the underlying technology. The gap between what applications expects and what the underlying technology can provide is called semantic gap.

 132 views

65⟩ Describe automatic repeat request (ARQ)?

Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in transmission and coordinates the re-transmission of those frames by the sender. In the data link layer, the term error control refers primarily to methods of error detection and re-transmission. Error control in the data link layer is often implemented simply: Any time an error is detected in an exchange, specified frames are re-transmitted. This process is called automatic repeat request (ARQ).

 113 views

66⟩ Explain sliding window?

The sliding window is an abstract concept that defines the range of sequence numbers that is the concern of the sender and receiver. In other words, he sender and receiver need to deal with only part of the possible sequence numbers.

 134 views

67⟩ What is character stuffing?

In byte stuffing (or character stuffing), a special byte is added to the data section of the frame when there is a character with the same pattern as the flag. The data section is stuffed with an extra byte. This byte is usually called the escape character (ESC), which has a predefined bit pattern. Whenever the receiver encounters the ESC character, it removes it from the data section and treats the next character as data, not a delimiting flag.

 129 views

68⟩ Describe bit stuffing?

Bit stuffing is the process of adding one extra 0 whenever five consecutive Is follow a 0 in the data, so that the receiver does not mistake the pattern 0111110 for a flag.

 112 views

70⟩ What is piggy backing in network engineering?

A technique called piggybacking is used to improve the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also carry control information about arrived (or lost) frames from B; when a frame is carrying data from B to A, it can also carry control information about the arrived (or lost) frames from A.

 108 views

73⟩ Explain the usage of sequence number in relaible transmission?

The protocol specifies that frames need to be numbered. This is done by using sequence numbers. A field is added to the data frame to hold the sequence number of that frame. Since we want to minimize the frame size, the smallest range that provides unambiguous communication. The sequence numbers can wrap around.

 125 views

74⟩ Explain stop-and-wait protocol?

In Stop and wait protocol, sender sends one frame, waits until it receives confirmation from the receiver (okay to go ahead), and then sends the next frame.

 125 views

75⟩ Describe fixed size framing?

In fixed-size framing, there is no need for defining the boundaries of the frames. The size itself can be used as a delimiter.

 101 views

78⟩ What is the mean of "triple X" in Networks?

The function of PAD (Packet Assembler Dis-assembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X".

 133 views

79⟩ What is NETBIOS in network engineering?

NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.

 119 views