Sie sind auf Seite 1von 15

Page

| 71

Page | 71
Preface
CCNA stands for Cisco Certified Network Associate. CCNA certification is an
associate-level ideal certification program for entry-level network engineers to
maximize their foundational networking knowledge. It is one of the most respected
and reputed certification in the networking industry. This EBook is ideal for
candidates who have completed or pursuing CCNA certification and intending to
go for interviews. This EBook will help you to prepare for interviews and to
revise your concepts which you have learned during your CCNA certification.


Copyright

Copyright 2016. All rights reserved. No part of this book may be
reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or by any
information storage and retrieval system, without written permission
from the publisher.












Warning and Disclaimer



This book is designed to help candidates prepare for CCNA interviews. Every
effort has been made to make this book as complete and as accurate as possible,
but no warranty or fitness is implied.

The publisher and the author make no representations or warranties with respect
to the accuracy or completeness of the contents of this work and specifically
disclaim all warranties, including without limitation warranties of fitness for a
particular purpose. The advice and strategies contained herein may not be suitable
for every situation. Neither the publisher nor the author shall be liable for
damages arising here from.



To Our Readers

Thank you for looking to Networker Interview for your CCNA interview
preparation needs. We at Networker Interview are proud of our reputation for
providing candidates with the knowledge needed to succeed in the highly
competitive interviews.

As always, your feedback is important to us. If you believe youve identified an
error in the Book or if you have general comments or suggestions, feel free to
contact us through email at creatorstudio.s24@gmail.com


Website
For CCNA, CCNP, CCIE and more visit http://networkerinterview.net

List the Layers of OSI Model?


Application Layer, Presentation Layer, Session Layer, Transport Layer,
Network Layer, Data Link Layer, Physical Layer.
What are the Functions of Transport, Network and Data Link Layer?
Transport layer
1. On the sending device, the Transport layer is responsible for breaking
the data into smaller packets, so that if any packet is lost during
transmission, it will be sent again. At the receiving device, the transport
layer will be responsible for opening all of the packets and reconstructing
the original message.
2. It provides end-to-end data transport services.
3. Establishes logical connection between the sending host and destination
host on an internetwork.
4. Transport layer also performs sequencing. Sequencing is a connection-
oriented service that places TCP segments in right order if they are
received out of order.
Network layer
1.The Network layer (layer 3) manages device addressing.
2. It tracks the location of devices on the network.
3. It determines the best way to move data between devices that are not
locally attached.
4. Routers functions at the Network layer to provide the routing services
within an internetwork.
Data link layer
1.The Data Link layer is responsible for physical transmission of the data.
2. It handles error notification, flow control.
3. Data Link layer ensures that messages are delivered to the proper
device on a LAN using MAC addresses.
4. It translates messages from the Network layer into bits for the Physical
layer to transmit.
5. The Data Link layer formats the message into data frame by adding the
customized header containing the hardware destination and source
address.
Which Layer is responsible for reliable connection?
Transport Layer
Which Layer is responsible for error detection?
Data Link Layer performs error detection not error correction.

Which Layer is responsible for error correction?
Transport layer performs error correction.

What are the functions of Application Layer, Presentation
Layer & Session Layer?
Application Layer The Application layer of the OSI model is the
layer where users actually communicate to the computer. The
Application layer is also responsible for identifying and
establishing the availability of the communication partner and
determines whether sufficient resources for the communication
exist or not. Services that take place at application layer are E-
Mail, File Transfers, Remote Access etc.

Presentation Layer It is responsible for data translation and
code formatting. When the presentation layer receives data from
the application layer, to be sent over the network, it makes sure
that the data is in the proper format. If it is not, the presentation
layer converts the data to the proper format. On the other side of
communication, when the presentation layer receives network
data from the session layer, it makes sure that the data is in the
proper format and once again converts it if it is not. Formatting
functions at the presentation layer may include compression,
decompression, encryption, and decryption.

Session Layer The Session layer is responsible for setting up,
managing, and tearing down sessions between applications
running on communicating stations. Session layer also
synchronizes dialogue between the presentation layers of the two
hosts and manages their data exchange.

What are the different protocols works at each of the layers of OSI
Model?
Physical Layer
ISDN (Integrated Services Digital Network), ADSL (Asymmetric Digital
Subscriber Line), Universal Serial Bus, Bluetooth, Controller Area Network,
Ethernet.
Data Link layer
Spanning Tree Protocol, VLanTrunking Protocol, Dynamic Trunking
Protocol, HDLC, PPP, Frame Relay, Token Ring.
Network Layer
ICMP, IGMP, IPV4, IPV6, IPSEC, OSPF, EIGRP, RIP, BGP.
Transport Layer
TCP, UDP, GRE.
Session Layer
NFS (Network File System).
Presentation Layer
Data encryption/decryption, Data compression, Data Conversion Protocols
Application Layer
DNS, DHCP, FTP, HTTP, NTP, SNMP, SMP, TELNET, TFTP, SSH.
Define Unicast, Multicast and Broadcast?
Broadcast is the term used to describe communication where a piece of
information is sent to all devices on the network segment.
Multicast is the term used to describe communication where a piece of
information is sent from a single source and transmitted to many devices
but not all devices.
Unicast is the term used to describe communication where a piece of
information is sent to a single destination host.
What is the range Of Port Numbers?
Well Known Ports - 0 to 1023
Registered Ports -1024 to 49151
Open Ports - 49152 to 65535
What is the difference between Simplex, Half-duplex and
Full-duplex?
Simplex - Data can travel in one direction only.
Half Duplex - Data can travel in both directions but not
simultaneously. At a time Data can flow only in one direction.
Example: - HUB.
Full Duplex - Data can travel in both directions 00simultaneously.
Example: - Switch.

What is a port number and give some examples?
TCP & UDP must use port numbers to communicate with upper layers
because these are what keep track of different conversations crossing the
network simultaneously.
PROTOCOLS PORT NUMBERS
FTP 20, 21
TELNET 23
SMTP 25
DNS 53
DHCP 67 (DHCP Server)
68 (DHCP Client)
TFTP 69
HTTP 80
POP3 110
NTP 123
IMAP4 143
SNMP 161
BGP 179
HTTPS 443
RIP 520
What is a Protocol Number and give some examples?
In IPV4 There is a Field called Protocol to identify the Next Level Protocol.
In IPV6 this Field is called "Next Header" Field.
PROTOCOL PROTOCOL NUMBER

ICMP 1
IGMP 2
Ipv4 4
TCP 6
EGP 8
IGP 9
UDP 17
Ipv6 41

GRE 47
EIGRP 88
OSPF 89
VRRP 112

What is the MAC Address format?


It is a 12 Digit, 48 Bit (6 Byte) Hardware address written in hexadecimal
format.
It consists of two parts: -
The first 24 Bits OUI (Organizationally Unique Identifier) is assigned by
IEEE to an organization.
The Last 24 Bits is Manufacturer-assigned code. This portion commonly
starts with 24 0s for the first card made and continues in order until there
are 24 1s for the last card made.
What is a Frame?
The Data Link layer formats the message into pieces, each called a data
frame and adds a customized header containing the source and destination
hardware address.
What is TCP/IP Model?
TCP/IP is four layer standard model. It is robust to failures and
flexible to diverse networks. Most widely used protocol for
interconnecting computers and it is the protocol of the internet.
The four layers of TCP/IP model are Application layer, Transport
layer, Internet layer, Network access layer

What are the protocols that are included by each layer of TCP/IP
model?
Layers of TCP/IP model Protocols
Application Layer DNS, DHCP, FTP, SMTP, HTTP
Transport Layer TCP, UDP
Internet Layer IP, ICMP, ARP
Network access layer Ethernet, Token Ring, ARP, RARP
Explain Different Types of cables?
Straight-through cable - The straight-through cable is used to
connect dissimilar devices such as Host to switch or hub, Router
to switch or hub. In this only pins 1, 2, 3 and 6 are used. We
connect 1 to 1, 2 to 2, 3 to 3, and 6 to 6 to make a straight
through cable

Crossover cables - These are very similar to straight-through cables,


except that in crossover cables the pairs of wires are crisscross which
allows two devices to communicate at the same time. Unlike straight-
through cables, we use crossover cables to connect similar devices. It is
used to connect router to a router, switch to switch, host to host, hub to
hub, hub to switch, router direct to host. In crossover cable 4 pins are used
(1, 2, 3, and 6) here we connect pins 1 to 3 and 2 to 6 on each side of the
cable.

Rollover Cable - Although it is not used to connect any Ethernet


connections but we can use a Rollover cable to connect a
computer to the console port or auxiliary port of the router for
administration purposes. Eight wires are used in this cable to
connect serial devices and the order of the wires from one end of
the cable to the other are totally reversed, or rolled over. A
rollover cable is also known as a console cable.

What is Ethernet?
Ethernet is a data link and physical layer specification that allows
all hosts on a network to share the same bandwidth of a link. It is
dominating technology used in LAN networking for controlling
access to a shared network medium.

Explain CSMA/CD?
Carrier Sense Multiple Access with Collision Detection
(CSMA/CD), is a protocol used to prevent collisions by enabling
devices share the bandwidth evenly without allowing two devices
transmit at the same time on the network.

What is ARP?
Address Resolution Protocol (ARP) is a network protocol, which is used to
map a network layer protocol address (IP Address) to a data link layer
hardware address (MAC Address). In short, ARP resolves IP address to
the corresponding MAC address of the device.
Explain the use of ARP?
If a host in a network wants to communicate with another host, it can
communicate only if it knows the MAC address of other host. ARP is used
to get the Mac address of a host from its IP address.
What is an ARP Table (cache)?
ARP maintains a table that contains the mappings between IP address and
MAC address. This table is called ARP Table.
What is the Source & Destination IP address in ARP Request and
ARP Reply packet?
ARP Request
Source - Mac address of host sending the ARP request. (Senders MAC
address)
Destination - FF:FF:FF:FF:FF:FF (Broadcast)
ARP Reply
Source - Mac address of host replying for ARP Request.
Destination - Mac address of host which generated the ARP request initially
(unicast).
How can we differentiate between an ARP Request packet and ARP
Reply packet?
We can differentiate ARP request packet from an ARP reply packet using
the 'operation' field in the ARP packet. For ARP Request it is 1 and for ARP
Reply it is 2.
What is the size of an ARP Request and ARP Reply packet?
The size of an ARP request or ARP reply packet is 28 bytes.
What is Proxy ARP?
Proxy ARP is the process in which one device responds to the ARP request
for another device.
Example - Host A sends an ARP request to resolve the IP address of Host
B. Instead of Host B, Host C responds to this ARP request.
What is Gratuitous ARP? Why it is used?
When a host sends an ARP request to resolve its own IP address, it is
called Gratuitous ARP. In the ARP request packet, the source IP address
and destination IP address are filled with the same source IP address itself.
The destination MAC address is the broadcast address
(FF:FF:FF:FF:FF:FF).
Gratuitous ARP is used by the host after it is assigned an IP address by
DHCP Server to check whether another host in the network does not have
the same IP address. If the host does not get ARP reply for a gratuitous
ARP request, it means there is no another host which is configured with the
same IP address. If the Host gets ARP reply than it means another host is
also configured with the same IP address.
What is Reverse ARP?
Reverse ARP is used to obtain device's IP address when its MAC address
is already known.
What is Inverse ARP?
Inverse ARP dynamically maps local DLCIs to remote IP addresses when
Frame Relay is configured.
What is IP address and it's format?
An IP address is a software address assigned to each machine on an IP
network. It specifies the location of a device on the network. It allows hosts
on one network to communicate with the host on a different network.
It is 32 bits of information. These 32 bits are divided into four sections
referred to as octets or bytes. Each octet contains 1 byte (8 bits).
An IP address can be depicted using one of three methods: -
1. Dotted - decimal, example - 172.16.30.56
2. Binary - 10101100.00010000.00011110.00111000
3. Hexadecimal - AC.10.1E.38
What are the different Classes of IP address and give the range of
each class?
There are five classes of IP addresses: -
Class A - 0 to 127 (0 & 127 cannot be used)
Class B - 128 to 191
Class C - 192 to 223
Class D - 224 to 239 (MULTICAST ADDRESSES)
Class E - 240 to 255 (RESEARCH & DEVELOPMENT)
Class A addresses 127.0.0.0 to 127.255.255.255 are reserved for
loopback addresses.
What are Private addresses and Give range of Private Addresses?
These addresses can be used only on private network. They cannot be
routed through the internet. Private IP addresses are designed for security
and they also save valuable IP address space.
Class A - 10.0.0.0 to 10.255.255.255
Class B - 172.16.0.0 to 172.31.255.255
Class C - 192.168.0.0 to 192.168.255.255

Visit: http://www.smashwords.com/books/view/661064 to purchase this book to continue reading. Show the


author you appreciate their work!

Das könnte Ihnen auch gefallen