Anda di halaman 1dari 62

What is a Router?

Router is the most important network device that is used to connect two logically and physically different networks. Router defines the short possible route for the data to reach its destination. A router works with built-in intelligent software known as routing table, which helps to determine the route between the two networks. What is Gateway? A gateway is software or a hardware that is used to connect the local area network with the internet. A gateway is a network entrance point and a router usually works as a gateway.

What is WLAN? WLAN or Wireless local area network is simply a type of network that doesnt use wired Ethernet connections for networking. WLAN uses wireless network devices such as wireless routers etc. What is Subnet Mask? A subnet mask is used to determine the number of networks and the number of host computers. Every class of the IP address uses the different range of the subnet mask. Subnet masks allow the IP based networks to be divided into the sub networks for performance and security purposes. What is a MAC Address? MAC address or Media Access control is a unique identifier of a computer device. The MAC address is provided by the manufacturer of the device. MAC addresses are 12 digital hexadecimal numbers. What is an IP Address? An IP address is a unique identifier of a computer or network device on the local area network, WAN or on internet. Every host computer on the internet must have a unique IP address. IP addresses on the internet are usually assigned by the local ISPs to which users are connected.

What is Wifi? Wi Fi or wireless fidelity is a base band network technology that is used for the wireless data communication. What is WiMax? Wi Fi is a next form of the Wi fi. Wi max is a very high speed broadband network technology that is designed for the corporate offices, roaming and home users. Name the Seven Layers of OSI Model The seven layers of the OSI are Application, Presentation, Sessions, Transport, Network, Data Link and Physical layer. What is LDAP? Lightweight Directory Access Protocol is used to access the directory services from the Active directory in Windows operation systems. What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP, and FTP? SMTP 25, POP3 110, IMAP4 143, RPC 135, LDAP, FTP-21, HTTP-80 What is IPv6? IP V6 is a next generation protocol that is used as an expansion of DNS. What is UDP? UDP or user datagram protocol is a connectionless protocol that is used to transfer the data without any error handling. What is Firewall? A firewall is usually a software program that is installed on the network server or gateway. The purpose of the firewall is to protect the network resources from the intruders and unauthorized persons. What is Virtual Private Network (VPN) and how does it work?

VPN or virtual private network is used to connect two networks by means internet. VPN uses PPTP (point to point tunneling protocol) and other security procedures to make a secure tunnel on internet. Define VOIP VOIP or voice over internet protocol is a technology that uses IP based networks such as internet or private networks to transmit the voice communication. Define Bluetooth Technology Bluetooth is a short range wireless technology that uses radio waves for communication. Many mobile phones, laptops, MP3 players have built in features of the Bluetooth. What is a RAS server? RAS or remote access server allows you to remote dial in through the desktop computers, laptops and GSM mobile phones. Whats a Frame Relay? Frame relay is high speed data communication technology that operates at the physical and data link layers of the OSI model. Frame relay uses frames for data transmission in a network.

Physical Topology means the physical design of a network including the devices, location and cable installation. Logical Topology refers to the fact that how data actually transfers in a network as opposed to its design. Topology can be considered as a virtual shape or structure of a network. This shape actually does not correspond to the actual physical design of the devices on the computer network. The computers on the home network can be arranged in a circle shape but it does not necessarily mean that it presents a ring topology.

Computer network topologies can be categorized in the following categories. bus star ring mesh Tree. Hybrid networks are the complex networks, which can be built of two or more above mentioned topologies. Bus Topology Bus topology uses a common backbone to connect all the network devices in a network in a linear shape. A single cable functions as the shared communication medium for all the devices attached with this cable with an interface connector. The device, which wants to communicate send the broadcast message to all the devices attached with the shared cable but only the intended recipient actually accepts and process that message. Ethernet bus topologies are easy to install and dont require much cabling and only a main shared cable is used for network communication. 10Base-2 and 10BaseT are two popular types of the Ethernet cables used in the Bus topology. Also, Bus network works with very limited devices. Performance issues are likely to occur in the Bus topology if more than 1215 computers are added in a Bus Network. Additionally, if the Backbone cable fails then all network becomes useless and no communication fails among all the computers. Unlike in the Star topology in which if one computer is detached from a network then there is not effect on the other computers in a network. Ring Topology In ring Network, every computer or devices has two adjacent neighbors for communication. In a ring network, all the communication messages travel in the same directory whether clockwise or anti clockwise. Any damage of the cable of any cable or device can result in the breakdown of the whole network. Ring topology now has become almost obsolete. FDDI, SONET or Token Ring Technology can be used to implement Ring Technology. Ring topologies can be found in office, school or small buildings. Star Topology

In the computer networking world the most commonly used topology in LAN is the star topology. Star topologies can be implemented in home, offices or even in a building. All the computers in the star topologies are connected to central devices like hub, switch or router. The functionality of all these devices is different. I have covered the detail of each networking devices in the separate portion of my website. Computers in a network are usually connected with the hub, switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair Cables. As compared to the bus topology, a star network requires more devices & cables to complete anetwork. The failure of each node or cable in a star network, wont take down the entire network as compared to the Bus topology. However if the central connecting devices such as hub, switch or router fails due to any reason,then ultimately all the network can come down or collapse. Tree Topology Tree topologies are comprised of the multiple star topologies on a bus. Tree topologies integrate multiple star topologies together onto a bus. Only the hub devices can connect directly with the tree bus and each Hub functions as a root of a tree of the network devices. This bus/star/hybrid combination supports future expandability of the computer networks, much better than a bus or star. Mesh Topology Mesh topology work on the concept of routes. In Mesh topology, message sent to the destination can take any possible shortest, easiest route to reach its destination. In the previous topologies star and bus, messages are usually broadcasted to every computer, especially in bus topology. Similarly in the Ring topology message can travel in only one direction i.e clockwise or anticlockwise. Internet employs the Mesh topology and the message finds its route for its destination. Router works in find the routes for the messages and in reaching them to their destinations.The topology in which every devices connects to every other device is called a full Mesh topology unlike in the partial mesh in which every device is indirectly connected to the other devices. Summary

Topologies are the important part of the network design theory. A better network can be built if you have the knowledge of these topologies and if you know the difference between each topology. Similarly you should have the knowledge of each network device so that you can properly use them according to your network needs. A misconfigured network can result in a waste of time and energy as well as a lots of troubleshooting methods to resolve the issue. So thebasic understanding of the network topologies and network devices is a must to build a good network.
Router Commands Overview In this section you will learn about the router commands, configurations, privileged mode commands, routing protocols, cisco labs and network configurations. There are hundreds of basic and advance level commands of a router. It is not easy to remember all the commands. But some commands are frequently used and can be remembered with some practice. I have provided a list of the most commonly used commands based on their features and usage.

You will find here some basic terminology of a router. Routing: Routing is a process of moving the data (packets) through an inter network. Routing performs the two basic tasks. Define the paths for a packet and then forward the packets on the basis of defined paths. Routing can also be defined as the communication between two or more logically and physical networks and this communication (packet transfer) is brought by a router.

First of all you should remember the keyboard shortcuts of a router. Keyboard Shortcuts CTRL-N - show next command CTRL-P - show previous command SHIFT-CTRL-6 Break Configuring the Router You will be able to learn the basic commands for configuring a router. sh running-config - details the running configuration file (RAM) sh startup-config - displays the configuration stored in NVRAM setup - Will start the the automatic setup; the same as when you first boot the router config t - use to execute configuration commands from the terminal config mem - executes configuration commands stored in NVRAM; copies startup-config to running-

config config net - used to retrieve configuration info from a TFTP server copy running-config startup-config - copies saved config in running config (RAM) to NVRAM or "write memory" for IOS under ver.11 copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM) boot system flash <put file filename here> - tells router which IOS file in flash to boot from boot system tftp - tells router which IOS file on the tftp server to boot from boot system rom - tell router to boot from ROM at next boot copy flash tftp - Copies flash to tftp server copy tftp flash - Restores flash from tftp server copy run tftp - Copies the current running-config to tftp server copy tftp run - Restores the running-config from tftp server General Commands Here is a list of the general commands. These are the basic level commands and most commonly used no shutdown - (enables the interface) reload - restarts the router sh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration register sh clock - shows date and time on router sh history - shows the history of your commands sh debug - shows all debugging that is currently enabled no debug all - turns off all debugging sh users - shows users connected to router sh protocols - shows which protocols are configured banner motd # Your customized message here # - Set/change banner hostname <give router name> - use to configure the hostname of the router clear counters - clear interface counters Privileged Mode commands of a router Learn how to work in the privileged mode of a router. enable - get to privileged mode disable - get to user mode enable password <give password here> - sets privileged mode password enable secret <give password here> - sets encrypted privileged mode password Setting Passwords on router Here you will be able to learn how to set the password on a router. enable secret <give password here> - set encrypted password for privileged access enable password <give password here> - set password for privileged access (used when there is no enable secret and when using older software)

Setting the password for console access: (config)#line console 0 (config-line)#login (config-line)#password <put password here> Set password for virtual terminal (telnet) access (password must be set to access router through telnet): (config)#line vty 0 4 (config-line)#login (config-line)#password <put password here> Set password for auxiliary (modem) access: (config)#line aux 0 (config-line)#login (config-line)#password <put password here> Router Processes & Statistics By these command you can see the statistics and different processes of the router. sh processes - shows active processes running on router sh process cpu - shows cpu statistics sh mem - shows memory statistics sh flash - describes the flash memory and displays the size of files and the amount of free flash memory sh buffers - displays statistics for router buffer pools; shows the size of the Small, Middle, Big, Very Big, Large and Huge Buffers sh stacks - shows reason for last reboot, monitors the stack use of processes and interrupts routines IP Commands Here is a list of the IP Commands Configure IP on an interface: int serial 0 ip address 157.89.1.3 255.255.0.0 int eth 0 ip address 2008.1.1.4 255.255.255.0 Other IP Commands: sh ip route - view ip routing table ip route <remote_network> <mask> <default_gateway> [administrative_distance] - configure a static IP route ip route 0.0.0.0 0.0.0.0 <put gateway of the last resort here> - sets default gateway ip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible route sh arp - view arp cache; shows MAC address of connected routers ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interface sh ip protocol

CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data): sh cdp neighbor - shows directly connected neighbors sh cdp int - shows which interfaces are running CDP sh cdp int eth 0/0 - show CDP info for specific interface sh cdp entry <cdp neighbor here> - shows CDP neighbor detail cdp timer 120 - change how often CDP info is sent (default cdp timer is 60) cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180) sh cdp run - shows if CDP turned on no cdp run - turns off CDP for entire router (global config) no cdp enable - turns off CDP on specific interface IPX Commands Enable IPX on router: ipx routing Configure IPX + IPX-RIP on an int: int ser 0 ipx network 4A Other Commands: sh ipx route - shows IPX routing table sh ipx int e0 - shows ipx address on int sh ipx servers - shows SAP table sh ipx traffic - view traffic statistics debug ipx routing activity - debugs IPS RIP packets debug ipx sap - debugs SAP packets Routing Protocols RIP, IGPR and OSPF are the routing protocols and here is a list of the commands for the working on the routing protocols. Configure RIP: router rip network 157.89.0.0 network 208.1.1.0 Other RIP Commands: debug ip rip - view RIP debugging info Configure IGRP: router IGRP 200 network 157.89.0.0 network 208.1.1.0 Other IGRP Commands:

debug ip igrp events - view IGRP debugging info debug ip igrp transactions - view IGRP debugging info Access Lists Here is a list of the Access list command of a router. sh ip int ser 0 - use to view which IP access lists are applies to which int sh ipx int ser 0 - use to view which IPX access lists are applies to which int sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which int View access lists: sh access-lists sh ip access-lists sh ipx access-lists sh appletalk access-lists Apply standard IP access list to int eth 0: access-list 1 deny 200.1.1.0 0.0.0.255 access-list 1 permit any int eth 0 ip access-group 1 in Apply Extended IP access list to int eth 0: access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23 access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80 int eth 0 ip access-group 100 out Apply Standard IPX access list to int eth 0: access-list 800 deny 7a 8000 access-list 800 permit -1 int eth 0 ipx access-group 800 out Apply Standard IPX access list to int eth 0: access-list 900 deny sap any 3378 -1 access-list 900 permit sap any all -1 int eth 0 ipx access-group 900 out WAN Configurations Commands Networking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity. PPP Configuration Point to point protocol is a method for the WAN connectivity and you will find here some commands of PPP. encapsulation pppppp authentication <chap or pap here> ppp chap hostname <put router name here> ppp pap sent-username <put user name here>

sh int ser 0 - use to view encapsulation on the interface Frame-Relay Configuration One of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay. encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco router frame-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is autosensed in IOS v11.2 and up frame-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won't work, map Other IP to Your DLCI # (local) keep alive 10 - use to set keep alive sh int ser 0 - use to show DLCI, LMI, and encapsulation info sh frame-relay pvc - shows the configured DLCI's; shows PVC traffic stats sh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info Miscellaneous Commands In the last but not least here is a list of the some miscellaneous and useful commands sh controller t1 - shows status of T1 lines sh controller serial 1 - use to determine if DCE or DTE device (config-if)#clock rate 6400 - set clock on DCE (bits per second) (config-if)#bandwidth 64 - set bandwidth (kilobits) OSI 7 Layers Reference Model Here you will learn OSI Model Layer Introduction, overview of the 7 OSI reference model, applicaion, session, transport, network and physical layers. If you want to remember the sequence of the OSI layers model name then the following two sentences can help you a lot for this purpose.All People Seems To Need Data Processing. Open Systems Interconnection (OSI) model is developed by ISO (International organization for standardization) in 1984. OSI reference model is a logical framework for standards for the network communication. OSI reference model is now considered as a primary standard for internetworking and inter computing. Today many network communication protocols are based on the standards of OSI model. In the OSI model the network/data communication is defined into seven layers. These 7 layers further divide the tasks of moving the data across the network into subtask and hence complete one communication cycle between two computers or two network devices. Each layer is assigned a task and the task is completed independently. The OSI layers have the clear and independent characteristics and tasks.

The 7 layers of the OSI models can be divided into upper and lower layers. I have defined the

characteristics, tasks and features of each layer separately. Layer 7: Application Layer The application layer defines the interfaces for communication and data transfer. This layer also provides and support services such as job transfer, handles network access, e-mail, supports user applications and error recovery. Protocols: FTP, DNS, SNMP, SMTP, FINGER, TELNET, TFTP, BOOTP and SMB protocol are operated on the application layer. Network Devices: Gateway network device is operated on the application layer. Layer 6:Presentation Layer The presentation layer presents the data into a uniform format and masks the difference of data format between two dissimilar systems. It also translates the data from application to the network format. Presentation layer is also responsible for the protocol conversion, encryption, decryption and data compression. Presentation layer is a best layer for cryptography. Network Devices: Gateway Redirector is operates on the presentation layer. Layer 5: Session Layer Session layer establish and manages the session between the two users at different ends in a network. Session layer also manages who can transfer the data in a certain amount of time and for how long. The examples of session layers and the interactive logins and file transfer sessions. Session layer reconnect the session if it disconnects. It also reports and logs and upper layer errors. Protocols: The protocols that work on the session layer are NetBIOS, Mail Slots, Names Pipes, RPC Network Devices: Gateway Layer 4: Transport Layer Transport layer manages end to end message delivery in a network and also provides the error checking and hence guarantees that no duplication or errors are occurring in the data transfers across the network. Transport layer also provides the acknowledgement of the successful data transmission and retransmits the data if no error free data was transferred. It also provides and error handling and connectionless oriented data deliver in the network. Protocols: These protocols work on the transport layer TCP, SPX, NETBIOS, ATP and NWLINK. Network Devices: The Brouter, Gateway and Cable tester work on the transport layer. Layer 3: Network Layer The network layer determines that how data transmits between the network devices. It also translates the logical address into the physical address e.g computer name into MAC address. It is also responsible for defining the route, managing the network problems and addressing. Router works on the network layer and if a sending device does not break the data into the similar packets as the receiving device then

network layer split the data into the smaller units and at the receiving end the network layer reassemble the data. Network layer routes the packets according to the unique network addresses. Router works as the post office and network layer stamps the letters (data) for the specific destinations. Protocols: These protocols work on the network layer IP, ICMP, ARP, RIP, OSI, IPX and OSPF. Network Devices: Network devices including Router, Brouter, Frame Relay device and ATM switch devices work on the network layer. Layer 2:Data Link Layer Defines procedures for operating the communication links Frames packets Detects and corrects packets transmit errors Protocols: Logical Link Control error correction and flow control manages link control and defines SAPs 802.1 OSI Model 802.2 Logical Link Control Media Access Control communicates with the adapter card controls the type of media being used: 802.3 CSMA/CD (Ethernet) 802.4 Token Bus (ARCnet) 802.5 Token Ring 802.12 Demand Priority Network Devices: Bridge Switch ISDN Router Intelligent Hub NIC Advanced Cable Tester Layer 1: Physical Layer Physical layer defines and cables, network cards and physical aspects. It defines raw bit stream on the physical media. It also provides the interface between network and network communication devices. It is also responsible for how many volts for 0 and how many for 1. Physical layer also checks the number of bits transmitted per second and two ways or one way transmission. Physical layer also dealing with the optical, mechanical and electrical features. Protocols: Protocols that work on the physical layer are ISDN, IEEE 802 and IEEE 802.2 Network Devices: Hubs, Repeaters, Oscilloscope and Amplifier works on the network devices.

Download Networking interview questions Test your Networking skills!


Networking (40 questions) Wireless communication Iphone Android Linux (27 questions) Routing and Switching Comment on Data Encryption Standard (DES) weakness and strength. The Data Encryption Standard (DES) is a symmetric key block cipher which takes 64-bit plaintext and 56-bit key as an input and produces 64-bit cipher text.............
Read Answer

If you are a victim of Denial of Service (Dos) then what you do? The function of a denial of service attack is to flood its target machine with too much traffic and prevents it from being accessible to any other requests or providing services..............
Read Answer

What are Brute Force Attacks? Brute forcing is a mechanism which is used by an attacker to break the encryption of data by applying a set of various key.............
Read Answer

How do you use RSA for both authentication and secrecy? RSA is a public key encryption algorithm. The RSA algorithms are...........
Read Answer

Can you differentiate among encoding, encryption and hashing? Encoding: Basically encoding is used to protect the integrity of data as it crosses through communication network to keep its original message.............
Read Answer

If you have to generate a hash function then what characteristics are needed in a secure hash function? A secure hash function should have the following characteristics:................
Read Answer

What is digital signature? Differentiate between Physical and Digital Signature

A digital signature is an electronic analogue of a written signature; the digital signature can be used to provide assurance...........
Read Answer

What is Authentication Header and how it provides the protection to IP header? Basically Authentication Header protects IP header and provides the complete authenticity to the IP packets.............
Read Answer

Explain SSL Protocol. How does it protect internet users from various threats? The SSL protocol (Secure Socket Layer protocol) was originally developed by Netscape, to ensure security of data transported.............
Read Answer

What is PIX firewall security? How does it differ from a firewall? PIX (Private Internet Exchange)...........
Read Answer

What are Malware? Explain different types of Malware Malware is a software program which is developed to destroy a computer system..............
Read Answer

What are replay attacks? Give an example of replay attack Replay attacks are the network attacks in which an attacker spies the conversation between the sender and receiver..........
Read Answer

If you have to encrypt as well as compress data during transmission then which would you do first and why? Data should be transmitted over any communication network in such a way that the data integrity and authenticity.............
Read Answer

What is the goal of Information Security in an organization? Mainly there are three Information security goals in an organization: Confidentiality, Integrity and Availability..............
Read Answer

What is Symmetric-Key cryptography and Asymmetric-Key cryptography? Symmetric-Key Cryptography: Symmetric-key cryptography uses a single key for both encryption and decryption. Encryption and decryption algorithm are inverse of each other.............
Read Answer

Explain the services provided by IP (Internet Protocol) - Addressing, Fragmentation, Packet timeouts and options

Latest answer: Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP. As IP operates in an internet, its systems are designed to accept the addressing of devices which are unique.............
Read answer

Explain the classes of IP address Latest answer: IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format. Every number in each class is represented as binary to computers..................
Read answer

Define Broadcast, Unicast and Multicast. Latest answer: Unicast: A term used in communication to describe a piece of information to send from one point to another. There are only sender and receiver................
Read answer

What is Network Mask? Latest answer: A network mask is used for determination of what subnet an IP address belongs to. An IP address has network address and the host address.................
Read answer

Define Subnetting. Latest answer: A subnet describes a set of networked computers which have common IP address routing prefix..................
Read answer

What is the User Datagram Protocol (UDP)? Latest answer: User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol,..................
Read answer

Explain TCP Windowing concept. Latest answer: TCP Windowing is a concept that is used for avoiding congestion in the network traffic..................
Read answer

What is the Domain Name System (DNS)? What are the advantages of it? Latest answer: A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet...................
Read answer

What is the TTL (Time to Live)? Why is it required? Latest answer: TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded.................
Read answer

Explain the use of Internet Control Message Protocol (ICMP) Latest answer: Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers..................
Read answer

What is the use of IGMP protocol? Latest answer: Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups..............
Read answer

What are Ping and Tracert? Latest answer: Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets..............
Read answer

Explain RSVP. How does it work? Latest answer: Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network...............
Read answer

Explain the concept of DHCP. Latest answer: Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The IP addresses are assigned dynamically...............
Read answer

What are the differences between a domain and a workgroup? Latest answer: In a domain, one or more computer can be a server to manage the network. On the other hand in a workgroup all computers are peers having no control on each other.............
Read answer

Explain how NAT works. Latest answer: Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is maintained for global to local and local to mapping of IPs................
Read answer

What is PPP protocol? Explain PPP packet format. Latest answer: Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host................
Read answer

What is IP Spoofing and how can it be prevented?

Latest answer: IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host...............
Read answer

Explain IP datagram, Fragmentation and MTU. Latest answer: IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged in an order. The order is specific which helps to decode and read the stream easily..............
Read answer

What is an application gateway? Latest answer: An application gateway is an application program that runs on a firewall between two networks. An application gateway is used for establishing connection between client program and destination service..................
Read answer

Explain Circuit Level Gateway. Latest answer: A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be considered as a layer between application layer and transport layer..................
Read answer

What is 'Gateway Of Last Resort'? A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to transmit the IP packet. Known routes are present in the routing table.................
Read answer

What are switches? Explain the concepts of Layer-3 switches. Latest answer: It is a device that connects multiple network segments. A switch analyzes the MAC address and then determines where to send the data..............
Read answer

What is Router? Explain components of Routers. Latest answer: The way switches connect multiple computers, a router connects multiple networks. Routers comprise of data consisting of large tables of networks and addresses..................
Read answer

Overview of OSI layer. Latest answer: OSI stands for Open Systems Interconnection The OSI reference model gives an overview of the layered communications and computer network protocol design...................
Read answer

Explain different layers in the OSI model. Latest answer: Application Layer: Closest to the end user, Interact directly with the software application. Presentation Layer: Translates application to network format, and vice versa, Works to transform data into

the form that the application layer can accept, Formats and encrypts data to be sent across a network.........................
Read answer

Explain the concept and capabilities of Unicast IP Addresses. Latest answer: It is an IP address that uniquely identifies a host in a network. The datagram with a unicast IP address is received and processed by only a single host.
Read answer

What is IP Multicasting? Latest answer: It is an IP address that identifies a particular group of hosts in network. This group of hosts is called a multicast group..............
Read answer

Explain the classes of IP addresses. Why do we need them? Latest answer: Class A: Range: from 0.0.0.0 to 127.255.255.255. Leftmost bit: 0. First 8 bits: netid. Remaining 24 bits: hostid..............
Read answer

What is Subneting? Explain the advantages of using Subneting. Latest answer: Subneting is dividing a network into several subnets. This is usually done for the following purposes:..................
Read answer

What is Superneting? Explain the concept of custom Subneting. Latest answer: Supernetting or Classless Inter-Domain Routing (CIDR) : It is a way to aggregate multiple Internet addresses of the same class..............
Read answer

What is VLSM, Variable length subnet masking? Latest answer: VLSM is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule................
Read answer

What is Data Fragmentaion? Explain how Data Fragmentaion works. Latest answer: Fragmentation occurs when storage space is used inefficiently due to which storage capacity and performance is reduced................
Read answer

Explain the concepts and capabilities of IP Datagram.

Latest answer: Data transmitted over an internet using IP is carried in messages called IP datagrams. Like all network protocol messages, IP uses a specific format for its datagrams...................
Read answer

What is MAC address? Media Access Control address is an identifier for assigned to most network adapters or Network Interface Cards by the manufacturer for the purpose of identification...............
Read answer

Test your networking knowledge with our m Difference between the communication and transmission. The differences between the communication and transmission are: Physical movement of information and concerning about bit priority, synchronization, clock etc is referred as transmission................
Read answer

What is the difference between TFTP and FTP application layer protocols? The differences between FTP and TFTP: FTP is connection oriented, where as TFTP is not. TFTP uses error checking and flow control, where as TFTP does not cause error checking.................
Read answer

Difference between bit rate and baud rate The differences between bit rate and baud rate: Bit rate is measured as number of data bits transmitted / second in communication channel...............
Read answer

What are NETBIOS and NETBEUI? Network Basic Input Output System provides session layer of OSI model related services which allows the applications on different computers for communicating over a LAN...............
Read answer

Difference between ARP and RARP The differences between ARP and RARP: Address Resolution Protocol is utilized for mapping IP network address to the hardware address that uses data link protocol..............
Read answer

What is the difference between POP3 and IMAP Mail Server? POP3: All emails are to be downloaded again if used by another desktop PC for checking the email. May leads to confusion if used for checking email in office and at home pc.............
Read answer

What is a Transaction server? A transaction server is software that is used for implementing transactions. A transaction comprises of multiple steps that must automatically be completed..............
Read answer

What is Message Oriented Middleware (MOM)? An infrastructure focuses on sending and receiving messages to increment interoperability, flexibility and flexibility of an application..............
Read answer

What is Groupware server? Groupware server is software that allows the collaboration of users, irrespective of location through the internet or intranet..............
Read answer

What are TP-Lite and TP-Heavy Monitors? TP-Lite Monitor: The integration of TP monitors functions in a database engines is called as TP-Lite monitor...............
Read answer

What is LAN? Latest answer: LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves...............
Read answer

What's the difference Between an Intranet and the Internet? Latest answer: There's one major distinction between an intranet and the Internet: The Internet is an open, public space, while an intranet is designed to be a private space.................
Read answer

Define the term Protocol. Latest answer: Protocol is a standard way of communicating across a network. A protocol is the "language" of the network. It is a method by which two dissimilar systems can communicate..........
Read answer

Define File Transfer Protocol. Latest answer: File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP)................
Read answer

Explain the 7 Layers of OSI. Latest answer: Layer 1: Physical layer It represents all the electrical and physical specifications for devices............
Read answer

What is a network? What are the different kinds of network? Explain them.

Latest answer: A network is a group of computers or nodes connected together. They are connected with each other by communication paths................
Read answer

What are network topologies? Explain Ring, Bus and Star topology. Latest answer: A network topology describes the layout of a network. It describes how different nodes and elements are connected to each other. Different types of topology.................
Read answer

Explain IP, TCP and UDP. Latest answer: TCP Transmission control Protocol is used to establish communication between nodes or networks and exchange data packets. It guarantees delivery of data packets in the order they were sent.................
Read answer

How would you define IP address? Latest answer: Computers using the TCP/IP for communication are uniquely identified by a 32 bit address called as an IP address. The routers use the IP address information to forward the packet to the destination computer.............
Read answer

What is multicasting? Latest answer: Multicasting allows a single message to be sent to a group of recipients. Emailing, teleconferencing, are examples of multicasting..................
Read answer

Explain the functionality of PING. Latest answer: Ping Is particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address................
Read answer

Explain the core naming mechanism, Domain Name System (DNS). Latest answer: A Domain Name system is used to convert the names of the website on the internet to IP addresses. The domain names for each IP addresses are stored in a database that is distributed across different servers.................
Read answer

<<Previous Next>> Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 |Part 13 Describe Application layer.

Latest answer: The application layer is located at the top of the TCP/IP protocol layers. This one contains the network applications which make it possible to communicate using the lower layers...............
Read answer

Define DNS. Latest answer: The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses............
Read answer

Define Telnet. Latest answer: Telnet is the main Internet protocol for creating a connection to a remote server..............
Read answer

Define SMTP. Latest answer: SMTP - Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers..............
Read answer

Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 |Part 13 What Is a MAC Address? Latest answer: MAC (Media Access Control) addresses are globally unique addressed that are written into hardware at the time of manufacture.................
Read answer

MAC vs. IP Addressing Latest answer: Whereas MAC addressing works at the data link layer, IP addressing functions at the network layer (layer 3). It's a slight oversimplification................
Read answer

Define Spanning-Tree Protocol (STP) Latest answer: Spanning-Tree Protocol (STP) as defined in the IEEE 802.1D is a link management protocol that provides path redundancy while preventing undesirable loops in the network...........
Read answer

What is VPN? Latest answer: A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet.................
Read answer

Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 |Part 13 How would you define IP address?

Latest answer: IP address or Internet Protocol address is the address of a device attached to an IP network (TCP/IP network)...............
Read answer

Difference between Static and Dynamic IP. Latest answer: Static IP is also called as permanent address assigned to each device in a network, whereas Dynamic IP, a temporary address assigned to the device via DHCP software..............
Read answer

What is the difference between public and private IP? Latest answer: A public IP address allows equipment accessible to everyone on the internet. A private IP address is for private use within the network and allows many more PCs to be connected.............
Read answer

What is Network Address Translation? Latest answer: Network Address Translation acts as an agent between the Internet and a local network. It is a dynamic method which is used to minimize Internet connectivity needs................
Read answer

Define IP multicast. Latest answer: IP multicast technology reduces traffic by sending stream of information to many recipients at one go.................
Read answer

What is subneting? Latest answer: Subnet adds one level to the way IP address is represented. It logically organizes the network. .................
Read answer

Define Address Resolution Protocol. Latest answer: Address Resolution Protocol ARP, is responsible for mapping an IP address to its corresponding physical network address. It is mostly seen on Ethernet network............
Read answer

Explain Maximum Transfer Unit, MTU. Latest answer: MTU specifies the largest amount of data that can be transferred across a network...........
Read answer

What is Routing Protocol? Latest answer: Routing protocol is the way to send routing information between any routers in an autonomous system..............
Read answer

Explain the structure and use of internet addresses.

Latest answer: Each IP address is 32 bit long. In human language the IP addresses are written in dotted decimal notation. These are then converted to binary by the computer.................
Read answer

Explain how names are translated (resolved) into IP address. Latest answer: Domain Name server or DNS is used to resolve names into IP addresses. When a web address is entered into the browser, the DNS client sends a request to the DNS server to find the corresponding IP address for the name.................
Read answer

Describe the basics of internet routing. Latest answer: When a source sends a packet to a destination, this packet has a specific path or route it follows. Different routing protocols are used to find the shortest path to the destination. The protocols maintain routing tables...............
Read answer

Explain the core naming mechanism, Domain Name System (DNS). Latest answer: A Domain Name system is used to convert the names of the website on the internet to IP addresses. The domain names for each IP addresses are stored in a database that is distributed across different servers.................... Define broadcast domain. Latest answer: It is a logical area in a computer network where any computer connected to the network can directly transmit to any other computer in the domain.............
Read answer

Bridge vs switch. Latest answer: A bridge connects two different LAN networks. A switch is something like you can connect many computers to a switch and then one computer can connect to another.................
Read answer

What is a Router? Latest answer: A router is a device or sometimes a software in a computer which decides the next network point to which a packet should be forwarded to reach its destination on Internet..............
Read answer

Define gateway. Latest answer: A gateway is a network point that provides entrance into another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node............
Read answer

What is firewall? Latest answer: A firewall is a hardware or software installed to provide security to the private networks connected to the internet. They can be implemented in both hardware and software, or a...............
Read answer

What is firewall? Latest answer: A firewall is a hardware or software installed to provide security to the private networks connected to the internet.........................
Read answer

What are the types of firewalls? Latest answer: Packet Filtering Firewall: This type of Firewall detects packets and block unnecessary packets and makes network traffic release.....................
Read answer

What is Data encryption? Latest answer: Data encryption ensures data safety and very important for confidential or critical data. It protect data from being read, altered or forged while transmission.................
Read answer

What is the Public Key Encryption? Latest answer: Public key encryption use public and private key for encryption and decryption. In this mechanism, public key is used to encrypt messages and only the corresponding private key .................
Read answer

Define Digital Signatures. Latest answer: Digital signature is an attachment to an electronic message used for security purpose. It is used to verify the authenticity of the sender................
Read answer

What is Ethernet technology? Latest answer: Ethernet technology is a high speed broadcast bus technology. In this type, all the station shares a single ether channel and receives every single transmitted signal...........
Read answer

Explain the use of network interface card, NIC. Latest answer: NIC is used to connect computer to an Ethernet network................
Read answer

Explain token ring technology. Latest answer: In this technology, all the devices are arranged in a circle. A token moves around the circular network. A device waits for the token before it sends its frame............
Read answer

What is CSMA and CD concept? Latest answer: In CSDA (carrier sense multiple access), presence of any digital signal in a network is checked before transmission. Data transmission occurs only when no signal is sensed.............. What is NetBIOS protocol?

Latest answer: NetBIOS (Network Basic Input/Output System) Protocol allows applications on separate computers to communicate over a LAN. It runs over TCP/IP giving each computer in the network a NetBIOS name and IP address.................
Read answer

What is IGMP protocol? Latest answer: Internet Group Management Protocol, allows internet hosts to multicast. i.e. to send messages to a group of computers. There may be a group of internet hosts interested to multicast..................
Read answer

Explain PPP protocol. Latest answer: Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host..................
Read answer

What is TCP/IP protocol? Latest answer: Transmission Control Protocol / Internet Protocol: - It is a family of protocols used for communication and connection between hosts on the internet. It is the most widely used standard for transmitting data over the internet...............
Read answer

What is FTP (File Transfer Protocol)? Latest answer: FTP is File Transfer Protocol. It used to exchange files on the internet. To enable the data transfer FTP uses TCP/IP, FTP is most commonly used to upload and download files from the internet..................
Read answer

What is HTTP (Hypertext Transfer Protocol)? Latest answer: HTTP or Hyper Text Transfer Protocol is provides a set of rules to transfer files, videos, images over the world wide web. When the web browser is opened, a HTTP request call is made..................
Read answer

What is NNTP (Network News Transfer Protocol)? Latest answer: NNTP or Network News Transfer Protocol is used to manage the notes posted on Unset newsgroup (a collection of posted notes on a subject posted by different users)...............
Read answer

What is SMTP (Simple Mail Transfer Protocol)? Latest answer: SMTP or Simple Mail Transfer Protocol is used to send email messages between servers. The messages are retrieved using email clients. SMTP is more commonly used to send messages from a mail client to a mail server.................
Read answer

What is POP3 (Post Office Protocol 3)?

Latest answer: POP3 or Post Office Box 3 is used fro receiving emails. It is a client server protocol which holds the email.................
Read answer

What is SNMP (Simple Network Management Protocol)? Latest answer: SNMP or Simple Network Management Protocol is typically used for managing the network. Managing the network includes managing the nodes present in the network................
Read answer

What are the basic components of routers? Latest answer: Components of Router: Internal components: ROM:- Used to store the routers bootstrap details, operating system software. Flash memory: - holds the operating systems images. The content is retained when the router is restarted..................
Read answer

What is Routing table? Latest answer: A routing table stores the routes of the various nodes in a network. Nodes can be any electronic device connected to the network. The table is usually stored in a router or the network computer as a database or file.................
Read answer

What is Routing Protocols? Latest answer: Routing protocols are used to assist in achieving the basic purpose of routing. They specify the routers the method to communicate with each other. They help the routers select the best possible path between nodes....................
Read answer

What is Distance Vector Routing Protocols? Latest answer: The main goal of Distance Vector Routing Protocols Is to find out the best path for he data packet to reach the destination. Distance here could be the hops..................
Read answer

Describe the basics of internet routing. Latest answer: When a source sends a packet to a destination, this packet has a specific path or route it follows. Different routing protocols are used to find the shortest path to the destination. The protocols maintain routing tables................. What is Data encryption? Latest answer: Data encryption ensures data safety and very important for confidential or critical data. It protect data from being read, altered or forged while transmission....................
Read answer

What is the Public Key Encryption?

Latest answer: Public key encryption use public and private key for encryption and decryption. In this mechanism, public key is used to encrypt messages and only the corresponding..............
Read answer

Define Digital Signatures. Latest answer: Digital signature is an attachment to an electronic message used for security purpose. It is used to verify the authenticity of the sender.................
Read answer

What is firewall? Latest answer: A firewall is a hardware or software installed to provide security to the private networks connected to the internet. They can be implemented in both hardware and software, or a combination of both................ Explain Transmission Control Protocol, TCP. Latest answer: TCP ensures reliable and end to end delivery of segments of information. Segments are acknowledged to the source when received by the destination.......................
Read answer

Explain User Datagram Protocol, UDP. Latest answer: The UDP is a connectionless, unreliable service. UDP messages can be lost and duplicated.................
Read answer

What is TCP windowing concept? Latest answer: TCP windowing concept is primarily used to avoid congestion in the traffic. It controls the amount of unacknowledged data a sender can send before it gets an acknowledgement...............
Read answer

What is TCP protocol? Latest answer: Transmission control Protocol is used to establish communication between nodes or networks and exchange data packets. It guarantees delivery of data packets in the order they were sent.....................
Read answer

What is UDP protocol? Latest answer: User Data Protocol is a communication protocol. It is normally used as an alternative for TCP/IP. However there are a number of differences between them. UDP does not divide data into packets.....................
Read answer

TCP vs. UDP. Latest answer: TCP guarantees the delivery of data. UDP on the other hand, does not guarantee delivery of data. TCP delivers messages in the order they were sent. UDP has no ordering mechanisms....................

What is Trusted and Untrusted Networks? Latest answer: Trusted networks: Such Networks allow data to be transferred transparently. The machines using a trusted network are usually administered by an Administrator to ensure that private and secured data is not leaked....................
Read answer

What is VPN? Latest answer: Virtual Private network is a network that used the public telecommunication infrastructure. This means that it used public wires to connect the nodes...................
Read answer

What are the different types of VPN? Latest answer: Remote Access VPN:- Also called as Virtual Private dial-up network (VPDN) is mainly used in scenarios where remote access to a network becomes essential...................
Read answer

What are the different authentication methods used in VPNs? Latest answer: The authentication method uses an authentication protocol. The methods are: EAP authentication method: Extensible authentication protocol authenticates remote access connection......................... What is Tunneling? Latest answer: Tunneling is a mechanism provided to transfer data securely between two networks. The data is split into smaller packets and passed through the tunnel................
Read answer

What are voluntary and compulsory tunnels? Latest answer: Voluntary Tunneling Users computer is an end point of the tunnel and acts as tunnel client. Here the client or user issues a request to configure and create a voluntary tunnel.................
Read answer

Explain static and dynamic tunnels. Latest answer: Tunnels that are created manually are static tunnels. Tunnels that are auto discovered are dynamic tunnels. In dynamic tunneling, tcp connections can be checked dynamically.............
Read answer

Describe the concept of Subneting. Latest answer: Subneting is a process of breaking the network into smaller units. These units care called as subnets. Here a subnet could be several machines in a single LAN...............
Read answer

Explain the advantages of using Subneting.

Latest answer: Advantages of using Subneting: Easier network management and trouble shooting, Routing tables size is reduced which means faster network transfers...................
Read answer

What is custom Subneting? Latest answer: Subnets that can be customized; i.e. modifying the dividing point between subnet ID and host ID to suit the needs of our network. The subnet mask that we use when creating a customized.................
Read answer

Explain the importance of increasing and decreasing subnet bits. Latest answer: Adding 1s as a bit means increasing the subnets and decreasing the hosts. Removing or decreasing 1s means decreasing subnets and increasing hosts..............
Read answer

Why do we need a subnet mask? Latest answer: A subnet mask allows identification of host part and network part of an IP address. Subnet mask can be used to find if an IP address is present on a subnet or not.............. Explain RTP. Latest answer: Real-Time Transfer Protocol lays a standard or a way to transfer or manage real time data over a network. It does not guarantee the delivery of data or provide any quality of service. However it helps to manage the data...............
Read answer

What is RTP Multiplexing? Latest answer: RTP multiplexing allows multiple media flows within a single RTP data payload between two points. This means that it can be used to carry multiple streams of data in one RTP packet.....................
Read answer

Explain the use of RTP and RTCP protocols. Latest answer: Use of RTP and RTCP:- RTP can be used to transfer Real time data like voice packets, RTP can be used with RTCP which makes it possible to monitor data...................
Read answer

Describe the format of RTP and RTCP packets. Latest answer: The 32 bits of RTP packet format is as follows:- (L to R) Bit 0-1:- Indicates version, currently 2 Bit 2:- P- indicates padding bytes Bit 3:- X- Indicates presence of extension header Bit 4-7:- CC- Contains number of CSRC identifiers that follows the header...................
Read answer

What is multicasting?

Latest answer: Multicasting allows a single message to be sent to a group of recipients. Emailing, teleconferencing, are examples of multicasting...................
Read answer

Define IP multicast. Latest answer: IP multicast technology reduces traffic by sending stream of information to many recipients at one go...............
Read answer

Describe how the multicast protocol works. Latest answer: Multicast protocol or Internet protocol delivers a singles message to multiple machines. One packet from the source is replicated and sent to the destination. Every multicast message requires a multi case group...................
Read answer

Describe how to control the scope of multicast transmissions. Latest answer: Controlling the scope of multicast transmission restricts the range of group members. TTL (Time To Live) is one of the mechanisms to limit the scope...............
Read answer

Explain why use Multicasting. Latest answer: When the same message or packet needs to be sent to multiple destinations, multicasting is used. Within campus and offices, using multicasting file distribution can be done................. Routing and Switching Comment on Data Encryption Standard (DES) weakness and strength. The Data Encryption Standard (DES) is a symmetric key block cipher which takes 64-bit plaintext and 56-bit key as an input and produces 64-bit cipher text.............
Read Answer

If you are a victim of Denial of Service (Dos) then what you do? The function of a denial of service attack is to flood its target machine with too much traffic and prevents it from being accessible to any other requests or providing services..............
Read Answer

What are Brute Force Attacks? Brute forcing is a mechanism which is used by an attacker to break the encryption of data by applying a set of various key.............
Read Answer

How do you use RSA for both authentication and secrecy? RSA is a public key encryption algorithm. The RSA algorithms are...........
Read Answer

Can you differentiate among encoding, encryption and hashing? Encoding: Basically encoding is used to protect the integrity of data as it crosses through communication network to keep its original message.............
Read Answer

If you have to generate a hash function then what characteristics are needed in a secure hash function? A secure hash function should have the following characteristics:................
Read Answer

What is digital signature? Differentiate between Physical and Digital Signature A digital signature is an electronic analogue of a written signature; the digital signature can be used to provide assurance...........
Read Answer

What is Authentication Header and how it provides the protection to IP header? Basically Authentication Header protects IP header and provides the complete authenticity to the IP packets.............
Read Answer

Explain SSL Protocol. How does it protect internet users from various threats? The SSL protocol (Secure Socket Layer protocol) was originally developed by Netscape, to ensure security of data transported.............
Read Answer

What is PIX firewall security? How does it differ from a firewall? PIX (Private Internet Exchange)...........
Read Answer

What are Malware? Explain different types of Malware Malware is a software program which is developed to destroy a computer system..............
Read Answer

What are replay attacks? Give an example of replay attack Replay attacks are the network attacks in which an attacker spies the conversation between the sender and receiver..........
Read Answer

If you have to encrypt as well as compress data during transmission then which would you do first and why? Data should be transmitted over any communication network in such a way that the data integrity and authenticity.............
Read Answer

What is the goal of Information Security in an organization? Mainly there are three Information security goals in an organization: Confidentiality, Integrity and Availability..............
Read Answer

What is Symmetric-Key cryptography and Asymmetric-Key cryptography? Symmetric-Key Cryptography: Symmetric-key cryptography uses a single key for both encryption and decryption. Encryption and decryption algorithm are inverse of each other.............
Read Answer

Explain the services provided by IP (Internet Protocol) - Addressing, Fragmentation, Packet timeouts and options Latest answer: Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP. As IP operates in an internet, its systems are designed to accept the addressing of devices which are unique.............
Read answer

Explain the classes of IP address Latest answer: IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format. Every number in each class is represented as binary to computers..................
Read answer

Define Broadcast, Unicast and Multicast. Latest answer: Unicast: A term used in communication to describe a piece of information to send from one point to another. There are only sender and receiver................
Read answer

What is Network Mask? Latest answer: A network mask is used for determination of what subnet an IP address belongs to. An IP address has network address and the host address.................
Read answer

Define Subnetting. Latest answer: A subnet describes a set of networked computers which have common IP address routing prefix..................
Read answer

What is the User Datagram Protocol (UDP)? Latest answer: User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol,..................
Read answer

Explain TCP Windowing concept.

Latest answer: TCP Windowing is a concept that is used for avoiding congestion in the network traffic..................
Read answer

What is the Domain Name System (DNS)? What are the advantages of it? Latest answer: A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet...................
Read answer

What is the TTL (Time to Live)? Why is it required? Latest answer: TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded.................
Read answer

Explain the use of Internet Control Message Protocol (ICMP) Latest answer: Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers..................
Read answer

What is the use of IGMP protocol? Latest answer: Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups..............
Read answer

What are Ping and Tracert? Latest answer: Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets..............
Read answer

Explain RSVP. How does it work? Latest answer: Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network...............
Read answer

Explain the concept of DHCP. Latest answer: Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The IP addresses are assigned dynamically...............
Read answer

What are the differences between a domain and a workgroup? Latest answer: In a domain, one or more computer can be a server to manage the network. On the other hand in a workgroup all computers are peers having no control on each other.............
Read answer

Explain how NAT works.

Latest answer: Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is maintained for global to local and local to mapping of IPs................
Read answer

What is PPP protocol? Explain PPP packet format. Latest answer: Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host................
Read answer

What is IP Spoofing and how can it be prevented? Latest answer: IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host...............
Read answer

Explain IP datagram, Fragmentation and MTU. Latest answer: IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged in an order. The order is specific which helps to decode and read the stream easily..............
Read answer

What is an application gateway? Latest answer: An application gateway is an application program that runs on a firewall between two networks. An application gateway is used for establishing connection between client program and destination service..................
Read answer

Explain Circuit Level Gateway. Latest answer: A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be considered as a layer between application layer and transport layer..................
Read answer

What is 'Gateway Of Last Resort'? A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to transmit the IP packet. Known routes are present in the routing table.................
Read answer

What are switches? Explain the concepts of Layer-3 switches. Latest answer: It is a device that connects multiple network segments. A switch analyzes the MAC address and then determines where to send the data..............
Read answer

What is Router? Explain components of Routers.

Latest answer: The way switches connect multiple computers, a router connects multiple networks. Routers comprise of data consisting of large tables of networks and addresses..................
Read answer

Overview of OSI layer. Latest answer: OSI stands for Open Systems Interconnection The OSI reference model gives an overview of the layered communications and computer network protocol design...................
Read answer

Explain different layers in the OSI model. Latest answer: Application Layer: Closest to the end user, Interact directly with the software application. Presentation Layer: Translates application to network format, and vice versa, Works to transform data into the form that the application layer can accept, Formats and encrypts data to be sent across a network.........................
Read answer

Explain the concept and capabilities of Unicast IP Addresses. Latest answer: It is an IP address that uniquely identifies a host in a network. The datagram with a unicast IP address is received and processed by only a single host.
Read answer

What is IP Multicasting? Latest answer: It is an IP address that identifies a particular group of hosts in network. This group of hosts is called a multicast group..............
Read answer

Explain the classes of IP addresses. Why do we need them? Latest answer: Class A: Range: from 0.0.0.0 to 127.255.255.255. Leftmost bit: 0. First 8 bits: netid. Remaining 24 bits: hostid..............
Read answer

What is Subneting? Explain the advantages of using Subneting. Latest answer: Subneting is dividing a network into several subnets. This is usually done for the following purposes:..................
Read answer

What is Superneting? Explain the concept of custom Subneting. Latest answer: Supernetting or Classless Inter-Domain Routing (CIDR) : It is a way to aggregate multiple Internet addresses of the same class..............
Read answer

What is VLSM, Variable length subnet masking?

Latest answer: VLSM is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule................
Read answer

What is Data Fragmentaion? Explain how Data Fragmentaion works. Latest answer: Fragmentation occurs when storage space is used inefficiently due to which storage capacity and performance is reduced................
Read answer

Explain the concepts and capabilities of IP Datagram. Latest answer: Data transmitted over an internet using IP is carried in messages called IP datagrams. Like all network protocol messages, IP uses a specific format for its datagrams...................
Read answer

What is MAC address? Media Access Control address is an identifier for assigned to most network adapters or Network Interface Cards by the manufacturer for the purpose of identification...............
Read answer

Networking Interview Questions and Answers : 1. What is an Object server? With an object server, the Client/Server application is written as a set of communicating objects. Client object communicate with server objects using an Object Request Broker (ORB). The client invokes a method on a remote object. The ORB locates an instance of that object server class, invokes the requested method and returns the results to the client object. Server objects must provide support for concurrency and sharing. The ORB brings it all together.

2. What is a Transaction server? With a transaction server, the client invokes remote procedures that reside on the server with an SQL database engine. These remote procedures on the server execute a group of SQL statements. The network exchange consists of a single request/reply message. The SQL statements either all succeed or fail as a unit.

3. What is a Database Server? With a database server, the client passes SQL requests as messages to the database server. The results of each SQL command are returned over the network. The server uses its own processing power to find the request data instead of passing all the

records back to the client and then getting it find its own data. The result is a much more efficient use of distributed processing power. It is also known as SQL engine.

4. What are the most typical functional units of the Client/Server applications? User interface Business Logic and Shared data.

5. What are all the Extended services provided by the OS? Ubiquitous communications Network OS extension Binary large objects (BLOBs) Global directories and Network yellow pages Authentication and Authorization services System management Network time Database and transaction services Internet services Object- oriented services

6. What are Triggers and Rules? Triggers are special user defined actions usually in the form of stored procedures, that are automatically invoked by the server based on data related events. It can perform complex actions and can use the full power of procedural languages. A rule is a special type of trigger that is used to perform simple checks on data. 7. What is meant by Transparency? Transparency really means hiding the network and its servers from the users and even the application programmers.

8. What are TP-Lite and TP-Heavy Monitors? TP-Lite is simply the integration of TP Monitor functions in the database engines. TPHeavy are TP Monitors which supports the Client/Server architecture and allow PC to initiate some very complex multiserver transaction from the desktop.

9. What are the two types of OLTP? TP lite, based on stored procedures. TP heavy, based on the TP monitors.

10. What is a Web server? This new model of Client/Server consists of thin, protable, "universal" clients that talk to superfat servers. In the simplet form, a web server returns documents when clients ask for them by name. The clients and server communicate using an RPC-like protocol 11. What are Super servers? These are fully-loaded machines which includes multiprocessors, high-speed disk arrays for intervive I/O and fault tolerant features. called HTTP.

12. What is a TP Monitor? There is no commonly accepted definition for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".

13. TP Monitor does mainly two things extremely well. They are Process management and Transaction management.? They were originally introduced to run classes of applications that could service hundreds and sometimes thousands of clients. TP Monitors provide an OS - on top of existing OS - that connects in real time these thousands of humans with a pool of shared server processes.

14. What is meant by Asymmetrical protocols? There is a many-to-one relationship between clients and server. Clients always initiate the dialog by requesting a service. Servers are passively awaiting for requests from clients.

15. What are the types of Transparencies? The types of transparencies the NOS middleware is expected to provide are:-

Location transparency Namespace transparency

Logon transparency Replication transparency Local/Remote access transparency Distributed time transparency Failure transparency and Administration transparency.

16. What is the difference between trigger and rule? The triggers are called implicitly by database generated events, while stored procedures are called explicitly by client applications.

17. What are called Transactions? The grouped SQL statements are called Transactions (or) A transaction is a collection of actions embused with ACID properties.

18. What are the building blocks of Client/Server? The client The server and Middleware.

19. Explain the building blocks of Client/Server? The client side building block runs the client side of the application.

The server side building block runs the server side of the application. 20. The middleware buliding block runs on both the client and server sides of an application. It is broken into three categories: Transport stack Network OS Service-specific middleware.

21. What are all the Base services provided by the OS? Task preemption Task priority Semaphores Interprocess communications (IPC) Local/Remote Interprocess communication

Threads Intertask protection Multiuser High performance file system Efficient memory management and Dynamically linked Run-time extensions.

22. What are the roles of SQL? SQL is an interactive query language for ad hoc database queries. SQL is a database programming language. SQL is a data definition and data administration language. SQL is the language of networked database servers SQL helps protect the data in a multi-user networked environment. Because of these multifacted roles it plays, physicists might call SQL as "The grand unified theory of database". 23. What is Structured Query Langauge (SQL)? SQL is a powerful set-oriented language which was developed by IBM research for the databases that adhere to the relational model. It consists of a short list of powerful, yet highly flexible, commands that can be used to manipulate information collected in tables. Through SQL, we can manipulate and control sets of records at a time.

24. What are the characteristics of Client/Server? Service Shared resources Asymmentrical protocols Transparency of location Mix-and-match Message based exchanges Encapsulation of services Scalability Integrity

Client/Server computing is the ultimate "Open platform". It gives the freedom to mix-and-match components of almost any level. Clients and servers are loosely coupled systems that interact through a message-passing mechanism.

25. What is Remote Procedure Call (RPC)? RPC hides the intricacies of the network by using the ordinary procedure call mechanism familiar to every programmer. A client process calls a function on a remote server and suspends itself until it gets back the results. Parameters are passed like in any ordinary procedure. The RPC, like an ordinary procedure, is synchoronous. The process that issues the call waits until it gets the results.

Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends it to the remote server. The server receives the request, unpack the parameters, calls the procedures, and sends the reply back to the client. It is a telephone-like metaphor.

26. What are the main components of Transaction-based Systems? Resource Manager Transaction Manager and Application Program.

27. What are the three types of SQL database server architecture? Process-per-client Architecture. (Example: Oracle 6, Informix ) Multithreaded Architecture. (Example: Sybase, SQL server) Hybrid Architecture (Example: Oracle 7)

28. What are the Classification of clients? Non-GUI clients - Two types are:-

1. Non-GUI

clients

that

do

not

need

multi-tasking

(Example: Automatic Teller Machines (ATM), Cell phone) 2. Non-GUI (Example: GUI OOUI clients clients that need multi-tasking ROBOTs) clients

29. What are called Non-GUI clients, GUI Clients and OOUI Clients? Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction.

GUI Clients: These are applicatoins, where occassional requests to the server result from (Example: a human Windows interacting 3.x, with NT a GUI 3.5)

OOUI clients : These are applications, which are highly-iconic, object-oriented user interface that provides seamless access to information in very visual formats. (Example: MAC OS, Windows 95, NT 4.0) 30. What is Message Oriented Middleware (MOM)? MOM allows general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate over networks by simply putting messages in the queues and getting messages from queues. It typically provides a very simple high level APIs to its services.

MOM's messaging and queuing allow clients and servers to communicate across a network without being linked by a private, dedicated, logical connection. The clients and server can run at different times. It is a post-office like metaphor. 31. What is meant by Middleware? Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it acts as a bridge between the clients and servers. It starts with the API set on the client side that is used to invoke a service and it covers the transmission of the request over the network and the resulting response. It neither includes the software that provides the actual service - that is in the servers domain nor the user interface or the application login - that's in clients domain. 32. What are the functions of the typical server program? It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiates and runs background task activity. Keeps running. Grown bigger and faster.

33. What is meant by Symmentric Multiprocessing (SMP)?

It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided into threads that can run concurrently on any available processor. Any processor in the pool can run the OS kernel and execute user-written threads.

34. What are Service-specific middleware? It is needed to accomplish a particular Client/Server type of services which includes:-

Database specific middleware OLTP specific middleware Groupware specific middleware Object specific middleware Internet specific middleware and System management specific middleware.

35. What are General Middleware? It includes the communication stacks, distributed directories, authentication services, network time, RPC, Queuing services along with the network OS extensions such as the distributed file and print services.

36. What is meant by Asymmetric Multiprocessing (AMP)? It imposses hierarchy and a division of labour among processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated to specific functions.

37. What is OLTP? In the transaction server, the client component usually includes GUI and the server components usually consists of SQL transactions against a database. These applications are called OLTP (Online Transaction Processing) OLTP Applications typically, Receive a fixed set of inputs from remote clients. Perform multiple pre-compiled SQL comments against a local database. Commit the work and Return a fixed set of results. 38. What is meant by 3-Tier architecture?

In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is separated from the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and flexible.

Example: TP monitor, Web. 39. What is meant by 2-Tier architecture? In 2-tier Client/Server systems, the application logic is either burried inside the user interface on the client or within the database on the server.

Example: File servers and Database servers with stored procedures. 40. What is Load balancing? If the number of incoming clients requests exceeds the number of processes in a server class, the TP Monitor may dynamically start new ones and this is called Load balancing.

41. What are called Fat clients and Fat servers? If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal software.

If the bulk of the application runs on the Server side, then it is Fat servers. It tries to minimize network interchanges by creating more abstract levels of services. 42. What is meant by Horizontal scaling and Vertical scaling? Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers.

43. What is Groupware server? Groupware addresses the management of semi-structured information such as text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct contact with other people.

44. What are the two broad classes of middleware? General middleware Service-specific middleware.

45. What are the types of Servers? File servers

Database servers Transaction servers Groupware servers Object servers Web servers.

46. What is a File server? File servers are useful for sharing files across a network. With a file server, the client passes requests for file records over nerwork to file server.

47. What are the five major technologies that can be used to create Client/Server applications? Database Servers TP Monitors Groupware Distributed Objects Intranets.

48. What is Client/Server? Clients and Servers are separate logical entities that work together over a network to accomplish a task. Many systems with very different architectures that are connected together are also called Client/Server.

49. List out the benefits obtained by using the Client/Server oriented TP Monitors? Client/Server applications development framework. Firewalls of protection. High availability. Load balancing. MOM integration. Scalability of functions. Reduced system cost.

50. What are the services provided by the Operating System? Extended services - These are add-on modular software components that are layered on top of base service.

Welcome to Network Interview Questions!

Q:What is Networking? Inter connection between the two or more computers is called the networking. Using three types of network are Intranet, Internet and Extranet (Eg. LAN, WAN & MAN) Q:What is Bandwidth? Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth. Every line has a capacity of transmission of data, The maximum amount of data that can be transferred in a single line is called Bandwidth. Q:What is VLAN? VLAN Stand for Virtual Local Area Network. It is a logical grouping of network users and resources connected to administratively defined ports on a switch. Uses of VLAN are as follows:1. It is securied connection. 2. It increases flexibility. 3. It creates separate broadcast domain. Q:What is CIDR? CIDR Stands for classless inter domain routing. It helps in preventing the wasting of IP address and nowadays we are facing the shortage of the IP address.So this CIDR helps to prevent the waste of IP address.Shortly IPV6 will come into exist. Q:What is VLSM? VLSM stands for Variable length subnet mask, when try to separate a major subnet into minor ones, then that process is called VLSM. We can subnet in various lengths. Eg: 1.1.1.0-/24 can be separated into 1.1.1.0-/30 and 1.1.1.4-/28 Q:What is unicast? Unicast is one type of transmission in which information is sent from one host to another host (i.e Source to Destination). In another words,

Unicast transmission is between one-to-one nodes Unicast ---> A transmission to a single interface card. Q:What is Multicast? Multicast is such differ from Unicast. It is another type of transmission or communication in which there may be more than host and the information sent is meant for a set of host.(i.e one source to group of destination Multicast ---> A transmission to a group of interface cards on the network. Q:What is Broadcast? Broadcast is one type of transmission in which information is transfer from just one host but is received by all the host connected to the network. (i.e one source to all destination) Broadcast ---> A transmission to all interface cards on the network.

NETWORKING INTERVIEW QUESTIONS AND ANSWERS


1. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs 10Base2An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments. 10Base5An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. 10BaseTAn Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling. 2. Explain the difference between an unspecified passive open and a fully specified passive open An unspecified passive open has the server waiting for a connection request from a client. A fully specified passive open has the server waiting for a connection from a specific client. 3. Explain the function of Transmission Control Block A TCB is a complex data structure that contains a considerable amount of information about each connection. 4. Explain a Management Information Base (MIB) A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the devices status, its performance, connections, and configuration. The MIB is queried by SNMP. 5. Explain anonymous FTP and why would you use it Anonymous FTP enables users to connect to a host without using a valid login and password.

Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the users ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access. 6. Explain a pseudo tty A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no connection can take place. 7. Explain REX What advantage does REX offer other similar utilities? 8. What does the Mount protocol do? The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a clients request. 9. Explain External Data Representation External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent. 10. Explain the Network Time Protocol? 11. BOOTP helps a diskless workstation boot. How does it get a message to the network looking for its IP address and the location of its operating system boot files? BOOTP sends a UDP message with a subnetwork broadcast address and waits for a reply from a server that gives it the IP address. The same message might contain the name of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server. 12. Explain a DNS resource record A resource record is an entry in a name servers database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files. 13. What protocol is used by DNS name servers? DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP. 14. Explain the difference between interior and exterior neighbor gateways Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world. 15. Explain the HELLO protocol used for The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol. 16. What are the advantages and disadvantages of the three types of routing tables? The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be manually modified every time there is a change. A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each

machines table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the tables contents can change without the administrator being aware of the change. 17. Explain a TCP connection table 18. Explain source route It is a sequence of IP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header. 19. Explain RIP (Routing Information Protocol) It is a simple protocol used to exchange information between the routers. 20. Explain SLIP (Serial Line Interface Protocol) It is a very simple protocol used for transmission of IP datagrams across a serial line. 21. Explain Proxy ARP It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router. 22. Explain OSPF It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internets topology to make accurate routing decisions. 23. Explain Kerberos It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files. 24. Explain a Multi-homed Host It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host. 25. Explain NVT (Network Virtual Terminal) It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session. 26. Explain Gateway-to-Gateway protocol It is a protocol formerly used to exchange routing information between Internet core routers. 27. Explain BGP (Border Gateway Protocol) It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol). 28. Explain autonomous system It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol. 29. Explain EGP (Exterior Gateway Protocol) It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system. 30. Explain IGP (Interior Gateway Protocol) It is any routing protocol used within an autonomous system. 31. Explain Mail Gateway It is a system that performs a protocol translation between different electronic mail delivery

protocols. 32. Explain wide-mouth frog Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol. 33. What are Digrams and Trigrams The most common two letter combinations are called as digrams. e.g. th, in, er, re and an. The most common three letter combinations are called as trigrams. e.g. the, ing, and, and ion. 34. Explain silly window syndrome It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time. 35. Explain region When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions. 36. Explain multicast routing Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing. 37. Explain traffic shaping One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping. 38. Explain packet filter Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped. 39. Explain virtual path Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path. 40. Explain virtual channel Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit. 41. Explain logical link control One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection. 42. Why should you care about the OSI Reference Model It provides a framework for discussing network operations and design. 43. Explain the difference between routable and non- routable protocols Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router 44. Explain MAU In token Ring , hub is called Multistation Access Unit(MAU). 45. Explain 5-4-3 rule

In a Ethernet network, between any two points on the network, there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated. 46. Explain the difference between TFTP and FTP application layer protocols The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP. The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information. 47. Explain the range of addresses in the classes of internet addresses Class A 0.0.0.0 127.255.255.255 Class B 128.0.0.0 191.255.255.255 Class C 192.0.0.0 223.255.255.255 Class D 224.0.0.0 239.255.255.255 Class E 240.0.0.0 247.255.255.255 48. Explain the minimum and maximum length of the header in the TCP segment and IP datagram The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes. 49. Explain difference between ARP and RARP The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address. 50. Explain ICMP ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages. 51. What are the data units at different layers of the TCP / IP protocol suite The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media. 52. Explain Project 802 It is a project started by IEEE to set standards that enable intercommunication between equipment from a variety of manufacturers. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LAN protocols. It consists of the following: 802.1 is an internetworking standard for compatibility of different LANs and MANs across

protocols. 802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is nonarchitecture-specific, that is remains the same for all IEEE-defined LANs. Media access control (MAC) is the lower sublayer of the data link layer that contains some distinct modules each carrying proprietary information specific to the LAN product being used. The modules are Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5). 802.6 is distributed queue dual bus (DQDB) designed to be used in MANs. 53. Explain Bandwidth Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth. 54. Difference between bit rate and baud rate. Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits. baud rate = bit rate / N where N is no-of-bits represented by each signal shift. 55. Explain MAC address The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique. 56. Explain attenuation The degeneration of a signal over distance on a network cable is called attenuation. 57. Explain cladding A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable. 58. Explain RAID A method for providing fault tolerance by using multiple hard disk drives. 59. Explain NETBIOS and NETBEUI NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets. 60. Explain redirector Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer. 61. Explain Beaconing The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks. 62. Explain terminal emulation, in which layer it comes Telnet is also called as terminal emulation. It belongs to application layer. 63. Explain frame relay, in which layer it comes Frame relay is a packet switching technology. It will operate in the data link layer. 64. What do you meant by triple X in Networks The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three

recommendations are often called triple X 65. Explain SAP Series of interface points that allow other computers to communicate with the other layers of network protocol stack. 66. Explain subnet A generic term for section of a large networks usually separated by a bridge or router. 67. Explain Brouter Hybrid devices that combine the features of both bridges and routers. 68. How Gateway is different from Routers A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats. 69. What are the different type of networking / internetworking devices Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link. Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion. Routers: They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission. Gateways: They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model. 70. Explain mesh network A network in which there are multiple network links between computers to provide multiple paths for data to travel. 71. Explain passive topology When the computers on the network simply listen and receive the signal, they are referred to as passive because they dont amplify the signal in any way. Example for passive topology linear bus. 72. What are the important topologies for networks BUS topology: In this each computer is directly connected to primary network cable in a single line. Advantages: Inexpensive, easy to install, simple to understand, easy to extend. STAR topology: In this all computers are connected using a central hub. Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems. RING topology: In this all computers are connected in loop. Advantages:

All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it. 73. What are major types of networks and explain Server-based network Peer-to-peer network Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources. Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration 74. Explain Protocol Data Unit The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I frame) or a supervisory frame (S frame) or a unnumbered frame (U frame). 75. Explain difference between baseband and broadband transmission In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously. 76. What are the possible ways of data exchange (i) Simplex (ii) Half-duplex (iii) Full-duplex. 77. What are the types of Transmission media Signals are usually transmitted over some transmission media that are broadly classified in to two categories. Guided Media: These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light. Unguided Media: This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony. 78. Explain point-to-point protocol A communications protocol used to connect computers to remote networking services including Internet service providers. 79. What are the two types of transmission technology available (i) Broadcast and (ii) point-to-point 80. Difference between the communication and transmission.

Transmission is a physical movement of information and concern issues like bit polarity, synchronization, clock etc. Communication means the meaning full exchange of information between two communication media.

Q:What is ACL? ACL stands of Access Control List, It is packet filtering method, which filter the IP packets based on source and destination address. It is set of rules or condition that permit or deny the ip packets. Cisco ACLs are divided into types. 1. Standard ACL & 2. Extended ACL. Standard ACL - Standard IP Access Lists ranging in number from 1 to 99. Standard ACL control the traffic based on the source IP address only. Extended ACL - Extended IP Access Lists ranging in number from 100 to 199. Extended ACL control the traffic based on the source IP address, destination IP address, source port number and destination port number. Q:What is CEF? Cisco Express Forwarding (CEF) is an advanced layer 3 switching technology used mainly in large core networks or the Internet to enhance the overall network performance. CEF is mainly used to increase packet switching speed by reducing the overhead and delays introduced by other routing techniques. CEF consists of two key components: The Forwarding Information Base (FIB) and adjacencies. The FIB is similar to the routing table generated by multiple routing protocols, maintaining only the next-hop address for a particular IP-route. The adjacency maintains layer 2 or switching information linked to a particular FIB entry, avoiding the need for an ARP request for each table lookup. There are five types of adjacencies: 1. Null adjacency. 2. Punt adjacency. 3. Glean adjacency. 4. Discard adjacency.

5. Drop adjacency. Q:What is CDP? CDP Stand for Cisco Discovery Protocol, It's a Layer 2 protocol and used to check the availability of neighbouring Cisco devices. It can give you all the details of the neighbours. CDP provides network device inventory, connectivity information, and IP next hop information. CDP Version-2 (CDPv2) is the most recent release of the protocol and provides more intelligent device tracking features. Sending CDP packets every 60 seconds and Hold time is 180 seconds. Q:What is SNMP? The Simple Network Management Protocol (SNMP) is an application layer protocol (Layer 1) that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth. What is RIP and difference between Rip V1 & Rip V2? RIP Stands for Routing information protocol. It is also called distance vector routing protocol. It is open standard for any vendor use. It uses metric as hop count (max hop count 15) AD 120. It sends periodic update for every 30 sec. It is used for small network. Rip V1 1. It is a Class full Protocol. 2.Classful Protocol: - Supports networks with same Subnet Mask 3.RIPV1 uses Broadcast Address 4.RIPV1 Universal Broadcast (255.255.255.255) 5. RIPV1 does not VLSM. Rip V2

1. It is a Classless Protocol. 2.Classless Protocol: - Supports subnetted networks; It carries the information of subn mask 3.RIP V2 uses Multicast Address 4. RIPV2 uses Multicast (224.0.0.9). 5.RIPV2 supports VLSM

What is EIGRP? EIGRP stands for Enhanced Interior Gateway Routing Protocol, it is also called balanced hybrid routing protocol or advanced distance vector routing protocol. Hello packets for every 5 sec, hold time 15 sec. It support for VLSM, the multicast address is 224.0.0.10. It maintain neighbour table, topology table & routing table 1. Neighbour directly connected neighbour (feasible successor) 2. Topology all path reach to destination (feasible successor) 3. Routing best path (successor) DUAL: Diffusion update algorithm

1. Successor is available in routing table 2. If successor failed means it will take the feasible successor
DUAL Parameter 1. A.D = Advertised distance (Reported Distance) 2. F.D = Feasible distance Reported Distance: The metric for a route advertised by a neighbour Feasible distance: The distance advertised by a neighbour plus the cost to get to that neighbour What is OSPF? Open Shortest Path First (OSPF) is a dynamic routing protocol for use in Internet Protocol (IP) networks. OSPF is designated by the Internet Engineering Task Force (IETF). Specifically, it is a link-state routing protocol and falls into the group of interior gateway protocols, operating within an autonomous system (AS). Unlimited router can be used. CPU usage will be high, to reduce the CPU Usage using area. What are the areas in OSPF? The backbone area, which is also referred to as Area 0. All other areas must connect to the backbone area. Hence, this area is obligatory. An ordinary or standard area, which is an area that connects to the backbone (Area 0) and is treated as a separate entity. All routers in a standard area have the same topological database, but their routing tables will be based on the routers position in the standard area and will

thus be unique to the router. A stub area, which is an area that does not accept external summary routes. A router within a stub area can only see outside the autonomous system if a default route has been configuration for it. A totally stubby area, which is similar to a stub area. In this area, the default route must be configured as 0.0.0.0. This type of area is useful for remote sites that have few networks and limited connectivity with the rest of the network and is a Cisco proprietary solution. A not so stubby area (NSSA), which is a stub area that can receive external routes but will not propagate those external routes into the backbone area.

What are the network types in OSPF? 1. Non broadcast - This is the default on frame relay networks has a DR/BDR election. Neighbor command needed to establish adjacency. 2. Broadcast - This is the default on Ethernet/broadcast networks. Does have DR/BDR election. 3. Point-to-point - No DR/BDR election. This one is pretty self explanatory. 4. Point-to-multipoint - Does not have a DR/BDR election. Solves some design issues with the next hop processing for NONBROADCAST. Treats as a collection of P2P links. 5. Point-to-multipoint non broadcast - Same as P2M but does not use pseudo broadcast. Must statically define neighbors. 6. Loopback - OSPF treats these as stub hosts. (/32) What are BGP and their attributes? The Border Gateway Protocol (BGP) is an inter autonomous system routing protocol. An autonomous system is a network or group of networks under a common administration and with common routing policies. BGP is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP). Customer networks, such as universities and corporations, usually employ an Interior Gateway Protocol (IGP) such as RIP or OSPF for the exchange of

routing information within their networks. Customers connect to ISPs, and ISPs use BGP to exchange customer and ISP routes. When BGP is used between autonomous systems (AS), the protocol is referred to as External BGP (EBGP). If a service provider is using BGP to exchange routes within an AS, then the protocol is referred to as Interior BGP (IBGP). BGP Attributes are 1. Weight AS_path 2. Local preference hop 3. Multi-exit discriminator Community 4.Origin What is PPPoE? Point to Point Protocol over Ethernet (PPPoE) is network protocols that allow data communication between two network entities or points, which supports network layer protocols including IPv4 and IPv6. PPP supports three types of user authentication protocols that provide varying levels of security. 1. PAP PAP 2. CHAP CHAP 3. EAP 5. 6. Next 7.

1. Clear text 1. Encrypted 2. Less secure 2. High secure 3. Two way handshake method 3. Three way handshake method Auth. Request Challenge Auth. Acknowledgment Response Success 4. No periodic Check up 4. Periodical Check up Extensible Authentication Protocol (EAP) is most commonly used for authentication on wireless networks What are the timers for dynamic routing protocol? Hello Rip None IGRP None EIGRP 60 sec OSPF 10 sec

Update timers Dead timers

30 sec 180 sec

90 sec 3*hello

3*hello

4*hello

What is the AD Value for Dynamic routing protocols? AD Rip 120 IGRP 100 EIGRP OSPF 90 110 BGP 20

Anda mungkin juga menyukai