23
# 1. Which class of addressing is used for small LAN and why? Class C IP address is used for small LAN among class A, Class B and Class C. Explanation: Among Class A, B and C Class B has Two bytes and class A has three bytes reserved for host address, while Class C use One byte for host address. So class C is ideal for small LAN as range of class C is 192-223 with 254 numbers of hosts. #2. What are the techniques involved in transmitting the data from the server via router? The first step involved in transmitting the data from the server is to check the router IP address. If the router IP address is correct then the next step is done by the router itself. The router recognizes the destination from the routing table and sends the packet of data. After this is done, similar process is executed by the next network. #3. How does ARP works? In networking, ARP (Address Resolution Protocol) associates the IP address to a network node of the physical hardware address. The ARP creates ARP CACHE/TABLE that maps the hardware address of the nodes with the IP address on the local network. Based on the IP address the ARP check’s whether the hardware address exists in its ARP TABLE. It matches found then the transmission to that IP address is done quickly as destination is known. #4. What is Kerberos protocol? Kerberos protocol is a network authentication protocol. To provide strong authentication for server – client applications it utilizes symmetric cryptography (secret key). Kerberos is specially designed for addressing the problem of authentication over internet and also uses dedicated authentication servers. The authentication server contains all secret keys for every user and servers in the network and avoids misuse of any information. #5. Define RIP and discuss its use? RIP whose full form is routing information protocol. RIP is a dynamic routing protocol which is used in local and wide area network. RIP uses distance vector routing algorithm and is classified as an interior gateway protocol. Rip is used where there is less number of routers as the maximum hop count of RIP is 15. So it works on internal networks which have lesser network connected to the internet and helps router to adapt changes dynamically by gathering information about the networks each router can reach and the distance between those networks.

Networks FAQs

Embed Size (px)

Citation preview

Page 1: Networks FAQs

# 1. Which class of addressing is used for small LAN and why?

Class C IP address is used for small LAN among class A, Class B and Class C.

Explanation: Among Class A, B and C Class B has Two bytes and class A has three bytes reserved for host address, while Class C use One byte for host address. So class C is ideal for small LAN as range of class C is 192-223 with 254 numbers of hosts.

#2. What are the techniques involved in transmitting the data from the server via router?

The first step involved in transmitting the data from the server is to check the router IP address. If the router IP address is correct then the next step is done by the router itself. The router recognizes the destination from the routing table and sends the packet of data. After this is done, similar process is executed by the next network.

#3. How does ARP works?

In networking, ARP (Address Resolution Protocol) associates the IP address to a network node of the physical hardware address. The ARP creates ARP CACHE/TABLE that maps the hardware address of the nodes with the IP address on the local network. Based on the IP address the ARP check’s whether the hardware address exists in its ARP TABLE. It matches found then the transmission to that IP address is done quickly as destination is known.

#4. What is Kerberos protocol?

Kerberos protocol is a network authentication protocol. To provide strong authentication for server – client applications it utilizes symmetric cryptography (secret key). Kerberos is specially designed for addressing the problem of authentication over internet and also uses dedicated authentication servers. The authentication server contains all secret keys for every user and servers in the network and avoids misuse of any information.

#5. Define RIP and discuss its use?

RIP whose full form is routing information protocol. RIP is a dynamic routing protocol which is used in local and wide area network. RIP uses distance vector routing algorithm and is classified as an interior gateway protocol.

Rip is used where there is less number of routers as the maximum hop count of RIP is 15. So it works on internal networks which have lesser network connected to the internet and helps router to adapt changes dynamically by gathering information about the networks each router can reach and the distance between those networks.

#6. What is TCP/IP?

TCP/IP is the set of communication protocols which is used for internet and other similar kind of networks. TCP/IP is the internet protocol suite in which TCP stands for Transmission control protocol and IP stands for Internet protocol. These were the first two networking protocols introduce in this category.

#7. Why cross cable is used to connect same devices?

In case of similar devices NIC (Network Interface card) of device 1, 2 are used for transmission and 3, 6 for receiving of data. While in case of hub/switch/dissimilar devices it uses NIC (Switch/Hub) 1, 2 for

Page 2: Networks FAQs

receiving and 3, 6 for transmission of data. That’s why straight cable is used for dissimilar host and cross cable for similar hosts. If cross cable is not used for similar devices then data can not be transferred.

#8. Discuss OSPF Protocol?

OSPF stands for Open Shortest Path First. OSPF is a link-state routing protocol which is used for sending link -state advertisements (LSAs) to all other routers within the network. Since OSPF routers collects link-state information that is why they use SPF (Shortest path First) algorithm to calculate the shortest path to each node. OSPF has two primary characteristics. Firstly, the protocol is open and secondly it is based on SPF algorithm.

#9. How SSO helps in authentication technologies?

SSO which generally stands for Single Sign – On, provides access control to a user. With the SSO property a user gets logs in information once and gain access to all the system without entering log in details again and again. With the help of this Single Sign – On Information a user is authenticated and is allowed to access system unless and until the users signs – off.

#10. What are Sockets?

A socket is simply an end point of bidirectional communication. Internet sockets are API available in an operating system which is used for inter – process communications. Three major operations that can be performed on a socket are:-

Control Operation: This operation include creating and accepting a connection on a socket, associating a socket with port number and lastly destroying a socket.

Data Transfer Operations: Writes data to application through sockets and even reading data from applications through it.

Status Operations: This operation helps to find the IP address associated with a socket.

#11. Can IP protect data in a network?

The data protection part is handled by the transport protocol. TCP and UDF have mechanisms which ensure that the data which is being delivered to an application is error free. However, IP try to protect the IP packet’s header which is the small part of each packet which controls the flow of packet through the network. This is done by calculating and associating a checksum in the IP packet’s header field before transmitting over the network and the receiver checks the IP packet’s header before procession the whole packet. A packet whose header does not match is discarded.

#12. What is UDP?

UDP generally stands for User datagram Protocol. An unreliable data transfer service is provided by UDP between two end points. UDP transfers packets over network being dependent on the IP. UDP assures integrity by adding a checksum to the data before transmission of the data over network but it never guarantees delivery of data to the destination and in the same order.

#13. How many layers are there in a network?

The seven layers in a network which works together to transfer/receive packets are:-

Page 3: Networks FAQs

1. Application layer.

2. Presentation layer.

3. Session layer.

4. Transport layer.

5. Network layer.

6. Data link layer.

7. Physical layer.

What is DHCP?

DHCP stands for Dynamic Host Configuration Technology. The basic purpose of the DHCP is to assign the IP addresses and the other network configuration such as DNS, Gateway and other network settings to the client computers. DHCP reduces the administrative task of manually assigning the IP addresses to the large number of the computers in a network.

What is DNS and how it works?

DNS stands for Domain name system and it translates (converts) the host name into the IP address and IP address into to the host name. Every domain and the computer on the internet is assigned a unique IP address. The communication on the internet and in the network is based on the IP addresses. IP addresses are in this format 10.1.1.100, 220.12.1.22.3, 1.1.1.1 etc. IP addresses can't be remembered but the host names are easy to remember instead of their IP addresses.

What is a Firewall?

Firewall is a protective boundary for a network and it prevents the unauthorized access to a network. Most of the Windows operating system such as Windows XP Professional has built-in firewall utilities. There are the large number of the third party firewall software and the basic purpose of all the firewall software and hardware is same i.e. to block the unauthorized user access to a network.

What is WAN?

WAN stands for wide area network and it covers the broader geographical area. Basically there are three types of a computer network LAN (Local Area Network), MAN (Metropolitan Area Network) and WAN (Wide Area Network). The communication in a WAN is based on the Routers. A WAN network can cover a city, country or continents.

Define VOIP Communication Technology

VOIP stands for Voice over IP and this technology is used for transmitted the voice over the IP based long distance network to make phone calls. VOIP phone calls are very cheap and a large number of the corporate offices and home users are using VOIP technology to make long distance phone calls.

What is Wi Max Technology?

Wi Max is a wireless broadband technology and it is a advance shape of the Wi Fi (which was a base band technology). Wi Max supports data, video and audio communication at the same time at a very high speed up to 70 Mbps.

Page 4: Networks FAQs

Define Network Gateway

Network Gateway can be software or a hardware. A gateway is usually a joining point in a network i.e. it connects two networks. A computer with two LAN cards can act as a gateway.

What is a Router?

A router routes the traffic to its destination based on the source and destination IP addresses, which are placed in the routing software known as routing table.

How Fiber Optic Cable Works

Fiber optics provides the fastest communication medium for data and voice. Data can travel at the speed of light through the fiber optic cables. ISPs and corporate offices are usually connected with each other with the fiber optic cables to provide high speed connectivity.

What is File Server?

A file server is a computer in a network that authenticates the user access in a network such as Windows 2000/2003 Servers.

Define Seven Layers of OSI Model

There are seven layers of the OSI model. The basic purpose of these layers is to understand the communication system and data transmission steps. The seven layers are Application, Presentation, Session, Transport, Network, Data Link and Physical. You can remember the name of these layers by this phrase. "All people seems to need data processing".

Define GSM Technology

GSM is a short range wireless technology and is usually used in the mobile phones, hand help devices, MP3 players, Laptops, computers and in cars.

Networking Interview Questions and Answers :

1. What is an Object server?

With an object server, the Client/Server application is written as a set of communicating objects. Client object communicate with server objects using an Object Request Broker (ORB). The client invokes a method on a remote object. The ORB locates an instance of that object server class, invokes the requested method and returns the results to the client object. Server objects must provide support for concurrency and sharing. The ORB brings it all together.

2. What is a Transaction server?

With a transaction server, the client invokes remote procedures that reside on the server with an SQL database engine. These remote procedures on the server execute a group of SQL statements. The network exchange consists of a single request/reply message. The SQL statements either all succeed or fail as a unit.

3. What is a Database Server?

With a database server, the client passes SQL requests as messages to the database server. The results of each SQL command are returned over the network. The server uses its own processing power to find the request data

Page 5: Networks FAQs

instead of passing all the records back to the client and then getting it find its own data. The result is a much more efficient use of distributed processing power. It is also known as SQL engine.

4. What are the most typical functional units of the Client/Server applications?

User interface Business Logic and Shared data.

5. What are all the Extended services provided by the OS?

Ubiquitous communications Network OS extension Binary large objects (BLOBs) Global directories and Network yellow pages Authentication and Authorization services System management Network time Database and transaction services Internet services Object- oriented services

6. What are Triggers and Rules?

Triggers are special user defined actions usually in the form of stored procedures, that are automatically invoked by the server based on data related events. It can perform complex actions and can use the full power of procedural languages.A rule is a special type of trigger that is used to perform simple checks on data.

7. What is meant by Transparency?

Transparency really means hiding the network and its servers from the users and even the application programmers.

8. What are TP-Lite and TP-Heavy Monitors?

TP-Lite is simply the integration of TP Monitor functions in the database engines. TP-Heavy are TP Monitors which supports the Client/Server architecture and allow PC to initiate some very complex multiserver transaction from the desktop.

9. What are the two types of OLTP?

TP lite, based on stored procedures. TP heavy, based on the TP monitors.

10. What is a Web server?

This new model of Client/Server consists of thin, protable, "universal" clients that talk to superfat servers. In the simplet form, a web server returns documents when clients ask for them by name. The clients and server communicate using an RPC-like protocol called HTTP.11. What are Super servers?

These are fully-loaded machines which includes multiprocessors, high-speed disk arrays for intervive I/O and fault tolerant features.

Page 6: Networks FAQs

12. What is a TP Monitor?

There is no commonly accepted definition for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".

13. TP Monitor does mainly two things extremely well. They are Process management and Transaction management.?

They were originally introduced to run classes of applications that could service hundreds and sometimes thousands of clients. TP Monitors provide an OS - on top of existing OS - that connects in real time these thousands of humans with a pool of shared server processes.

14. What is meant by Asymmetrical protocols?

There is a many-to-one relationship between clients and server. Clients always initiate the dialog by requesting a service. Servers are passively awaiting for requests from clients.

15. What are the types of Transparencies?

The types of transparencies the NOS middleware is expected to provide are:-

Location transparency Namespace transparency Logon transparency Replication transparency Local/Remote access transparency Distributed time transparency Failure transparency and Administration transparency.

16. What is the difference between trigger and rule?

The triggers are called implicitly by database generated events, while stored procedures are called explicitly by client applications.

17. What are called Transactions?

The grouped SQL statements are called Transactions (or) A transaction is a collection of actions embused with ACID properties.

18. What are the building blocks of Client/Server?

The client The server and Middleware.

19. Explain the building blocks of Client/Server?

The client side building block runs the client side of the application.The server side building block runs the server side of the application.

20. The middleware buliding block runs on both the client and server sides of an application. It is broken into three categories:-

Page 7: Networks FAQs

Transport stack Network OS Service-specific middleware.

21. What are all the Base services provided by the OS?

Task preemption Task priority Semaphores Interprocess communications (IPC) Local/Remote Interprocess communication Threads Intertask protection Multiuser High performance file system Efficient memory management and Dynamically linked Run-time extensions.

22. What are the roles of SQL?

SQL is an interactive query language for ad hoc database queries. SQL is a database programming language. SQL is a data definition and data administration language. SQL is the language of networked database servers SQL helps protect the data in a multi-user networked environment. Because of these multifacted roles it plays, physicists might call SQL as "The grand unified theory of

database".

23. What is Structured Query Langauge (SQL)?

SQL is a powerful set-oriented language which was developed by IBM research for the databases that adhere to the relational model. It consists of a short list of powerful, yet highly flexible, commands that can be used to manipulate information collected in tables. Through SQL, we can manipulate and control sets of records at a time.

24. What are the characteristics of Client/Server?

Service Shared resources Asymmentrical protocols Transparency of location Mix-and-match Message based exchanges Encapsulation of services Scalability Integrity

Client/Server computing is the ultimate "Open platform". It gives the freedom to mix-and-match components of almost any level. Clients and servers are loosely coupled systems that interact through a message-passing mechanism.

25. What is Remote Procedure Call (RPC)?

Page 8: Networks FAQs

RPC hides the intricacies of the network by using the ordinary procedure call mechanism familiar to every programmer. A client process calls a function on a remote server and suspends itself until it gets back the results. Parameters are passed like in any ordinary procedure. The RPC, like an ordinary procedure, is synchoronous. The process that issues the call waits until it gets the results.

Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends it to the remote server. The server receives the request, unpack the parameters, calls the procedures, and sends the reply back to the client. It is a telephone-like metaphor.

26. What are the main components of Transaction-based Systems?

Resource Manager Transaction Manager and Application Program.

27. What are the three types of SQL database server architecture?

Process-per-client Architecture. (Example: Oracle 6, Informix ) Multithreaded Architecture. (Example: Sybase, SQL server) Hybrid Architecture (Example: Oracle 7)

28. What are the Classification of clients?

Non-GUI clients - Two types are:-

1. Non-GUI clients that do not need multi-tasking(Example: Automatic Teller Machines (ATM), Cell phone)

2. Non-GUI clients that need multi-tasking(Example: ROBOTs)GUI clientsOOUI clients

29. What are called Non-GUI clients, GUI Clients and OOUI Clients?

Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction.GUI Clients: These are applicatoins, where occassional requests to the server result from a human interacting with a GUI(Example: Windows 3.x, NT 3.5)OOUI clients : These are applications, which are highly-iconic, object-oriented user interface that provides seamless access to information in very visual formats.(Example: MAC OS, Windows 95, NT 4.0)

30. What is Message Oriented Middleware (MOM)?

MOM allows general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate over networks by simply putting messages in the queues and getting messages from queues. It typically provides a very simple high level APIs to its services.MOM's messaging and queuing allow clients and servers to communicate across a network without being linked by a private, dedicated, logical connection. The clients and server can run at different times. It is a post-office like metaphor.

31. What is meant by Middleware?

Page 9: Networks FAQs

Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it acts as a bridge between the clients and servers. It starts with the API set on the client side that is used to invoke a service and it covers the transmission of the request over the network and the resulting response.It neither includes the software that provides the actual service - that is in the servers domain nor the user interface or the application login - that's in clients domain.

32. What are the functions of the typical server program?

It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiates and runs background task activity. Keeps running. Grown bigger and faster.

33. What is meant by Symmentric Multiprocessing (SMP)?

It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided into threads that can run concurrently on any available processor. Any processor in the pool can run the OS kernel and execute user-written threads.

34. What are Service-specific middleware?

It is needed to accomplish a particular Client/Server type of services which includes:-

Database specific middleware OLTP specific middleware Groupware specific middleware Object specific middleware Internet specific middleware and System management specific middleware.

35. What are General Middleware?

It includes the communication stacks, distributed directories, authentication services, network time, RPC, Queuing services along with the network OS extensions such as the distributed file and print services.

36. What is meant by Asymmetric Multiprocessing (AMP)?

It imposses hierarchy and a division of labour among processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated to specific functions.

37. What is OLTP?

In the transaction server, the client component usually includes GUI and the server components usually consists of SQL transactions against a database. These applications are called OLTP (Online Transaction Processing) OLTP Applications typically,Receive a fixed set of inputs from remote clients. Perform multiple pre-compiled SQL comments against a local database. Commit the work and Return a fixed set of results.

38. What is meant by 3-Tier architecture?

In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is separated from the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and flexible.Example: TP monitor, Web.

39. What is meant by 2-Tier architecture?

Page 10: Networks FAQs

In 2-tier Client/Server systems, the application logic is either burried inside the user interface on the client or within the database on the server.Example: File servers and Database servers with stored procedures.

40. What is Load balancing?

If the number of incoming clients requests exceeds the number of processes in a server class, the TP Monitor may dynamically start new ones and this is called Load balancing.

41. What are called Fat clients and Fat servers?

If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal software.If the bulk of the application runs on the Server side, then it is Fat servers. It tries to minimize network interchanges by creating more abstract levels of services.

42. What is meant by Horizontal scaling and Vertical scaling?

Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers.

43. What is Groupware server?

Groupware addresses the management of semi-structured information such as text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct contact with other people.

44. What are the two broad classes of middleware?

General middleware Service-specific middleware.

45. What are the types of Servers?

File servers Database servers Transaction servers Groupware servers Object servers Web servers.

46. What is a File server?

File servers are useful for sharing files across a network. With a file server, the client passes requests for file records over nerwork to file server.

47. What are the five major technologies that can be used to create Client/Server applications?

Database Servers TP Monitors Groupware Distributed Objects Intranets.

48. What is Client/Server?

Clients and Servers are separate logical entities that work together over a network to accomplish a task. Many systems with very different architectures that are connected together are also called Client/Server.

Page 11: Networks FAQs

49. List out the benefits obtained by using the Client/Server oriented TP Monitors?

Client/Server applications development framework. Firewalls of protection. High availability. Load balancing. MOM integration. Scalability of functions. Reduced system cost.

50. What are the services provided by the Operating System?

Extended services - These are add-on modular software components that are layered on top of base service.

What is DNS?

Domain name system/server is used to translate the IP address into the hostname and hostname into the IP address. DNS is mostly used on the internet and the networks.

What is DHCP?

Dynamic host configuration protocol is used to dynamically assign the IP address to the networked computers and devices. DHCP is a network protocol that automatically assigns static and dynamic IP addresses from its own range.

What is a Router?

Router is the most important network device that is used to connect two logically and physically different networks. Router defines the short possible route for the data to reach its destination. A router works with built-in intelligent software known as routing table, which helps to determine the route between the two networks.

What is Gateway?

A gateway is software or a hardware that is used to connect the local area network with the internet. A gateway is a network entrance point and a router usually works as a gateway.

What is WLAN?

WLAN or Wireless local area network is simply a type of network that doesn’t use wired Ethernet connections for networking. WLAN uses wireless network devices such as wireless routers etc.

What is Subnet Mask?

A subnet mask is used to determine the number of networks and the number of host computers. Every class of the IP address uses the different range of the subnet mask. Subnet masks allow the IP based networks to be divided into the sub networks for performance and security purposes.

What is a MAC Address?

MAC address or Media Access control is a unique identifier of a computer device. The MAC address is provided by the manufacturer of the device. MAC addresses are 12 digital hexadecimal numbers.

Page 12: Networks FAQs

What is an IP Address?

An IP address is a unique identifier of a computer or network device on the local area network, WAN or on internet. Every host computer on the internet must have a unique IP address. IP addresses on the internet are usually assigned by the local ISPs to which users are connected.

What is Wifi?

Wi Fi or wireless fidelity is a base band network technology that is used for the wireless data communication.

What is WiMax?

Wi Fi is a next form of the Wi fi. Wi max is a very high speed broadband network technology that is designed for the corporate offices, roaming and home users.

Name the Seven Layers of OSI Model

The seven layers of the OSI are Application, Presentation, Sessions, Transport, Network, Data Link and Physical layer.

What is LDAP?

Lightweight Directory Access Protocol is used to access the directory services from the Active directory in Windows operation systems.

What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP, and FTP?

SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP, FTP-21, HTTP-80

What is IPv6?

IP V6 is a next generation protocol that is used as an expansion of DNS.

What is UDP?

UDP or user datagram protocol is a connectionless protocol that is used to transfer the data without any error handling.

What is Firewall?

A firewall is usually a software program that is installed on the network server or gateway. The purpose of the firewall is to protect the network resources from the intruders and unauthorized persons.

What is Virtual Private Network (VPN) and how does it work?

VPN or virtual private network is used to connect two networks by means internet. VPN uses PPTP (point to point tunneling protocol) and other security procedures to make a secure tunnel on internet.

Define VOIP

VOIP or voice over internet protocol is a technology that uses IP based networks such as internet or

Page 13: Networks FAQs

private networks to transmit the voice communication.

Define Bluetooth Technology

Bluetooth is a short range wireless technology that uses radio waves for communication. Many mobile phones, laptops, MP3 players have built in features of the Bluetooth.

What is a RAS server?

RAS or remote access server allows you to remote dial in through the desktop computers, laptops and GSM mobile phones.

What’s a Frame Relay?

Frame relay is high speed data communication technology that operates at the physical and data link layers of the OSI model. Frame relay uses frames for data transmission in a network.

What is difference between ARP & RARP ? How both of these protocols will work, and where it will use ?

What is meant by port blocking within LAN ? Basis for OSPF protocol 1.what is classful and classless routing ? 2. Diff bet RIPv1 & RIPv2 ? 3. what is multicasting ? 4. what is VLSM ? What does CIA stand for in security management? What are all the technical steps involved when the data trasmission from server via router? What is the role of Single Sign On in authentication technologies? What are digital signatures and smart cards? Name some routing protocols? (RIP,OSPF etc..) Explain Kerberos Protocol ? How do you use RSA for both authentication and secrecy? How do you do authentication with message digest(MD5)? (Usually MD is used for finding tampering of data) How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in? How can you to performance testing for a switch?What is the difference between a repeater, bridge, router? Relate this to the OSI model.Describe a 3-way TCP/IP Handshake. What difference between a directory and active directry

Page 14: Networks FAQs

What does CIDR stand for? Can we use static and dynamic routing in one network? How can we configure dhcp features in an switch? What is the difference between physical address and logical address What is the difference between collision domain and broadcast domain What is supernetting?why it is used What is PING utility? What is a VLAN?What does VLAN provide? What is subnetting? why is it used? What is RAID?How can you keep a TCP connection from tearing down when no data will be sent for a long time? If you are given the IP address can u tell how many computers can be connected?What do you look at? In what features Ethernet stands better than Internet?how many types of network layers are availableHow to connect computer through socket?How many types of network?1.What is Firewall? 2.what is mean by spareware?and different between spareware and anti virus? How to repair .pst file?What is arp poisoning ?What is masking and what is the need of masking ?What is multi casting?Why hdlc is preferred over sdlc?In what features Ethernet stands better than Internet?From which DHCP server the client going to take ip,if 2 DHCP SERVERS PRESENT IN NETWORK. IN NET-BIOS PLAIN TEXT CHARACTER "EN" IS REPRESENTED BY WHICH OF THE ASCII SYMBOLS?what is metro ethernet?The subnet mask for a paricular network is 255.255.31.0. Which of the following pairs of ip addresses could belong to this network?Users cannot print from the printer their user login is correct and are allowed to print from that printer in active directory services? How do you resolve it?what is MPLS?Where it works?

Page 15: Networks FAQs

Is it possible to replicate a packet? If Yes, how?what is leasedline modem ? how it works in isp ? What is PING utility?What is RAID?What is NETBIOS and NETBEUI?What are the advantages and disadvantages of the three types of routing tables?What are the different type of networking / internetworking devices?What are 10Base2, 10Base5 and 10BaseT Ethernet LANs ?What is wide-mouth frog?What is difference between baseband and broadband transmission?Why should we care about the OSI Reference Model ? What is the main purpose for creating this OSI model? Why it is a layered model? What is a difference between switch and Hub? What is a VLAN?What does VLAN provide? If you are given the IP address can u tell how many computers can be connected?What do you look at? What is SIP? how does it work? what are the alternatives if any? current and future practice and application standards? references (books,urls,rfcs etc) What is region?Difference between the communication and transmission?What are the types of Transmission media?What is the difference between physical address and logical address? What is the difference between tree and forest?What are the Advantages and Disadvantages of DHCP? What is MAC address?Under what situations a packet can go into infinite loop in a network ? What is Proxy ARP?Describe a 3-way TCP/IP Handshake. what is mean by dns(domain name system)and what is the purpose of it?What is the difference between TFTP and FTP application layer protocols?1.explain 7 osi layers briefly. 2.define router,gateways,brouter. 3.explain abt encryption & decryption.What are the difference between node,host,terminal,system,hub?How many ips we can assign to a particular pc???What is the difference between hub,switch and router?what is difference between dial-up internet connection and broadband connection?What is Bandwidth?What is the Network Time Protocol?What is passive topology?What is Mail Gateway?

Page 16: Networks FAQs

What is difference between ARP and RARP?What is REX?What is traffic shaping?What is SLIP (Serial Line Interface Protocol)?Difference between bit rate and baud rate?

What is the difference between interior and exterior neighbor gateways?

What is NVT (Network Virtual Terminal)?what are the four main end user faetures in each of the following .yahoo maps, google maps and msn maps?What protocol is used by DNS name servers?What is the difference between an unspecified passive open and a fully specified passive openExplain the function of Transmission Control BlockWhat is subnet?what is DHCP? What is DNS? what is pop3? what is router? what is different between router and hub ? what is different between switch and router?What is frame relay, in which layer it comes?Explain 5-4-3 rule.how drivers are selected and implemented for various network components. What is attenuation?What is ICMP?What is multicast routing?What are the data units at different layers of the TCP / IP protocol suite?What do you meant by "triple X" in Networks?What are the two types of transmission technology available?What is the HELLO protocol used for?What is External Data Representation?What is the default subnet mask for an ipv6 address ? What is Kerberos?Name three network tools used to determine where a network connectivity is lost between two sites A&B. What is Brouter?What are the types of Transmission media?What is supernetting?why it is used What is SAP?What is subnetting?Why is it used? What is RIP (Routing Information Protocol)?What is a different between switch and Hub? What is Gateway-to-Gateway protocol?What are Digrams and Trigrams?What is redirector?What is source route?What is a DNS resource record?What is the range of addresses in the classes of internet addresses?

Page 17: Networks FAQs

What is mesh network?What is anonymous FTP and why would you use it?What is a pseudo tty?What is a Management Information Base (MIB)What is terminal emulation, in which layer it comes?Why should you care about the OSI Reference Model?What is the minimum and maximum length of the header in the TCP segment and IP datagram?What is MAU?Whatz the difference between DNS and WINS? What is EGP (Exterior Gateway Protocol)?Why should we care about the OSI Reference Model ? What is the main purpose for creating this osi model? why it is a layered model? What is virtual path?What is Project 802?What does the Mount protocol do ?What is an email client? what is differnce between email client and web mail? What is Beaconing?Can we use static and dynamic routing in one network? What is OSPF?What is packet filter?Which protocol is used for retrieving mails? What is cladding?How can we create VPN to connect to branch office of the same office.what would be the priliminary requirment? What difference between a directory and active directry What is MTU of a link ? What are major types of networks and explain?What is virtual channel?What is IGP (Interior Gateway Protocol)?What is deffrence between switch & hub What is fragmentation of a packet ? What are the possible ways of data exchange?What is point-to-point protocol?How Gateway is different from Routers?What is autonomous system?What are the important topologies for networks?What is layer-3 switch? What is a Bridge? When is it used? How is a bridge configured? What are the software and hardware components of a bridge? What is silly window syndrome?what is .ost file? What is piggy backing?

Page 18: Networks FAQs

What is logical link control?What is the difference between routable and non- routable protocols?what is the vlan ? how it is work? What is the Network Time Protocol What is the difference between collision domain and broadcast domain What is BGP (Border Gateway Protocol)?What is RAID What is Recovery Console? What is ERD(Emergency Repair Disk)? If a person is accessing his corporate network from home, how is the connection established and how does the data flow from internet to intra net?Name any field of IP header that can prevent a packet to loop infinitely ? Difference between the communication and transmission. Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc. Communication means the meaning full exchange of information between two communication media. What is a Multi-homed Host?What is Protocol Data Unit?How can we configure dhcp features in an switch? What is the difference between POP3 and IMAP Mail Server? What are the two types of transmission technology available how install ca certificate in win 2k3 & win 2k8? pls explain me this question???What does CIDR stand for?

www.coolinterview.com