Anda di halaman 1dari 18

Define Network?

A network is a set of devices connected by physical media links. A network is recursively is a


connection of two or more nodes by a physical link or two or more networks connected by one or
more nodes.
2. What is a Link?
At the lowest level, a network can consist of two or more computers directly connected by some
physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Link.
3. What is a node?
A network can consist of two or more computers directly connected by some physical medium such as
coaxial cable or optical fiber. Such a physical medium is called as Links and the computer it connects
is called as Nodes.
4. What is a gateway or Router?
A node that is connected to two or more networks is commonly called as router or Gateway. It
generally forwards message from one network to another.
5. What is point-point link?
If the physical links are limited to a pair of nodes it is said to be point-point link.
6. What is Multiple Access?
If the physical links are shared by more than two nodes, it is said to be Multiple Access



Networking interview questions - posted on Feb 04, 2014 at 12:45 PM by Nihal Singh
Q.1 Describe Classful Addressing
Ans. IPv4 addressing uses the concept of classes. In classful addressing, the address space is divided into five
classes:A, B, C, D, and E. We can find the class of an address when the given address is in binary notation or dotted-
decimal notation.
Example

Q.2 Find the error, if any, in the following IPv4 addresses.
a. 200.56.045.78
b. 22.34.7.8.20
c. 75.45.279.14
d. 11100010.23.24.66
Solution
a. There must be no leading zero (045).
b. There can be no more than four numbers in an IPv4 address.
c. Each number needs to be less than or equal to 255 (279 is outside this range).
d. A mixture of binary notation and dotted-decimal notation is not allowed.
Q3.Describe how many types are wireless transmission?
In general we can divide five types of wireless transmission
1. The Electromagnetic Transmission
2. Radio Transmission
3. Microwave Transmission
4. Infrared Transmission
5. Light Transmission
1. The Electromagnetic Transmission
When electrons move, they create electromagnetic waves that can propagate through space and in a vacuum. The
electromagnetic waves can be broadcast efficiently and received by a receiver some distance away.
2. Radio Transmission
Radio waves are easy to generate, can travel long distances, and can penetrate buildings easily, so they are widely
used for communication. These waves can travel in all directions.
3. Microwave Transmission
Microwaves travel in a straight line, so if the towers are too far apart, the earth will get in the way. Thus, repeaters are
needed periodically. The higher the towers are, the farther apart they can be. Unlike radio waves at lower
frequencies, microwaves do not pass through buildings well.
4. Infrared Transmission
It is used for short-range communication. The remote controls used for televisions, VCRs, and stereos all use infrared
communication. They are relatively directional and can no pass through solid objects.
5. Light Transmission
These types of wave can easily effected by wind and temperature changes. They normally work well on sunny days.
Q.4 Explain Random Excess Method.
In Random Excess Method any station can send the data at any time without the permission of other station. At any
time, if a station has information to send to other station, it uses a specific method defined by the protocol to make a
decision on whether or not to send.
There is no scheduled time for a station to transmit the data that is why it is called Random Excess Protocol. Random
protocol has the following types.


Q5.Explain Channelization in networks.
Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or
through code, between different stations. There are three basic approaches to achieve channelization.

Q.6 Describe FDMA and TDMA in short.
In frequency-division multiple access (FDMA), the available bandwidth is divided into frequency bands. Each station
is allocated a band to send its data. Different frequency bands are used by different stations.
In time-division multiple access (TDMA), the stations share the bandwidth of the channel in time. Each station is
allocated a time slot during which it can send data. Each station transmits its data in is assigned time slot.

FIG: TDMA
Q.7 Explain CDMA in wireless networks.
CDMA differs from FDMA and TDMA because only one channel occupies the entire bandwidth of the link and also
there is no timesharing.In CDMA a code is available for every station that wants to send the data. In this protocol the
assigned codes have two properties.
1. If we multiply each code by another, we get zero.
2. If we multiply each code by itself, we get the number of stations.
So let there are three station and code and data are (c1, d1), (c2, d2), (c3, d3) respectively. The data that go on the
channel are the sum of all these terms. Any station that wants to receive data from one of the other two multiplies the
data on the channel by the code of the sender. For example, suppose stations 1 and 2 are talking to each other.
Station 2 wants to hear what station I is saying. It multiplies the data on the channel by cl the code of station 1.
Because (cl . cl) is 3, but (c2 . cI) and (c3 . cI) are all Zero, station 2 divides the result by 3 to get the data from station
1.
Q.8 Describe the functionality of data link layer.
Data Link Layer is the second layer from the bottom in OSI model. This layer has two main functions
Data link control
Media access control.
Data link control provides the functionality of include framing, flow and error control that provide smooth and reliable
transmission of frames between nodes. Media Access Control (MAC) handles the sharing of link.
Q.9 Explain Stop-and-Wait Automatic Repeat Request for noisy channel.
In this protocol the sending device keeps a copy of the last frame transmitted until it receives an acknowledgment for
that frame. A data frames uses a sequence number; an ACK frame uses an acknowledgment number. The sender
has a control variable, which we call Sn (sender, next frame to send), that holds the sequence number for the next
frame to be sent (0 or 1).
Q.10 what is the difference between Pure ALOHA and Slotted Aloha protocol?
In Pure Aloha station can send data in a continuous time manner whereas in Slotted Aloha time is divided in slots
Pure ALOHA doesn't check whether the channel is busy before transmission. In slotted ALOHA, a frame can be sent
only at fixed times, whereas in pure ALOHA, you can send any time. Pure ALOHA has a vulnerable time of 2 x Tfr.
Whereas in Slotted ALOHA vulnerable time = Tfr {Tfr: Average transmission time for a frame} .
Download Networking interview questions and answers
Comment on Data Encryption Standard (DES) weakness and strength.
The Data Encryption Standard (DES) is a symmetric key block cipher which takes 64-bit plaintext and 56-bit key as
an input and produces 64-bit cipher text.............
Read Answer
Describe the Packet Format of ARP (Address Resolution Protocol)
What are the advantages of IPv6 over IPv4?
What are the different design goals of ATM?
If you are a victim of Denial of Service (Dos) then what you do?
The function of a denial of service attack is to flood its target machine with too much traffic and prevents it from being
accessible to any other requests or providing services..............
Read Answer
Networking interview questions - posted on J une 27, 2013 at 16:45 PM by Kshipra Singh
1. Differentiate between hub and switch.
a.) Hub is a layer 1 device while Switch is layer 2 device.
b.) Hub works on single collision and single broadcast domain while switch works on per port collision and single
broadcast domain.
2. What is FQDN?
- FQDN is the abbreviation for Fully Qualified Domain Name.
- It contains both the hostname and a domain name.
- It uniquely identifies a host within a DNS hierarchy
3. Tell us something about LMHOSTS files.
- It is a text file that resolves NetBIOS names to IP addresses.
- It can be compared with the HOSTS file which is a static method of resolving domain names into IP addresses.
- LMHOSTS files must be manually configured and updated.
4. What are the main qualities of an effective and efficient network?
a. Performance
b. Reliability
c. Security
5. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
10Base2 -
- It is an Ethernet term which means a maximum transfer rate of 10 Megabits per second that uses baseband
signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments.

10Base5
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling,
with 5 continuous segments not exceeding 100 meters per segment.

10BaseT
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling
and twisted pair cabling.
6. What is anonymous FTP? What is its use?
- It is an FTP that enables the users to connect to a host without a valid login and password.
- The login used is anonymous or guest, with the password usually requesting the user's ID.
- It enables a large number of users to access the files on the host without needing to set up a login for all of them.
- It exercises a strict control over the areas an anonymous user can access.
7. Which factors mark the reliability of the network?
a. Frequency of failure
b. Downtime / Time taken for recovery.
8. Name the factors that tell us about the security of the network.
a. Virus attacks on the system.
b. Unauthorized access to the system.
9. Define Bandwidth and Latency?
- Bandwidth/ Throughput It means the number of bits which can be transmitted over the network in a specified time.
- Latency It is the time taken by a message to travel from one side to another.

Bandwidth and latency describe the performance of a network.
10. What is point to point link?
- Direct connection between two computers on a network is called as point to point link.
- No other network devices other than a connecting cable are required for point to point connection.
- The cable connects the NIC card of both the devices.
11. When is a switch said to be congested?
- Sometimes a switch receives the packets faster than they can be accommodated in the shared link. These packets
are stored in the memory for sometime.
- However, after sometime the buffer space will exhaust and some packets will start getting dropped off.
- The switch is called as congested in this state.
12. Explain a.) Uni-casting, b.) Multicasting and c.) Broadcasting
a.) Uni-casting - Message is sent from a source to a single destination node.
b.) Multicasting - Message is sent from a source to some subsets of other nodes.
c.) Broadcasting - Message is sent from a source to all the nodes in the network.
13. What are the various types of Multiplexing?
The various types of multiplexing are:
a. Frequency Division Multiplexing (FDM)
b. Time Division Multiplexing (TDM)
i. Synchronous TDM
ii. Asynchronous TDM
c. Wave Division Multiplexing (WDM)
14. Which layers of OSI are referred to as network support layers?
The following 3 layers of OSI are referred to as network support layers:
a. Physical Layer
b. Data link Layer and
c. Network Layers
15. Which layers of OSI are referred to as user support layers?
The block of user support layers consists of:
a. Session Layer
b. Presentation Layer and
c. Application Layer
16. What does the Data Link Layer do?
- The Data Link Layer transforms the physical layer to a reliable link.
It takes care of:

a. Node to node delivery.
b. Framing
c. Physical Addressing
d. Flow Control
e. Error Control
f. Access Control
17. What is NIC?
- NIC stands for Network Interface Card.
- It is a peripheral card attached to a PC to helps it connect to a network.
- The MAC address of the card helps the network in identifying the PC.
18. What are the responsibilities of Network Layer?
- The Network Layer aids in source-to-destination delivery of packet across multiple networks.
- It performs:
a. Logical Addressing
b. Routing
19. Name the various error detection methods.
The various error detection methods are:
a. Vertical Redundancy Check (VRC)
b. Longitudinal Redundancy Check (VRC)
c. Cyclic Redundancy Check (VRC)
d. Checksum
20. . What is Bit Stuffing?
- Bit stuffing means adding one extra 0 whenever five consecutive 1s follow a 0.
- This is done so that the pattern 0111110 is not mistaken for a flag.
21. How does dynamic host configuration protocol aid in network
administration?
- In a large set up where it is difficult to manually configure the IP address of each system, dynamic host configuration
protocol comes very helpful.
- Using this protocol, the administrator can create a pool of IP addresses which are called scopes. These can be then
dynamically assigned to the systems.
Routing and Switching
What are Brute Force Attacks?
Brute forcing is a mechanism which is used by an attacker to break the encryption of data by applying a set of various
key.............
Read Answer
How do you use RSA for both authentication and secrecy?
RSA is a public key encryption algorithm. The RSA algorithms are...........
Read Answer
Can you differentiate among encoding, encryption and hashing?
Encoding: Basically encoding is used to protect the integrity of data as it crosses through communication network to
keep its original message.............
Read Answer
If you have to generate a hash function then what characteristics are needed in a secure hash function?
A secure hash function should have the following characteristics:................
Read Answer
What is digital signature? Differentiate between Physical and Digital Signature
A digital signature is an electronic analogue of a written signature; the digital signature can be used to provide
assurance...........
Read Answer
What is Authentication Header and how it provides the protection to IP header?
Basically Authentication Header protects IP header and provides the complete authenticity to the IP packets.............
Read Answer
Explain SSL Protocol. How does it protect internet users from various threats?
The SSL protocol (Secure Socket Layer protocol) was originally developed by Netscape, to ensure security of data
transported.............
Read Answer
What is PIX firewall security? How does it differ from a firewall?
PIX (Private Internet Exchange)...........
Read Answer
What are Malware? Explain different types of Malware
Malware is a software program which is developed to destroy a computer system..............
Read Answer
What are replay attacks? Give an example of replay attack
Replay attacks are the network attacks in which an attacker spies the conversation between the sender and
receiver..........
Read Answer
If you have to encrypt as well as compress data during transmission then which would you do first and
why?
Data should be transmitted over any communication network in such a way that the data integrity and
authenticity.............
Read Answer
What is the goal of Information Security in an organization?
Mainly there are three Information security goals in an organization: Confidentiality, Integrity and Availability..............
Read Answer
What is Symmetric-Key cryptography and Asymmetric-Key cryptography?
Symmetric-Key Cryptography: Symmetric-key cryptography uses a single key for both encryption and decryption.
Encryption and decryption algorithm are inverse of each other.............
Read Answer
Explain the services provided by IP (Internet Protocol) - Addressing, Fragmentation, Packet timeouts and
options
Latest answer: Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of
the destination. By including the host addressing, this task is carried out by IP. As IP operates in an internet, its
systems are designed to accept the addressing of devices which are unique.............
Read answer
Explain the classes of IP address
Latest answer: IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in
the decimal format. Every number in each class is represented as binary to computers..................
Read answer
Define Broadcast, Unicast and Multicast.
Latest answer: Unicast: A term used in communication to describe a piece of information to send from one point to
another. There are only sender and receiver................
Read answer
What is Network Mask?
Latest answer: A network mask is used for determination of what subnet an IP address belongs to. An IP address
has network address and the host address.................
Read answer
Define Subnetting.
Latest answer: A subnet describes a set of networked computers which have common IP address routing
prefix..................
Read answer
What is the User Datagram Protocol (UDP)?
Latest answer: User datagram protocol allows computer applications to send messages as datagram packets from
source to destination on an Internet Protocol,..................
Read answer
Explain TCP Windowing concept.
Latest answer: TCP Windowing is a concept that is used for avoiding congestion in the network traffic..................
Read answer
What is the Domain Name System (DNS)? What are the advantages of it?
Latest answer: A hierarchical naming system for computer systems, services or for that matter any resource
participating in the internet...................
Read answer
What is the TTL (Time to Live)? Why is it required?
Latest answer: TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or
not the packet should be in the network for too long or discarded.................
Read answer
Explain the use of Internet Control Message Protocol (ICMP)
Latest answer: Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is
mainly used in operating system of networked computers..................
Read answer
What is the use of IGMP protocol?
Latest answer: Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The
IGMP messages are used to learn which hosts is part of which multicast groups..............
Read answer
What are Ping and Tracert?
Latest answer: Ping and tracert are the commands used to send information to some remote computers to receive
some information. Information is sent and received by packets..............
Read answer
Explain RSVP. How does it work?
Latest answer: Resource Reservation protocol is used to reserve resources across a network. It is used for
requesting a specific Quality of Service (QoS) from the network...............
Read answer
Explain the concept of DHCP.
Latest answer: Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The
IP addresses are assigned dynamically...............
Read answer
What are the differences between a domain and a workgroup?
Latest answer: In a domain, one or more computer can be a server to manage the network. On the other hand in a
workgroup all computers are peers having no control on each other.............
Read answer
Explain how NAT works.
Latest answer: Network Address Translation translates and IP address used in a network to another IP address
known within another network. A NAT table is maintained for global to local and local to mapping of IPs................
Read answer
What is PPP protocol? Explain PPP packet format.
Latest answer: Point to Point protocol helps communication between 2 computers over a serial cable, phone line or
other fiber optic lines. E.g. Connection between an Internet Service Provider and a host................
Read answer
What is IP Spoofing and how can it be prevented?
Latest answer: IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the
intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted
host...............
Read answer
Explain IP datagram, Fragmentation and MTU.
Latest answer: IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields
arranged in an order. The order is specific which helps to decode and read the stream easily..............
Read answer
What is an application gateway?
Latest answer: An application gateway is an application program that runs on a firewall between two networks. An
application gateway is used for establishing connection between client program and destination service..................
Read answer
Explain Circuit Level Gateway.
Latest answer: A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be
considered as a layer between application layer and transport layer..................
Read answer
What is 'Gateway Of Last Resort'?
A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to
transmit the IP packet. Known routes are present in the routing table.................
Read answer
What are switches? Explain the concepts of Layer-3 switches.
Latest answer: It is a device that connects multiple network segments.
A switch analyzes the MAC address and then determines where to send the data..............
Read answer
What is Router? Explain components of Routers.
Latest answer: The way switches connect multiple computers, a router connects multiple networks. Routers
comprise of data consisting of large tables of networks and addresses..................
Read answer
Overview of OSI layer.
Latest answer: OSI stands for Open Systems Interconnection
The OSI reference model gives an overview of the layered communications and computer network protocol
design...................
Read answer
Explain different layers in the OSI model.
Latest answer: Application Layer: Closest to the end user, Interact directly with the software application.
Presentation Layer: Translates application to network format, and vice versa, Works to transform data into the form
that the application layer can accept, Formats and encrypts data to be sent across a network.........................
Read answer
Explain the concept and capabilities of Unicast IP Addresses.
Latest answer: It is an IP address that uniquely identifies a host in a network.
The datagram with a unicast IP address is received and processed by only a single host.
Read answer
What is IP Multicasting?
Latest answer: It is an IP address that identifies a particular group of hosts in network.
This group of hosts is called a multicast group..............
Read answer
Explain the classes of IP addresses. Why do we need them?
Latest answer: Class A:
Range: from 0.0.0.0 to 127.255.255.255.
Leftmost bit: 0.
First 8 bits: netid.
Remaining 24 bits: hostid..............
Read answer
What is Subneting? Explain the advantages of using Subneting.
Latest answer: Subneting is dividing a network into several subnets.
This is usually done for the following purposes:..................
Read answer
What is Superneting? Explain the concept of custom Subneting.
Latest answer: Supernetting or Classless Inter-Domain Routing (CIDR) : It is a way to aggregate multiple Internet
addresses of the same class..............
Read answer
What is VLSM, Variable length subnet masking?
Latest answer: VLSM is a means of allocating IP addressing resources to subnets according to their individual need
rather than some general network-wide rule................
Read answer
What is Data Fragmentaion? Explain how Data Fragmentaion works.
Latest answer: Fragmentation occurs when storage space is used inefficiently due to which storage capacity and
performance is reduced................
Read answer
Explain the concepts and capabilities of IP Datagram.
Latest answer: Data transmitted over an internet using IP is carried in messages called IP datagrams. Like all
network protocol messages, IP uses a specific format for its datagrams...................
Read answer
What is MAC address?
Media Access Control address is an identifier for assigned to most network adapters or Network Interface Cards by
the manufacturer for the purpose of identification...............
Read answer
Describe the Packet Format of ARP (Address Resolution Protocol)?
The fields of the packet format of ARP are as follows:
-Hardware type: It is a 16-bit field . Each LAN has been assigned an integer based on its type. For example, Ethernet
is given the type 1.
-Protocol type: This is a 16-bit field defining the protocol. For example, the value of this field for IPv4 protocol is 0800.
-Hardware length: This is an 8-bit field defining the length of the physical address in bytes. For example, for Ethernet
the value is 6.
-Protocol length: This is an 8-bit field defining the length of the logical address in bytes. For example, for IPv4
protocol the value is 4.
-Operation: This is a 16-bitfield defining the type of packet. Two packet types are defined: ARP request (1), ARP reply
(2).
-Sender hardware address: This is a variable-length field defining the physical address of the sender. For example,
for Ethernet this field is 6 bytes long.
-Sender protocol address: This is a variable-length field defining the logical (for example, IP) address of the sender.
For the IP protocol, this field is 4 bytes long.
-Target hardware address: This is a variable-length field defining the physical address of the target. For example, for
Ethernet this field is 6 bytes long.
-Target protocol address: This is a variable-length field defining the logical (for example, IP) address of the target. For
IPv4 protocol, this field is 4 bytes long.
What are the advantages of IPv6 over IPv4?
the next generation IP, or IPv6 has some advantages over IPv4 that can be summarized as follows:
- Larger Address Space: An IPv6 address is 128 bytes long where IPv4 has 32-bit address only, this is a huge
increase in the address space.
- Better Header Format: IPv6 uses a new header format which simplifies and speeds up the routing process because
most of the options do not need to be checked by routers.
- New Options: IPv6 has new options to allow for additional functionalities.
- Allowance for extension: In IPv6 new technologies can easily embedded.
-Support For Resource Allocation: In IPv6, flow label has been added to enable the source to request special
handling of the packet. This mechanism can be used to support traffic such as real-time audio and video.
-Support For More Security: The encryption and authentication options in IPv6 provide confidentiality and integrity of
the packet.
What are the different design goals of ATM?
Asynchronous Transfer Mode (ATM) is the cell relay protocol.
The Design Goals of ATM are as follows:
- A technology is needed to take advantage of high rate transmission media and less susceptible to noise
degradation for maximizing the data rates.
-The system must interface with existing systems and provide wide-area inter-connectivity between.
-The implementation of design must be cheaper enough so that everyone can afford it. If ATM is to become the
backbone of international communications, as indeed, it must be available at low cost to every user who wants it.
-The new system must be able to work with and support the existing telecommunication hierarchies.
- The new system must be connection-oriented to ensure accurate and predictable delivery.
- One objective is to move as many of the functions to hardware as possible (for speed) an eliminate as many
software functions as possible (again for speed).

Discussion Board

Networking interview questions and answers.

What is the role of Pseudo tty?
Pseudo tty -false terminal - it enables external machines to connect through Telnet or rlogin. No connection can be
made without a pseudo tty.

Explain External Data Representation.
It is a method of encoding data within an RPC message. It is used to ensure that the data is not system-dependent.

Differentiate between interior and exterior neighbour gateways.
- Interior gateway - connects LANs within an organization
- Exterior gateway - connects the organization to the outside world.

Honey 12-7-2011 06:48 AM
Networking interview questions and answers.

Explain SLIP.
SLIP - Serial Line Interface Protocol, is a protocol used for transmission of IP datagrams across a serial line.

What do you mean by Multi-homed Host?
- It is a multiple network interface that requires multiple IP addresses.

What is multicast routing?
Multicasting - Sending a message to a group.
Multicast routing- Routing algorithm of sending message to a group.

What is the role of OSI Reference Model?
It provides a framework for discussing network operations and design.

Arun 12-7-2011 06:47 AM
Networking interview questions and answers.

In which layer does the frame relay operate?
Frame relay - packet switching technology, operates in the data link layer.

Explain Gateway.
Gateway - operates at the upper levels of the OSI model. It translates information between two absolutely different
network architectures or data formats.

What are the different ways of data exchange?
a. Simplex
b. Half-duplex
c. Full-duplex.

Magan 12-7-2011 06:46 AM

When were OSI model developed and why its standard called 802.XX and so on?
OSI model was developed in February1980 that why these also known as 802.XX Standard (Notice 80 means
==> 1980, 2means ==> February)
What is Full form of ADS?
Active Directory Structure
How will you register and activate windows?
If you have not activated windows XP, you can do so at any time by clicking the windows Activation icon in the
system tray to initiate activation. Once you have activated windows XP, this icon disappears from the system
tray.
For registration
Start ==> Run ==> regwiz /r
Where do we use cross and standard cable?
Computer to computer ==> cross
Switch/hub to switch/hub ==>cross
Computer to switch/hub ==>standard
How many pins do serial ports have?
In computer it's known as com port and could be available in 9pin or 25 pin. On router it have 60 pins.
How will check ip address on 98?
Start ==> Run ==> command ==> winipcfg
How will you make partition after installing windows?
My computer ==> right click ==> manage ==> disk management ==>
select free space ==> right click ==> New partition
What is IP?
It's a unique 32 bits software address of a node in a network.
What is private IP?
Three ranges of IP addresses have been reserved for private address and they are not valid for use on the
Internet. If you want to access internet with these address you must have to use proxy server or NAT server
(on normal cases the role of proxy server is played by your ISP.).If you do decide to implement a private IP
address range, you can use IP addresses from any of the following classes:
Class A 10.0.0.0 10.255.255.255
Class B 172.16.0.0 172.31.255.255
Class C 192.168.0.0 192.168.255.255
What is public IP address?
A public IP address is an address leased from an ISP that allows or enables direct Internet communication.
What's the benefit of subnetting?
Reduce the size of the routing tables.
Reduce network traffic. Broadcast traffic can be isolated within a single logical network.
Provide a way to secure network traffic by isolating it from the rest of the network.
What are the differences between static ip addressing and dynamic ip addressing?
With static IP addressing, a computer (or other device) is configured to always use the same IP address. With
dynamic addressing, the IP address can change periodically and is managed by a centralized network service
What is APIPA?
Automatic private IP addressing (APIPA) is a feature mainly found in Microsoft operating systems. APIPA
enables clients to still communicate with other computers on the same network segment until an IP address
can be obtained from a DHCP server, allowing the machine to fully participate on the network. The range of
these IP address are the 169.254.0.1 to 169.254.255.254 with a default Class B subnet mask of 255.255.0.0.
What are the LMHOSTS files?
The LMHOSTS file is a static method of resolving NetBIOS names to IP addresses in the same way that the
HOSTS file is a static method of resolving domain names into IP addresses. An LMHOSTS file is a text file that
maps NetBIOS names to IP addresses; it must be manually configured and updated.
What is DHCP scope?
A scope is a range, or pool, of IP addresses that can be leased to DHCP clients on a given subnet.
What is FQDN?
An FQDN contains (fully qualified domain name) both the hostname and a domain name. It uniquely identifies a
host within a DNS hierarchy
What is the DNS forwarder?
DNS servers often must communicate with DNS servers outside of the local network. A forwarder is an entry
that is used when a DNS server receives DNS queries that it cannot resolve locally. It then forwards those
requests to external DNS servers for resolution.
Which command will you use to find out the name of the pc in networks?
NSLOOKUP [192.168.0.1]
[Ip of target computer]
How will enable sound service in 2003?
By default this service remain disable to enable this service
Start ==> administrative tools ==> service ==> windows audio ==> start up type ==> automatic
How will enable CD burning service in 2003?
By default this service remain disable to enable this service
Start ==> administrative tools ==> service ==> IMAPI CD burning com service ==> start up type ==> automatic

Anda mungkin juga menyukai