Basic CS-Networks [3i Infotech Placement]: Sample Questions 31 - 33 of 90

Glide to success with Doorsteptutor material for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.

Question 31

Networks
Edit

Write in Short

Short Answer▾

What are Diagram and Trigrams?

Explanation

Diagram:

  • Common two letter combinations are called as diagrams
  • Example: th, in, er, re and an.

Trigrams:

  • Common three letter combinations are called as trigrams.
  • Example: the, ing, and and ion.

Question 32

Networks
Edit

Describe in Detail

Essay▾

What is terminal emulation, in which layer it comes?

Explanation

Given PC Treminal Emulation
  • Telnet also called terminal emulation- belongs to application layer.
  • Ability to make one computer terminal appear like some other terminal
  • Allows users to log on and get direct access to legacy programs in a mainframe operating system.
  • Emulation programs run like any other workstation application as a separate program task.
  • It comes in the application layer.
  • Requires installing a special program a telnet program- runs like workstation application as a separate program task providing its own window to the user.
  • Window might presents some particular mainframe operating system or application interface that is text-only.

Question 33

Networks
Edit

Describe in Detail

Essay▾

What particular challenges do you see in managing a network?

Explanation

Challenges in managing a network

  • Visibility:
    • Required for:
      • Plan capacity upgrades
      • Troubleshoot app performance
      • Fact check efficacy of security investments
      • Deploy early warning system for suspicious traffic- data breaches or compliance violations.
    • Visibility needs to translate into simple reports and detailed flow-level records of network events.
  • Getting context of application (for example for QoS)
    • Identifying applications based on ports and protocols.
    • Greater context based on nature of the application traffic.
  • Personalized experience:
    • For example, for education align network with specific users՚ needs, such as students versus faculty.
    • Includes:
      • Allocating bandwidth
      • Aligning available bandwidth to meet application specific service level agreements for satisfaction, performance and productivity.
  • Conserve bandwidth:
    • All network issues cannot be solved by adding more bandwidth.
    • Take into account cost of bandwidth:
      • Some regions have bandwidth nearly free or heavily subsidized by government programs.
      • Other regions have very expensive bandwidth
    • Imperative to calculate cost of bandwidth
  • Security posture:
    • Intelligently monitor network traffic mix.
    • Balance between visibility and control help educational institutions with encrypted traffic.
    • Knowledge of risk points can not only protect the users but also de-risk the institution, its brand, and assets.

Developed by: