Sie sind auf Seite 1von 12

1.What is Blackberry technology?

BlackBerry is nothing but a handheld wireless device that is just like a two way pager. It supports the features like mobile telephone, push e-mail, text messaging, web browsing, internet faxing. In addition to these, all types of wireless information services and multi-touch interfaces are also included.

2.What are the differences between a domain and a workgroup?


In a domain, one or more computer can be a server to manage the network. On the other hand in a workgroup all computers are peers having no control on each other.............

3.Explain IP datagram, Fragmentation and MTU.


IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged in an order. The order is specific which helps to decode and read the stream easily..............

4.What is 'Gateway Of Last Resort'?


A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to transmit the IP packet. Known routes are present in the routing table.................

5.Explain about Blackberry Operating System.


Research in Motion, a Canadian company provided a proprietary operating system for BlackBerry. The operating system provides support for Java MIDP 1.0 and WAP 1.2. The current version supports Novell Group Wise and Lotus Notes. Third-party software can be developed using BlackBerry APIs as well, with certain restriction functionality must be signed by RIM digitally, so that it can be associated to a developer account.

Explain about Blackberry Enterprise Server


BlackBerry Enterprise Server: The BlackBerry handhelds are integrated into the e-mail system of the organization through software BlackBerry Enterprise Server. The BES versions are available for MS Exchange, Novell GroupWise and Lotus Domino. A connector was made by Google for BES for making BES available for Google Apps. A new feature is added which enables to track the current location of an individual through trailateration. BES provides handhelds with the connectivity of TCP/IP which can be accessed through a component known as Mobile Data Service Connection Service MDS-CS. This allows the development of custom application development using data streams on BlackBerry devices which are based on the Sun JME

platform. BES also provides network security in the form of Triple DES or AES encryption standard of all data including e-mail and MDS traffic, which travels between the BlackBerry hand held devices and a BES.

Explain about BlackBerry Internet Service


The primary alternative to BlackBerry Enterprise Server is BlackBerry Internet Service. The development of this service is aimed at the average consumer rather than for the business consumer. POP3 and IMAP integration are allowed by these services for the personal user. It allows upto 10 e-mail accounts could be accessed including popular emails Gmail, Hotmail, Yahoo and AOL. MySpace, Facebook and MSN can also be accessed by using special bundles. Latest BlackBerry devices are using proprietary BlackBerry Messenger for sending and receiving instant messages through BlackBerry PIN or barcode scan. This is a BlackBerry Alliance program for the partners who work under contract with RIM for creating new BlackBerry applications.

Explain how synchronization takes place with Blackberry Technology


The handheld device is used as a network device, which always connected to the data account of the user via redirector software. The software is installed on the BlackBerry Enterprise Server. The communication between the software, BE Server and the hand held devices software is always a two way street. BES immediately updates the mobile device or the email or the calendar account, whenever a change in email account occurs. The push technology of BlackBerry keeps the device instantly in synch without any effort by the user.

What are the features of Blackberry?


The standard features of a BlackBerry are calendar, notes, calculator, tasks, alarm clock and few games. In addition to the standard features, BlackBerry also has a feature for downloading third party applications. Most of the BlackBerry handhelds are capable of using Bluetooth, which allows for using wireless Bluetooth headsets for handling telephone calls.

What are the benefits for organizations and IT departments by using Blackberry?
Benefits for organizations The BlackBerry Connect technology allows the organizations for standardizing BlackBerry platform and leverages their existing BlackBerry solution investments. The employees productivity and performance can also be boosted by providing them the mobile access for their emails and calendars.

Benefits for IT IT departments are provided with a solution that is easy to utilize, manage and deploy by using BlackBerry Connect technology. Strict requirements for security and manageability will be satisfied and several devices can be connected to the BlackBerry Platform.

What are the advantages of BlackBerry technology?


1. Email: BlackBerry provides email accessing facility with its wireless extension. Normal email activities can be performed without hassles. It remains continuously connected to the wireless network which enables the user to access email. The mail will appear on the device without retrieving it. 2. Phone: The BlackBerry hand held has all the features of a mobile. In addition it has digital walkietalkie, SIP based IP telephony and also provides headsets with comfort, clarity and convenience. 3. Wireless Internet: The hand held phone have special features which enables to browse the internet by clicking and scroll track wheel for navigating the pages and types the URLs by using QWERTY keyboards. 4. Tethered Modem: Some of the BlackBerry hand held devices are available with features like speedy wireless services with fast email and browsing experiences. This device acts as a tethered modem without carrying a wireless PC card. 5. Organizer: The mobile is provided with functionality regarding day to day activities. 6. SMS: Blackberry devices support the facility of sending and receiving text messages. 7. Instant Messaging: This feature helps the user for contacting people once they are connected to the wireless network. 8. Corporate Data Access: Business goals can be achieved with access to the corporate data, by using wireless connectivity technology. 9. Paging: Some of the BlackBerry models provide paging services to the BlackBerry users who do not have an email account.

What are the features of BlackBerry Storm2?


The BlackBerry Storm2 has the following features: More memory , upto 32GB micro SD card 3.2 MP camera with Wi-Fi Major change - Mechanical Button keyboard replacement with fully electronic key board screen will not be shifted while typing Support for full-width keyboard while in landscape mode.

What is iPhone?
IPhone is a combination of internet and multimedia enabled smart phone developed by Apple Inc. iPhone functions as a camera phone, including text messaging, and visual voice mail iPhone is a portable media player that resembles a video iPod It has user interface that is built around the multi-touch screen including virtual keyboard. App Store , which launched in the mid 2008 has over 1,00,000 applications with functionalities including games, references, GPS navigation, advertising, television shows, films, reference, celebrities.

What are the features of iphone 3gs?


Video: Videos can be edited, shared. High quality VGA video can be shot in portrait or landscape. 3 Megapixel Camera: Still photos with greater quality can be taken Voice control: It recognizes the names in contacts and recognizes the music on iPod. Compass: iPhone 3GS has built-in digital compass, used to point the way. Internet Tethering: Internet surfing can be done from anywhere. A 3G connection can be shared on Iphon3 with Mac notebook or laptop..

What is iphone OS?


iPhone OS runs on iPhone and iPod touch devices. Hardware devices are managed by iPhone OS and provides the technologies needed for implementing native applications on the phone. The OS ships with several system applications such as Mail, Safari, Phone, which provide standard services to the user.

What is iphone sdk?


iPhone SDK is available with tools and interfaces needed for developing, installing and running custom native applications. Native applications are built using the iPhone OSs system frameworks and Objective -C language and run directly on iPhone OS. Native applications are installed physically on a device and can run in presence or absence of network connection.

What is iphone architecture?

It is similar to MacOS X architecture It acts as an intermediary between the iPhone and iPod hardware an the appearing applications on the screen The user created applications never interact directly with the appropriate drivers, which protects the user applications from changes to the hardware.

What is iphone reference library?


iPhone reference library is a set of reference documents for iPhone OS . It can be downloaded by subscribing to the iPhone OS Library doc set. Select Help>Documentation from Xcode, and click the subscribe button next to the iPhone OS Library doc set, which appears in the left column.

What are sensors in iphone?


The proximity sensor immediately turns off the display when the iPhone is lifted to ear. With this sensor the power is saved and accidental dialing is prevented. The display is automatically brightens the iPhone by the ambient light sensor when the sunlight or bright rooms and dims in darker places.

What are the location services?


Applications such as Maps, camera and compass are allowed to use the information from cellular, Wi-Fi and Global Positioning System networks for determining the approximate locations. The location is displayed on the screen, using a blue marker.

Describe the functionality of accelerometer of an iphone


iPhone responds to motion using a built-in accelerometer. The accelerometer detects the movement and changes the display accordingly, at the time of rotating iPhone from portrait to landscape.

Explain about the applications that can be used with iphone


Technology, Entertainment and Design(TED): Allows to watch and listen to worlds most fascinating people have to say, all on the iPhone.

Market Watch: Breaking news about the investments can be seen. To do so, open the Stocks app and rotate. Trends: Latest runway shows, videos from Vogues fashion library, reviews, exclusive party pictures, fashion news updates can be seen on Style.com.

What is Blackberry technology?


BlackBerry is nothing but a handheld wireless device that is just like a two way pager. It supports the features like mobile telephone, push e-mail, text messaging, web browsing, internet faxing. In addition to these, all types of wireless information services and multi-touch interfaces are also included.

Explain about Blackberry Operating System.


Research in Motion, a Canadian company provided a proprietary operating system for BlackBerry. The operating system provides support for Java MIDP 1.0 and WAP 1.2. The current version supports Novell Group Wise and Lotus Notes. Third-party software can be developed using BlackBerry APIs as well, with certain restriction functionality must be signed by RIM digitally, so that it can be associated to a developer account.

Explain about the CPU used in Blackberry technology


Early BlackBerry devices used Interl-80386 processors but Intel XScale 624 MHz CPUs are used in the latest BlackBerry 9000 series. Earlier, BlackBerry 8000 series with Pearl was based on the 312 MHz ARM XScale ARMv5TE PAXA900. BlackBerry 8707 was based on 80 MHz Qualcomm 3250 chipset, and the device was often slower for downloading and render the web pages over 3G than the 8700 was over EDGE networks.

Explain about Blackberry Enterprise Server


BlackBerry Enterprise Server: The BlackBerry handhelds are integrated into the e-mail system of the organization through software BlackBerry Enterprise Server. The BES versions are available for MS Exchange, Novell GroupWise and Lotus Domino. A connector was made by Google for BES for making BES available for Google Apps. A new feature is added which enables to track the current location of an individual through trailateration. BES provides handhelds with the connectivity of TCP/IP which can be accessed through a component known as Mobile Data Service Connection Service MDS-CS. This allows the development of custom application development using data streams on BlackBerry devices which are based on the Sun JME

platform. BES also provides network security in the form of Triple DES or AES encryption standard of all data including e-mail and MDS traffic, which travels between the BlackBerry hand held devices and a BES.

Explain about BlackBerry Internet Service


The primary alternative to BlackBerry Enterprise Server is BlackBerry Internet Service. The development of this service is aimed at the average consumer rather than for the business consumer. POP3 and IMAP integration are allowed by these services for the personal user. It allows upto 10 e-mail accounts could be accessed including popular emails Gmail, Hotmail, Yahoo and AOL. MySpace, Facebook and MSN can also be accessed by using special bundles. Latest BlackBerry devices are using proprietary BlackBerry Messenger for sending and receiving instant messages through BlackBerry PIN or barcode scan. This is a BlackBerry Alliance program for the partners who work under contract with RIM for creating new BlackBerry applications.

Explain how synchronization takes place with Blackberry Technology


The handheld device is used as a network device, which always connected to the data account of the user via redirector software. The software is installed on the BlackBerry Enterprise Server. The communication between the software, BE Server and the hand held devices software is always a twoway street. BES immediately updates the mobile device or the email or the calendar account, whenever a change in email account occurs. The push technology of BlackBerry keeps the device ins tantly in synch without any effort by the user.

What are the features of Blackberry?


The standard features of a BlackBerry are calendar, notes, calculator, tasks, alarm clock and few games. In addition to the standard features, BlackBerry also has a feature for downloading third party applications. Most of the BlackBerry handhelds are capable of using Bluetooth, which allows for using wireless Bluetooth headsets for handling telephone calls.

What are the benefits for organizations and IT departments by using Blackberry?
Benefits for organizations The BlackBerry Connect technology allows the organizations for standardizing BlackBerry platform and leverages their existing BlackBerry solution investments. The employees productivity and perf ormance can also be boosted by providing them the mobile access for their emails and calendars.

Benefits for IT IT departments are provided with a solution that is easy to utilize, manage and deploy by using BlackBerry Connect technology. Strict requirements for security and manageability will be satisfied and several devices can be connected to the BlackBerry Platform.

What is the Domain Name System (DNS)? What are the advantages of it? A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet................... What are the differences between a domain and a workgroup? In a domain, one or more computer can be a server to manage the network. On the other hand in a workgroup all computers are peers having no control on each other............. Explain the concept and capabilities of Unicast IP Addresses. It is an IP address that uniquely identifies a host in a network. The datagram with a unicast IP address is received and processed by only a single host.

What is the Domain Name System (DNS)? What are the advantages of it?
A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet. Various information with domain names is assigned to each of the participants. DNS translates the names of domain into meaningful to humans into binary identifiers that are associated with the equipment of network to locate and address these devices. Advantages: More Reliable: Delivers messages to the users with zero downtime. Faster: DNS are connected well at intersections of internet. Any cast technology enables requests are answered to the next closest node in the case of maintenance or downtime. Smarter: Automatic corrections of typos.

What is the TTL (Time to Live)? Why is it required?


TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded. Usually, data packets might not be transmitted to their intended destination within a stipulated period of time. The TTL value is set by a system default value which is an 8-bit binary digit field in the header of the packet. The purpose of TTL is, it would specify certain time limit in seconds, for transmitting the packet header. When the time is exhausted, the packet would be discarded. Each router receives the subtracts count, when the packet is discarded, and when it becomes zero, the router detects the discarded packets and sends a message, Internet Control Message Protocol message back to the originating host.

Explain the use of Internet Control Message Protocol (ICMP).


Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers, for the purpose of sending error messages, for example, a requested service is unavailable or the host could not be reached. It is not directed by the network applications. ICMPs are utilized by routers, hosts for communicating the updates or error information to other routers.

What is the use of IGMP protocol?


Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups. The mechanism also allow a host to inform its local router, that it wants to receive messages.

What are Ping and Tracert?


Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets. Ping I particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address Tracert is called as trace route. It is used to track or trace the path the packet takes from the computer where the command is given until the destination. In windows ping command is written as tracert ip_address

Explain RSVP. How does it work?


Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network. This is done by carrying the request (that needs a reservation of the resource) of the host throughout the network. It visits each node in the network. RSVP used two local modules for reservation of resources. Admission control module confirms if there are sufficient available resources while policy module checks for the permission of making a reservation. RSVP offers scalability. On a successful completion of both checks RSVP uses the packet classifier and packet scheduler for the desired Qos requested.

Explain the concept of DHCP.


Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The IP addresses are assigned dynamically. Certainly, using DHCP, the computer will have a different IP address every time it is connected to the network. In some cases the IP address may change even when the computer is in network. This means that DHCP leases out the IP address to the computer for sometime. Clear advantage of DHCP is that the software can be used to manage IP address rather than the administrator.

What are the differences between a domain and a workgroup?


In a domain, one or more computer can be a server to manage the network. On the other hand in a

workgroup all computers are peers having no control on each other. In a domain, user doesnt need an account to logon on a specific computer if an account is available on the domain. In a work group user needs to have an account for every computer. In a domain, Computers can be on different local networks. In a work group all computers needs to be a part of the same local network.

Explain how NAT works.


Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is maintained for global to local and local to mapping of IPs. NAT can be statically defined or dynamically translate from a pool of addresses. The NAT router is responsible for translating traffic coming and leaving the network. NAT prevents malicious activity initiated by outside hosts from reaching local hosts by being dependent on a machine on the local network to initiate any connection to hosts on the other side of the router.

What is PPP protocol? Explain PPP packet format.


Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host. PPP also provides authentication. PPP operates by sending Request packets and waiting for Acknowledge packets that accept, reject or try to change the request. The protocol is also used to negotiate on network address or compression options between the nodes. Packet format:Flag field: 1 byte: - Indicates frames beginning or end Address field: 1 byte: - Used for broadcast address (destination address) Control field: 1 byte: - Used as a control byte Protocol field: - 1 or 2 bytes: - Setting of protocol in information field (of datagram) Information: - 0 or more bytes: - Datagram (whether it contains data or control information) Padding: - 0 or more bytes: - optional padding FCS: - 2 or more bytes: - error check sum

What is IP Spoofing and how can it be prevented?


IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. This is done by forging the header so it contains a different address and make it appear that the packet was sent by a different machine. Prevention:Packet filtering: - to allow packets with recognized formats to enter the network Using special routers and firewalls. Encrypting the session

Explain IP datagram, Fragmentation and MTU.


IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged in an order. The order is specific which helps to decode and read the stream easily. IP datagram has fields like Version, header length, Type of service, Total length, checksum, flag, protocol, Time to live, Identification, source and destination ip address, padding, options and payload. MTU:- Maximum Transmission Unit is the size of the largest packet that a communication protocol can pass. The size can be fixed by some standard or decided at the time of connection Fragmentation is a process of breaking the IP packets into smaller pieces. Fragmentation is needed when the datagram is larger than the MTU. Each fragment becomes a datagram in itself and transmitted independently from source. When received by destination they are reassembled.

What is an application gateway?


An application gateway is an application program that runs on a firewall between two networks. An application gateway is used for establishing connection between client program and destination service. The client negotiates with the gateway to communicate with the service of destination. Here, gateway can be called as a proxy. Hence, two connections are made. One between client and proxy; other, between proxy and destination service. Connections take place behind the firewall

Explain Circuit Level Gateway.


A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be considered as a layer between application layer and transport layer. They protect the information of the private network they protect. Circuit level gateways do not filter packets.

What is 'Gateway Of Last Resort'?


A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to transmit the IP packet. Known routes are present in the routing table. Hence, any route not known by the routing table is forwarded to the default route. Each router which receives this packet will treat the packet the same way, if the route is known, packet will be forwarded to the known route.

What are switches? Explain the concepts of Layer-3 switches.


It is a device that connects multiple network segments. A switch analyzes the MAC address and then determines where to send the data. So a file addressed to a computer reaches only that computer through the use of a switch. The term switch commonly refers to a Network bridge that processes and routes data at the Data link layer (layer 2) of the OSI model. Switches that additionally process data at the Network Layer are often referred to as Layer 3 switches or Multilayer switches.

What is Router? Explain components of Routers.


The way switches connect multiple computers, a router connects multiple networks. Routers comprise of data consisting of large tables of networks and addresses. Routers use algorithms to determine the shortest route to an address in a network.

What are the basic components of routers?


Answer Components of Router Internal components: ROM:- Used to store the routers bootstrap details, operating system software. Flash memory: - holds the operating systems images. The content is retained when the router is restarted. RAM: - Used to store the Routing tables, configuration files, caching and buffering details. Content is lost when lost router is switched off or restarted. NVRAM:- Stores the routers startup config files. Data is non volatile. Network interfaces to connect router to network.

External components: Virtual terminals: For accessing routers Network management stations.

Overview of OSI layer.


OSI stands for Open Systems Interconnection The OSI reference model gives an overview of the layered communications and computer network protocol design. The layers of the OSI are: Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer

Das könnte Ihnen auch gefallen