- Briefly list and describe three different ways error detection is implemented.
- Briefly describe what the hidden node problem is when using wireless network.
- Briefly describe what we mean by a bipolar signal and some advantages over unipolar?
- Compare and contrast the three types of addresses used in a network.
- Compare and contrast symmetric and asymmetric encryption?
- Describe the two major categories of media types used in data networks.
- Describe the three different types of application architectures used to create network solution.
- Describe how application level firewall works and how it is used to provide security.
- Describe how a network subnet decides if the generated packet should be forwarded to the default gateway.
- Describe TDM and any limitations that may be inherent in its design.
- Describe activities and responsibilities of the transport layer in network communications.
- Explain what is meant by “logical” and “physical” topology of a network
- Explain the difference between host based and client based application architecture..
- Explain what is encapsulation and how is it different from translation when used for network interconnectivity.
- Explain how a SVC is set up on a network in order to enable transmission of data in a packet switched network..
- Explain what we mean by attenuation and why it is an issue in communications?
- Explain how Forward Error Correction works and under what circumstances is it used in communications.
- Explain the difference between information bits and overhead bits in messages and how this might influence the size of the packet?
- How does the router determine if the arriving packet belongs to a subnet’s address range and which port to forward the packet to?
- How does a layer-2 Ethernet switches know where to forward the packets they receive? Describe how switches gather and use this information.
- In network communication what are the difference between a frame and a packet?
- In network management explain what we mean by smart devices and what extra functionality they provide compared to slandered devices.
- List and describe the three types of data flows.
- What are the main differences between dynamic distance vector routing and link state dynamic routing?
- What purpose does media access control serve in a contention based network?
- What are the major advantages and disadvantages of using a partial mesh for a wide area network solution? 只需点中关键字词即可,还望高人速速解答,不胜感激
网络与分布式的几道考试题,马上考试了,麻烦各位大神看看,只需点中关键字词即可!
- 写回答
- 好问题 0 提建议
- 追加酬金
- 关注问题
- 邀请回答
-
6条回答 默认 最新
悬赏问题
- ¥15 深度学习根据CNN网络模型,搭建BP模型并训练MNIST数据集
- ¥15 lammps拉伸应力应变曲线分析
- ¥15 C++ 头文件/宏冲突问题解决
- ¥15 用comsol模拟大气湍流通过底部加热(温度不同)的腔体
- ¥50 安卓adb backup备份子用户应用数据失败
- ¥20 有人能用聚类分析帮我分析一下文本内容嘛
- ¥15 请问Lammps做复合材料拉伸模拟,应力应变曲线问题
- ¥30 python代码,帮调试,帮帮忙吧
- ¥15 #MATLAB仿真#车辆换道路径规划
- ¥15 java 操作 elasticsearch 8.1 实现 索引的重建