THE NETWORKING INTERVIEW QUESTION AND ANSWER



THE NETWORKING INTERVIEW QUESTION AND ANSWER
 
What is backbone network?


A backbone network is a centralized infrastructure that is designed to distribute different routes and data to various networks. It also handles management of bandwidth and various channels.

What are routers?

Routers can connect two or more network segments. These are intelligent network devices that store information in its routing table such as paths, hops and bottlenecks. With this info, they are able to determine the best path for data transfer. Routers operate at the OSI Network Layer.

What is anonymous FTP?

Anonymous FTP is a way of granting user access to files in public servers. Users that are allowed access to data in these servers do not need to identify themselves, but instead log in as an anonymous guest.

What is the maximum length allowed for a UTP cable?

A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can be overcome by using repeaters and switches.

Describe Network Topology

Network Topology refers to the layout of a computer network. It shows how devices and cables are physically laid out, as well as how they connect to one another.

Briefly describe NAT.

NAT is Network Address Translation. This is a protocol that provides a way for multiple computers on a common network to share single connection to the Internet.

How does a network topology affect your decision in setting up a network?

Network topology dictates what media you must use to interconnect devices. It also serves as basis on what materials, connector and terminations that is applicable for the setup.

What are different ways of securing a computer network?

There are several ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls are setup and configured properly. User authentication will also help a lot. All of these combined would make a highly secured network.

What is WAN?

WAN stands for Wide Area Network. It is an interconnection of computers and devices that are geographically dispersed. It connects networks that are located in different regions and countries.

How many layers are there under TCP/IP?

There are four layers: the Network Layer, Internet Layer, Transport Layer and Application Layer.

What is the function of the OSI Session Layer?

This layer provides the protocols and means for two devices on the network to communicate with each other by holding a session. This includes setting up the session, managing information exchange during the session, and tear-down process upon termination of the session.

What does 10Base-T mean?

The 10 refers to the data transfer rate, in this case is 10Mbps. The word Base refers to base band, as oppose to broad band. T means twisted pair, which is the cable used for that network.

What is NOS?

NOS, or Network Operating System, is specialized software whose main task is to provide network connectivity to a computer in order for it to be able to communicate with other computers and connected devices.

What is OSI and what role does it play in computer networks?

OSI (Open Systems Interconnect) serves as a reference model for data communication. It is made up of 7 layers, with each layer defining a particular aspect on how network devices connect and communicate with one another. One layer may deal with the physical media used, while another layer dictates how data is actually transmitted across the network.

What is the advantage of address sharing?

By using address translation instead of routing, address sharing provides an inherent security benefit. That’s because host PCs on the Internet can only see the public IP address of the external interface on the computer that provides address translation and not the private IP addresses on the internal network.

What is the equivalent layer or layers of the TCP/IP Application layer in terms of OSI reference model?

The TCP/IP Application layer actually has three counterparts on the OSI model: the Session layer, Presentation Layer and Application Layer.

What is the main purpose of OSPF?

OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to determine the best possible path for data exchange.

Describe star topology

Star topology consists of a central hub that connects to nodes. This is one of the easiest to setup and maintain.

What is the disadvantage of a star topology?

One major disadvantage of star topology is that once the central hub or switch get damaged, the entire network becomes unusable.
Give some examples of private network addresses.
10.0.0.0 with a subnet mask of 255.0.0.0 172.16.0.0 with subnet mask of 255.240.0.0 192.168.0.0 with subnet mask of 255.255.0.0

What are the functions of a network administrator?

A network administrator has many responsibilities that can be summarize into 3 key functions: installation of a network, configuration of network settings, and maintenance/troubleshooting of networks.

What is Hybrid Network?

A hybrid network is a network setup that makes use of both client-server and peer-to-peer architecture.

What is the main job of the ARP?

The main task of ARP or Address Resolution Protocol is to map a known IP address to a MAC layer address.

How can you manage a network using a router?

Routers have built in console that lets you configure different settings, like security and data logging. You can assign restrictions to computers, such as what resources it is allowed access, or what particular time of the day they can browse the internet. You can even put restrictions on what websites are not viewable across the entire network.

What is the use of a default gateway?

Default gateways provide means for the local networks to connect to the external network. The default gateway for connecting to the external network is usually the address of the external router port.

What is the proper termination rate for UTP cables?

The proper termination for unshielded twisted pair network cable is 100 ohms.

What is the number of network IDs in a Class C network?

For a Class C network, the number of usable Network ID bits is 21. The number of possible network IDs is 2 raised to 21 or 2,097,152. The number of host IDs per network ID is 2 raised to 8 minus 2, or 254.

What common software problems can lead to network defects?

Software related problems can be any or a combination of the following: - client server problems - application conflicts - error in configuration - protocol mismatch - security issues - user policy and rights issues

What is Ping?

Ping is a utility program that allows you to check connectivity between network devices on the network. You can ping a device by using its IP address or device name, such as a computer name.

What is DNS?

DNS is Domain Name Server. The main function of this network service is to provide host names to TCP/IP address resolution.

What is the difference between a hub and a switch?

A hub acts as a multiport repeater. However, as more and more devices connect to it, it would not be able to efficiently manage the volume of traffic that passes through it. A switch provides a better alternative that can improve the performance especially when high traffic volume is expected across all ports.

What are the maximum networks and hosts in a class A, B and C network?

For Class A, there are 126 possible networks and 16,777,214 hosts For Class B, there are 16,384 possible networks and 65,534 hosts For Class C, there are 2,097,152 possible networks and 254 hosts

What protocols fall under the Application layer of the TCP/IP stack?

The following are the protocols under TCP/IP Application layer: FTP, TFTP, Telnet and SMTP.

What is ipconfig?

Ipconfig is a utility program that is commonly used to identify the addresses information of a computer on a network. It can show the physical address as well as the IP address.

What is client/server?

Client/server is a type of network wherein one or more computers act as servers. Servers provide a centralized repository of resources such as printers and files. Clients refers to workstation that access the server.

When you move the NIC cards from one PC to another PC, does the MAC address gets transferred as well?

Yes, that’s because MAC addresses are hard-wired into the NIC circuitry, not the PC. This also means that a PC can have a different MAC address when the NIC card was replace by another one.

In a network that contains two servers and twenty workstations, where is the best place to install an Anti-virus program?

An anti-virus program must be installed on all servers and workstations to ensure protection. That’s because individual users can access any workstation and introduce a computer virus when plugging in their removable hard drives or flash drives.


What are some drawbacks of implementing a ring topology?

In case one workstation on the network suffers a malfunction, it can bring down the entire network. Another drawback is that when there are adjustments and reconfigurations needed to be performed on a particular part of the network, the entire network has to be temporarily brought down as well.

What is SMTP?

SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all Internal mail, and provides the necessary mail delivery services on the TCP/IP protocol stack.

What is the importance of Encryption on a network?

Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back or decrypted back to its normal readable format using a secret key or password. Encryption help ensure that information that is intercepted halfway would remain unreadable because the user has to have the correct password or key for it.

Explain the importance of authentication.

Authentication is the process of verifying a user’s credentials before he can log into the network. It is normally performed using a username and password. This provides a secure means of limiting the access from unwanted intruders on the network.

What are the different technologies involved in establishing WAN links?

Analog connections – using conventional telephone lines; Digital connections –using digital-grade telephone lines; switched connections – using multiple sets of links between sender and receiver to move data.

When troubleshooting computer network problems, what common hardware-related problems can occur?

A large percentage of a network is made up of hardware. Problems in these areas can range from malfunctioning hard drives, broken NICs and even hardware startups. Incorrectly hardware configuration is also one of those culprits to look into.

How does dynamic host configuration protocol aid in network administration?

Instead of having to visit each client computer to configure a static IP address, the network administrator can apply dynamic host configuration protocol to create a pool of IP addresses known as scopes that can be dynamically assigned to clients.

What is sneakernet?

Sneakernet is believed to be the earliest form of networking wherein data is physically transported using removable media, such as disk, tapes.

What protocols fall under the TCP/IP Internet Layer?

There are 4 protocols that are being managed by this layer. These are ICMP, IGMP, IP and ARP.

What is one basic requirement for establishing VLANs?

A VLAN requires dedicated equipment on each end of the connection that allows messages entering the Internet to be encrypted, as well as for authenticating users.

What is RSA algorithm?

RSA is short for Rivest-Shamir-Adleman algorithm. It is the most commonly used public key encryption algorithm in use today.


What is the maximum segment length of a 100Base-FX network?

The maximum allowable length for a network segment using 100Base-FX is 412 meters. The maximum length for the entire network is 5 kilometers.

If you are a victim of Denial of Service (Dos) then what you do?

The function of a denial of service attack is to flood its target machine with too much traffic and prevents it from being accessible to any other requests or providing services.
To prevent DoS attacks firewall can be configured as a relay; in this approach the firewall responds on behalf of the internal host. During the attack, the firewall responds to the SYN sent by the attacker; since the ACK never arrives, the firewall terminates the connection. By Keeping protocols and Antivirus software up-to-date, we can prevent to be a victim of DoS. A regular scanning of the machine is also necessary in order to detect any “anomalous” behavior.

Comment on Data Encryption Standard (DES) weakness and strength.

The Data Encryption Standard (DES) is a symmetric key block cipher which takes 64-bit plaintext and 56-bit key as an input and produces 64-bit cipher text as output. The DES function is made up of P and S-boxes. P-boxes transpose bits and S-boxes substitute bits to generate a cipher.

Strength- The strength of DES lies on two facts:

The use of 56-bit keys: 56-bit key is used in encryption, there are 256 possible keys. A brute force attack on such number of keys is impractical. The nature of algorithm: Cryptanalyst can perform cryptanalysis by exploiting the characteristic of DES algorithm but no one has succeeded in finding out the weakness.

Weakness- Weakness has been found in the design of the cipher:

Two chosen input to an S-box can create the same output. The purpose of initial and final permutation is not clear.

What are Brute Force Attacks?

Brute forcing is a mechanism which is used by an attacker to break the encryption of data by applying a set of various key. Cryptanalyst has a set of number of keys and apply them one by one to the encryption algorithm until he get the right key.

How do you use RSA for both authentication and secrecy?

RSA is a public key encryption algorithm. The RSA algorithms are based on the mathematical part that it is easy to find and multiply large prime numbers together, but it is extremely difficult to factor their product.

For authentication: One can encrypt the hash (MD4/SHA) of the data with a private key. This is known as digital signature.

For Secrecy: Secrecy/confidentiality is achieved by encrypting the data with public key and decrypting with private key.

Can you differentiate among encoding, encryption and hashing?

Encoding: Basically encoding is used to protect the integrity of data as it crosses through communication network to keep its original message upon arriving. It is primarily an insecure function because it is easily reversible.

Encryption: Encryption is basically designed for confidentiality and data integrity and reversible only if you have the appropriate key.

Hashing: With hashing the operation is one-way i.e. non-reversible. It takes an input (or ‘message’) and returns a fixed-size string, which is called the hash value.

If you have to generate a hash function then what characteristics are needed in a secure hash function?

A secure hash function should have the following characteristics:

i. The output generated by a hash function should be of a fixed length.

ii. It should be very easy to find out a hash function for a given message.

iii. If a hash value is given of a message than it is almost impossible to get that message.

iv. The two different messages should not have the same hash value; it is against the hash function property.

What is digital signature? Differentiate between Physical and Digital Signature

A digital signature is an electronic analogue of a written signature; the digital signature can be used to provide assurance that the claimed signatory signed the information. Digital signature is used to detect the integrity of signed data. We can differentiate between physical and digital signature as:

i. Physical signature is just writing on paper but digital signature includes crucial parameters of identification.

ii. Physical signature can be coped but it is impossible to copy a digital signature.

iii. Physical signature does not give any privacy to content but digital signature enables encryption and thus privacy.

What is Authentication Header and how it provides the protection to IP header?

Basically Authentication Header protects IP header and provides the complete authenticity to the IP packets.

AH may work in two ways: transport mode and tunnel mode.

In tunnel mode; AH protects the IP header using two IP header layers inner and outer. Inner IP header is used to contain the source and destination addresses, and the outer IP header is used to contain the security gateway information.

Explain SSL Protocol. How does it protect internet users from various threats?

The SSL protocol (Secure Socket Layer protocol) was originally developed by Netscape, to ensure security of data transported and routed through HTTP, LDAP or POP3 application layer.

SSL uses TCP as a communication layer to provide a reliable end-to-end secure and authenticated connection; which helps internet users to protect from various threats. SSL Record protocol is used to ensure the data security and integrity.

What is PIX firewall security? How does it differ from a firewall?

PIX (Private Internet Exchange)

It is a popular IP firewall and NAT (Network Address Translation) appliance.

PIX firewall security is developed by Cisco Systems.

PIX firewall is used to protect your network with a stateful packet filtering firewall.

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications.

What are Malware? Explain different types of Malware

Malware is a software program which is developed to destroy a computer system. These programs runs in victim’s computer without any information to the victim, i.e. victim do not know that someone hacked his system.

Different types of malware are: worm, Trojans Horse, Rootkits.

Worm: Worm is a computer program which makes its copy again and again in the victim’s computer. They damage the network by using a lot bandwidth.

Trojan Horses: Trojan horse consists of two parts, server and client. Server is an executable file which runs on victim’s computer and attacker may take the full control of the victim’s computer.

Rootkits: Rootkits are used to hide the malicious processes from active process

What are replay attacks? Give an example of replay attack

Replay attacks are the network attacks in which an attacker spies the conversation between the sender and receiver and takes the authenticated information e.g. sharing key and then contact to the receiver with that key. In Replay attack the attacker gives the proof of his identity and authenticity.

Example:
Suppose in the communication of two parties A and B; A is sharing his key to B to prove his identity but in the meanwhile Attacker C eavesdrop the conversation between them and keeps the information which are needed to prove his identity to B. Later C contacts to B and prove its authenticity.

If you have to ‘encrypt’ as well as ‘compress’ data during transmission then which would you do first and why?

Data should be transmitted over any communication network in such a way that the data integrity and authenticity should be maintained, for this first compress the data and then encrypt the data.

The reason behind it is; if you encrypt first you will have nothing but random data to work with, which will destroy any potential benefit from compression.

What is the goal of Information Security in an organization?

Mainly there are three Information security goals in an organization: Confidentiality, Integrity and Availability.

Confidentiality: Confidentiality means maintaining secrecy during transmission of information.

Integrity: Integrity means changes made in the stored information need to be done only by authorized entities and through authorized mechanism.

Availability: Information is useless if it is not available. Availability means information created and stored should be available to authorized entities.

What is Symmetric-Key cryptography and Asymmetric-Key cryptography?

Symmetric-Key Cryptography: Symmetric-key cryptography uses a single key for both encryption and decryption. Encryption and decryption algorithm are inverse of each other.

Example:

To create the ciphertext from the plaintext John uses an encryption algorithm and a key. To create the plaintext from ciphertext, Bob uses the decryption algorithm and the same key.

Asymmetric-Key cryptography: It is also called public key cryptography. In public key cryptography two keys: a private key and a public key is used. Encryption is done through the public key and decryption through private key. Receiver creates both the keys and is responsible for distributing its public key to the communication community.

Example:

The sender (say John) uses the public key to encrypt the plaintext into ciphertext and the receiver (say Bob) uses his private key to decrypt the ciphertext.

Explain the services provided by IP (Internet Protocol) - Addressing, Fragmentation, Packet timeouts and options

1. Addressing: For the purpose of delivering data-gram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP. As IP operates in an internet, its systems are designed to accept the addressing of devices which are unique.

2. Fragmenting: The datagram packets are sent to the data link layer for the purpose of transmission on the network. The physical network frame size that uses IP may be different. To resolve this, IP fragments the datagram into certain pieces. So that, each piece can be carried on the network. The receiving systems use these pieces and reassemble the whole IP datagram again.

3. Packet timeouts: A timeout packet is the time for waiting next instruction from the command station. If the command is not sent by the station, it shuts down.

Explain the classes of IP address

IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format. Every number in each class is represented as binary to computers.

The four numbers in an IP address are known as ‘octets’. Each of them has eight bit positions. The octets are divided into two sections: Net and Host. The first octet represents Net for identifying the network and the Host contains the last octet. There are five IP classes.

Class A: The class A is used for very large networks. There are 1 to 126 are part of this class. That means there are 126 Class A networks. Class A networks accounts for half of the total available IP addresses.

Class B: It is used for medium size networks. The IP address with a first octet from 128 to 191 is part of this class. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.

Class C: Class C is used for small to middle size networks. IP address with a first octet starts from 192-223. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.

Class D: It has first, second and third bit value as 1 and the fourth bit as 0. The other 28 bits are used for identifying the group of computers which is intended for multicast messages.

Class E: Class E is used for identification purpose. The four bits value is 1. The other 28 bits are used for identifying the group of computers which is intended for multicast messages.

Define Broadcast, Unicast and Multicast.

Unicast: A term used in communication to describe a piece of information to send from one point to another. There are only sender and receiver. All LANs support unicast transfer mode and most applications that employ TCP transport protocol uses unicast messaging.

Broadcast: A term used for describing communication that is sent a piece of information from one point to all other points. There is one sender and multiple receivers. All LANs support broadcast transmission.

Multicast: A term described in communicating a piece of information sent from one or more points to a set of other points. The senders and receivers are one or more.

What is Network Mask?

A network mask is used for determination of what subnet an IP address belongs to. An IP address has network address and the host address. The first two numbers represents the network address and the second two numbers represents the host of the network.


Define Subnetting.

A subnet describes a set of networked computers which have common IP address routing prefix.

Breaking the networking into smaller and more efficient subnets is known as subnets. Subnetting prevents Ethernet packet collision which has excessive rates in a large network. Routers are used to manage the traffic and constitute borders among subnets.

What is the User Datagram Protocol (UDP)?

User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol, with out using prior communications for setting up special transmission paths. An unreliable service is provided by UDP which makes the datagram packets may arrive irrespective of order. UDP is a better solution for time-sensitive applications due to the reason ‘dropping packets is preferable to use delayed packets’. Its stateless nature makes the server to answer smaller queries to huge number of clients.

Explain TCP Windowing concept.

TCP Windowing is a concept that is used for avoiding congestion in the network traffic. Unacknowledged amount of data that is sent by the sender before the data gets acknowledgment back from the receiver that it has received it is controlled.

What is the Domain Name System (DNS)? What are the advantages of it?

A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet. Various information with domain names is assigned to each of the participants. DNS translates the names of domain into meaningful to humans into binary identifiers that are associated with the equipment of network to locate and address these devices.

Advantages:

More Reliable: Delivers messages to the users with zero downtime.

Faster: DNS are connected well at intersections of internet. Any cast technology enables requests are answered to the next closest node in the case of maintenance or downtime.

Smarter: Automatic corrections of typos.


What is the TTL (Time to Live)? Why is it required?

TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded. Usually, data packets might not be transmitted to their intended destination within a stipulated period of time. The TTL value is set by a system default value which is an 8-bit binary digit field in the header of the packet. The purpose of TTL is, it would specify certain time limit in seconds, for transmitting the packet header. When the time is exhausted, the packet would be discarded. Each router receives the subtracts count, when the packet is discarded, and when it becomes zero, the router detects the discarded packets and sends a message, Internet Control Message Protocol message back to the originating host.

Explain the use of Internet Control Message Protocol (ICMP).

Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers, for the purpose of sending error messages, for example, a requested service is unavailable or the host could not be reached. It is not directed by the network applications. ICMPs are utilized by routers, hosts for communicating the updates or error information to other routers.

What is the use of IGMP protocol?

Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups. The mechanism also allow a host to inform its local router, that it wants to receive messages.

What are Ping and Tracert?

Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets. Ping I particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address Tracert is called as trace route. It is used to track or trace the path the packet takes from the computer where the command is given until the destination. In windows ping command is written as tracert ip_address

Explain RSVP. How does it work?

Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network. This is done by carrying the request (that needs a reservation of the resource) of the host throughout the network. It visits each node in the network. RSVP used two local modules for reservation of resources. Admission control module confirms if there are sufficient available resources while policy module checks for the permission of making a reservation. RSVP offers scalability. On a successful completion of both checks RSVP uses the packet classifier and packet scheduler for the desired Qos requested.

Explain the concept of DHCP.

Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The IP addresses are assigned dynamically. Certainly, using DHCP, the computer will have a different IP address every time it is connected to the network. In some cases the IP address may change even when the computer is in network. This means that DHCP leases out the IP address to the computer for sometime. Clear advantage of DHCP is that the software can be used to manage IP address rather than the administrator.

What are the differences between a domain and a workgroup?

In a domain, one or more computer can be a server to manage the network. On the other hand in a workgroup all computers are peers having no control on each other. In a domain, user doesn’t need an account to logon on a specific computer if an account is available on the domain. In a work group user needs to have an account for every computer. In a domain, Computers can be on different local networks. In a work group all computers needs to be a part of the same local network.

Explain how NAT works.

Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is maintained for global to local and local to mapping of IP’s. NAT can be statically defined or dynamically translate from a pool of addresses. The NAT router is responsible for translating traffic coming and leaving the network. NAT prevents malicious activity initiated by outside hosts from reaching local hosts by being dependent on a machine on the local network to initiate any connection to hosts on the other side of the router.

What is PPP protocol? Explain PPP packet format.

Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host. PPP also provides authentication. PPP operates by sending Request packets and waiting for Acknowledge packets that accept, reject or try to change the request. The protocol is also used to negotiate on network address or compression options between the nodes.

Packet format:-

Flag field: 1 byte: - Indicates frames beginning or end Address field: 1 byte: - Used for broadcast address (destination address) Control field: 1 byte: - Used as a control byte Protocol field: - 1 or 2 bytes: - Setting of protocol in information field (of datagram) Information: - 0 or more bytes: - Datagram (whether it contains data or control information) Padding: - 0 or more bytes: - optional padding FCS: - 2 or more bytes: - error check sum

What is IP Spoofing and how can it be prevented?

IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. This is done by forging the header so it contains a different address and make it appear that the packet was sent by a different machine.

Prevention:-Packet filtering: - to allow packets with recognized formats to enter the network Using special routers and firewalls. Encrypting the session

What is an application gateway?

An application gateway is an application program that runs on a firewall between two networks. An application gateway is used for establishing connection between client program and destination service. The client negotiates with the gateway to communicate with the service of destination. Here, gateway can be called as a proxy. Hence, two connections are made. One between client and proxy; other, between proxy and destination service. Connections take place behind the firewall

What is 'Gateway Of Last Resort'?

A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to transmit the IP packet. Known routes are present in the routing table. Hence, any route not known by the routing table is forwarded to the default route. Each router which receives this packet will treat the packet the same way, if the route is known, packet will be forwarded to the known route.

What is Router? Explain components of Routers.

The way switches connect multiple computers, a router connects multiple networks. Routers comprise of data consisting of large tables of networks and addresses. Routers use algorithms to determine the shortest route to an address in a network.

Explain different layers in the OSI model.

Application Layer:

Closest to the end user Interact directly with the software application.

Presentation Layer:

Translates application to network format, and vice versa Works to transform data into the form that the application layer can accept Formats and encrypts data to be sent across a network

Session Layer

Controls the connections between computers Establishes, manages and terminates the connections between the local and remote application. Provides full-duplex, half-duplex, or simplex operation Establishes checkpointing, adjournment, termination, and restart procedures

Transport Layer:

Provides transparent transfer of data between end users Providing reliable data transfer services to the upper layers Controls the reliability of a given link through flow control, segmentation /desegmentation, and error control.

Network Layer

Provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks Performs networkrouting functions Performs fragmentation and reassembly, and report delivery errors.

Data Link Layer

Provides the functional and procedural means to transfer data between network entities Detects and corrects errors that occur in the Physical Layer.

Physical Layer:

Defines the electrical and physical specifications for devices.

What is IP Multicasting?

It is an IP address that identifies a particular group of hosts in network. This group of hosts is called a multicast group.

What is Subneting? Explain the advantages of using Subneting.

Subneting is dividing a network into several subnets. This is usually done for the following purposes:

Reducing network traffic by decreasing the number of broadcasts Exceeding the limitations in a local area network Enabling people to connect to the network remotely without opening the entire network

What is VLSM, Variable length subnet masking?

VLSM is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule.

Explain the concepts and capabilities of IP Datagram.

Data transmitted over an internet using IP is carried in messages called IP datagrams. Like all network protocol messages, IP uses a specific format for its datagrams.

The IPv4 consists of the following fields:

Version: the version of IP used to generate the datagram. For IPv4, this is of course the number 4 Internet Header Length: Specifies the length of the IP header, in 32-bit words. Type of service: information to provide quality of service features Total Length Identification: it can be used if the datagram must be fragmented by a router during delivery and then for reassembling. Flags: (Don’t Fragment, More Fragment) Fragment Offset: When fragmentation of a message occurs, this field specifies the offset, or position. Time to Live: specifies how long the datagram is allowed to “live” Protocol: ICMP, TCP, UDP, etc Header Checksum: to provide basic protection against corruption in transmission. Source Address Destination Address Options Padding: if number of bits used for options is not a multiple of 32, then paddin is added Data

What is MAC address?

Media Access Control address is an identifier for assigned to most network adapters or Network Interface Cards by the manufacturer for the purpose of identification. MAC address is used in MAC protocol sub layer. MAC address is usually encodes the registered identification number that is registered by the manufacturer. The numbering spaces managed by the IEEE, which are common for formulating a MAC address: MAC-48, EUI-48 and EUI-64.

Explain the function of Transmission Control Block

Hort for trusted computing base. TCB refers to the totality of protection mechanisms (hardware, firmware and software) that provide a secure computing environment. The TCB includes everything that must be trusted --access control, authorization and authentication procedures, cryptography,firewalls, virus protection, data backup, and even human administration -- in order for the right level of security to work.

Difference between bit rate and baud rate?

Bit rate is no. of bits transmitted during one second. baud rate is max. no of times the signal is change per second.

What is the difference between tree and forest?

A tree start whenever you install the first domain controller and a tree may consist a single domain or multiple domain arranged in structure called child or grand child which will inherit name from its parent. When we install first domain controller a new domain ,anew tree and a new forest begins.In a new forest you can have single tree or multiple tree.

What is NETBIOS and NETBEUI?

NETBIOS: basic input and output system.It is a non-routable protocol. NETBEUI:Netbeui is the protocol that is is responsible for data transport.does handle all the frame formatting that is not handled by netbios.

What is RIP (Routing Information Protocol)?

Rip (routing information protocol) their are two type .class full and classless protocol.is a distance vector protocol selecting nearest best path count a hope 0 to 15.

What is the difference between TFTP and FTP application layer protocols?

FTP is connection oriented, where as TFTP is not. TFTP uses error checking and flow control, where as TFTP does not cause error checking.

FTP uses TCP as transport protocol, where as TFTP uses UDP as transport protocol. Authentication is mandatory in FTP, where as authentication is not needed in TFTP.

Just getting and putting application effectively is the design concern of TFTP, where as FTP provides more control and data connection aspects.

how drivers are selected and implemented for various network components.

Drivers are selected for Network components as per their performance and capacity to carry the signals accross the network and it also depends on the performance of the drivers of Networks selected, that should be robust and easy to implement and secure.

Difference between the communication and transmission?

Transmission can be looked into as an issue of lower layers like physical layer, while communication is an activity about which user is concerned and is related with application layer activity. transmission looks at the actual techniques used for data transfer whereas communication looks at user aspects and deals with whole messages instead of raw bits.

What are 10Base2, 10Base5 and 10BaseT Ethernet LANs ? 
 10Base5: means transmission speed 10 Mbps, coaxial cable, maximum segment length 500 metre, network length 2500 metre, minimum distance between node 2.5 metre. 10Base2: means transmission speed 10 Mbps, coaxial cable, maximum segment length 185 metre, network length 925 metre, minimum distance between node 0.5 metre 10BaseT: means transmission speed 10 Mbps, UTP(unshielded twisted pair)cat 3,4,5, maximum segment length 100 metre, network length 500 metre

How can we create VPN to connect to branch office of the same office.what would be the priliminary requirment? First of all what is VPN." VPN " stand for Virtual Private Network .Next how it works and where it is used . VPN works when the IP Conficts and IP is conflict because we dont use the PUBLIC IP means the IP we use is may be used by onther Company or Branch then we use VPN it works in the MAC address principal means it doesnot work on the IP it works Over the IP . And COMPUTER ,INTERNET or INTRANET, DHCP is required for the VPN .

What is difference between baseband and broadband transmission?

In a base-band transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.

What is piggy backing?

The technique of temporarily delaying outgoing acknowledgement so that it can hooked on to the next outgoing data frames is called piggybacking.. the advantage of using piggybacking is the better utilization of available channel bandwidth..

What are Digrams and Trigrams?

The most common two letter combinations are called as diagrams. e.g. th, in, er, re and an. The most common three letter combinations are called as trigrams. e.g. the, ing, and, and ion.

What is frame relay, in which layer it comes?

FRAME RELAY is packet-switching protocol for connecting devices on a Wide Area Network (WAN). Frame Relay networks in the U.S. support data transfer rates at T-1 (1.544 Mbps) and T-3 (45 Mbps) speeds. In fact, you can think of Frame Relay as a way of utilizing existing T-1 and T-3 lines owned by a service provider. Most telephone companies now provide Frame Relay service for customers who want connections at 56 Kbps to T-1 speeds. (In Europe, Frame Relay speeds vary from 64 Kbps to 2 Mbps. it operats at datalink layer os osi model

What is region?

When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.

when hierarchical routing is used,the routers are divided into what we call regions,with each router knowing all the details about how to route packets to destinations within its own region,but knowing nothing about the internal structure of other regions.

What is SLIP (Serial Line Interface Protocol)?

It is a very simple protocol used for transmission of IP datagrams across a serial line.

What is terminal emulation, in which layer it comes?

Telnet is also called as terminal emulation. It belongs to application layer.

What is BGP (Border Gateway Protocol)?

It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol).

What is NVT (Network Virtual Terminal)?

It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.

What is IGP (Interior Gateway Protocol)?

In contrast an Exterior Gateway Protocol (EGP) is for determining network reachability between autonomous systems and makes use of IGPs to resolve routes within an AS.

What is virtual path?

Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.

What is the difference between physical address and logical address?

Simply physical address known as hardware address.IP address is known as logical address.Physical address is used for identify the PC on network and IP is used for identify the network on the PC mac address 48 bit address IP address 32 bit address.

Describe a 3-way TCP/IP Handshake.

(1) first time check that destination port is present on network yes or no (2) second time check that port is on or off and it receive request on port. (3) send message of destination side that sender side is ready for connection.

What are the difference between node,host,terminal,system,hub?

These are all different things in networking. Hub:Where we connect all the the links for a networking connection. Node:It can be identified as a one connection. Host:is nothing than if you are going to send a request to the server the questioned system can be know as a host.

WHAT IS DIFFERENCE BETWEEN DIAL-UP INTERNET CONNECTION AND BROADBAND CONNECTION?

Dial up connection is just like telephone ,anyone wants to talk to someone have to dial a number talk to the person and disconnect the phone, it also requires a username/password & a modem to connect to internet.The speed of net is variable and sometimes its upto 56kbps . In this either the phone or the internet will work at a time. We can't use both simultaneously internet and phone. While in broadband connection , its also requires a modem & may need user/password.It is directly connected with LAN card and/or by wireless also can be adopted for the same. In this we can simultaneously work on internet and on phone.Its speed ranges from 256kbps to several mbps.

What is a difference between switch and Hub?

hub:Each port of hub is collision domain&broadcast domain switch:each port of switch is collision domain & each vlan is broadcast domain

1.explain 7 osi layers briefly. 2.define router,gateways,brouter. 3.explain abt encryption & decryption.

OSI layers are same as the above. Routers are devices which routes packets from source to destination. Gateways are the entry ports or the entry gates through which packets enter. Encryption is a process of converting plain text to cipher(encoded) text. Decryption is cipher to plain.

What is difference between ARP and RARP?

The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver.

The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.

ARP-Address resulution protocol Used to find the physical address if it knows the logical address.

RARP-Reverse address resolution protocol Used to find the logical address if it knows the physical address.

What do you meant by "triple X" in Networks?

The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X".

What are the possible ways of data exchange?

(i) Simplex

(ii) Half-duplex

(iii) Full-duplex.

Why should we care about the OSI Reference Model ? What is the main purpose for creating this osi model? why it is a layered model?

The main aim to design the OSI model is that actully they want to set a standerd for the communication and want to standarized the network equipement so that they would not be any Brand consuines

ISO stands International Standards Organization established 1940's and ISO developed OSI means Open System Interconnection model for communication at 1970's. It is a layerd model. Advantages of layered model is 1.complexity can be reduced. 2. Modifications can be achieved without affecting higher and lower layers.

What is Protocol Data Unit?

The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame).

What is a Multi-homed Host?

It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host.

The host has multiple interfaces and each interface has one, or more, IP addresses. If one of the links fails, then its IP address becomes unreachable, but the other IP addresses will still work.

What is a Management Information Base (MIB)

A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device's status, its performance, connections, and configuration. The MIB is queried by SNMP.
Why should you care about the OSI Reference Model?

OSI model is a reference model that explains how a network device should behave in its position(layer). and also explains how the data will move in the network at different layers this helps to easily locate the troubles in network to over come the problem and also gives a standard for the devices with which the different vendors can inter operate.

What is attenuation?

Attenuation means signal loose some of its energy during transmission. so we need to amplify the signal before it becomes very weak.

What is the HELLO protocol used for?

The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol.

What is redirector?

Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer.

The two types of transmission technology available are Analog and the Digital technology.

Whatz the difference between DNS and WINS?

DIFFRENTS BETWEEN DNS AND WINS. DNS STANDS FOR DOMAIN NAMING SERVICE WHICH IS USED TO RESOLVE THE IP ADDRESS TO NAME & NAME TO IP ADDRESS. WINS STANDS FOR WINDOWS INTER NETWORK SERVICES. WHICH IS USED TO CONVERT NETBIOS NAME TO IP ADDRESS. WINS WORKS ONLY IN WINDOWS ENVIORNMENT.


What is subnetting?Why is it used?

A portion of a network that shares a common address component. On TCP/IP networks, subnets are defined as all devices whose IP Address have the same prefix.

What is the range of addresses in the classes of internet addresses?

class A 0.0.0.0 126.255.255.255 class B 128.0.0.0 191.255.255.255 class c 192.0.0.0 223.255.255.255 class D 224.0.0.0 239.255.255.255 class E 240.0.0.0 255.255.255.255

What is Kerberos?

It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.

kerberos is a network authentication protocol which utilize symmetric cryptography to provide authentication for client server application.


What are the two types of transmission technology available?

(i) Broadcast

(ii) point-to-point.

What is the difference between collision domain and broadcast domain

Broadcast Domain: A set of all devices that recieve broadcast frames originating from any device within the set. Broadcast domains are typically bounded by routers (or, in a switched network, by VLANs) because routers do not forward broadcast frames.

Collision Domain: In Ethernet, the network area within which frames that have collided are propagated. Repeaters and Hubs prpagate collisions, LAN switches and bridges do not.

What is point-to-point protocol?

A communications protocol used to connect computers to remote networking services including Internet service providers.

1) Industry standard protocol 2) used to create point-to-point links between different vendors equipment

If a person is accessing his corporate network from home, how is the connection established and how does the data flow from internet to intra net?

If u want to access ur corporate network from ur public network(internet) u have to use VPN. It carries the data in a secured mode in public network. For this u need to install VPN software n u need some authentication for that from u r company. Now a days u can access ur internal site from normal internet.It is with this kind of secured con nection only. If u want to know more abt this, search regarding VPN in Google u can finds tonns of data.

What is the Network Time Protocol

NTP (Network Time Protocol) provides accurate and syncronised time across the Internet.NTP uses UDP port 123 as its transport layer. NTP is one of the oldest Internet protocols still in use NTP uses Marzullo's algorithm with the UTC time scale

What is autonomous system?

It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.

Autonomous System is a community of interest. Used in conjunction with Routing Protocols. It breaks up parts of the network into manageable chunks. It is a collection of Routers under the control of a single administrative authority and that use a common IGP.

What is cladding?


A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

What is packet filter?


Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.


On the Internet, packet filtering is the process of passing or blocking packets at a network interface based on source and destination addresses, ports, or protocols. The process is used in conjunction with packet mangling and Network Address Translation (NAT). Packet filtering is often part of a firewall program for protecting a local network from unwanted intrusion.


What is MAU?


A multistation access unit (MSAU) is a hub or concentrator that connects a group of computers ("nodes" in network terminology) to a Token Ring local area network.


What are the possible ways of data exchange?


(i) Simplex (ii) Half-duplex (iii) Full-duplex.


What is MTU of a link ?


Maximum Transmission Unit is the largest physical packet size, measured in bytes, that a network can transmit. Any messages larger than the MTU are divided into smaller packets before being sent. Every network has a different MTU, which is set by the network administrator. On Windows 95, you can also set the MTU of your machine. This defines the maximum size of the packets sent from your computer onto the network. Ideally, you want the MTU to be the same as the smallest MTU of all the networks between your machine and a message's final destination. Otherwise, if your messages are larger than one of the intervening MTUs, they will get broken up (fragmented), which slows down transmission speeds.


Trial and error is the only sure way of finding the optimal MTU, but there are some guidelines that can help. For example, the MTU of many PPP connections is 576, so if you connect to the Internet via PPP, you might want to set your machine's MTU to 576 too. Most Ethernet networks, on the other hand, have an MTU of 1500, which is the default MTU setting for Windows 95.


What are the types of Transmission media?


Signals are usually transmitted over some transmission media that are broadly classified in to two categories:-


Guided Media: These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light.


Unguided Media: This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony.


What is ERD(Emergency Repair Disk)?


Emergency Repair Disk, an ERD is a diskette that creates backups of important system files and settings and is used to help troubleshootand fix issues for Microsoft WINNT and WIN 2000. The ERD is used in conjunction with the Windows repair option and you will be prompted for the diskette when needed. Note: The ERD is not to be confused with a standard boot diskette as it cannot be used alone.


The ERD is capable of performing such checks as:


1. Verifying the boot sector is not corrupt.


2. Repairing any startup files.


3. Locate any missing or damaged system files.


how install ca certificate in win 2k3 & win 2k8? pls explain me this question???


No answer available currently. Be the first one to reply to this question by submitting your answer from the form below.


What is logical link control?


One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.


The Logical Link Control (LLC) data communication protocol layer is the upper sub-layer of the Data Link Layer (which is itself layer 2, just above the Physical Layer) in the seven-layer OSI reference model. It provides multiplexing and flow control mechanisms that make it possible for several network protocols (IP, IPX) to coexist within a multipoint network and to be transported over the same network media.


What do you meant by "triple X" in Networks?


The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between the PAD and the network, called X.29. Together, these three recommendations are often called "triple X".


What is RIP (Routing Information Protocol)?


It is a simple protocol used to exchange information between the routers.


What is Mail Gateway?


It is just like gateway which is used to connect two different networks following different protocols. Mail gateway manages mail transfer between two networks using different mail transfer protocols.


What is Load balancing?


If the number of incoming clients requests exceeds the number of processes in a server class, the TP Monitor may dynamically start new ones and this is called Load balancing.


What is the difference between an unspecified passive open and a fully specified passive open?


An unspecified passive open has the server waiting for a connection request from a client. A fully specified passive open has the server waiting for a connection from a specific client.


What is the difference between TFTP and FTP application layer protocols?


The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP. The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.


What is REX?


Request to Exit (REX) - A signal that informs the controller that someone has requested to exit from a secure area.


What is the range of IP addresses in the classes of internet addresses?


range of IP addresses in the classes of internet addresses are as under...


Class A 0.0.0.0 - 127.255.255.255 Class B 128.0.0.0 - 191.255.255.255 Class C 192.0.0.0 - 223.255.255.255 Class D 224.0.0.0 - 239.255.255.255 Class E 240.0.0.0 - 247.255.255.255


What are the possible ways of data exchange?


(i) Simplex (ii) Half-duplex (iii) Full-duplex.


What is BGP (Border Gateway Protocol)?


It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol).


What is Recovery Console?


Recovery Console:That helps you restore your operating system when you cannot start your system.


What is ICMP?


ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.


What is meant by Horizontal scaling and Vertical scaling?


Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers.

What is a DNS resource record?


A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.


it is a record entry table in which there is mapping of host name to ip,c-name to host name..


What is Beaconing?


The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.


What is the difference between routable and non - routable protocols?


Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router.


What is virtual channel?


Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.

What is logical link control?


One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.


What are called Non-GUI clients, GUI Clients and OOUI Clients?


Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction. GUI Clients: These are applications, where occasional requests to the server result from a human interacting with a GUI (Example: Windows 3.x, NT 3.5) OOUI clients : These are applications, which are highly-iconic, object-oriented user interface that provides seamless access to information in very visual formats. (Example: MAC OS, Windows 95, NT 4.0)


What is point-to-point protocol?


A communications protocol used to connect computers to remote networking services including Internet service providers.


What is redirector in Networking?


Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer.


Why should you care about the OSI Reference Model?


It provides a framework for discussing network operations and design.


How we save ip addresses through subnetting how to avoid the wasting of assigning ip addresses by subnetting?


By Subnetting technique we can save wastage of Ip addresses. Subnetting is a process of creating a sub network from a bigger network. First we have to decide how many ip's does we need then we have to apply subnetting technique to find which network class is suitable for this much of IP's.


What is the Network Time Protocol?


A protocol that assures accurate local timekeeping with reference to radio and atomic clocks located on the Internet. This protocol is capable of synchronizing distributed clocks within milliseconds over long time periods. It is defined in STD 12, RFC 1119.


What is deffrence between switch & hub


Hub is a physical layer device which is a multiport repeater also.It regenerates the signals and broadcast the signals to those devices which are connected to the hub


where as


Switch is data link layer device which provide bridging functionality with greater efficiency.a switch may act as a multiport bridge to connect devices or segments in a LAN


What is Mail Gateway?


It is a system that performs a protocol translation between different electronic mail delivery protocols.


Difference between the communication and transmission?


Transmission is a physical movement of information and concern issues like bit polarity, synchronization, clock etc. Communication means the meaning full exchange of information between two communication media.


Why Data Link Layer Protocol Programming is preferable in C?


No answer available currently. Be the first one to reply to this question by submitting your answer from the form below.


What is source route?


It is a sequence of IP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header.


What are the different type of networking / internetworking devices?


Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link. Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipient and control congestion. Routers: They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission. Gateways: They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.


What is a pseudo tty?


A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no connection can take place.


what is drive manager?


Firstly its a DriverManager class which is reside in java.sql.DriverManager package and used to call its static function getConnection()which have Connection string,user name, and password of the database.It use to be connect your program code with database.

What are the main components of Transaction-based Systems?


Resource Manager Transaction Manager and Application Program.


What are the most typical functional units of the Client/Server applications?


User interface Business Logic and Shared data.


What is the difference between routable and non - routable protocols?


Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router.


What is attenuation?


The degeneration of a signal over distance on a network cable is called attenuation.


What is meant by Asymmetric Multiprocessing (AMP)?


It imposes hierarchy and a division of labor among processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated to specific functions.


What does the Mount protocol do?


The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request.


What is a DNS resource record?


A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.



What is meant by 3-Tier architecture?


In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is separated from the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and flexible. Example: TP monitor, Web.


What is subnet in Networking?


A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats.


Explain the building blocks of Client/Server?


The client side building block runs the client side of the application. The server side building block runs the server side of the application.


What is SLIP (Serial Line Interface Protocol)?


It is a very simple protocol used for transmission of IP datagrams across a serial line.


What are the two types of OLTP?


TP lite, based on stored procedures. TP heavy, based on the TP monitors.


What is meant by Symmentric Multiprocessing (SMP)?


It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided into threads that can run concurrently on any available processor. Any processor in the pool can run the OS kernel and execute user-written threads.


Back to Basic Networking Concepts Interview Questions and Answers page Question : What is difference between baseband and broadband transmission?


In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.


What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?


10Base2?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments 10Base5?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. 10BaseT?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.


What are the building blocks of Client/Server?


The client The server and Middleware.


What is wide-mouth frog?


Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.


The middleware building block runs on both the client and server sides of an application. It is broken into three categories?


Transport stack Network OS Service-specific middleware.


What is cladding in Networking?


A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

What is anonymous FTP and why would you use it?


Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.


What are the most typical functional units of the Client/Server applications?


User interface Business Logic and Shared data.


What is the difference between routable and non - routable protocols?


Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router.


What is attenuation?


The degeneration of a signal over distance on a network cable is called attenuation.


What is meant by Asymmetric Multiprocessing (AMP)?


It imposes hierarchy and a division of labor among processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated to specific functions.


What does the Mount protocol do?


The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request.


What is a DNS resource record?


A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.


What is anonymous FTP and why would you use it?


Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.


What is meant by 3-Tier architecture?


In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is separated from the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and flexible. Example: TP monitor, Web.


What is subnet in Networking?


A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats.


Explain the building blocks of Client/Server?


The client side building block runs the client side of the application. The server side building block runs the server side of the application.


What is SLIP (Serial Line Interface Protocol)?


It is a very simple protocol used for transmission of IP datagrams across a serial line.


What are the two types of OLTP?


TP lite, based on stored procedures. TP heavy, based on the TP monitors.


What is meant by Symmentric Multiprocessing (SMP)?


It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided into threads that can run concurrently on any available processor. Any processor in the pool can run the OS kernel and execute user-written threads.


Back to Basic Networking Concepts Interview Questions and Answers page Question : What is difference between baseband and broadband transmission?


In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.


What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?


10Base2?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments 10Base5?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. 10BaseT?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.


What are the building blocks of Client/Server?


The client The server and Middleware.


What is wide-mouth frog?


Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.


The middleware building block runs on both the client and server sides of an application. It is broken into three categories?


Transport stack Network OS Service-specific middleware.


What is cladding in Networking?


A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.


What is passive topology?

When the computers on the network simply listen and receive the signal, they are referred to as passive because they don?t amplify the signal in any way. Example for passive topology - linear bus


What is an Object server?


With an object server, the Client/Server application is written as a set of communicating objects. Client object communicate with server objects using an Object Request Broker (ORB). The client invokes a method on a remote object. The ORB locates an instance of that object server class, invokes the requested method and returns the results to the client object. Server objects must provide support for concurrency and sharing. The ORB brings it all together.


What is a Database Server?


With a database server, the client passes SQL requests as messages to the database server. The results of each SQL command are returned over the network. The server uses its own processing power to find the request data instead of passing all the records back to the client and then getting it find its own data. The result is a much more efficient use of distributed processing power. It is also known as SQL engine.


What are the two types of transmission technology available?


Two types of transmission technology available are: (i) Broadcast (ii) point-to-point.


What is a File server?


File servers are useful for sharing files across a network. With a file server, the client passes requests for file records over network to file server.


What is the HELLO protocol used for?


The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol.


What is a Web server?


This new model of Client/Server consists of thin, portable, "universal" clients that talk to super fat servers. In the simplest form, a web server returns documents when clients ask for them by name. The clients and server communicate using an RPC-like protocol called HTTP.


What is External Data Representation?


External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent.


What is the difference between trigger and rule?


The triggers are called implicitly by database generated events, while stored procedures are called explicitly by client applications.


What is Remote Procedure Call (RPC)?


RPC hides the intricacies of the network by using the ordinary procedure call mechanism familiar to every programmer. A client process calls a function on a remote server and suspends itself until it gets back the results. Parameters are passed like in any ordinary procedure. The RPC, like an ordinary procedure, is synchronous. The process that issues the call waits until it gets the results. Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends it to the remote server. The server receives the request, unpack the parameters, calls the procedures, and sends the reply back to the client. It is a telephone-like metaphor.


Do you have any collect


What is Message Oriented Middleware (MOM)?


MOM allows general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate over networks by simply putting messages in the queues and getting messages from queues. It typically provides a very simple high level APIs to its services. MOM's messaging and queuing allow clients and servers to communicate across a network without being linked by a private, dedicated, logical connection. The clients and server can run at different times. It is a post-office like metaphor.


What are the functions of the typical server program?


It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiates and runs background task activity. Keeps running. Grown bigger and faster.


Difference between the communication and transmission?


Transmission is a physical movement of information and concern issues like bit polarity, synchronization, clock etc. Communication means the meaning full exchange of information between two communication media.


What is Protocol Data Unit?


The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame).


What is EGP (Exterior Gateway Protocol)?


It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system


What is the difference between interior and exterior neighbor gateways?


Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.


What is virtual path?


Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.


What is IGP (Interior Gateway Protocol)?


It is any routing protocol used within an autonomous system.


What are the three types of SQL database server architecture?


Process-per-client Architecture. (Example: Oracle 6, Informix ) Multithreaded Architecture. (Example: Sybase, SQL server) Hybrid Architecture (Example: Oracle 7)


What are Service-specific middleware?


It is needed to accomplish a particular Client/Server type of services which includes:-Database specific middleware OLTP specific middleware Groupware specific middleware Object specific middleware Internet specific middleware and System management specific middleware.


What is Client/Server?


Clients and Servers are separate logical entities that work together over a network to accomplish a task. Many systems with very different architectures that are connected together are also called Client/Server.


Do you have any collection of Interview Questions and interested to share with us!! Please send that collection to iq@GlobalGuideline.Com along with the category and sub category information

What is logical link control?


One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.


Why should you care about the OSI Reference Model?


It provides a framework for discussing network operations and design.


What is a Multi-homed Host?


It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host.


What is frame relay, in which layer it comes?


Frame relay is a packet switching technology. It will operate in the data link layer.


What protocol is used by DNS name servers?


DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.


What is a TP Monitor?


There is no commonly accepted definition for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".


What are the advantages and disadvantages of the three types of routing tables?


The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be manually modified every time there is a change. A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine's table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the table's contents can change without the administrator being aware of the change.


What are all the Extended services provided by the OS?


Ubiquitous communications Network OS extension Binary large objects (BLOBs) Global directories and Network yellow pages Authentication and Authorization services System management Network time Database and transaction services Internet services Object- oriented services


What is meant by Asymmetrical protocols?


There is a many-to-one relationship between clients and server. Clients always initiate the dialog by requesting a service. Servers are passively awaiting for requests from clients.


What are the characteristics of Client/Server?


Service Shared resources Asymmetrical protocols Transparency of location Mix-and-match Message based exchanges Encapsulation of services Scalability Integrity Client/Server computing is the ultimate "Open platform". It gives the freedom to mix-and-match components of almost any level. Clients and servers are loosely coupled systems that interact through a message-passing mechanism.


What are called Non-GUI clients, GUI Clients and OOUI Clients?


Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction. GUI Clients: These are applications, where occasional requests to the server result from a human interacting with a GUI (Example: Windows 3.x, NT 3.5) OOUI clients : These are applications, which are highly-iconic, object-oriented user interface that provides seamless access to information in very visual formats. (Example: MAC OS, Windows 95, NT 4.0)


What is OLTP?


In the transaction server, the client component usually includes GUI and the server components usually consists of SQL transactions against a database. These applications are called OLTP (Online Transaction Processing) OLTP Applications typically, Receive a fixed set of inputs from remote clients. Perform multiple pre-compiled SQL comments against a local database. Commit the work and Return a fixed set of results.


What is ACID property?


ACID is a term coined by Andrew Router in 1983, which stands for Atomicity, Consistence, Isolation and Durability.


What is routing region?


When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.


What is the HELLO protocol used for?


The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol.


What is IGP (Interior Gateway Protocol)?


It is any routing protocol used within an autonomous system.


What is NVT (Network Virtual Terminal)?


It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.


What is silly window syndrome?


It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.


What is ICMP?


ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.


What is a DNS resource record?


A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.


What is Bandwidth?


Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.

What is source route?


It is a sequence of IP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header.


What is RIP (Routing Information Protocol)?


It is a simple protocol used to exchange information between the routers.


What is BGP (Border Gateway Protocol)?


It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol).


What is Gateway-to-Gateway protocol?


It is a protocol formerly used to exchange routing information between Internet core routers.


What is NVT (Network Virtual Terminal)?


It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.


What is Kerberos?


It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.


Expand IDEA.


IDEA stands for International Data Encryption Algorithm.


What is Mail Gateway?


It is a system that performs a protocol translation between different electronic mail delivery protocols.


What is IGP (Interior Gateway Protocol)?


It is any routing protocol used within an autonomous system.


What is autonomous system?


It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.


What is packet filter?


Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.


What is multicast routing?


Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.


What is silly window syndrome?


It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.


What is the difference between routable and non- routable protocols?


Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router.


What is logical link control?


One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.


What is virtual path?


Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.


What are major types of networks and explain?


1. Server-based network: provide centralized control of network resources and rely on server computers to provide security and network administration 2. Peer-to-peer network: computers can act as both servers sharing resources and as clients using the resources.


What are the important topologies for networks?


1. BUS topology: In this each computer is directly connected to primary network cable in a single line. Advantages: Inexpensive, easy to install, simple to understand, easy to extend. 2. STAR topology: In this all computers are connected using a central hub. Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems. 3. RING topology: In this all computers are connected in loop. Advantages: All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.


What is difference between baseband and broadband transmission?


In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.


What is ICMP?


ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.


What are the data units at different layers of the TCP / IP protocol suite?


The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media.


What is difference between ARP and RARP?


The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver.


The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.


What is the minimum and maximum length of the header in the TCP segment and IP datagram?


The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.

What is Bandwidth?

Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.


What is Protocol Data Unit?


The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame).


What are the types of Transmission media?


Signals are usually transmitted over some transmission media that are broadly classified in to two categories.


a.) Guided Media: These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light.


b.) Unguided Media: This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony.


What is passive topology?


When the computers on the network simply listen and receive the signal, they are referred to as passive because they dont amplify the signal in any way. Example for passive topology -linear bus.


What is cladding?


A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.


How Gateway is different from Routers? A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats.


What is frame relay, in which layer it comes?


Frame relay is a packet switching technology. It will operate in the data link layer.


What is Beaconing?


The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.


What is NETBIOS and NETBEUI?


NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.


NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.


Difference between the communication and transmission.


Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc.


Communication means the meaning full exchange of information between two communication media.


What are the possible ways of data exchange?


(i) Simplex (ii) Half-duplex (iii) Full-duplex.


What do you meant by "triple X" in Networks?


The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X".


What is Stop-and-Wait Protocol?


In Stop and wait protocol, sender sends one frame, waits until it receives confirmation from the receiver (okay to go ahead), and then sends the next frame.


What is Stop-and-Wait Automatic Repeat Request?


Error correction in Stop-and-Wait ARQ is done by keeping a copy of the sent frame and retransmitting of the frame when the timer expires.


What is Pipelining ?


In networking and in other areas, a task is often begun before the previous task has ended. This is known as pipelining.


What is Piggy Backing?


A technique called piggybacking is used to improve the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also carry control information about arrived (or lost) frames from B; when a frame is carrying data from B to A, it can also carry control information about the arrived (or lost) frames from A.

What is Fixed Size Framing?

In fixed-size framing, there is no need for defining the boundaries of the frames. The size itself can be used as a delimiter.


What is Bit Stuffing?


Bit stuffing is the process of adding one extra 0 whenever five consecutive Is follow a 0 in the data, so that the receiver does not mistake the pattern 0111110 for a flag.


What is Error Control ?


Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in transmission and coordinates the retransmission of those frames by the sender. In the data link layer, the term error control refers primarily to methods of error detection and retransmission.


What Automatic Repeat Request (ARQ)?


Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in transmission and coordinates the retransmission of those frames by the sender. In the data link layer, the term error control refers primarily to methods of error detection and retransmission. Error control in the data link layer is often implemented simply: Any time an error is detected in an exchange, specified frames are retransmitted. This process is called automatic repeat request (ARQ).


What is a Linear Block Code?


A linear block code is a code in which the exclusive OR (addition modulo-2) of two valid codewords creates another valid codeword.


Define Encoder?


A device or program that uses predefined algorithms to encode, or compress audio or video data for storage or transmission use. A circuit that is used to convert between digital video and analog video.


59. Define Decoder?


What is Framing?


Framing in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address. The destination address defines where the packet has to go and the sender address helps the recipient acknowledge the receipt.


List the steps involved in creating the checksum.a. Divide the data into sections


b. Add the sections together using 1's complement arithmetic c. Take the complement of the final sum, this is the checksum.


Compare Error Detection and Error Correction:


The correction of errors is more difficult than the detection. In error detection, checks only any error has occurred. In error correction, the exact number of bits that are corrupted and location in the message are known. The number of the errors and the size of the message are important factors.


Define Retransmission?


Retransmission is a technique in which the receiver detects the occurrence of an error and asks the sender to resend the message. Resending is repeated until a message arrives that the receiver believes is error-freed.


What is Redundancy?


The concept of including extra information in the transmission solely for the purpose of comparison. This technique is called redundancy.


What is LRC?


In LRC, a block of bits is divided into rows and a redundant row of bits is added to the whole block. It can detect burst errors. If two bits in one data unit are damaged and bits in exactly the same positions in another data unit are also damaged, the LRC checker will not detect an error. In LRC a redundant data unit follows n data units.


What is Checksum?


Checksum is used by the higher layer protocols (TCP/IP) for error detection


What are the responsibilities of Presentation Layer?


The Presentation layer is concerned with the syntax and semantics of the information exchanged between two systems.


a. Translation b. Encryption c. Compression


What are the two classes of hardware building blocks?


Nodes and Links.


What are the types of errors?


a. Single-Bit errorIn a single-bit error, only one bit in the data unit has changed b. Burst Error A Burst error means that two or more bits in the data have changed.


Which layer links the network support layers and user support layers?


The Transport layer links the network support layers and user support layers.


What are the responsibilities of Data Link Layer?


The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link and is responsible for node-node delivery.


a. Framing b. Physical Addressing c. Flow Control d. Error Control e. Access Control


What are the responsibilities of Transport Layer?


The Transport Layer is responsible for source-to-destination delivery of the entire message.


a. Service-point Addressing b. Segmentation and reassembly c. Connection Control d. Flow Control e. Error Control


What is TDM?

TDM is a digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate required by the sending and receiving devices.

What is Synchronous TDM?


In STDM, the multiplexer allocates exactly the same time slot to each device at all times, whether or not a device has anything to transmit.


Which layers are network support layers?


a. Physical Layer b. Data link Layer and c. Network Layers


What is WDM?


WDM is conceptually the same as FDM, except that the multiplexing and demultiplexing involve light signals transmitted through fiber optics channel.


What is Round Trip Time?


The duration of time it takes to send a message from one end of a network to the other and back, is called RTT


What is Multiplexing?


Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.


What are the key design issues of a computer Network?


a. Connectivity b. Cost-effective Resource Sharing c. Support for common Services d. Performance


Define Routing?


The process of determining systematically hoe to forward messages toward the destination nodes based on its address is called routing.


When a switch is said to be congested?


It is possible that a switch receives packets faster than the shared link can accommodate and stores in its memory, for an extended period of time, then the switch will eventually run out of buffer space, and some packets will have to be dropped and in this state is said to congested state.


What are the criteria necessary for an effective and efficient network?


a. Performance It can be measured in many ways, including transmit time and response time. b. Reliability It is measured by frequency of failure, the time it takes a link to recover from a failure, and the networks robustness. c. Security Security issues includes protecting data from unauthorized access and virues.


Name the factors that affect the reliability of the network?


a. Frequency of failure b. Recovery time of a network after a failure


What is Protocol?


A protocol is a set of rules that govern all aspects of information communication.


Define Network?


A network is a set of devices connected by physical media links. A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes.


What is a node?


A network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Links and the computer it connects is called as Nodes.


What is point-point link?


If the physical links are limited to a pair of nodes it is said to be point-point link.


What is Beaconing?


The process that allows a network to self-repair networks problems is called Beaconing.


The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI(Fibre Distributed Data Interface) networks.


What is SLIP (Serial Line Interface Protocol)?


It is a very simple protocol used for transmission of IP datagrams across a serial line.


What is Bandwidth?


Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.


What is point-to-point protocol?


A communications protocol used to connect computers to remote networking services including Internet service providers.


What is Beaconing?


The process that allows a network to self-repair networks problems is called Beaconing.


The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI(Fibre Distributed Data Interface) networks.


What is SLIP (Serial Line Interface Protocol)?
It is a very simple protocol used for transmission of IP datagrams across a serial line.

What is silly window syndrome?
It is a problem that can affect TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads only 1 byte at a time.


What is a routing table?
A routing table contains the path information for data data packets to reach a particular inter-network. Basically this table consists of the following information, Network ID, Subnet Mask, Gateway Address, Interface(port), and netric(hops or number of gaps between two internetworking devices).


Routers add entries to routing table with the help of routing protocols.


What are the commonly used frequency bands for VSAT communication?


The commonly used frequency bands for VSAT communication arr, C-band Extended C-band(XC-band) Ku-band


In an IP address can a network ID be 127?


No, a network ID can't be 127. Because 127 is not assigned to any IP address classes. It is reserved.


What is a Passive Hub?


Passive hub is a type of hub that do not provide the amplification of signals.


These hub also do not require any external electrical supply.


What are the factors that affect the performance of NIC?


The following factors affect the performance of NIC, Bus Speed :- It depends on ISA or PCI slot. PCI has higher speed. Memory :- More the memory, better the performance. Memory Access Method :- DMA is faster than I/O method.


How session layer in OSI model is responsible for Synchronisation and recovery?


Session layer creates certain check points while transmitting volumes of data in a sequence. When there is a problem in the transmission in the middle of any bulk of data, transmission will take place from the check point where it was left. This function of Session layer is called Synchronisation and recovery.


What is Synchronous Communication?


When the server is processing a particular client that means if it is receiving and sending the information to that particular client , another client cannot acess the server at the same time . Since the server will be blocked on the first client. Hence it is not suitable in real world applciations because, mostly these days applications should process multiple clients at a time.Which is not the case here.


How to get the IP address of the Client System ?


By using following code in the Code-Behind file we can get the IP adderss of a client system on which the application is running.


What is TCB?


TCB is nothing but Transmission Control Block. It is a complex data structure which contains a considerable amount of information about each connection.


What is a Multi-homed Host ?


It is a host which has multilple network interfaces and which requires multiple IP addresses is called as a Multi-homed Host.


What is an Autonomous System ?


A collection of routers under the control of a single administrative authority which uses a common Interior Gateway Protocol is called as an Autonomous System.


What is the difference between an unspecified passive open and a fully specified passive open ?


An unspecified passive open has a server waiting for a connection request from a client. Fully Specified Passive Open:


A fully specified passive open has the server waiting for a connection from a specific client.


What is a Protocol ?


The main purpose of a protocol is for communication. Set of rules that determines how the devices communicate in a network with each other is nothing but a protocol.


What is subnet?


A generic term for section of a large networks usually separated by a bridge or router.


Difference between the communication and transmission.


Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc.


What is SAP?


Series of interface points that allow other computers to communicate with the other layers of network protocol stack.


What is frame relay, in which layer it comes?


Frame relay is a packet switching technology. It will operate in the data link layer.


What is Beaconing?


The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.


What is NETBIOS and NETBEUI?

NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.

What is RAID?

A method for providing fault tolerance by using multiple hard disk drives.


What is Brouter?

Hybrid devices that combine the features of both bridges and routers.


What is point-to-point protocol?


A communications protocol used to connect computers to remote networking services including Internet service providers.


What is attenuation?


The degeneration of a signal over distance on a network cable is called attenuation.


What is Protocol Data Unit?


The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending


machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame).


What is ICMP?


ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.


What are the data units at different layers of the TCP / IP protocol suite?


The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media.


What is the minimum and maximum length of the header in the TCP segment and IP datagram?


The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.


How Gateway is different from Routers?


A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats


What is attenuation?


The degeneration of a signal over distance on a network cable is called attenuation.


What is MAC address?


The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.


What is Bandwidth?


Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.


What is ICMP?


ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.


What are the types of Transmission media?


Signals are usually transmitted over some transmission media that are broadly classified in to two categories.


What is the range of addresses in the classes of internet addresses?


Class A 0.0.0.0 - 127.255.255.255


Class B 128.0.0.0 - 191.255.255.255


Class C 192.0.0.0 - 223.255.255.255


Class D 224.0.0.0 - 239.255.255.255


Class E 240.0.0.0 - 247.255.255.255


What is MAC address?


The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.


What are the possible ways of data exchange?


(i) Simplex (ii) Half-duplex (iii) Full-duplex.


What do you mean by data communication?


Ans: It is the exchange of data between two devices via some form of transmission medium such as wire cable. The communicating system must be part of a communication system made up of a combination of hardware and software.The effectiveness of a data communication system depends on three fundamental characteristics: delivery, accuracy and timeliness.


What is half-duplex?


Ans: It is the mode of communication between two devices in which flow of data is bi-directional but not at the same time. ie each station can transmit and receive but not at the same time. E.g walkie-talkies are half-duplex system.


What is a network?


Ans: It is a set of devices connected by communication links. A node can be a computer or any other device capable of sending and/or receiving data generated by other nodes on the network.


What is distributed processing?


Ans: It is a strategy in which services provided by the network reside at multiple sites.


What is point to point connection?


Ans:It provides a dedicated link between two devices. The entire capacity of the link is reserved for transmission between the two devices e.g. when we change the TV channels by remote control we establish a point to point connection between remote control and TV control system.


What is a topology?


Ans: Topology of a network is defined as the geometric representation of the relationship of all the links and linking devices (node) to one another.Four basic topologies are star, bus, ring and mesh. Star – Here each device has a dedicated point to point link only to a central controller called hub.


Define internet?


Ans: It is a network of networks.


What is TCP/IP protocol model?


Ans: It is a five layered model which provides guidelines for the development of universally compatible networking protocols. The five layers are physical, data link, network, transport and application.


What is ISO-OSI model?


Ans: Open Systems Interconnection or OSI model was designed by the International Organization for Standardization (ISO) .It is a seven layer model. It is a theoretical model designed to show how a protocol stack should be implemented. It defines two extra layers in addition to TCP/IP model. Session -It was designed to establish, maintain, and synchronize the interaction between communicating system.


What is multiplexing?


Ans: Multiplexing is the process of dividing a link, the phycal medium, into logical channels for better efficiency. Here medium is not changed but it has several channels instead of one.


How data is transmitted over a medium?


Ans: Data is transmitted in the form of electromagnetic signals.


Compare analog and digital signals?


Ans: Analog signals can have an infinite number of values in a range but digital signal can have only a limited number of values.


What are the factors on which data rate depends?


Ans: Data rate ie.how fast we can send data depends upon i) Bandwidth available ii) The levels of signals we can use iii) The quality of the channel (level of noise


What is sampling?


Ans: It is the process of obtaining amplitude of a signal at regular intervals.


Define pulse code modulation?


Ans: Pulse code Modulation modifies pulses created by PAM to create a completely digital signal. For this PCM first quantizes the PAM pulse. Quantization is the method of assigning integral values in a specific tange to sampled instances.PCM is made up of four separate processes: PAM, quantization, binary encoding and line encoding.


What are the modes of data transmission? Ans: Data transmission can be serial or parallel in mode In parallel transmission, a group of bits is sent simultaneously, with each bit on a separate line.In serial transmission there is only one line and the bits are sent sequentially.


What is Synchronous mode of data transmission?


Ans: It is a serial mode of transmission.In this mode of transmission, bits are sent in a continuous stream without start and stop bit and without gaps between bytes. Regrouping the bits into meaningful bytes is the responsibility of the receiver.


What is FDM?


Ans: In frequency division multiplexing each signal modulates a different carrier frequency. The modulated carrier combines to form a new signal that is then sent across the link. Here multiplexers modulate and combine the signal while demultiplexers decompose and demodulate. Guard bands keep the modulating signal from overlapping and interfering with one another.


What is TDM ?


Ans: In TDM digital signals from n devices are interleaved with one another, forming a frame of data. Framing bits allow the TDM multiplexer to synchronize properly.


What are the different Guided Media?


Ans: The media which provides a conduct from one device to another is called a guided media. These include twisted pair cable, coaxial cable, and fiber-optic cable.


What do you mean by wireless communication?


Ans: Unguided media transport electromagnetic waves without using a physical conductor. This type of communication is referred as wireless communication. Here signals are broadcaster through air and thus available to anyone who has a device to receive it.


What are the switching methods?


Ans: There are three fundamental switching methods: circuit switching, packet switching, And message switching.In circuit switching, a direct physical connection between two devices is created by space division switches, time division switches or both. In packet switching data is transmitted using a packet switched network. Packet switched network is a network in which data are transmitted in independent units called packets.


What are the types of errors?


Ans: Errors can be categorized as a single-bit error or burst error. A single bit error has one bit error per data unit. A burst error has two or more bits errors per data unit.




Ans: In parity check, a parity bit is added to every data unit so that the total number of 1s is even (or odd for odd parity).Simple parity check can detect all single bit errors. It can detect burst errors only if the total number of errors in each data unit is odd.In two dimensional parity checks, a block of bits is divided into rows and a redundant row of bits is added to the whole block.


Define cyclic redundancy check (CRC).


Ans: C RC appends a sequence of redundant bits derived from binary division to the data unit. The divisor in the CRC generator is often represented as an algebraic polynomial.


What do you mean by flow control?


Ans: It is the regulation of sender’s data rate so that the receiver buffer doesn’t become


Define stop and wait ARQ.


Ans: In stop and wait ARQ, the sender sends a frame and waits for an acknowledgement from the receiver before sending the next frame.


Define Selective Repeat ARQ?


Ans: In Selective Repeat ARQ, multiple frames can be in transit at the same time. If there is an error, only unacknowledged frame is retransmitted.


What is HDLC?


Ans: It is a bit oriented data link protocol designed to support both half duplex and full duplex communication over point to point and multi point links.HDLC is characterized by their station type,configuration and their response modes.


What do you mean by point to point protocol stack?


Ans: Point to point protocol uses a stack of other protocol to use the link, to authenticate the parties involved, and to carry the network layer data. Three sets of protocols are defined: link control protocol, Authentication protocol, and network control protocol.


What do you mean by line control protocol?


Ans: It is responsible for establishing, maintaining, configuring, and terminating links.


What do you mean by network control protocol?


Ans: Network control protocol is a set of protocols to allow the encapsulation of data coming from network layer protocol that requires the services of PPP


What do you mean by Bluetooth?


Ans: It is a wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers, cameras, printers and so on. Bluetooth LAN Is an adhoc network that is the network is formed spontaneously? It is the implementation of protocol defined by the IEEE 802.15 standard.


What do you mean by subnetting?


Ans: Subnetting divides one large network into several smaller ones. It adds an intermediate level of hierarchy in IP addressing.


What are the disadvantages of fiber optics cable?


Ans: The disadvantages of fiber optics cable over twisted pair cable are Cost-It is expensive Installation/maintenance-Any roughness or cracking defuses light and alters the signal Fragility-It is more fragile.


What are the factors for evaluating the suitability of the media ?


Ans: The factors are cost,throughput,attenuation,Electromagneric interference(EMI),securtty.


What do you mean by ALOHA ?


Ans: It is the method used to solve the channel allocation problem .It is used for: i)ground based radio broadcasting ii)In a network in which uncoordinated users are competing for the use of single channel. It is of two types: 1.Pure aloha 2.Slotted aloha


What is slotted ALOHA?


Ans: In this method time is divided into discrete intervals,each interval corresponding to one frame.It requires user to agree on slot boundaries.Here data is not send at any time instead it wait for beginning of the next slot.Thus pure ALOHA is tuened into discrete one.


What do you mean by non persistent CSMA(carrier sense multiple access) ?


Ans: Here if no one else is sending the station begins doing so itself.However if the channel is already in use,the station does’t continuously sense it rather it waits for a random period of time and then repeats.It leads better channel utilization but longer delay.


What is FDDI?


Ans: It is high performance fiber optic token ring LAN running at 100Mbps over distance up 1000 stations.FDDI access is limited by time.A FDDI cabling consist of two fiber rings. i)one transmitting clockwise ii)one transmitting counterclockwise


What is Repeaters ?


Ans: A receiver receives a signal before it becomes too weak or corrupted,regenerates the original bit pattern,and puts the refreshed copy back onto the link.It operates on phycal layer of OSI model.


What is Routers ?


Ans: Router relay packets among multiple interconnected networks.They receive packet from one connected network and pass it to another network.They have access to network layer addresses and certain software that enables them to determine which path is best for transmission among several paths.They operate on phycal,data link and network layer of OSI model.


What do you mean by Data Terminal Equipment(DTE) ?


Ans: It is any device that is source of or destination for binary digital data.At phycal layer it can be a terminal computer. They generate or consume information.

What do you mean by protocol stack ?


Ans: The list of protocols used by certain system ,one protocol per layer is called protocol stack.


What do you mean by peer ?


Ans: Entities comprising the corresponding layers on different machines are called peers.It may be hardware device processes human being peers communicate by using protocol.


What are the advantages of broadcast network.


Ans: a single communication channel is shared by all computers. packets are transmitted and received by all the computer. address field is attached to whom it is intended. multicasting is used in network.


What are the design issue of layers ?


Ans: The design issue of layer are • Addressing technique.ie source and destination address • Types of communication • Error control • Order of message. • Speed matching • Multiplexing and demultiplexing.


What are the protocols in transport layer ?


Ans: The protocols defined in transport layer are • TCP • UDP


Define UDP ?


Ans: It is unreliable connectionless protocol.It is used for one-shot,client-server type,requesr-reply queries and applications in which prompt delivery is required than accuracy.


Define IP ?


Ans: Internetwork protocol (IP) is the transmission mechanism used by TCP/IP protocol.It is an unreliable and connectionless datagram protocol.It provides no error checking and tracking.


What are the information that a computer attached to a TCP/IP internet must possesses ?


Ans: Each computer attached to TCP/IP must possesses the following information • Its IP addesss • Its subnet mask • The IP addesss of the router. • The Ip address of the name server.


What is TELNET ?


Ans: TELNET is a client –server application that allows a user to log on to a remote machine,giving the user access to the remote system. TELNET is an abbreviation of terminal Network.


What is Network Virtual Terminal ?


Ans: A universal interface provided by TELNET is called Network Virtual Terminal(NVT) character set.Via this interface TELNET translates characters (data or command) that come from local terminal into NVT form and delivers them to the network.


What is Hypertext Transfer Protocol(HTTP) ?


Ans: It is the main protocol used to access data on the World Wide Web .the protocol transfers data in the form of plain text,hypertext,audio,video,and so on. It is so called because its


What is URL ?


Ans: It is a standard for specifying any kind of information on the World Wide Web.


What is HTML ?


Ans: Hypertext Markup Language (HTML) is a language for creating static web pages

Share this

Related Posts

Previous
Next Post »