Sie sind auf Seite 1von 3

Corvit Systems

1: In networking terminology, what is data encapsulation?


Answer:
Data encapsulation is the process of putting headers and trailers around the data. Each layer
encapsulates the upper layers data into a new header and trailer. This process is repeated until
reaching layer 1 which is responsible for transmitting the data over the transmission medium.

2: What is CSMA/CD and how does it work?
Answer:
When the data i transmitted by two or three nodes on a network through the cable, there occurs
collision. So, CSMA/CA(Carrier Sense Multiple Access/ Collision Avoidance) is used,
Before transmitting the data on the cable, NIC(network Interface Card) checks the cable if any
transmission is going on. If no, sends the data or waits for the transmission to finish.

3: List the TCP/IP port for following:
a) FTP
b) TELNET
c) HTTP
d) SNMP
e) POP3
Answer:
FTP-21
TELNET-23
HTTP-80
SNMP-25
POP3-110

4: What are the advantages of UDP over TCP?
Answer:
a) Both are transport layer protocols.UDP is a connectionless protocol while TCP is a connection
oriented protocol
b) UDP provides low overhead data delivery than TCP
c) UDP find applications in the Domain Name System (DNS) , Video Streaming , Voice over IP
(VoIP) whereas TCP has applications in Web Browsers , E-mail , File Transfers

5: What is broadcast MAC address and what is its value?
Answer:
The broadcast MAC address is a type of layer 2 address that is used to deliver data to all devices
in the same broadcast domain of the sender. The source sends only one frame on the network and
the switch replicates it to all ports in the same broadcast domain of the source. The broadcast
MAC address has a value of FFFF.FFFF.FFFF.

6: What is a VLAN? And what does VLAN provide?
Answer:
VLAN stands for Virtual Local Area Network
It provides broadcast control; security and flexibility by logically grouping or segmenting a
network connected to administratively defined ports on a switch.
7: What is subnetting and why is it used?
Answer:
Subnetting is the breaking up of larger networks to become smaller, more easily managed
subnetworks. Subnetting is used to reduce network traffic and optimize network performance as
well as to simplify the management of the networks making it easier to identify issues with
networks.

8: Difference between ARP and RARP?
Answer:
Address Resolution Protocol (ARP) is used for mapping IP network address to the hardware
addresses that are working on the data link layer. Whereas, RARP (Reverse ARP) maps the IP
address from the ARP table that was requested by physical machine in a LAN.

9: Can you explain Protocol?
Answer:
Protocols is basically a set of rules that is required to be followed by a network for
communication. It provides the standards that a network should have to follow while
communicating to another network.

10: List out the 7 OSI layers?
Answer:
Seven OSI layers are:
Physical Layer
Data link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer

11: What is Routing?
Answer:
Routing is the process of finding a path on which data can pass from source to destination.
Routing is done by a device called routers, which are network layer devices.

12: What is a Frame Relay?
Answer:
Frame Relay is a WAN protocol that provides connection-oriented communication by creating
and maintaining virtual circuits. It has a high performance rating and operates at the Data Link
and Physical.

13: What are packets?
Answer:
Packets are the results of data encapsulation. These are data that has been wrapped under the
different protocols of the OSI layers. Packets are also referred to as datagrams.

14: What is MTU?
Answer:
MTU stands for Maximum Transmission Unit. It refers to the maximum packet size that can be
sent out onto the data line without the need to fragment it.

15: What is BootP?
Answer:
BootP is a protocol that is used to boot diskless workstations that are connected to the network. It
is short for Boot Program. Diskless workstations also use BootP in order to determine its own IP
address as well as the IP address of the server PC.

16: What is Route Poisoning?
Answer:
Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable.
This technique is used in order to prevent problems caused by inconsistent updates on a route.

17: How does Hold-downs work?
Answer:
Hold-downs prevent regular update messages from reinstating a downed link by removing that
link from update messages. It uses triggered updates to reset the hold-down timer.

Das könnte Ihnen auch gefallen