Sie sind auf Seite 1von 24

Question Bank

Network+ FAQ

Q. What do you understand by a network or what is network?


Ans. A group of interconnected devices sharing information and resources together is known as network.

Q. What is networking?
Ans. Sharing information and resources between devices is called networking.

Q. What are the objectives and drawbacks of networking?


Ans. objectives:

 Resource sharing
 Speed
 Time
 Cost minimization
 File sharing
 Application sharing
 Message sharing

Drawback of network:
 Less security (high chance of hacking)
 Less privacy(high transparency)

Q. What are the basic requirements of networking?


Ans. Network Interface Card (NIC), Media (Wired or Wireless), Protocol.

Q. What are the different types of Network?


Ans.
 Local Area Networks (LAN): Local area networks, generally called LANS, are privately-owned
networks within a single building or campus of up to a few kilometers in size. They widely used to
connect personal computers and workstations in company offices and factories to share resources
and information. LANs are restricted in size distance varies from 1 to 10 km. Traditional LANs run
at speeds of 10 Mbps to 100 Mbps. Newer LANs operate at up to 10 Gbps.

 Wide Area Networks: It is a collection of more than two LANs. A WAN is any network that crosses
metropolitan, regional, or National boundaries. A WAN as any networks that uses routers and public
network links.

 Metropolitan Area Networks: A MAN covers a city. The best known example of a MAN is the cable
TV network available in many cities. A MAN is smaller than a WAN but bigger than a LAN.

 SAN: Storage area network a SAN is a dedicated high-performance network used to move data
between servers and storage resources.

Develop by Ankit Srivastava


 VPN: Using the internet to connect remote users securely to internal networks is known as Virtual
private networking.

Q. What is Intranet?
Ans. Private network within an organization or LAN is called Intranet.

Q. What is Internet?
Ans. The internet is a network of networks. It is a global collection of high powered computers that are
connected to each other with network cables, telephone lines, microwave dishes, satellites etc. You can
communicate with anyone on the internet by sending email, posting messages in newsgroups, chatting in
various chat areas and even telephoning and video conferencing over the net.

Q. What is Network Interface Card (NIC)?


Ans. Network Interface Card is a expansion card which connects a device in a network. It converts
analog signal to digital and digital to analog. It prepares data, send data, and control the flow of data.

Q. What is MAC?
Ans. Media Access Control it’s a 48 bit physical address of your NIC card which can’t be change.

Q. What is the difference between Hub and Switch?

Hub Switch
Layer 1 device. Layer 2 and 3 device.
Share the bandwidth between devices. Provides full bandwidth to each device.
Single collision domain. Multiple collision domains.
No security. Provide security.
No Internal operating system. It’s got Internal operating system.
Non intelligent device.. Intelligent device.

Q. How many ways you can create a Wire?


Ans. There are two methods for creating wire.

 Straight cable: It is used to connect two dissimilar devices like hub to computer.
 Cross cable: it is used to connect two similar devices like computer to computer, hub to hub etc.

Q. What are the advantages and disadvantages of Fiber optic based network?
Ans.

Advantages Disadvantages
It covers larger distance Very Expensive
High bandwidth up to 100 Mbps Difficult to install
Support voice data and video at the highest Require special training to configure.
Transmission speeds
Q. What is CSMA/CD?

Develop by Ankit Srivastava


Ans. The 802.3 carriers sense multiple accesses with collision detection cable access method to put data
on the cable. CSMA/CD specifies that every computer can transmit at any time. When two machines
transmit at the same time a collision takes place and no data can be transmitted for either machine. The
machine then back off for a random period of ti8me and try to transmit again. This process repeats until
transmission takes place successfully. The CSMA/CD technology is also called contention.

Q. Define Multicast, Broadcast and Unicast?


Ans.
 Unicast: When information is only for single device.
 Multicast: When information is for a group of devices.
 Broadcast: When information is for all devices.

Q. Difference between TCP and UDP?


Ans.

TCP UDP
It’s a connection oriented protocol It’s a connection less protocol
It provides error recovery, flow control It adds no reliability, flow control and error
And reliability. Recovery
It’s slow It’s fast

Q. Difference between Workgroup and Domain?


Ans.

Workgroup Domain
There is no centralized administration. Centralized administration.
Share level security. Access level security.
Local users and computers Global users and computers
Desktop level security Global security
Good for small network Good for secure network
Easy to maintain Difficult to maintain.

Q. Difference between Router and Switch?


Ans.

Router Switch
Layer 3 device. Layer 2 device.
WAN device. LAN device.
Multiple collision multiple broadcast. Multiple collision single broadcast.

Q. Define GSM technology?


Ans. Global System for Mobile communication is a wireless technology, which is used in mobile
communication currently.

Q. What is Hub?

Develop by Ankit Srivastava


Ans. A Hub is a component that provides a common connection point for computers, printers and other
network devices in a network. It’s a layer 1 device mostly used in star topology.

Q. Define OSI Model?


Ans. Open System Interconnection reference model it’s a seven layers model developed by ISO in 1997.
Data travels from the sending computer down through all the seven layers.

 Application layer- This is seventh layer of the model. Responsible for providing network services
like file services web access etc.

 Presentation layer- Sixth layer of the model. This layer performs protocol conversion and manages
data transmission and encryption.

 Session layer- Fifth layer of the model. Responsible for establishing and maintaining a
communication session.

 Transport layer- Fourth layer of the model. This layer controls the data flow and troubleshoots and
problem with transmitting or receiving data grams. This layer’s most important job is to provide
error checking and reliable end to end communication.

 Network layer- Third layer of the model. Responsible for logical addressing. Some error control and
flow control is performed at this level.

 Data link layer- Second layer of the model. Maintain data flow divide packets into chunks with error
detection.

 Physical layer- First layer of the model. Defines cabling and connection also transmits data over the
physical media.

Q. OSI Layer with Devices and Protocols?


Ans.

Layers Devices Protocols


Application Gateway Http, Telnet, FTP etc.
Presentation Gateway NCP, AFP, TDI etc.
Session Gateway NetBIOS.
Transport Gateway TCP/UDP
Network Router IP
Data Switch and Bridge LCP, NCP, ARP, RARP etc.
Physical NIC, HUB, Repeaters.

Q. What is Router?
Ans. Routers are highly intelligent devices work in layer 3, used to connect different networks segments
and determine the best path for sending data.
Q. What is Gateway?

Develop by Ankit Srivastava


Ans. It’s a device which is used to connect different networks using different protocols. Gateways are
found in Application layer.

Q. What is Bridge?
Ans. Bridges operate in the Data link layer of the OSI model. They join similar topologies and are used
to divide network segments.

Q. What is client?
Ans. A client is a requester of a service.

Q. What is Server?
Ans. A server is a service provider in a network like File server, Print server and Web server.

Q. What are dedicated server and non dedicated server?


Ans.

 Dedicated Server- Dedicated server is a server which is only responsible for only one service like
File server, Web server, and Print server etc.

 Non-Dedicated Server- A non-dedicated server is responsible for more than one service like
DHCP+DNS+PRINT server.

Q. Explain VOIP?
Ans. VOIP stands for Voice over IP and this technology is used for transmitted the voice over the IP
based long distance network to make phone calls. VOIP phone calls are very cheap and a large number
of the corporate offices and home users are using VOIP technology to make long distance phone calls.

Q. Explain WI Max?
Ans. WI Max is a wireless broadband technology and it is a advance shape of the WI FI (which was a
base band technology). WI Max supports data, video and audio communication at the same time at a
very high speed up to 70 Mbps.

Q. What is Switch?
Ans. A switch like a hub but with additional benefits like, learn MAC address with IOS and provide full
bandwidth to each device.

Q. What is subnet mask?


Ans. A subnet mask divides and IP address into the host address and network address.

Q. What is ICS?
Ans. Internet connection sharing that connects multiple computers in one LAN to the internet through a
single connection and a single IP.

Q. What is FDDI?
Ans. Fiber Distributed Data Interface is a set of American National Standard Institute (ANSI) protocols
for sending network data over Fiber optic cable.

Develop by Ankit Srivastava


Q. What is Socket?
Ans. A socket is communication link from one process to another. Sockets work over a network using
the internet protocol set.

Q. What is Port?
Ans. A well known port is a port number which is reserved for a well known service like FTP, HTTP.

Q. What is Information Technology?


Ans. The method used to collect and store the data, process the data into information and communicate
the information all over the world is Information Technology.

Q. What is Bandwidth?
Ans. Quantity of information that can be transferred in a specific time unit is called Bandwidth. The unit
for Bandwidth is Bits per second (bps). Higher the bandwidth faster is data transfer.

Q. What is Data rate?


Ans. This is the rate in bits per second at which data can be communicated.

Q. What is Data communication?


Ans. It’s a process of exchanging the information between two or many communicating devices using a
transmission system.

Q. What is Channel Capacity?


Ans. The maximum rate at which data can be transmitted over a given communication path is called
channel capacity.

Q. What is protocol stack?


Ans. A list of protocols used by a certain system is called a protocol stack.

Q. what is protocol?
Ans. A protocol is an agreement between the communicating parties on how communication is to
proceed.

Q. What is Modem?
Ans. A modem is a device that makes it possible for computers to communicate over telephone lines.
Modem means modulate and demodulate. It converts analog signal to digital and digital signal to analog.

Q. What is Maximum Transmission Unit (MTU)?


Ans. The greatest amount of data or “packet” size that can be transferred in one physical frame on a
network. This packet also contains the header and trailer information, which are like addresses for each
packet that are required by the routers on the network.

Q. What is APIPA and how would you recognize it?

Develop by Ankit Srivastava


Ans. Automatic Private IP Addressing windows automatically assign an IP address in the absence of
DHCP server. All computers on a subnet are using APIPA can communicate with each other without
requiring any additional configuration. APIPA Class starts 169.254.0.0.

Q. How Fiber optic cable works?


Ans. Fiber optics provides the fastest communication medium for data and voice. Data can travel at the
speed of light through the fiber optic cables. ISPs and corporate offices are usually connected with each
other with the fiber optic cables to provide high speed connectivity.

Q. Talk about network topology and difference between them?


Ans. Topology means how you design your network or what is the physical structure of a network.
There are five ways you can design your network.

 Star Topology- In star topology computers are connected by cables to a hub or switch. In this
topology you can easily add or remove devices. In this topology in one computer fail the network
will continue to function but if hub or switch fails all network will fail.

 Bus Topology- All computers are connected to a single cable but the numbers of computers on a Bus
network will affect network performance because only one computer can send data at a time, in this
topology line break at any point will result in total network failure.

 Mesh Topology- A mesh topology provides each device with a point to point connection to every
other device in the network, this topology is most expansive and difficult to maintain.

 Ring Topology- In Ring topology computers are connected by a single loop of cable, the data signals
travel around the loop in one direction passing throw each computer. In this topology if there is a
line break or it you are adding or removing a device anywhere in the ring this will bring down the
network. It is difficult to maintain

 Hybrid Topology- The hybrid topology is simply a mix of the other topologies the hybrid network
may be more expensive than some types of network topologies, but it takes the best feature of all the
other topologies and exploits them.

Topology Advantages Disadvantages


Bus Cheap, easy to install Difficult to reconfigure, any
Break in the Bus will disable
The total network.
Star Cheap, easy to install, easy More expensive than Bus
To reconfigure, fault tolerant
Mesh Simplest for data flow, most Reconfiguration is very
Fault tolerant Difficult, very expensive,
Very complex.
Ring Efficient, easy to install Reconfiguration is very
Difficult, very expensive.
Hybrid Provides best features Complex.
Q. What is IP address?

Develop by Ankit Srivastava


Ans. An Internet Protocol address is 32 bit logical address that identifies a specific host in the network.
It’s a unique address each machine must have in order to communicate on a TCP/IP network.

Q. What is NetBEUI?
Ans. NetBEUI a transport protocol. It’s is responsible for how data is transmitted between two
computers. It is not routable and is rarely used in modern computing

Q. What is NetBIOS?
Ans. Network Basic Input Output System a name resolution system. It allows a computer to search for
another computer on the network by its Microsoft computer name.

Q. Talk about IP Classes?


Ans. There are five classes.

 Class A- In class A the first byte is assigned to the network address and remaining three bytes are
used for host or node address. The class A format is Network.Node.Node.Node, and the default
subnet mask is 255.0.0.0

 Class B- In class B network the first two bytes are assigned to the network address and the remaining
two bytes are used for node address. The format is Network.Network.Node.Node, the default subnet
mask is 255.255.0.0

 Class C- In Class C network the first three bytes are assigned to the network address and the last
byte dedicated to node address. The format is Network.Network.Network.Node, the subnet mask is
255.255.255.0.

 Class D- Used for multicasting

 Class E- Reserve for future usage.

Class Address Range No. of Networks Maximum. Host Subnet mask


A 1-126 126 16777214 255.0.0.0
B 128-191 16384 65534 255.255.0.0
C 192-223 2097152 254 255.255.255.0
D 224-239 - - -
E 240-255 - - -

Q. Describe CSMA/CA?

Develop by Ankit Srivastava


Ans. Carrier Sense Multiple Access with Collision Avoidance allows the computer to send a signal that it
is ready to transmit data. If the ready signal transmits without a problem, the computer then transmits its
data. If the ready signal is not transmitted successfully, the computer waits and tries again. This method
is slower and less popular than CSMA/CD

Q. What is Cable Access method?


Ans. Cable access method defines a set of rules for how computers put data on and receive it from a
network cable. There two methods for this:
CSMA/CD and CSMA/CA

Q. Describe Transmission media?


Ans. There are two kind of transmission media: (a) Guided media (b) Unguided media.

 Guided Media: This form of transmission is usually referred wired transmission like UTP, Coaxial,
Fiber optic cable etc.

 Unguided Media: This form of transmission is usually referred as wireless transmission like Antenna
to Antenna, Microwave, Satellite, Infrared etc.

Q. What are the advantages and disadvantages of Fiber optic cable?


Ans.
Advantages Disadvantages
Low Attenuation Very expensive
Fast Speed Require special training to configure
High bandwidth Installation is difficult
Covers larger distance Less flexible.
Support voice data, and video at the highest
Transmission speeds.

Q. What are the benefits of UTP?


Ans.
Advantages Disadvantages
Least expensive Covers short distance
Most flexible Maximum speed only 10-100Mbps
Very easy installation

Q. What are the benefits of Wireless?


Ans.

Advantages Disadvantages
Covers larger distance up to 2 miles. Low bandwidth 2-54Mbps
Very flexible Most expensive.

Q. What is RJ-45?
Ans. RJ-45 a connector type used with UTP wire to connect network devices.

Develop by Ankit Srivastava


Q. What is RJ-11?
Ans. Connector type used with UTP wire mostly used in telephone network.

Q. What is BNC?
Ans. British Novel Connecter used with coaxial cable in BUS topology.

Q. Describe Simplex, Half duplex and Full duplex transmission?


Ans.

 Simplex: In this mode data is transmitted in one direction only. This means one end will always be a
transmitter and the other end will always be a receiver.

 Half duplex: In this mode data can flow in either direction but at a given time one transmission can
take place only in one direction.

 Full duplex: A transmission system in which data can be transmitted in both directions
simultaneously is called a full duplex system. Sometimes this mode of transmission is called duplex
mode.

Q. What is NOS?
Ans. The network requires some software to control all the information transfer activity on the network.
This task is handled by the software called Network Operating System.

Q. Describe TCP/IP Reference model?


Ans. The TCP/IP model come from the ARPANET the predecessor of the internet ARPANET was a
research network sponsored by the US Department of Defense. The TCP/IP Model is also called as the
TCP/IP protocol stack that is organized into four layers.

 Application Layer- This layer is the highest layer in the TCP/IP model. It is used by application to
access services across a TCP/IP network like FTP, HTTP, and Telnet etc.

 Transport Layer- The transport layer is located at layer 3 of the TCP/IP model. The main
responsibility of the transport layer is to provide communication from one application to another
application. It also controls the flow of data.

 Internet Layer- It is responsible for handling the communication from one computer to the other. It
accepts a request to send data from the Transport layer

 Network Interface layer- This is at the lowest level of the TCP/IP model. It accepts the datagram
from the Internet layer and transmits over the network. The Network Interface layer is also
responsible for translating an internet address into a hardware address(48 bit MAC)

Q. Describe these following protocols?


Ans.

Develop by Ankit Srivastava


 LCP- Link control protocol this protocol used to establish, configure and test the link between a
client and PPP host.

 NCP- Network control protocol used for conveying network traffic. It also allows a host to connect
with other host.

 NNTP- Network News Transfer Protocol used to distribute network news messages to NNTP servers
and clients (newsreaders) on the Internet. NNTP is designed so that news articles are stored on a
server in a central database, thus enabling a user to select specific items to read.

 SNMP- Simple Network Management Protocol (SNMP) client software that runs on a hub, a router,
or another networking component. It also sends the health information of network.

 NTP- Stands for Network Time Protocol, an Internet protocol for synchronizing computer clocks to
an accurate reference clock

 NTLM- Stands for Windows NT LAN Manager, the native security protocol on Microsoft Windows
NT domain-based networks. NTLM is also known as Windows NT Challenge/Response
Authentication protocol.

 IMAP- Internet Message Access Protocol (IMAP), which enabled individual mailboxes to be
assigned to users, and Multipurpose Internet Mail Extensions (MIME), which made it possible for
text-based e-mail to contain binary information such as multimedia files and executables.

 MPPE- Microsoft Point-to-Point Encryption (MPPE) encrypts data in PPP-based dial-up connections
or PPTP VPN connections. Strong (128-bit key) and standard (40-bit key) MPPE encryption
schemes are supported. MPPE provides data security between your PPTP connection and the tunnel
server.

 ICMP- Internet control message protocol. It is used to report errors. There are two simple and widely
used application based on ICMP Ping and Trace route.

 ARP- Address resolution protocol used to convert logical address to physical address e.g. IP to
MAC. Path command prompt- ARP -a

 RARP- Reverse address resolution protocol responsible for converting physical address to logical
addresses e.g. MAC to IP.

 BOOTP- The Bootstrap protocol enable a client workstation to initialize with a minimal IP stack and
request it’s IP address, a gateway and the address of a name server from a BOOTP Server.

 UDP- User datagram protocol. It’s a connection less protocol, responsible for sending and receiving
data grams but does not provide reliability, flow control, and error recovery.

Develop by Ankit Srivastava


 TCP- Transmission control protocol a connection oriented protocol which divides packets in chunks
and responsible for data transmission. It also provides error recovery, flow control and reliability.

 FTP- File transfer protocol used to download and upload files.

 Telnet- Telecommunication protocol used for remote login.

 SMTP- Simple mail transfer protocol used to send and receive mail between networks.

 TFTP- Trivial file transfer protocol is an extremely simple protocol to transfer files. TFTP lacks most
of the feature of FTP the only thing it can do is read, write from/to a server.

 NFS- The SUN micro system Network File System protocol enables machines to share file system
across a network.

 HTTP- Hypertext transfer protocol it is used to transfer HTML pages in network.

 HTTPS- Hypertext transfer protocol secure it is used to transfer encrypted information in network.

 SLIP- Serial line internet protocol it’s an internet protocol. This is the older and simple protocol. Slip
lacks with few problems like, it does not do any error detection or correction, it supports only IP and
doesn’t provide authentication.

 PPP- Point to point protocol an alternate solution of Slip protocol with error detection, support
multiple protocols, and permits authentication.

 L2TP- Layer 2 tunneling protocol a VPN protocol that is used in conjunction with IPSec to provide a
high level of security when sending IP packets over the internet. L2TP and IPSec provide data
authentication, data encryption, and data integrity services.

 MS-CHAP2- Microsoft Challenge Handshake Authentication protocol version 2 a better version of


CHAP and MS CHAP. Provides mutual authentication use different encryption keys for sending and
receiving.

 PPPOE- Point to point protocol over Ethernet. A protocol that uses PPP to provide remote
connectivity services via Ethernet.

 PPTP- Point to point tunneling protocol used for secure communication between two networks. It
provides authentication, compression and encryption.

 PAP- Password authentication protocol. It is a simplest authentication protocol which uses


unencrypted plain text password.

Develop by Ankit Srivastava


 SPAP- Shiva Password Authentication protocol. A remote access authentication method that encrypts
password with a two-way encryption scheme. With this option window clients and Shiva clients can
make communication with each other.

 CHAP- challenge Handshake Authentication Protocol. A security protocol used to negotiate secure
authentication by using encryption that is based the industry standard hashing scheme specified by
Message Digest 5(MD5). Mostly schemes are used to transform data into a scrambled format.

 EAP- Extensible Authentication Protocol. A remote access protocol used for logon authentication.
EAP was designed to provide secure authentication services for third party devices like smart card.

 POP- Post Office Protocol used to receive mails in networks.

 MS-CHAP- Microsoft Challenge Handshake Authentication Protocol. It’s a better version of CHAP;
it uses the Message Digest 4(MD4) hashing algorithm and Data Encryption Standard (DES).

 IP- Internet Protocol is the standard for data packet delivery over the internet. IP is a network layer
protocol that provides network addressing for identifying senders and receivers. IP also define how
data packets can be routed across the network to their destination.

 RPC- Remote procedure call is a protocol which is responsible for replication.

 BAP- Bandwidth allocation protocol a protocol that manages bandwidth for Multilink
Point-to-Point Protocol (MPPP) connections.

Q. Difference between PPTP and L2TP?


Ans. Both protocols are used in VPN network.

PPTP L2TP
Microsoft proprietary Standards based
Only windows and Unix platforms Not platform specific
Microsoft encryption IPSec encryption
Requires that the transmission network, Require an IP-based transmission network
Provide point-to-pint connectivity
No header compression Support header compression

Q. Ports and related services.


Ans.
Service Port No.
Echo 7
FTP data 20
FTP 21
SSH 22

Develop by Ankit Srivastava


Telnet 23
SMTP 25
DNS 53
HTTP 80
HTTPS 443
POP3 110
SNMP 161
Netstat 15
WINS 42
BOOTP 67
DHCP 68
Kerberos 88
NNTP 119
Host Name 101
NTP 123
NetBios 139
SNMP 161
RIS 180
RIP 520
FINGER 79
TIME 37
Terminal services 3389
IMAP4 220
IPSec 500
LDAP 389

Q. What is IP routing table?


Ans. The IP routing table in each device is used to forward packets between network segments.

Q. What is the difference between Interior gateway protocol and Exterior gateway protocol?
Ans
.
 (IGPs): Interior gateway protocol allows routers to exchange information within an AS. Examples of
these protocols are Open Short Path First (OSPF) and Routing Information Protocol (RIP).

 (EGPs): Exterior gateway protocol allows the exchange of information between autonomous
systems. An example of this type of routing protocol is Border Gateway Protocol (BGP).

Q. What is Autonomous system (AS)?


Ans. An AS is defined as a logical portion of a larger IP network.

Develop by Ankit Srivastava


Q. Discuss about types of IP routing and IP routing algorithms?
Ans. Routing algorithms are used to build and maintain the IP routing table on a device. There are two
primary methods used to build the routing table.

 Static Routing: Static routing is manually performed by the network administrator. The
administrator is responsible for discovering and propagating routes through the network.

 Dynamic Routing: This algorithm allows routers to automatically discover and maintain awareness
of the paths through the network.

Q. What is Routing Information Protocol?


Ans. Routing Information Protocol is an example of an interior gateway protocol designed for use within
small autonomous system. RIP is based on the Xerox XNS routing protocol. RIP is a distance vector
protocol.

Q. What is Border Gateway Protocol?


Ans. The Border gateway protocol is an exterior gateway protocol. It was originally developed to
provide a loop free method of exchanging routing information between autonomous systems.

Q. What are the differences between RIP-1 and RIP2?


Ans. RIP-2 is similar to RIP-1, but RIP-2 provides these additional benefits not available in RIP-1.

 RIP-2 support super netting and variable length subnet masking.


 It supports the use of multicasting rather than simple broadcasting of routing announcements.
 Supports authentication of any node transmitting route advertisements.
 RIP-2 is fully interoperable with RIP-1. This provides backward compatibility between the two
standards.

Q. What is Loop back address?


Ans. It’s a reserved IP address for diagnostic purpose. The IP address is 127.0.0.0.

Q. Describe the IP addressing rules.


Ans.

 The network ID cannot be set to 127. This address is reserved for loop back and diagnostic purpose.

 The network ID and host ID can’t be all 1s. If all bits are set to 1, the address is interpreted as a
broadcast address.

 The host IP must be unique to the local network ID.

 Neither the network ID nor the host ID can have the all bits 0s.

 A unique network ID is needed for each network connected to a wide area network.

Develop by Ankit Srivastava


 Every TCP/IP host requires a subnet mask. The IP address is useless without subnet mask.

Q. Difference between Dial up internet and Broadband internet.


Ans.

Dial-up Broadband
It’s an old method Its new technology
Its slow Its fast
Maximum download speed 56 kbps. Maximum speed 256 kbps.
Cheep technology Expensive than dial-up

Q. Describe Wireless internet access.


Ans. Wireless internet is an internet access technology that uses radio frequency signals instead of wires
to communicate between ISP and users. The advantage of wireless is that you can be anywhere in the
vicinity of wireless devices and get internet access.

Q. What is Kerberos?
Ans. Kerberos is an authentication system. Kerberos secure authentication requests, ensuring that user
access to network services occurs over a secure communication channel. The Kerberos 5 (v5)
authentication mechanism works by assigning a unique key, called a ticket, to each user who
successfully authenticates to a windows server 2003 domain controller. These tickets contain encrypted
data, including an encrypted password, which confirms the user’s identity to the requested service.

Q. What are the IEEE 802.3 project models?


Ans.
Model Technology
802.1 Internetworking
802.2 Logic Link Control
802.3 CSMA/LAN
802.4 Token Bus LAN
802.5 Token Ring LAN
802.6 MAN
802.7 Broadband technical advisory group
802.8 Fiber optic technical advisory group
802.9 Integrated voice data networks
802.10 Network security
802.11 Wireless network

Q. What is the difference between routable and non routable protocols?


Ans.
 Routable protocols: Routable protocols are network protocols that use layer 3 addresses for
forwarding packets to their destination. The most commonly routable protocol is TCP/IP.

 Non Routable protocols: Non routable protocols that can’t forward packets. The most commonly non
routable protocol is NetBUEI.

Develop by Ankit Srivastava


Q. What is Frame Relay?
Ans. Frame relay is a WAN technology in which variable-length packets are
transmitted by switching. Packet switching involves breaking messages into chunks
at the sending router. Each packet can be sent over any number of routes on its
way to its destination. The packets are then reassembled in the correct order at the
receiver.

Q. What is UNC?
Ans. Universal Naming Convention for identifying shared resources on a network.

Q. Describe the Client/ Server.


Ans. It’s a network architecture in which software and hardware resources are distributed across the
network. A client is a requester of service and a server is a service provider.

Q. Common Commands.
Ans.
Command Service
ARP Resolve IP to MAC address
HOST NAME Display the host name for the local system
IPCONFIG Display the local TCP/IP configuration
NBSTAT Provides information about NetBIOS over
TCP/IP connections.
NETSTAT Provides statistical information and,
Connections status for TCP/IP protocol
PATHPING A route tracing tool that combines feature,
Of the PING and Tracert commands.
PING Packet internet gopher used to verify, the
Connectivity between two devices
ROUTE Display a copy of the local routing table for,
the system and provides the ability to,
modify the local routing table

TRACERT Tracks and displays the entire route between,


Two systems
NETSH Allows you to configure a computer’s,
Network configuration remotely or locally
TELNET Used for remote login.
NSLOOKUP It’s a troubleshooting tool for DNS server
IPCONFIG /FLUSHDNS This command will clear all the cached,
Information you have retrieved from DNS.
IPCONFIG / REGISTERDNS This command will register your host name,
With your locally configured DNS server
IPCONFIG /DISPLAYDNS This will show the entries currently in the,
Cache
DCPROMO This command will convert your local,

Develop by Ankit Srivastava


System to Domain Controller
DCPROMO /FORCEREMOVAL This is used to remove Domain Controller,
From your network
IPCONFIG /RELEASE Release the IP address for the specific LAN,
Adapter
IPCONFIG /RENEW Renew the IP address for the specified,
LAN adapter
SHUTDOWN Used to shut down a computer remotely

Q. Difference between bit rate and baud rate?


Ans. Bit Rate is how many data bits are transmitted per second. A baud Rate is the measurement of the
number of times per second a signal in a communications channel changes.

Q. Explain the advantages of using Subneting.


Ans. Advantages of using Subneting:-
 Easier network management and trouble shooting.
 Routing table’s size is reduced which means faster network transfers.
 Solves network congestion problems since the complete network is divided into smaller networks.
 Network addresses can be decentralized e.g. the administrator of the network can monitor the subnet.

Q. What is Sub-netting?
Ans. Sub-netting allows you to divide a large network into smaller network or Subneting is a process of
breaking the network into smaller units. These units care called as subnets.

Q. What is Tunneling?
Ans. Tunneling is a mechanism provided to transfer data securely between two networks. The data is
split into smaller packets and passed through the tunnel. The data passing through the tunnel has 3 layers
of encryption. The data is encapsulated. Tunneling can be approached by Point to Point tunneling
protocol and L2TP protocol.

Q. What is the Public Key Encryption?


Ans. Public key encryption use public and private key for encryption and decryption. In this mechanism,
public key is used to encrypt messages and only the corresponding private key can be used to decrypt
them. To encrypt a message, a sender has to know recipient’s public key.

Q. What is Routing table?


Ans. A routing table stores the routes of the various nodes in a network. Nodes can be any electronic
device connected to the network. The table is usually stored in a router or the network computer as a
database or file. This information helps to fond the best possible path. The routing table has at least 3
fields: the destination network ID, cost of the path, next hop or address to send the packet.

Q What is Routing Protocols?

Develop by Ankit Srivastava


Ans. Routing protocols are used to assist in achieving the basic purpose of routing. They specify the
routers the method to communicate with each other. They help the routers select the best possible path
between nodes. There are different types of protocols such as link-state routing protocols, path vector
protocols and distance vector routing protocols. These protocols prevent routing loops to form or break
if formed already. They help to decide preferred routes from a sequence of hop costs.

Q. What is Distance Vector Routing Protocols?


Ans. The main goal of Distance Vector Routing Protocols Is to find out the best path for he data packet
to reach the destination. Distance here could be the hops. The three different types of Distance Vector
routing protocols include:- Routing Information Protocol (RIP v1 and v2) and Interior Gateway Routing
Protocol. The protocol is easy to manage however not well scalable.

The Distance Vector protocol initially prepares a Routing table which is shared with other routers. This
routing table is shared between routers present in the same network. A new routing table is prepared
when some new information is received from some other router. Now, the bad routing paths are removed
keeping only the smallest hop paths. This new table is then communicated to other routers.

Q. What is IGMP protocol?

Ans. Internet Group Management Protocol, allows internet hosts to multicast. i.e. to send messages to a
group of computers. There may be a group of internet hosts interested to multicast. IGMP allows router
to determine which host groups have members on a given network segment. It helps to establish group
memberships. It is commonly used for streamlining videos and gaming. The protocol can be
implemented both as a host side and router side. The host side is responsible to notify its membership in
a group. The notification is made to a local router. This local router (router side) in turn sends out
queries.

Q. What is LMHOSTS file?


Ans. It’s a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.

Q. What is binding order?


Ans. The order by which the network protocols are used for client-server communications. The most
frequently used protocols should be at the top.

Q. Explain DHCP.
Ans. Dynamic Host Configuration Protocol is a service that automatically configures TCP/IP on client
machines.

Q. DHCP requirement.
Ans. DHCP comes with window NT server, window 2000, 2003 and 2008 server. If we have any one of
this server we can use DHCP service.

Q. Describe DHCP working Process.


Ans.
 Discover- Broadcast by a client to find available DHCP server.

Develop by Ankit Srivastava


 Offer- DHCP offer an IP address to client machine.

 Request- Request the parameter offered by one of the servers and declines all other offer.

 Acknowledge- Acknowledge from server to client with parameters including IP address.

Q. Describe DHCP message types.


Ans.

 DHCP-DISCOVER: Broadcast by a client to find available DHCP server.

 DHCP-OFFER: DHCP offer an IP address to client machine.

 DHCP-REQUEST: Request the parameter offered by one of the servers and declines all other offer.

 DHCP-ACK: Acknowledge from server to client with parameters including IP address.

 DHCP-NACK: Negative acknowledgement from server to client, indicating that the client’s lease
has expired or that a requested IP address is incorrect.

 DHCP-DECLINE: Message from client to server indicating that the offered address is already in use.

 DHCP-RELEASE: Message from a client to server canceling remainder of a lease and relinquishing
network address.

 DHCP-INFORM: Message from client that already has an IP address.

Q. What is DHCP scope?


Ans. The range of IP address which DHCP server can assign to the clients machines is know as DHCP
scope.

Q. What is the minimum and maximum lease duration for DHCP IP?
Ans. Minimum 8 days and maximum 999 days.

Q. What is Super scope?


Ans. Logical group of more than one scope is known as super scope.

Q. Components of DHCP.
Ans.

 Address Pool- No. of available IP addresses including include and exclude.


 Leased Address- Already assigned IP addresses.
 Reservation: Reservation allows you to assign a same IP address to same machine every time.
 Options- We can integrate DHCP with other services like DNS.

Develop by Ankit Srivastava


Q. What is relay agent?
Ans. Relay agent is an option of DHCP service by which a DHCP server can assign IP address to clients
in different subnet mask.

Q. Advantages of DHCP.
Ans.

 DHCP centralizes the management of IP address allocation.


 It also reduces human error associated with manual IP configuration.
 Users don’t need to remember IP addresses of their machines.

Q. Describe the concept of DNS.


Ans. Domain Name System is a naming resolution mechanism that resolve host name to IP and IP to
host name. The advantage of DNS system is that you don’t need to remember any IP address of resource
you need remember only the resource name and DNS will resolve its IP address itself.

Q. DNS components.
Ans. There are three main components you will find in the DNS.

 Domain Name Servers- The Domain Name Servers are servers running the DNS software
component, which store information about a zone file. These name servers provide address
resolution and other information about the computers that you access.

 DNS resolvers- DNS resolvers are piece of code that is built into the operating system. These
resolves FQDN to IP address.

 The logical Name space- This is where DNS objects is stored.

Q. What is FQDN?
Ans. A Fully Qualified Domain Name represents a host name appended to the parent namespace. The
left most portion of the FQDN is the host portion of the name. A host name is an alias we give to an IP
address.

Q. Explain Zone files in DNS?


Ans.

 Forward lookup zone- It resolves host name to IP address.

 Reverse lookup zone- It resolves IP address to host name.

Q. Describe Zone categories.


Ans. There are three zones in DNS.

 Primary Zone: The primary zone is the location where all updates to the zone’s records are made.
Primary zone has read and write permission.

Develop by Ankit Srivastava


 Secondary Zone: Secondary zone is usually for load balancing and fault tolerance. The secondary
zones are secondary because they store copies of primary zone. Secondary zone has read only
permission.

 Stub Zone- This is mini zone is kept on a DNS server hosting a parent zone, and its only purpose is
to identify the authoritative name servers in child zones.

Q. What is the role of Conditional Forwarder?


Ans. A conditional forwarder is a DNS forwarder that examines the domain name of the query, and then
forwards the query to specified servers based on that name.

Q. What are the records stored in a zone file?


Ans.

 A- Record name it provides host name to IP address.

 PTR- Pointer it provides IP address to host name.

 SRV- Service a service record helps identify services running in a domain namespace.

 MX- Mail Exchange this record identifies the IP address of a mail server for a given domain.

 NS- Name Server these specify the name servers that are authoritative for a given portion of the
DNS namespace.

 SOA- Start of Authority this resource records indicates the name of origin for the zone and contains
the name of the server that is the primary source for information about the zone.

 CNAME- Canonical name the CNAME can be used to assign multiple names to a single IP address.

Q. What is Recursive query?


Ans. When DNS server is not able to resolve a particular host name to IP but able to forward your query
to other DNS server that is known as Recursive query.

Q. What is Iterative Query?


Ans. The query that has been sent to the DNS server from a Client is called iterative query. (i. e.,
iterative query is nothing but give the answer for my question, don’t ask to contact that person or this
person or don’t say some thing else. Simply just answer to my question. That’s all)

Q. Explain WINS.
Ans. Windows Internet Name Service (WINS) A Windows NT service that resolves a NetBIOS name to
IP. It’s also naming resolution mechanism like DNS but works in Windows NT network environment.

Develop by Ankit Srivastava


Q. What do you understand by Ethernet 802.3?
Ans. Ethernet is the most common method for LAN access. Ethernet is based on the Institute of
Electrical and Electronic Engineers 802.3 model. There are several Ethernet standards, which include 10
Mbps, 100 Mbps and 1Gbps Ethernet. Ethernet uses CSMA/CD technology to transmit data.

Q. What is Web Server?


Ans. A server that holds and delivers Web pages and other Web content using the HTTP protocol.

Q. What is TTL?
Ans. Time to Live (TTL) a field in IP packets that indicates how many routers the packet can still cross
(hops it can still make) before it is discarded. TTL is also used in ARP tables to indicate how long an
entry should remain in the table.

Q. What is Thick Ethernet?


Ans. Thick Ethernet a type of Ethernet that uses thick coaxial cable and supports a maximum
transmissions distance of 500 meters.

Q. What is Super-netting?
Ans. Super-netting the process of combining multiple IP address ranges into a single IP network.

Q. What is Subnet?
Ans. Subnet a network that is part of another network. The connection is made through a gateway,
bridge, or router.

Q. Explain SAM?
Ans. Security Accounts Manager (SAM) A database within Windows that contains information about all
the users and groups and their associated rights and settings within a domain.

Q. What is Remote Access Protocol?


Ans. Remote access protocol any networking protocol that is used to gain access to a network over
public communication links.

Q. What is Remote Access Server?


Ans. Remote access Server a computer that has one or more modems installed to enable remote
connections to the network.

Q. What is Proxy?
Ans. Proxy a type of firewall that prevents direct communication between a client and a host by acting
as an intermediary.

Q. Explain Circuit Switching.


Ans. Circuit switching is the switching technique in which a circuit between source and destination is
established on demand for exclusive use by the two parties until the connection is free. Circuit switching
is used for ordinary telephone called.

Develop by Ankit Srivastava


Q. What is Packet switching?
Ans. The process of breaking messages into packets for easier transmission.

Q. What is the Difference between Private IP and Public IP?


Ans. Private IP they can be used over and over and be unique to that organization but if you want to use
public address you have to buy personally. That’s means private IP addresses are free to use and for
public IP you have to pay.

Q. What is the difference between IP4 & IP6?


Ans. The most obvious difference between the two protocols is the length of their source and destination
addresses. The whole point of making the switch to IPv6 is to compensate for a global shortage of IP
addresses. The IPv4 protocol uses a 32-bit source and destination address. In contrast, an IPv6 address is
128 bits in length

Q. What is the difference between UTP & STP?


Ans. UTP is Unshielded Twisted Pair. The majority of Ethernet networks utilize this type of cabling. As
the name implies this cable doesn't have a shield to protect from electrical interference.

STP is Shielded Twisted Pair. It is the same as UTP but has a shield inside to protect from electrical
interference. It should be used in Token Ring networks or in Ethernet networks where electrical
interference may be a problem.

STP is more expensive and bulkier than UTP due to the shield.

Q. What is Packet?
Ans. A group of bits ready for transmission over a network. It includes a header, data, and a trailer.

Q. What is WINIPCFG?
Ans. In windows 9X, the utility that allows you to view you current TCP/IP configuration.

Develop by Ankit Srivastava

Das könnte Ihnen auch gefallen