Sie sind auf Seite 1von 33

Hardware interview questions

What is interrupt? - Interrupt is a signal send by external device to the processor so as to request the processor to perform a particular work.

1. What is cache memory? - Cache memory is a small high-speed memory. It is used for

temporary storage of data & information between the main memory and the CPU (center processing unit). The cache memory is only in RAM.

Hardware architecture interview questions


1. Are you familiar with the term MESI? 2. Are you familiar with the term snooping? 3. Describe a finite state machine that will detect three consecutive coin tosses (of one coin) that results in heads. 4. In what cases do you need to double clock a signal before presenting it to a synchronous state machine? 5. You have a driver that drives a long signal & connects to an input device. At the input device there is either overshoot, undershoot or signal threshold violations, what can be done to correct this problem? 6. For a single computer processor computer system, what is the purpose of a processor cache and describe its operation? 7. Explain the operation considering a two processor computer system with a cache for each processor. 8. What are the main issues associated with multiprocessor caches and how might you solve it? 9. Explain the difference between write through and write back cache. 10. What are the total number of lines written in C/C++? What is the most complicated/valuable program written in C/C++? 11. What compiler was used? 12. Have you studied busses? What types? 13. Have you studied pipelining? List the 5 stages of a 5 stage pipeline. Assuming 1 clock per stage, what is the latency of an instruction in a 5 stage machine? What is the throughput of this machine ? 14. How many bit combinations are there in a byte? 15. What is the difference between = and == in C?

16. Are you familiar with VHDL and/or Verilog?

1. Aniket Says:
June 9th, 2006 at 6:39 am

Suggestion fo Question No. 16.: VHDL stands for Very high speed integrated circuit Hardware Discription Language. VHDL is used to design vary large scale integrated circuits. It can simulate the wave form output of the proposed circuit. Verilog is another hardware discription language but more powerful than VHDL. Verilog can be used to design analog circuits as well. VHDL has limilation of designing digital circuits only.
2. Aniket Says:
June 9th, 2006 at 6:47 am

Answer for Question 14. : There can be 2^8 combinations of bits in a byte.
3. vijay Says:
June 17th, 2006 at 2:34 am

for question no 15: = it assigns the value( of right side variable) to the left side. where as== will compare the two operands.This will be used in Descion making statements.
4. sunny Says:
August 23rd, 2006 at 5:11 am

for question num. 12 Basically there are 3 types of busses they r : 1 system bus, 2 data bus and 3 control bus in any kind of microprocessor or computer

5. sunny Says:
August 23rd, 2006 at 5:14 am

for question 6 basically cache memory is a temporary memory tat is used by microprocessor. Also i m doutful about this question
6. Potty Says:
October 13th, 2006 at 3:45 am

Question 13: Stage1: Instruction Fetch Stage2: Decode Stage 1 Stage3: Decode Stage 2 Stage4: Execute Stage5: Write back reference: Computer Organization & Architecture, Designing for performance, William Stallings
7. hackcrackvirus Says:
October 18th, 2006 at 7:40 am

For que no.6 Cache is required for temp storage due to vast difference in operating speed of processor and main memory.
8. Obaid Says:
October 24th, 2006 at 9:29 pm

***************** sunny said, Wrote on August 23, 2006 @ 5:11 am for question num. 12 Basically there are 3 types of busses they r : 1 system bus, 2 data bus and 3 control bus in any kind of microprocessor or computer ***************** System bus is just a data bus in a computer. You forgot about address bus.

9. Obaid Says:
October 24th, 2006 at 9:30 pm

Question 13: Most moder texts list the following stages of a pipeline: Instruction fetch Instruction decode and register fetch Execute Memory access Register write back
10. Obaid Says:
October 24th, 2006 at 9:32 pm

Question 13: Latency = 5, throughput = 1


11. Obaid Says:
October 24th, 2006 at 9:33 pm

MESI represents the 4 states of cache: Modified Exclusive Shared Invalid This method is used in cache coherency and is applied in the Pentium family of processors.
12. Ashish Says:
October 31st, 2006 at 11:13 pm

What are the total number of lines written in C/C++? What is the most complicated/valuable program written in C/C++? I dont really know if there is single correct answer to this question but I feel a closer answer could be GCC. In 1985 The first version of GCC was able to compile itself. Even today I think most versions of GCC are able to compile itself. GCC as we all know is a highly respected C\C++ compiler and its contributions to open source and C\C++ is unparalleled. Another answer which I can think of is the Linux Kernel (as of now)

13. Ashish Says:


October 31st, 2006 at 11:21 pm

How many bit combinations are there in a byte? Generally collection of 8 bits is called a byte. But the number can certainly vary depending on architecture of machines. I mean there are/were machines for which a byte != 8 bits.
14. das Says:
December 7th, 2006 at 3:04 pm

Cache memory is a small high-speed memory. It is used for temporary storage of data & information between the main memory and the CPU (center processing unit). The cache memory is only in RAM
15. palani Says:
March 1st, 2007 at 7:15 am

six roles of active dirretory forest and domain 1 . domain naming operating master - forest 2 . global catloge sever - forest 3 . sehma master - forest 4 . rid relative master - domain 5 . pdc immodulat - domain 6 . infrastructure master - domain
16. Abhijit Singh Says:
March 13th, 2007 at 4:51 am

Problem (3)> H1 H2 H3 Start->S1>S2>End/Final State |// Tail | Tail / / |


17. Ramalingam Says:
September 27th, 2007 at 7:28 am

Cache memory is a small temporary memory in cpu.which has two types called level1 and level2. Level1 is used in cpu to have quick operation. But level2 is on the motherboard. if the processor check the catch memeory then get the data from where means that term is called catch hit else catch miss.
18. Bingmo Says:
May 13th, 2008 at 1:04 am

Snooping is method used in multi-core parallel processing environment to keep the data access by different caches consistence.
19. Anjaz Says:
October 14th, 2008 at 9:01 am

Q9. In Write thru Cache the write from cache to main memory(RAM) occurs at the same time when cache is modified. so here the data loss due to power failure and some critical conditions could be avoided In write back Cache the write from cache to Main memory occurs only after the cache is been updated or it requires to move the page from cache to main memory.here the advt is that time could be saved by saving two write occuring at the same time. And also remember the memory near to processor is easier to acces rather than the farther 1 and ie why caches are classifies as L1 cACHE AND L2 Cache
20. Anjaz Says:
October 14th, 2008 at 9:03 am

Q15. = is used to assign some values to a variable(a memory location) or pass values from 1 variable to other . Its basically used to assign. == is used to compare between two variables or values . it is a condition checking EQUAL TO
21. Anjaz Says:
October 14th, 2008 at 9:08 am

Q6. Processor Cache is used to increase the performance of the computer processor. more the distance of memory from processor slower the performance of the processor .

their are many techniques implemented to make the procesor acces the memory faster and the succes one is use of cache . their are many cache algorithms also implemented . Processor cannot work independently it requires program to run or execute and these programs are stored in memory so processor requires to be in touch with memory constantly so their will be consider loss of time(performance) if memory access tooks much time so this make the requiremnt of Cache to be present.
22. Anjaz Says:
October 14th, 2008 at 9:11 am

Q8. Multiprocessor cache s/m isuues: Multi processor means able to handle multitasking . So their must be an Bus arbitration rule and also a good protocol to handle the issue. cache HiT and cache MISS must be considered into account carefully

Question

What?s the maximum hard drive size for FAT16-based Windows system? 2GB

Answer

4 GB

Question

What?s the speed and device maximum specs for Firewire? IEEE 1394 (Firewire) supports the maximum of 63 connected devices with speeds up to 400 Mbps. Where?s MBR located on the disk? Main Boot Record is located in sector 0, track 0, head 0, cylinder 0 of the primary active partition.

Answer

Question

What?s the difference between L1 and L2 cache? Level 1 cache is internal to the chip, L2 is external.

Answer

In addition this L1 is faster than L2. becouse L1 is easily accesable to the CPU.

Question

Name the processor lines of two major manufacturers? High-end: Intel - Pentium (II, III, 4), AMD - Athlon. Low-end: Intel - Celeron, AMD - Duron. 64-bit: Intel - Itanium 2, AMD Opteron.

Answer

Question

How do you clear CMOS password? Since CMOS is a special chip with its own battery, the best way to clear out a CMOS chip is to disconnect it from its power supply. kindly shutdown pc remove cmos battery or jumper setting for cmos.and start pc again place cmos battry or jumper and strat pc

Answer

Answered By: jaykumar

Date: 7/12/2007

1. By removing the CMOS battery and then replace 2. jumper settings will be in 1 n 2 connection(by default)better make it to 2 n 3 connection and check

Networking

What is WLAN? WLAN or Wireless local area network is simply a type of network that doesnt use wired Ethernet connections for networking. WLAN uses wireless network devices such as wireless routers etc. What is Subnet Mask? A subnet mask is used to determine the number of networks and the number of host computers. Every class of the IP address uses the different range of the subnet mask. Subnet masks allow the IP based networks to be divided into the sub networks for performance and security purposes. What is a MAC Address? MAC address or Media Access control is a unique identifier of a computer device. The MAC address is provided by the manufacturer of the device. MAC addresses are 12 digital hexadecimal numbers. What is an IP Address? An IP address is a unique identifier of a computer or network device on the local area network, WAN or on internet. Every host computer on the internet must have a unique IP address. IP addresses on the internet are usually assigned by the local ISPs to which users are connected. What is Wifi? Wi Fi or wireless fidelity is a base band network technology that is used for the wireless data communication. What is WiMax? Wi Fi is a next form of the Wi fi. Wi max is a very high speed broadband network technology that is designed for the corporate offices, roaming and home users. Name the Seven Layers of OSI Model The seven layers of the OSI are Application, Presentation, Sessions, Transport, Network, Data Link and Physical layer. What is LDAP?

Lightweight Directory Access Protocol is used to access the directory services from the Active directory in Windows operation systems. What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP, and FTP? SMTP 25, POP3 110, IMAP4 143, RPC 135, LDAP, FTP-21, HTTP-80 What is IPv6? IP V6 is a next generation protocol that is used as an expansion of DNS. What is UDP? UDP or user datagram protocol is a connectionless protocol that is used to transfer the data without any error handling. What is Firewall? A firewall is usually a software program that is installed on the network server or gateway. The purpose of the firewall is to protect the network resources from the intruders and unauthorized persons. What is Virtual Private Network (VPN) and how does it work? VPN or virtual private network is used to connect two networks by means internet. VPN uses PPTP (point to point tunneling protocol) and other security procedures to make a secure tunnel on internet. Define VOIP VOIP or voice over internet protocol is a technology that uses IP based networks such as internet or private networks to transmit the voice communication. Define Bluetooth Technology Bluetooth is a short range wireless technology that uses radio waves for communication. Many mobile phones, laptops, MP3 players have built in features of the Bluetooth. What is a RAS server? RAS or remote access server allows you to remote dial in through the desktop computers, laptops and GSM mobile phones. Whats a Frame Relay?

Frame relay is high speed data communication technology that operates at the physical and data link layers of the OSI model. Frame relay uses frames for data transmission in a network.

Q1. Name of seven layers in Open System Interconnection model. A. They are Application, Presentation, Session, Transport, Network, Data link, and Physical.

Networking Interview Questions and Answers : 1. What is an Object server? With an object server, the Client/Server application is written as a set of communicating objects. Client object communicate with server objects using an Object Request Broker (ORB). The client invokes a method on a remote object. The ORB locates an instance of that object server class, invokes the requested method and returns the results to the client object. Server objects must provide support for concurrency and sharing. The ORB brings it all together. 2. What is a Transaction server? With a transaction server, the client invokes remote procedures that reside on the server with an SQL database engine. These remote procedures on the server execute a group of SQL statements. The network exchange consists of a single request/reply message. The SQL statements either all succeed or fail as a unit. 3. What is a Database Server? With a database server, the client passes SQL requests as messages to the database server. The results of each SQL command are returned over the network. The server uses its own processing power to find the request data instead of passing all the records back to the

client and then getting it find its own data. The result is a much more efficient use of distributed processing power. It is also known as SQL engine.

4. What are the most typical functional units of the Client/Server applications?

User interface Business Logic and Shared data.

5. What are all the Extended services provided by the OS?

Ubiquitous communications Network OS extension Binary large objects (BLOBs) Global directories and Network yellow pages Authentication and Authorization services System management Network time Database and transaction services Internet services Object- oriented services

6. What are Triggers and Rules?

Triggers are special user defined actions usually in the form of stored procedures, that are automatically invoked by the server based on data related events. It can perform complex actions and can use the full power of procedural languages.

A rule is a special type of trigger that is used to perform simple checks on data.

7. What is meant by Transparency?

Transparency really means hiding the network and its servers from the users and even the application programmers.

8. What are TP-Lite and TP-Heavy Monitors?

TP-Lite is simply the integration of TP Monitor functions in the database engines. TP-Heavy are TP Monitors which supports the Client/Server architecture and allow PC to initiate some very complex multiserver transaction from the desktop.

9. What are the two types of OLTP?

TP lite, based on stored procedures. TP heavy, based on the TP monitors.

10. What is a Web server?

This new model of Client/Server consists of thin, protable, "universal" clients that talk to superfat servers. In the simplet form, a web server returns documents when clients ask for them by name. The clients and server communicate using an RPC-like protocol called HTTP. 11. What are Super servers?

These are fully-loaded machines which includes multiprocessors, high-speed disk arrays for intervive I/O and fault tolerant features.

12. What is a TP Monitor?

There is no commonly accepted definition for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".

13. TP Monitor does mainly two things extremely well. They are Process management and Transaction management.?

They were originally introduced to run classes of applications that could service hundreds and sometimes thousands of clients. TP Monitors provide an OS - on top of existing OS -

that connects in real time these thousands of humans with a pool of shared server processes.

14. What is meant by Asymmetrical protocols?

There is a many-to-one relationship between clients and server. Clients always initiate the dialog by requesting a service. Servers are passively awaiting for requests from clients.

15. What are the types of Transparencies?

The types of transparencies the NOS middleware is expected to provide are:-

Location transparency Namespace transparency Logon transparency Replication transparency Local/Remote access transparency Distributed time transparency Failure transparency and Administration transparency.

16. What is the difference between trigger and rule?

The triggers are called implicitly by database generated events, while stored procedures are called explicitly by client applications.

17. What are called Transactions?

The grouped SQL statements are called Transactions (or) A transaction is a collection of actions embused with ACID properties.

18. What are the building blocks of Client/Server?

The client The server and Middleware.

19. Explain the building blocks of Client/Server?

The

client

side

building

block

runs

the

client

side

of

the

application.

The server side building block runs the server side of the application.

20. The middleware buliding block runs on both the client and server sides of an application. It is broken into three categories:-

Transport stack Network OS Service-specific middleware.

21. What are all the Base services provided by the OS?

Task preemption Task priority Semaphores Interprocess communications (IPC) Local/Remote Interprocess communication Threads Intertask protection Multiuser High performance file system Efficient memory management and Dynamically linked Run-time extensions.

22. What are the roles of SQL?

SQL is an interactive query language for ad hoc database queries. SQL is a database programming language.

SQL is a data definition and data administration language. SQL is the language of networked database servers SQL helps protect the data in a multi-user networked environment. Because of these multifacted roles it plays, physicists might call SQL as "The grand unified theory of database".

23. What is Structured Query Langauge (SQL)?

SQL is a powerful set-oriented language which was developed by IBM research for the databases that adhere to the relational model. It consists of a short list of powerful, yet highly flexible, commands that can be used to manipulate information collected in tables. Through SQL, we can manipulate and control sets of records at a time.

24. What are the characteristics of Client/Server?

Service Shared resources Asymmentrical protocols Transparency of location Mix-and-match Message based exchanges Encapsulation of services Scalability Integrity

Client/Server computing is the ultimate "Open platform". It gives the freedom to mix-andmatch components of almost any level. Clients and servers are loosely coupled systems that interact through a message-passing mechanism.

25. What is Remote Procedure Call (RPC)?

RPC hides the intricacies of the network by using the ordinary procedure call mechanism familiar to every programmer. A client process calls a function on a remote server and

suspends itself until it gets back the results. Parameters are passed like in any ordinary procedure. The RPC, like an ordinary procedure, is synchoronous. The process that issues the call waits until it gets the results.

Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends it to the remote server. The server receives the request, unpack the parameters, calls the procedures, and sends the reply back to the client. It is a telephonelike metaphor.

26. What are the main components of Transaction-based Systems?

Resource Manager Transaction Manager and Application Program.

27. What are the three types of SQL database server architecture?

Process-per-client Architecture. (Example: Oracle 6, Informix ) Multithreaded Architecture. (Example: Sybase, SQL server) Hybrid Architecture (Example: Oracle 7)

28. What are the Classification of clients?

Non-GUI clients - Two types are:-

1. Non-GUI

clients

that

do

not

need

multi-tasking

(Example: Automatic Teller Machines (ATM), Cell phone) 2. Non-GUI (Example: GUI OOUI clients 29. What are called Non-GUI clients, GUI Clients and OOUI Clients? clients that need multi-tasking ROBOTs) clients

Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction.

GUI Clients: These are applicatoins, where occassional requests to the server result from a human (Example: interacting Windows with 3.x, a NT GUI 3.5)

OOUI clients : These are applications, which are highly-iconic, object-oriented user interface that provides seamless access to information in very visual formats.

(Example: MAC OS, Windows 95, NT 4.0)

30. What is Message Oriented Middleware (MOM)?

MOM allows general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate over networks by simply putting messages in the queues and getting messages from queues. It typically provides a very simple high level APIs to its services.

MOM's messaging and queuing allow clients and servers to communicate across a network without being linked by a private, dedicated, logical connection. The clients and server can run at different times. It is a post-office like metaphor.

31. What is meant by Middleware?

Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it acts as a bridge between the clients and servers. It starts with the API set on the client side that is used to invoke a service and it covers the transmission of the request over the network and the resulting response.

It neither includes the software that provides the actual service - that is in the servers domain nor the user interface or the application login - that's in clients domain.

32. What are the functions of the typical server program?

It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiates and runs background task activity. Keeps running. Grown bigger and faster.

33. What is meant by Symmentric Multiprocessing (SMP)?

It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided into threads that can run concurrently on any available processor. Any processor in the pool can run the OS kernel and execute user-written threads.

34. What are Service-specific middleware?

It is needed to accomplish a particular Client/Server type of services which includes:-

Database specific middleware OLTP specific middleware Groupware specific middleware Object specific middleware Internet specific middleware and System management specific middleware.

35. What are General Middleware?

It includes the communication stacks, distributed directories, authentication services, network time, RPC, Queuing services along with the network OS extensions such as the distributed file and print services.

36. What is meant by Asymmetric Multiprocessing (AMP)?

It imposses hierarchy and a division of labour among processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated to specific functions.

37. What is OLTP?

In the transaction server, the client component usually includes GUI and the server components usually consists of SQL transactions against a database. These applications are called OLTP (Online Transaction Processing) OLTP Applications typically,

Receive a fixed set of inputs from remote clients. Perform multiple pre-compiled SQL comments against a local database. Commit the work and Return a fixed set of results.

38. What is meant by 3-Tier architecture?

In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is separated from the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and flexible.

Example: TP monitor, Web.

39. What is meant by 2-Tier architecture?

In 2-tier Client/Server systems, the application logic is either burried inside the user interface on the client or within the database on the server.

Example: File servers and Database servers with stored procedures.

40. What is Load balancing?

If the number of incoming clients requests exceeds the number of processes in a server class, the TP Monitor may dynamically start new ones and this is called Load balancing.

41. What are called Fat clients and Fat servers?

If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal software.

If the bulk of the application runs on the Server side, then it is Fat servers. It tries to minimize network interchanges by creating more abstract levels of services.

42. What is meant by Horizontal scaling and Vertical scaling?

Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers.

43. What is Groupware server?

Groupware addresses the management of semi-structured information such as text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct contact with other people.

44. What are the two broad classes of middleware?

General middleware Service-specific middleware.

45. What are the types of Servers?

File servers Database servers Transaction servers Groupware servers Object servers Web servers.

46. What is a File server?

File servers are useful for sharing files across a network. With a file server, the client passes requests for file records over nerwork to file server.

47. What are the five major technologies that can be used to create Client/Server applications?

Database Servers TP Monitors Groupware

Distributed Objects Intranets.

48. What is Client/Server?

Clients and Servers are separate logical entities that work together over a network to accomplish a task. Many systems with very different architectures that are connected together are also called Client/Server.

49. List out the benefits obtained by using the Client/Server oriented TP Monitors?

Client/Server applications development framework. Firewalls of protection. High availability. Load balancing. MOM integration. Scalability of functions. Reduced system cost.

50. What are the services provided by the Operating System?

Extended services - These are add-on modular software components that are layered on top of base service.

BOTH

ISP Protocol

Which protocol is used to communicate between client and ISP?


View Question | Asked by : AW Networks

Answer Question
Install Printer in Network Environment

Subscribe

You have been given 1 printer and 1 IP Address for installing it in a Networking EnvironmentHow will you do it?
Latest Answer: Connect the printer with a lan port and go to the printer setup,

there is option of network config, press enter and go to IP config and the the given IP adress and exit with save. ...
Read Answers (1) | Asked by : shamz.ek

Answer Question
Missing NTLDR File

Subscribe

Windows crashed because NTLDR File is missing. How will you restore this file (Without using Safe Mode Option)?
Latest Answer: NTLDR is missingPress CTRL+ALT+DEL to restart. This problem

may occur if the basic input/output system (BIOS) on your computer is

outdated, or if one or more of the following Windows boot files are missing or damaged: NtldrNtdetect.comBoot.ini To resolve ...
Read Answers (3) | Asked by : shamz.ek

Answer Question
IP V6 PING

Subscribe

How do you ping from one host to another in IPv6 without ARP?
Latest Answer: To ping other computer using ipv6 we use NetBios or host file or

DNS ...
Read Answers (1) | Asked by : kcrao

Answer Question
Default Subnet Mask for IPV6

Subscribe

What is the default subnet mask for IPV6?


Latest Answer: There are 3 address types in v6 - Unicast, anycast, and

multicast. Unicast addresses identify a single network device, anycast and multicast addresses identify a group of network devices. IPv6 addresses are 128 bit, compared to the 32 bit addresses of ...
Read Answers (1) | Asked by : mangala2910

Answer Question
Ping Death Packet

Subscribe

What is ping to death packet?What is the size of ping to death packet?/


Latest Answer: POD (Ping of Death) is a type of attack at computer in a network

that involves sending of a larger size malicious ping to a computer. A ping is normally 64 bytes in size.Many computers can not handle larger than the maximum ip packet size, which is 65,535bytes. ...

Read Answers (1) | Asked by : suchitra425777

Answer Question
VLAN and INTERVLAN

Subscribe

What is VLAN and INTERVLAN? Why do we use these techniques?What are the differences between STP, RSTP and MSTP?
Latest Answer: VLAN(Virtual Local Area Network) is a logical grouping of

network users and resources connected to administratively defined ports on a switch. VLAN's break up broadcast domains in layer 2 switch network.Virtual LANs (VLANs) divide one physical network ...
Read Answers (1) | Asked by : callnitin

Answer Question
Explain about Scan Disk ? How scan disk fixes errors ?

Subscribe

Latest Answer: It is a tool used to check and repair disk related errors like,1.

Bad Sector2. Partition Table3. Cross Link File4. Currup File


Read Answers (2) | Asked by : ranjithkolaboina

etc. ...

Answer Question
Access a File on Another Computer

Subscribe

A person would like to access a file on another computer (connected via LAN) while working with safe mode. What should he do?
Latest Answer: The User has to restart the PC and Getting into the Safe mode

with networking ...

Sharing and Security

What lets us access the shared network folders quickly without having to browse the entire network?
Latest Answer: Go to Start ->Run Type "\ip address" or "\computer name" ... Read Answers (1) | Asked by : kamlesh sharma

Answer Question
Pix Firewall

Subscribe

What is Pix Firewall Security? How does it differ from a firewall?


View Question | Asked by : callnitin

Answer Question
Routing and Routed protocol

Subscribe

Explain what are routing protocol and routed protocol?


Latest Answer: Routing protocols are one which assigns the route by seeing all

the routers in the network. They distribute routing information to all the routers.Ex: BGP, IGRP. Routed protocols are those which are sent over the network which is routed already. ...
Read Answers (3) | Asked by : kesava7hills

Answer Question
RIPv1 vs. RIPv2

Subscribe

what is the difference between RIPv1 vs. RIPv ?State advantages and disadvantages in detailed. which is better to use?

Latest Answer: RIP v2 supports VLSM with a new field in the header "subnet

mask"Supports authentication with the authentication field in the headerApart from these ,the protocol still remains the same ...
Read Answers (2) | Asked by : arf_arf_arf37

Answer Question
Communication of four routers

Subscribe

A software company owns four branches and Internet connection is available at every branch what will be required to build a Virtual Private Network between them and how it will be done.
View Question | Asked by : Muhammad Ali

Answer Question
LAN Connection

Subscribe

Suppose in a LAN, if one host does not get connection, what problem could have occured?
Latest Answer: Here are some tips check LAN card driver its proper install or

not check LAN card its enable or disable (always enable) check IP address, subnet mask, machine name and work group check LAN security in O/S firewall its stated on higher you ...
Read Answers (4) | Asked by : maung

Answer Question
Domain Controller

Subscribe

what is domain controller $how it manage a network security


Latest Answer: On Windows Server Systems, a domain controller (DC) is a server

that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain. ...

Read Answers (1) | Asked by : pradeepashu55

Answer Question
Trust relationship between two different forests

Subscribe

how to create trust relationship between two different forests.


View Question | Asked by : pullepu_nag

Answer Question
Basic difference between layer2 switch & layer3 switches

Subscribe

Latest Answer: L3 Switches do fast switching compared to router switching

functionality. L3 Switches Modify the packet as the packet is passed. L3 Switches can switch based on differented services(like More reliabliability, Less delay) L3 Switches are placed in core ...
Read Answers (2) | Asked by : suneelray

Answer Question
Why the hub placed on layer1(physical layer)?
View Question | Asked by : suneelray

Subscribe

Natting, Static Natting and Dynamic Natting

What is Natting, What is Static Natting and Dynamic Natting and how to apply on the traffic?
View Question | Asked by : s_nisarahmed

Answer Question
Latest Technology

Subscribe

What are the latest technologies in networking?


View Question | Asked by : sindhu85

Answer Question
What is the difference between simm & dimm

Subscribe

Latest Answer: SIMM Single In Line Memory moduleDIMM Dual In Line Memory

Module ...
Read Answers (1) | Asked by : ravi.kamal2007

Answer Question
Organization Unit

Subscribe

What is Organization Unit? Features of Organization Unit and its benifits


View Question | Asked by : singh.mahipal1982

Answer Question

Subscribe

If a computer have an IP address is 10.1.1.5 and subnet mask is 255.255.255.0 then what does it mean.

If a computer have an IP address is 10.1.1.5 and subnet mask is 255.255.255.0 then what does it mean.
Read Answers (2) | Asked by : ravinder singh

Answer Question
What is the difference between IARP and RARP?

Subscribe

Latest Answer: these two are prtocolos which work on the application layer of

the osi model ...


Read Answers (1) | Asked by : Toju Apo

Answer Question

Subscribe

Can traceout command work across the firewall? If No then why? If Yes then why?

Latest Answer: Traceroute is based on ICMP type 30 under Windows and UDP

under *NIX; traceroute pacjets that would hit the firewall should be dropped similarly any echo replay coming from inside the firewall should be restricted outbound. The answer: traceroute can ...
Read Answers (2) | Asked by : arun ahuja Tags : Firewall

Answer Question
DHCP Server

Subscribe

If two computers are connected to a dhcp server , How the APIPA will assign to these computers ?.Will it be same IP for two computers? If it is different how it will vary the IP ? On what basis it will
View Question | Asked by : sri

Answer Question
What is the difference between BOOTP and RARP?

Subscribe

Network Interview Questions 1. 2. 3. 4. 5. 6. 7. 8. 9. The Answers: What is MTU? How does TCP handshake work? How does SSL handshake work? What are the different phases in VPN establishment? How does DH (deffie helman) work? What is TCP window sizing? What is the difference between passive FTP and active FTP? What is the difference between socket and session? How does network management station work?

1. How does TCP handshake work? Transmission Control Protocol/Internet Protocol. There are 3 steps. 1. Local device sends sequence number and maximum segment size. 2. Destination device responds by sending its sequence number and maximum segment size back to local device. 3. Local device acknowledges receipt of the sequence number and segment size information. 2. How does SSL handshake work? Secure Sockets Layer. There are 4 steps. 1. Browser checks the certificate to make sure that the site you are connecting to is the real site and not someone intercepting. 2. Determine encryption types that the browser and web site server can both use to understand each other. 3. Browser and Server send each other unique codes to use when scrambling (or encrypting) the information that will be sent. 4. The browser and Server start talking using the encryption, the web browser shows the encrypting icon, and web pages are processed secured. 3. What is the difference between passive FTP and active FTP? FTP is an unusual protocol in that it uses two ports, one for commands and the other for data. (This is one of the reasons it is superior to HTTP for transferring large files.) Active FTP was invented first. The

client initiates a connection on the servers command port. The server then initiates a connection with the client from its data port. In Passive FTP, the client initiates both connections with the server, which remains passive. Active FTP may cause problems if your client is behind a firewall. From the firewalls point of view, the FTP server that is trying to initiate a connection with your client looks like an intruder and is usually blocked. This is why many users have difficulty using FTP to download files from behind a firewall. Passive FTP solves this problem, but creates other problems, notably where FTP server security is concerned. The server must listen on a large number of ports. This requires the firewall to let a lot of unqualified traffic through. Most firewall administrators do not like this. As a rule, you do not need to be concerned about passive and active FTP unless you administer an FTP server or a firewall. If you experience difficulty using your FTP client from behind a firewall, this is likely the reason. Perhaps you should discuss the matter with your firewall administrator. 4. What is the difference between socket and session? 1. An SSL session is a mechanism through which connections can be established by re-using previously negotiated handshakes. 2. A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent. 5. How does network management station work? Network management stations execute management applications which monitor and control network elements. Network elements are devices such as hosts, gateways, terminal servers, and the like, which have management agents responsible for performing the network management functions requested by the network management stations. The Simple Network Management Protocol (SNMP is used to communicate management information between the network management stations and the agents in the network elements. There are a few network management features that may be used to provide network monitoring for this advisory. 1. Device Availability Monitoring 2. SNMP MIB object monitoring 3. Cisco Service Assurance Agent (Cisco SAA) 4. RMON Alarm and Events 5. Event-MIB 6. CiscoWorks RME Network Show Commands and CLI scripting

6. What are the different phases in VPN establishment? Successful VPN establishment consists of two levels of SAs known as phases. Phase 1 authentication establishes session keys. Using the Xauth feature, the client waits for a username/password challenge after the IKE Phase 1 SA has been established. When the end user responds to the challenge, the response is forwarded to the IPsec peers for an additional level of authentication completing Phase 2. 1. Phase 1 of a 2 phase VPN tunnel establishment process. Phase 1 negotiates the security parameter agreement. 2. Phase 2 of 2 phase VPN tunnel establishment process. Phase 2 uses the agreed parameters from Phase 1 to bring the tunnel up. 7. How does DH (deffie helman) work? Diffie-Hellman key agreement was invented in 1976 during a collaboration between Whitfield Diffie and Martin Hellman and was the first practical method for establishing a shared secret over an unprotected communications channel. Based on Ralph Merkles public key cryptosystem. Public key cryptography is a form of cryptography which generally allows users to communicate securely without having prior access to a shared secret key, by using a pair of cryptographic keys, designated as public key and private key, which are related mathematically. 8. What is TCP window sizing? The window size is the maximum number of bytes of data that can be transmitted in one segment. Increasing the window size for a TCP-based file transfer would increase throughput until the slowest link in the path saturates. It would be preferable to have a window size appropriate to the size of the link. There would be less buffering, the ACKs would return more quickly and more of the bandwidth would be used. Ideally you are looking for a Window Size >= Bandwidth * RTT. 9. What is MTU? Maximum Transmission Unit. The greatest amount of data or packet size that can be transferred in one physical frame on a network. This packet also contains the header and trailer information, which are like addresses for each packet that are required by the routers on the network.

Das könnte Ihnen auch gefallen