Professional Documents
Culture Documents
1) What is a Link?
A link refers to the connectivity between two devices. It includes the type of cables and
protocols used in order for one device to be able to communicate with the other.
There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer,
Session Layer, Presentation Layer and Application Layer.
4) What is a LAN?
LAN is short for Local Area Network. It refers to the connection between computers and
other network devices that are located within a small physical location.
5) What is a node?
A node refers to a point or joint where a connection takes place. It can be computer or device
that is part of a network. Two or more nodes are needed in order to form a network
connection.
Routers can connect two or more network segments. These are intelligent network devices
that store information in its routing table such as paths, hops and bottlenecks. With this info,
they are able to determine the best path for data transfer. Routers operate at the OSI Network
Layer.
UMESH PRAJAPATI
It refers to a direct connection between two computers on a network. A point to point
connection does not need any other network devices other than connecting a cable to the NIC
cards of both computers.
Anonymous FTP is a way of granting user access to files in public servers. Users that are
allowed access to data in these servers do not need to identify themselves, but instead log in
as an anonymous guest.
A subnet mask is combined with an IP address in order to identify two parts: the extended
network address and the host address. Like an IP address, a subnet mask is made up of 32
bits.
A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation
can be overcome by using repeaters and switches.
Data encapsulation is the process of breaking down information into smaller manageable
chunks before it is transmitted across the network. It is also in this process that the source and
destination addresses are attached into the headers, along with parity checks.
Network Topology refers to the layout of a computer network. It shows how devices and
cables are physically laid out, as well as how they connect to one another.
VPN means Virtual Private Network, a technology that allows a secure tunnel to be created
across a network such as the Internet. For example, VPNs allow you to establish a secure
dial-up connection to a remote server.
NAT is Network Address Translation. This is a protocol that provides a way for multiple
computers on a common network to share single connection to the Internet.
15) What is the job of the Network Layer under the OSI reference model?
The Network layer is responsible for data routing, packet switching and control of network
congestion. Routers operate under this layer.
UMESH PRAJAPATI
16) How does a network topology affect your decision in setting up a network?
Network topology dictates what media you must use to interconnect devices. It also serves as
basis on what materials, connector and terminations that is applicable for the setup.
RIP, short for Routing Information Protocol is used by routers to send data from one network
to another. It efficiently manages routing data by broadcasting its routing table to all other
routers within the network. It determines the network distance in units of hops.
There are several ways to do this. Install reliable and updated anti-virus program on all
computers. Make sure firewalls are setup and configured properly. User authentication will
also help a lot. All of these combined would make a highly secured network.
NIC is short for Network Interface Card. This is a peripheral card that is attached to a PC in
order to connect to a network. Every NIC has its own MAC address that identifies the PC on
the network.
WAN stands for Wide Area Network. It is an interconnection of computers and devices that
are geographically dispersed. It connects networks that are located in different regions and
countries.
The physical layer does the conversion from data bits to electrical signal, and vice versa. This
is where network devices and cable types are considered and setup.
There are four layers: the Network Layer, Internet Layer, Transport Layer and Application
Layer.
23) What are proxy servers and how do they protect computer networks?
Proxy servers primarily prevent external users who identifying the IP addresses of an internal
network. Without knowledge of the correct IP address, even the physical location of the
network cannot be identified. Proxy servers can make a network virtually invisible to external
users.
This layer provides the protocols and means for two devices on the network to communicate
with each other by holding a session. This includes setting up the session, managing
UMESH PRAJAPATI
information exchange during the session, and tear-down process upon termination of the
session.
25) What is the importance of implementing a Fault Tolerance System? Are there
limitations?
A fault tolerance system ensures continuous data availability. This is done by eliminating a
single point of failure. However, this type of system would not be able to protect data in some
cases, such as in accidental deletions.
The 10 refers to the data transfer rate, in this case is 10Mbps. The word Base refers to base
band, as oppose to broad band. T means twisted pair, which is the cable used for that
network.
Private IP addresses are assigned for use on intranets. These addresses are used for internal
networks and are not routable on external public networks. These ensures that no conflicts are
present among internal networks while at the same time the same range of private IP
addresses are reusable for multiple intranets since they do not “see” each other.
NOS, or Network Operating System, is specialized software whose main task is to provide
network connectivity to a computer in order for it to be able to communicate with other
computers and connected devices.
DoS, or Denial-of-Service attack, is an attempt to prevent users from being able to access the
internet or any other network services. Such attacks may come in different forms and are
done by a group of perpetuators. One common method of doing this is to overload the system
server so it cannot anymore process legitimate traffic and will be forced to reset.
30) What is OSI and what role does it play in computer networks?
OSI (Open Systems Interconnect) serves as a reference model for data communication. It is
made up of 7 layers, with each layer defining a particular aspect on how network devices
connect and communicate with one another. One layer may deal with the physical media
used, while another layer dictates how data is actually transmitted across the network.
31) What is the purpose of cables being shielded and having twisted pairs?
The main purpose of this is to prevent crosstalk. Crosstalks are electromagnetic interferences
or noise that can affect data being transmitted across cables.
UMESH PRAJAPATI
By using address translation instead of routing, address sharing provides an inherent security
benefit. That’s because host PCs on the Internet can only see the public IP address of the
external interface on the computer that provides address translation and not the private IP
addresses on the internal network.
MAC, or Media Access Control, uniquely identifies a device on the network. It is also known
as physical address or Ethernet address. A MAC address is made up of 6-byte parts.
34) What is the equivalent layer or layers of the TCP/IP Application layer in terms of
OSI reference model?
The TCP/IP Application layer actually has three counterparts on the OSI model: the Session
layer, Presentation Layer and Application Layer.
By looking at the first octet of any given IP address, you can identify whether it’s Class A, B
or C. If the first octet begins with a 0 bit, that address is Class A. If it begins with bits 10 then
that address is a Class B address. If it begins with 110, then it’s a Class C network.
OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to
determine the best possible path for data exchange.
Firewalls serve to protect an internal network from external attacks. These external threats
can be hackers who want to steal data or computer viruses that can wipe out data in an
instant. It also prevents other users from external networks from gaining access to the private
network.
Star topology consists of a central hub that connects to nodes. This is one of the easiest to
setup and maintain.
One major disadvantage of star topology is that once the central hub or switch get damaged,
the entire network becomes unusable.
UMESH PRAJAPATI
41) What is SLIP?
SLIP, or Serial Line Interface Protocol, is actually an old protocol developed during the early
UNIX days. This is one of the protocols that are used for remote access.
Tracert is a Windows utility program that can used to trace the route taken by data from the
router to the destination network. It also shows the number of hops taken during the entire
transmission route.
A network administrator has many responsibilities that can be summarize into 3 key
functions: installation of a network, configuration of network settings, and
maintenance/troubleshooting of networks.
When you are accessing the resources that are shared by one of the workstations on the
network, that workstation takes a performance hit.
A hybrid network is a network setup that makes use of both client-server and peer-to-peer
architecture.
DHCP is short for Dynamic Host Configuration Protocol. Its main task is to automatically
assign an IP address to devices across the network. It first checks for the next available
address not yet taken by any device, then assigns this to a network device.
The main task of ARP or Address Resolution Protocol is to map a known IP address to a
MAC layer address.
TCP/IP is short for Transmission Control Protocol / Internet Protocol. This is a set of protocol
layers that is designed to make data exchange possible on different types of computer
networks, also known as heterogeneous network.
UMESH PRAJAPATI
50) How can you manage a network using a router?
Routers have built in console that lets you configure different settings, like security and data
logging. You can assign restrictions to computers, such as what resources it is allowed
access, or what particular time of the day they can browse the internet. You can even put
restrictions on what websites are not viewable across the entire network.
51) What protocol can be applied when you want to transfer files between different
platforms, such between UNIX systems and Windows servers?
Use FTP (File Transfer Protocol) for file transfers between such different servers. This is
possible because FTP is platform independent.
Default gateways provide means for the local networks to connect to the external network.
The default gateway for connecting to the external network is usually the address of the
external router port.
53) One way of securing a network is through the use of passwords. What can be
considered as good passwords?
Good passwords are made up of not just letters, but by combining letters and numbers. A
password that combines uppercase and lowercase letters is favorable than one that uses all
upper case or all lower case letters. Passwords must be not words that can easily be guessed
by hackers, such as dates, names, favorites, etc. Longer passwords are also better than short
ones.
The proper termination for unshielded twisted pair network cable is 100 ohms.
Netstat is a command line utility program. It provides useful information about the current
TCP/IP settings of a connection.
For a Class C network, the number of usable Network ID bits is 21. The number of possible
network IDs is 2 raised to 21 or 2,097,152. The number of host IDs per network ID is 2 raised
to 8 minus 2, or 254.
57) What happens when you use cables longer than the prescribed length?
Cables that are too long would result in signal loss. This means that data transmission and
reception would be affected, because the signal degrades over length.
UMESH PRAJAPATI
Software related problems can be any or a combination of the following:
– client server problems
– application conflicts
– error in configuration
– protocol mismatch
– security issues
– user policy and rights issues
ICMP is Internet Control Message Protocol. It provides messaging and communication for
protocols within the TCP/IP stack. This is also the protocol that manages error messages that
are used by network tools such as PING.
Ping is a utility program that allows you to check connectivity between network devices on
the network. You can ping a device by using its IP address or device name, such as a
computer name.
Peer to peer are networks that does not reply on a server. All PCs on this network act as
individual workstations.
DNS is Domain Name System. The main function of this network service is to provide host
names to TCP/IP address resolution.
63) What advantages does fiber optics have over other media?
One major advantage of fiber optics is that is it less susceptible to electrical interference. It
also supports higher bandwidth, meaning more data can be transmitted and received. Signal
degrading is also very minimal over long distances.
A hub acts as a multiport repeater. However, as more and more devices connect to it, it would
not be able to efficiently manage the volume of traffic that passes through it. A switch
provides a better alternative that can improve the performance especially when high traffic
volume is expected across all ports.
65) What are the different network protocols that are supported by Windows RRAS
services?
There are three main network protocols supported: NetBEUI, TCP/IP, and IPX.
66) What are the maximum networks and hosts in a class A, B and C network?
UMESH PRAJAPATI
For Class A, there are 126 possible networks and 16,777,214 hosts
For Class B, there are 16,384 possible networks and 65,534 hosts
For Class C, there are 2,097,152 possible networks and 254 hosts
68) What protocols fall under the Application layer of the TCP/IP stack?
The following are the protocols under TCP/IP Application layer: FTP, TFTP, Telnet and
SMTP.
69) You need to connect two computers for file sharing. Is it possible to do this without
using a hub or router?
Yes, you can connect two computers together using only one cable. A crossover type cable
can be use in this scenario. In this setup, the data transmit pin of one cable is connected to the
data receive pin of the other cable, and vice versa.
Ipconfig is a utility program that is commonly used to identify the addresses information of a
computer on a network. It can show the physical address as well as the IP address.
Client/server is a type of network wherein one or more computers act as servers. Servers
provide a centralized repository of resources such as printers and files. Clients refers to
workstation that access the server.
Networking refers to the inter connection between computers and peripherals for data
communication. Networking can be done using wired cabling or through wireless link.
74) When you move the NIC cards from one PC to another PC, does the MAC address
gets transferred as well?
Yes, that’s because MAC addresses are hard-wired into the NIC circuitry, not the PC. This
also means that a PC can have a different MAC address when the NIC card was replace by
another one.
UMESH PRAJAPATI
Clustering support refers to the ability of a network operating system to connect multiple
servers in a fault-tolerant group. The main purpose of this is the in the event that one server
fails, all processing will continue on with the next server in the cluster.
76) In a network that contains two servers and twenty workstations, where is the best
place to install an Anti-virus program?
An anti-virus program must be installed on all servers and workstations to ensure protection.
That’s because individual users can access any workstation and introduce a computer virus
when plugging in their removable hard drives or flash drives.
Ethernet is one of the popular networking technologies used these days. It was developed
during the early 1970s and is based on specifications as stated in the IEEE. Ethernet is used in
local area networks.
In case one workstation on the network suffers a malfunction, it can bring down the entire
network. Another drawback is that when there are adjustments and reconfigurations needed
to be performed on a particular part of the network, the entire network has to be temporarily
brought down as well.
SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all Internal mail,
and provides the necessary mail delivery services on the TCP/IP protocol stack.
Multicast routing is a targeted form of broadcasting that sends message to a selected group of
user, instead of sending it to all users on a subnet.
Encryption is the process of translating information into a code that is unreadable by the user.
It is then translated back or decrypted back to its normal readable format using a secret key or
password. Encryption help ensure that information that is intercepted halfway would remain
unreadable because the user has to have the correct password or key for it.
UMESH PRAJAPATI
IP addresses are displayed as a series of four decimal numbers that are separated by period or
dots. Another term for this arrangement is the dotted decimal format. An example is
192.168.101.2
Authentication is the process of verifying a user’s credentials before he can log into the
network. It is normally performed using a username and password. This provides a secure
means of limiting the access from unwanted intruders on the network.
This is a mode of data exchange wherein two communicating computers do not use IPSec
themselves. Instead, the gateway that is connecting their LANs to the transit network creates
a virtual tunnel that uses the IPSec protocol to secure all communication that passes through
it.
86) What are the different technologies involved in establishing WAN links?
Analog connections – using conventional telephone lines; Digital connections – using digital-
grade telephone lines; switched connections – using multiple sets of links between sender and
receiver to move data.
In the event that one link fails, there will always be another available. Mesh topology is
actually one of the most fault-tolerant network topology.
A large percentage of a network is made up of hardware. Problems in these areas can range
from malfunctioning hard drives, broken NICs and even hardware startups. Incorrectly
hardware configuration is also one of those culprits to look into.
A common way of dealing with such a problem is to use repeaters and hub, because it will
help regenerate the signal and therefore prevent signal loss. Checking if cables are properly
terminated is also a must.
90) How does dynamic host configuration protocol aid in network administration?
Instead of having to visit each client computer to configure a static IP address, the network
administrator can apply dynamic host configuration protocol to create a pool of IP addresses
known as scopes that can be dynamically assigned to clients.
UMESH PRAJAPATI
Profiles are the configuration settings made for each user. A profile may be created that puts
a user in a group, for example.
There are 4 protocols that are being managed by this layer. These are ICMP, IGMP, IP and
ARP.
Rights refer to the authorized permission to perform specific actions on the network. Each
user on the network can be assigned individual rights, depending on what must be allowed for
that user.
A VLAN is required because at switch level there is only one broadcast domain, it means
whenever new user is connected to switch this information is spread throughout the
network. VLAN on switch helps to create separate broadcast domain at switch level. It is
used for security purpose.
IPv6 , or Internet Protocol version 6, was developed to replace IPv4. At present, IPv4 is being
used to control internet traffic, butis expected to get saturated in the near future. IPv6 was
designed to overcome this limitation.
RSA is short for Rivest-Shamir-Adleman algorithm. It is the most commonly used public key
encryption algorithm in use today.
Mesh topology is a setup wherein each device is connected directly to every other device on
the network. Consequently, it requires that each device have at least two network
connections.
UMESH PRAJAPATI
The maximum allowable length for a network segment using 100Base-FX is 412 meters. The
maximum length for the entire network is 5 kilometers.
First is used directly by the user, such as e-mail, Second supports other application programs.
The Domain Name System (DNS) is a supporting program that is used by other programs
such as to find the IP address of an e-mail recipient.
Describe Hierarchical Namespace.
In a hierarchical name space, each name is combination of several parts as:
A central authority can assign the part of the name that defines the nature and name of the
organization. The other things of the name the organization provides itself. The organization
can add suffixes (or prefixes) to the name to define its host.
The company need not worry about the prefix if it is same as that of another organization
because, even if part of an address is the same, the whole address is different.
Example:
Suppose central authority has given names ABC.com and XYZ.com to two separate
organization but these organization can add prefix as career so the name becomes
career.XYZ.com and career.ABC.com. The names are unique without the need for
assignment by a central authority. The central authority controls only part of the name, not
the whole.
UMESH PRAJAPATI
Define Fully Qualified Domain Name and Partially
Qualified Domain Name.
In hierarchical name space, names are defined in an inverted-tree structure with the root at the
top. The tree can have only 128 levels: level 0 (root) to level 127.
Each node in the tree has a label, which is a string with a maximum of 63 characters.
The root label is a null string (empty string). In this tree, all the labels have different name,
which guarantee the uniqueness of the domain names.
A full domain name is a sequence of labels separated by dots (.). The domain names are
always read from the node up to the root.
If a label is terminated by a null string or empty string, it is called a fully qualified domain
name (FQDN).
If a label is not terminated by a null string, it is called a partially qualified domain name
(PQDN). A PQDN starts from a node, but it does not end with the root.
UMESH PRAJAPATI
Describe attenuation, distortion, and noise in brief.
Attenuation: When a signal travels through a medium, it loses some of its energy due to
resistance of the medium. This loss of energy is called Attenuation. This is the reason why a
wire carrying electric signals gets warm. Some of the electrical energy in the signal is
converted to heat. To overcome for this problem, amplifiers are used to amplify the signal.
Unit of the decibel is used to find out if a signal has lost or gained strength. The decibel (dB)
measures the relative strengths of two signals or one signal at two different points. If decibel
is negative then a signal is attenuated and if positive signal is amplified.
Formula:
Where PI and P2 are the variable and the powers of a signal at points 1 and 2, respectively.
Distortion
When the signal travels through the medium from one point to another it may chance to
change the form or shape of signal. It is called distortion.
Distortion can occur in a composite signal, made up of different frequencies. Each signal
component has its own propagation speed through a travelling medium and, therefore, its
own delay in reaching at the final destination. Means signal components at the receiver have
phases different from what they had at the sender.
Noise
The third cause of impairment is Noise. Following types of noise are possible.
-Thermal noise.
-Induced noise.
-Crosstalk noise.
-Impulse noise.
UMESH PRAJAPATI
These noise may corrupt the signal.
Thermal noise is produced due to the random motion of electrons in a wire which creates an
extra signal not originally sent by the transmitter.
Induced noise comes from sources such as motors and other electronic appliances.
These devices act as a sending antenna, and the transmission medium acts as the receiving
antenna.
Crosstalk is the effect of one wire on the other.
Impulse noise comes from power lines, lightning etc.
Describe composite single.
Composite Signals are the combination of more than one sine waves. Simple sine waves can
be used to carry electric energy from one place to another or we can use a single sine wave to
send an alarm to a security center when a thief opens a door or window in the house.
A single frequency sine wave is not useful in data communications we need to send a
composite signal. A composite signal can be periodic or non-periodic.
Describe MIME
Electronic mail has a simple structure. It can send messages only in NVT 7-bit ASCII format.
It cannot be used for those languages that are not supported by 7-bit ASCII characters so
languages such as French, German, Hebrew, Russian, Chinese etc cannot use this format.
Also, it cannot be used to send binary files or video or audio data.
We need a protocol that allows non-ASCII data to be sent through e-mail. So Multipurpose
Internet Mail Extensions (MIME) is the answer. MIME transforms non-ASCII data at the
sender site to NVT (Network Virtual Terminal) ASCII data and delivers them to the client
MTA to be sent through the Internet. The message at the receiving side is transformed back
to the original data. Main task of MIME is to transform non-ASCII data to ASCII data and
vice versa.
UMESH PRAJAPATI
MIME header
Delete Mode: In this mode, the mail is deleted from the mailbox after each retrieval.
UMESH PRAJAPATI
Keep Mode. The mail remains in the mailbox after retrieval.
Describe IMAP4 (Internet Mail Access Protocol) in detail.
This protocol is also used in Internet for accessing the mail. IMAP4 has more feature than
POP3 and is more powerful.
UMESH PRAJAPATI
given address is in binary notation or dotted-decimal notation.
Example
Solution
2. Radio Transmission
Radio waves are easy to generate, can travel long distances, and can penetrate buildings
easily, so they are widely used for communication. These waves can travel in all directions.
3. Microwave Transmission
Microwaves travel in a straight line, so if the towers are too far apart, the earth will get in the
way. Thus, repeaters are needed periodically. The higher the towers are, the farther apart they
can be. Unlike radio waves at lower frequencies, microwaves do not pass through buildings
well.
UMESH PRAJAPATI
4. Infrared Transmission
It is used for short-range communication. The remote controls used for televisions, VCRs,
and stereos, use infrared communication. They are relatively directional and can not pass
through solid objects.
5. Light Transmission
These types of wave can easily effected by wind and temperature changes. They normally
work well on sunny days.
Explain Random Excess Method.
In Random Excess Method, any station can send the data at any time without the permission
of other station. At any time, if a station has information to send to other station, it uses a
specific method defined by the protocol to make a decision on whether or not to send.
There is no scheduled time for a station to transmit the data that is why it is called Random
Excess Protocol. Random protocol has the following types.
UMESH PRAJAPATI
are used by different stations.
In time-division multiple access (TDMA), the stations share the bandwidth of the channel in
time. Each station is allocated a time slot during which it can send data. Each station
transmits its data in is assigned time slot.
So suppose there are three stations and code and data are (c1, d1), (c2, d2), (c3, d3)
respectively. The data that go on the channel are the sum of all these terms. Any station
wanting to receive data from one of the other two, multiplies the data on the channel by the
code of the sender. For example, suppose stations 1 and 2 are talking to each other. Station 2
wants to hear what station I is saying. It multiplies the data on the channel by cl the code of
station 1.
Because (cl . cl) is 3, but (c2 . cI) and (c3 . cI) are all Zero, station 2 divides the result by 3 to
get the data from station 1.
Describe the functionality of data link layer.
Data Link Layer is the second layer from the bottom in OSI model. This layer has two main
functions
Data link control provides the functionality of include framing, flow and error control that
provide smooth and reliable transmission of frames between nodes. Media Access Control
(MAC) handles the sharing of link.
UMESH PRAJAPATI
Explain Stop-and-Wait Automatic Repeat Request for
noisy channel.
In this protocol the sending device keeps a copy of the last frame transmitted until it receives
an acknowledgment for that frame. A data frames uses a sequence number; an ACK frame
uses an acknowledgment number. The sender has a control variable, which we call Sn
(sender, next frame to send), that holds the sequence number for the next frame to be sent (0
or 1).
What is the difference between Pure ALOHA and Slotted
Aloha protocol?
In Pure Aloha, station can send data in a continuous time manner whereas in Slotted Aloha,
time is divided in slots. Pure ALOHA doesn't check whether the channel is busy before
transmission. In slotted ALOHA, a frame can be sent only at fixed times, whereas in pure
ALOHA, you can send any time. Pure ALOHA has a vulnerable time of 2 x Tfr. Whereas in
Slotted ALOHA vulnerable time = Tfr {Tfr: Average transmission time for a frame}.
Differentiate between hub and switch.
a.) Hub is a layer 1 device while Switch is layer 2 device.
b.) Hub works on single collision and single broadcast domain while switch works on per
port collision and single broadcast domain.
What is FQDN?
- FQDN is the abbreviation for Fully Qualified Domain Name.
- It contains both the hostname and a domain name.
- It uniquely identifies a host within a DNS hierarchy
Tell us something about LMHOSTS files.
- It is a text file that resolves NetBIOS names to IP addresses.
- It can be compared with the HOSTS file which is a static method of resolving domain
names into IP addresses.
- LMHOSTS files must be manually configured and updated.
What are the main qualities of an effective and efficient
network?
a. Performance
b. Reliability
c. Security
What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
10Base2 -
- It is an Ethernet term which means a maximum transfer rate of 10 Megabits per second that
uses baseband signaling, with a contiguous cable segment length of 100 meters and a
maximum of 2 segments.
UMESH PRAJAPATI
10Base5
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses
baseband signaling, with 5 continuous segments not exceeding 100 meters per segment.
10BaseT
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses
baseband signaling and twisted pair cabling.
What is anonymous FTP? What is its use?
- It is an FTP that enables the users to connect to a host without a valid login and password.
- The login used is anonymous or guest, with the password usually requesting the user's ID.
- It enables a large number of users to access the files on the host without needing to set up a
login for all of them.
- It exercises a strict control over the areas an anonymous user can access.
Which factors mark the reliability of the network?
a. Frequency of failure
b. Downtime / Time taken for recovery.
Name the factors that tell us about the security of the
network.
a. Virus attacks on the system.
b. Unauthorized access to the system.
Define Bandwidth and Latency?
- Bandwidth/ Throughput – It means the number of bits which can be transmitted over the
network in a specified time.
- Latency – It is the time taken by a message to travel from one side to another.
UMESH PRAJAPATI
Broadcasting
a.) Uni-casting - Message is sent from a source to a single destination node.
b.) Multicasting - Message is sent from a source to some subsets of other nodes.
c.) Broadcasting - Message is sent from a source to all the nodes in the network.
What are the various types of Multiplexing?
The various types of multiplexing are:
a. Frequency Division Multiplexing (FDM)
b. Time Division Multiplexing (TDM)
i. Synchronous TDM
ii. Asynchronous TDM
c. Wave Division Multiplexing (WDM)
Which layers of OSI are referred to as network support
layers?
The following 3 layers of OSI are referred to as network support layers:
a. Physical Layer
b. Data link Layer and
c. Network Layers
Which layers of OSI are referred to as user support
layers?
The block of user support layers consists of:
a. Session Layer
b. Presentation Layer and
c. Application Layer
What does the Data Link Layer do?
- The Data Link Layer transforms the physical layer to a reliable link.
It takes care of:
UMESH PRAJAPATI
What are the responsibilities of Network Layer?
- The Network Layer aids in source-to-destination delivery of packet across multiple
networks.
- It performs:
a. Logical Addressing
b. Routing
Name the various error detection methods.
The various error detection methods are:
a. Vertical Redundancy Check (VRC)
b. Longitudinal Redundancy Check (VRC)
c. Cyclic Redundancy Check (VRC)
d. Checksum
What is Bit Stuffing?
- Bit stuffing means adding one extra 0 whenever five consecutive 1s follow a 0.
- This is done so that the pattern 0111110 is not mistaken for a flag.
How does dynamic host configuration protocol aid in
network administration?
- In a large set up where it is difficult to manually configure the IP address of each system,
dynamic host configuration protocol comes very helpful.
- Using this protocol, the administrator can create a pool of IP addresses which are called
scopes. These can be then dynamically assigned to the systems.
Describe the Packet Format of ARP (Address Resolution
Protocol)?
The fields of the packet format of ARP are as follows:
-Hardware type: It is a 16-bit field . Each LAN has been assigned an integer based on its type.
For example, Ethernet is given the type 1.
-Protocol type: This is a 16-bit field defining the protocol. For example, the value of this field
for IPv4 protocol is 0800.
-Hardware length: This is an 8-bit field defining the length of the physical address in bytes.
For example, for Ethernet the value is 6.
-Protocol length: This is an 8-bit field defining the length of the logical address in bytes. For
example, for IPv4 protocol the value is 4.
-Operation: This is a 16-bitfield defining the type of packet. Two packet types are defined:
ARP request (1), ARP reply (2).
-Sender hardware address: This is a variable-length field defining the physical address of the
sender. For example, for Ethernet this field is 6 bytes long.
-Sender protocol address: This is a variable-length field defining the logical (for example, IP)
address of the sender. For the IP protocol, this field is 4 bytes long.
-Target hardware address: This is a variable-length field defining the physical address of the
target. For example, for Ethernet this field is 6 bytes long.
-Target protocol address: This is a variable-length field defining the logical (for example, IP)
address of the target. For IPv4 protocol, this field is 4 bytes long.
UMESH PRAJAPATI
What are the advantages of IPv6 over IPv4?
The next generation IP, or IPv6 has some advantages over IPv4 that can be summarized as
follows:
- Larger Address Space: An IPv6 address is 128 bytes long where IPv4 has 32-bit address
only, this is a huge increase in the address space.
- Better Header Format: IPv6 uses a new header format which simplifies and speeds up the
routing process because most of the options do not need to be checked by routers.
- New Options: IPv6 has new options to allow for additional functionalities.
- Allowance for extension: In IPv6 new technologies can easily embedded.
-Support For Resource Allocation: In IPv6, flow label has been added to enable the source to
request special handling of the packet. This mechanism can be used to support traffic such as
real-time audio and video.
-Support For More Security: The encryption and authentication options in IPv6 provide
confidentiality and integrity of the packet.
What are the different design goals of ATM?
Asynchronous Transfer Mode (ATM) is the cell relay protocol.
The Design Goals of ATM are as follows:
- A technology is needed to take advantage of high rate transmission media and less
susceptible to noise degradation for maximizing the data rates.
-The system must interface with existing systems and provide wide-area inter-connectivity
between.
-The implementation of design must be cheaper enough so that everyone can afford it. If
ATM is to become the backbone of international communications, as indeed, it must be
available at low cost to every user who wants it.
-The new system must be able to work with and support the existing telecommunication
hierarchies.
- The new system must be connection-oriented to ensure accurate and predictable delivery.
- One objective is to move as many of the functions to hardware as possible (for speed) an
eliminate as many software functions as possible (again for speed).
In which switching physical path is present and how it is
different from packet switching?
- Circuit switching uses physical path for transmission of data.
- Here initially a physical connection is established between source and destination & then
data is sent .
- In packet switching data is broken into small parts called packets.
- Numbered packets may take any shortest route for transmission.
- In packet switching virtual connection is made between source and destination.
Give the frame format for data link layer.
- Header, payload filled, trailer are the main parts of a frame.
- Header contains the number of characters in a frame & source and desitnation address.
- Payload filled contains the data to be sent.
- Trailer is the end of packet and it also contains the starting and ending bits.
- This frame is sent to network layer.
UMESH PRAJAPATI
Why acknowledged service is better?
- When data is sent acknowledgement at reception of data occurs.
- If frame is lost, then error is detected and the data is sent again.
- Recovery of data takes place easily.
- It works for reliable channels where error is minimum.
- This is a time saving method and better than unacknowledged service .
What are the problems in Character count framing
method.
- In character count the header gives number of characters in frame.
- E.g. 2,3,4,2,5,7, 0,4
- Initially two frames will be sent as header shows 2 i.e. 3 and 4.
- Again 2 frames will be sent shown by next header and frames are 5and 7.
- 3rd Header is 0 which lead to wastage of time and bandwidth and no frame is sent.
- This leads to error and should be avoided.
Explain Echoplex
- It is a method used to detect error in data link layer and is also called echo checking.
- Here reciever retransmits the data back to the transmitter after reception.
- It requires a full duplex operation for sending and receiving data.
- When data is received at the transmitter,error can be detected by the human operator .
- Its disadvantage is that it depends on humans for error detection and correction.
What is D T E-Data Terminal Equipment.
- It is a Digital device than generates, transmits and recieves messages.
- Terminal here is used to show the movement of messages in and out of the terminal.
- Server and the hosts maintain data and give information to Terminals.
- Examples: TTY: Teletypewriter or Keyboard.
ATMs. Automatic Teller Machines
Explain front end processcor (FEP).
- It is a type of data Terminal Equipment which is a digital device used to input data and give
the required output.
- Performs data communications at host location.
- Host can communicate with all data circuits present at its server.
- The host location can also be remote from the server.
- The main advantage of FEP is it avoids slow processing.
Explain line control Unit (LCU).
- Performs communication related to remote location.
- Directs the flow of data from communication channel to terminals present at remote
location.
- Perform serial to parrellel data conversion at transmitter and vice-versa at reciever.
- Also perform the error detection and correction of the packets sent.
- Control characters can be inserted or deleted from the packets easily .
UMESH PRAJAPATI
Explain UART.
- Called Universal asynchronous receiver transmitter.
- Serial to parrallel conversion of data takes place at transmitter and vice –versa occurs at
reciever.
- Start and stop bits are send with data without any clock pulses for synchronization .
- Formating of Data in Transmitter and Receiver takes place.
- Also allows Voltage level conversion at both ends. Error detection and correction and bits
synchronization is possible and data is sent in form of bytes.
Explain USRT.
- Called universal synchronous receiver transmitter .
- Here clocking information in form of bits is also transferred with the data.
- Here no start and stop bits are transmitted with the data.
- Parity bits are inserted and data sent in form of Blocks.
- Transmit and receive status information is send or received.
- The synchronous & asynchronous receiver transmitter can be combined forming USART.
Explain SNRM
- Set normal response mode is an unnumbered command of synchronous data link control.
- This command places secondary station into normal response mode.
- In normal mode only the secondary station sends and receives information frames.
- Secondary station remains in normal mode until it receives a disconnect command.
- It is disconnected with an unnumbered acknowledgement.
What does address FF hex specify in SDLC address field.
- Synchronous data link control address field is 8 bit and FF hex represents the last address.
- This address is called as the broadcast address and is common to all secondary stations.
- Frame sent with broadcast address is simultaneously sent to all other stations.
- Since it is a 8 bit address so 256 addresses are possible.
- Remaining address can also be used as unique stations or as groups.
Explain BSC
- It is called as binary synchronous communications and is a type of synchronous data link
protocol.
- It is sometimes also called as the bisync or bisynchronous communications.
- Each data transmission precedes a unique synchronization character (SYC).
- The message block can be poll, selection or an acknowledgement.
- The SYC character for ASCII is 16 hex.
What is block mode?
- Block mode is a data transmission mode used for transmitting and receiving data.
- Here data characters are not transmitted as they are typed.
- Here initially the data characters are stored in buffers at the time of typing.
- When the sender presses Enter key then only data is transmitted.
- This set of characters stored in buffers and then sent are called blocks.
- This mode is used in multidrop data communications.
UMESH PRAJAPATI
Explain BOP.
- BOP is called as the bit oriented protocol used in data link protocols.
- It is used for serial bit by bit data transfer over communication channel.
- These bits can be interpreted individually or groups of bits rather fixed length groups.
- Here no dedicated data link control characters are required.
- Example: high level data link communications (HDLC).
Explain stop and wait flow control.
- Here transmitter sends one message and waits for acknowledgement(ACK)
- After receiving ACK it transmits next message.
- Its main advantage is it is very simple and easy to understand.
- Its main disadvantage is its speed is very slow and time is wasted.
- Here it takes twice as long to transmit data and receive ACK.
Explain Poll/select.
- It is a line discipline used for centrally controlled networks.
- Here primary station controls data and secondary station responds to instructions.
- Primary polls to secondary to determine if it has data to transmit.
- If secondary has data it responds to poll with a message and acts as a transmitter.
- If primary selects secondary, it identifies secondary as the receiver and checks if it is ready
to receive data.
Explain the function of line discipline.
- Line discipline is used in the data link layer which coordinates hop to hop data delivery.
- Here the hop can be a computer or a network controller.
- It also coordinates the half duplex transmission on data communication network.
- Acknowledgement discipline is used for simple networks.
- Poll/select is used for centrally controlled data networks.
Give the difference between cable and voice modems.
- Cable modem operates on higher frequencies up to 850MHz.
- Cable modem uses more complex modulation and demodulation techniques than simple
FSK modulation.
- Cable modems connect subscribers to cable tv and voice modem connect subscriber to the
telephone network.
- Cable modem works on Bit rate of 30Mbps and voice modem works on 56000 bps.
- Cable modem works on voice and video whereas voice modem work only on voice.
What are scramble and descramble circuits used for?
- Scramble circuit detects the undesirable sequence of 0 and 1 and convert them into
sequence more acceptable.
- It randomizes the data to convert data back at the receiver.
- For this different algorithms are used both at the transmitter and the receiver.
- Descramble circuit generates the original sequence at the receiver.
- Example: eight consecutive 0’s are converted to alternate 0’s and 1’s which is more
acceptable to the clock recovery.
UMESH PRAJAPATI
Explain adaptive equalizers.
- These are located in the receiver section of the modem.
- It automatically adjusts the gain and delay of the input received to compensate for the phase
and amplitude impairments.
- It determines the quality of the received signal.
- It continuously vary its settings to achieve bandwidth characteristics for the circuit.
- Because of their adjusting property they are called adaptive equalizers
Issues for data interfacing in physical layer.
- Raw data is to be converted into binary form 0 and 1 to be sent to the next layer.
- Different voltages are required for representing 0(0 to1.5 volts) and 1(3 to 5 volts).
- How many nano seconds a bit should last.
- How transmission may proceed from physical layer to data link layer or from
communication channel to physical layer .
- How many pins network connectors may use for serial communication.
Which physical property of information is changed for
transmission?
- Current or Voltage of signal is changed for transmitting it in the form of zeros and ones.
- Signal broken into harmonics called frequency using Fourier transform.
- Amplitude of signals due to Fourier transform may be reduced.
- A filter is attached before the transmission medium which allows only required harmonics
to pass through the medium.
- Signal at the receiver end can be reconstructed from harmonics using inverse Fourier
transform .
Explain resource sharing
- Different resources are attached to a computer and if they can be used by other computers in
the same network it is called resource sharing.
- It is generally possible in local area networks confined to offices or institutes.
- The host requires an operating system to access the resources of the server.
- FTP called the file transfer protocol is used to provide the shared access between host and
the server.
- It is cheaper, faster and easier to maintain.
Which transmission medium radiates and how it can be
avoided?
- Twisted pair cable radiates energy during transmission.
- Two wires present in the cable constitute an Antenna which radiates energy in all directions.
- The wires are twisted like a DNA present in human blood.
- Waves coming out from the two twisted wires are out of phase by 180 degree so they cancel
out.
- Leads to no radiations and also sheath could be provided outside the cable to provide
insulation.
UMESH PRAJAPATI
Which category of twisted pair is mainly used.
- There are up to 7 categories of twisted pair but Category 3 and 5 twisted pairs are mostly
used.
- Category 3 has 2 individually insulated wires twisted together .
- 4 such twisted pairs are put together in a sheath to form the medium.
- Category 5 is same as 3 with more number of twist per cm. More the number of twists the
better the communication medium .
- Leads to less cross talk and better signal transmission over longer distances.
Which transmission medium works at 2 giga bits per
second.
- The fiber cable sends data at rate of 2 giga bites per second.
- Cable consists of Hair like thin fiber which works on the principle of total internal
reflection.
- It transmits data with speed of light and works on bandwidth up to terahertz.
- Transmitting medium is fiber of glass which is insulated on the outside.
- Advantage:Attenuation of signal is minimum.
UMESH PRAJAPATI
Networking Interview Questions and Answers - Part 2
Network Security - Data Encryption Standard (DES) weakness and strength - The Data Encryption
Standard (DES) is a symmetric key block cipher which takes 64-bit plaintext...........
If you are a victim of Denial of Service (Dos) then what you do?
Network Security - The function of a denial of service attack is to flood its target machine with too
much traffic.............
Network Security - What are Brute Force Attacks? - Brute forcing is a mechanism which is used by an
attacker to break the encryption............
Network Security - How do you use RSA for both authentication and secrecy? - RSA is a public key
encryption algorithm. The RSA algorithms are based...........
Network Security - Can you differentiate among encoding, encryption and hashing? - RSA is a public
key encryption algorithm. Encoding: Basically encoding is used to protect the integrity of data
as............
Network Security - A secure hash function should have the following characteristics:.......
Network Security - A digital signature is an electronic analogue of a written signature; the digital
signature can be used to provide assurance............
Network Security - Basically Authentication Header protects IP header and provides the complete
authenticity to the IP packets.............
Explain SSL Protocol. How does it protect internet users from various threats?
Network Security - The SSL protocol (Secure Socket Layer protocol) was originally developed by
Netscape..............
Network Security - What is PIX firewall security? How does it differ from a firewall? - It is a popular IP
firewall and NAT (Network Address Translation) appliance..............
Network Security - What are Malware? Explain different types of Malware - Malware is a software
UMESH PRAJAPATI
program which is developed to destroy a computer system...............
Network Security - What are replay attacks? - Replay attacks are the network attacks in which an
attacker spies the conversation...............
Network Security - ‘encrypt’ and ‘compress’ data during transmission - Data should be transmitted
over any communication network in such a way..............
Network Security - Symmetric-Key Cryptography: Symmetric-key cryptography uses a single key for
both encryption and decryption...............
IP (Internet Protocol) - Addressing: For the purpose of delivering datagram packets, IP needs to know
about the address of the destination........
Classes of IP address - IP addresses are organized into classes. For convenience of humans, IP
addresses are expressed in the decimal format........
Broadcast, Unicast and Multicast - Unicast: A term used in communication to describe a piece of
information to send from one point to another........
What is Network Mask? - A network mask is used for determination of what subnet an IP address
belongs to........
Subnetting - A subnet describes a set of networked computers which have common IP address
routing prefix.........
User Datagram Protocol (UDP) - User datagram protocol allows computer applications to send
messages as datagram packets from source to destination on an Internet Protocol.......
TCP Windowing concept - TCP Windowing is a concept that is used for avoiding congestion in the
network traffic........
UMESH PRAJAPATI
Networking - What is the Domain Name System (DNS)? What are the advantages of it?
Domain Name System (DNS) - A hierarchical naming system for computer systems, services or for
that matter any resource participating in the internet........
What is the TTL (Time to Live)? - TTL is a value in data packet of Internet Protocol. It communicates
to the network router whether or not the packet........
Use of Internet Control Message Protocol (ICMP) - Internet Control Message Protocol is one of the
important protocols in the Internet Protocol suite.........
What is the use of IGMP protocol? - Internet Group Management Protocol: - It allows internet hosts
to participate in multicasting.........
What are Ping and Tracert? - Ping and tracert are the commands used to send information to some
remote computers to receive some information..........
Explain RSVP. How does it work? - Resource Reservation protocol is used to reserve resources across
a network. It is used for requesting a specific Quality of Service (QoS) from the network.......
Explain the concept of DHCP - Dynamic Host Configuration Protocol is used assigning IP addresses to
computers in a network.........
differences between a domain and a workgroup - In a domain, one or more computer can be a
server to manage the network. On the other hand in a workgroup........
Explain how NAT works - Network Address Translation translates and IP address used in a network to
another IP address........
What is PPP protocol? Explain PPP packet format - Point to Point protocol helps communication
between 2 computers over a serial cable, phone line or........
What is IP Spoofing and how can it be prevented? - IP spoofing is a mechanism used by attackers to
gain unauthorized access to a system. Here, the........
IP datagram, Fragmentation and MTU - IP datagram can be used to describe a portion of IP data.
UMESH PRAJAPATI
Each IP datagram has set of fields arranged.........
Circuit Level Gateway - A circuit level gateway is used to find if a session in TCP handshaking is
legitimate or not. It can be.........
What is 'Gateway Of Last Resort'? - A Gateway of Last Resort or Default gateway is a route used by
the router when no other known route.........
What are switches? Explain the concepts of Layer-3 switches - It is a device that connects multiple
network segments..........
What is Router? Explain components of Routers - The way switches connect multiple computers, a
router connects multiple networks. Routers comprise .........
Different layers in the OSI model - Application Layer: Closest to the end user, Interact directly with
the software application........
What is Subneting? Explain the advantages of using Subneting - Subneting is dividing a network into
several subnets......
UMESH PRAJAPATI
Networking - What is VLSM, Variable length subnet masking?
What is VLSM, Variable length subnet masking? - VLSM is a means of allocating IP addressing
resources to subnets according to their individual need .......
What is Data Fragmentaion? Explain how Data Fragmentaion works - Fragmentation occurs when
storage space is used inefficiently due to which storage capacity and performance is reduced. ........
Concepts and capabilities of IP Datagram - Data transmitted over an internet using IP is carried in
messages called IP datagrams.........
The differences between the communication and transmission are: Physical movement of
information and concerning about bit priority, synchronization, clock etc is referred as
transmission.......
The differences between FTP and TFTP: FTP is connection oriented, where as TFTP is not........
The differences between bit rate and baud rate: Bit rate is measured as number of data bits
transmitted / second in communication channel........
Network Basic Input Output System provides session layer of OSI model related services which
allows the applications on different computers for communicating over a LAN.......
The differences between ARP and RARP: Address Resolution Protocol is utilized for mapping IP
network address to the hardware address that uses data link protocol.........
POP3: All emails are to be downloaded again if used by another desktop PC for checking the
email.........
UMESH PRAJAPATI
What is Message Oriented Middleware (MOM)? - Networking
Groupware server is software that allows the collaboration of users, irrespective of location through
the internet.....
TP-Lite Monitor: The integration of TP monitors functions in a database engines is called as TP-Lite
monitor........
Media Access Control address is an identifier for assigned to most network adapters or Network
Interface Cards by the manufacturer for the purpose of identification.......
What is LAN? - LAN is a computer network that spans a relatively small area. Most LANs are confined
to a single building or group of buildings..........
Difference Between an Intranet and the Internet - There's one major distinction between an intranet
and the Internet: The Internet is an open, public space.........
Define the term Protocol - Protocol is a standard way of communicating across a network. A protocol
is the language of the network. ........
Define File Transfer Protocol - File Transfer Protocol (FTP), a standard Internet protocol, is the
simplest way to exchange files between computers on the Internet.........
Explain the 7 Layers of OSI - Layer 1: Physical layer It represents all the electrical and physical
specifications for devices. ........
What is a network? What are the different kinds of network? - A network is a group of computers or
nodes connected together. They are connected with each other by communication paths........
Networking - What are network topologies? Explain Ring, Bus and Star topology
What are network topologies? Explain Ring, Bus and Star topology - A network topology describes
the layout of a network. It describes how different nodes and elements.........
Explain IP, TCP and UDP - Transmission control Protocol is used to establish communication between
UMESH PRAJAPATI
nodes or networks and exchange data packets.........
How would you define IP address? - IP address or Internet Protocol address is the address of a device
attached to an IP network (TCP/IP network)........
Explain the functionality of PING - Ping Is particularly used to check if the system is in network or
not. It also gives packet lost information.........
Networking - Explain the core naming mechanism, Domain Name System (DNS)
Explain the core naming mechanism, Domain Name System (DNS) - A Domain Name system is used
to convert the names of the website on the internet to IP addresses..........
What is NAT? Explain how NAT actually works - Network Address Translation is the full form of
NAT........
Networking - Concept of Collision Domain. Explain why collisions occur in HUBS and Repeaters.
Concept of Collision Domain - If two computer systems transmit at the same time a collision
occurs.......
Concepts and capabilities of Routing Table - The information about the data packets route over an
Internet Protocol will be determined.......
What is static and dynamic routing? - In static routing the routes are described by fixed paths
through a data network.......
What is Routing Protocol? - Routing protocol specifies how the routers communicate, disseminating
the information which enables the routers to be selected between two nodes in a network.......
Explain Interior and Exterior Routing Protocols - Autonomous system’s routing is handled by Interior
Gateway Protocols.......
Define Distance vector routing protocol - Packet switched networks utilizes Distance Vector Routing
Protocol for the purpose of deciding the best packet forwarding path.......
UMESH PRAJAPATI
Difference between Broadcast and Multicast - Broadcast : Every device on the network will receive
the transmitted packets........
Distance Vector vs. Link-State Protocol - Each router in the protocol sends information about
destination and next hop to reach there, to its neighbor routers......
Explain the concept of RIP protocol - Routing Information Protocol is widely used protocol for the
purpose of managing router information within a self containing network such as LAN.......
Explain the techniques to avoid Routing Loop issue in RIP - Hold-down timer: Prevention of sending
inaccurate routing updates by routers is done by Hold-down timer........
Explain the concepts of IGRP(Interior gateway protocol) - Interior Gateway Routing Protocol is the
proprietary protocol developed by CISCO for addressing the issues associated with routing in large
and heterogeneous networks.......
Concept of EIGRP(Enhanced interior gateway routing protocol) - EIGRP transmits the subnet mask
for each routing entry by which EIGRP’s VLSM and route summarization is enabled........
Explain the different types of packets in EIGRP - Hello Packets: EIGRP neighbor ship is discovered and
maintained by Hello Packets. If the router fails to receive a hello packet within the hold timer, the
corresponding router will be declared dead. .......
What is Dual and Successor in EIGRP? - DUAL is a convergence algorithm. Loop free operations are
provided by this algorithm at every instant through a route computation.......
Explain the different tables used in EIGRP - Neighbor table: The neighbor relationships are tracked in
this table which are the basis for EIGRP routing and convergence activity.......
What are Passive and Acitve route states? - An operational route’s normal condition is known as
‘Passive State’. The router will not seek to replace a lost route, when it is in the normal condition.......
Networking - Explain the OSPF, Open Shortest Path First. What are the different areas in OSPF?
Explain the OSPF, Open Shortest Path First - OSPF is a protocol for routing to be used in IP networks.
It is a link-state routing protocol and is a part of interior gateway protocols group.......
UMESH PRAJAPATI
Networking Questions for Freshers with Answers
Symmetric Cryptosystems: The same key is used for both encryption and decryption......
The following are the disadvantages of Symmetric Cryptosystems: - Key transportation is one
disadvantage of Symmetric Cryptosystems.......
The following are the disadvantages of Asymmetric Cryptosystems: -The encryption speed is the
disadvantage of Asymmetric Cryptosystems. Popular secret-key encryption methods......
Public Key Infrastructure: A set of hardware, software, people, policies and procedures comprises
the Public Key Infrastructure (PKI) and digital certificates are revoked.......
PKI Client: PKI Client is software which enables the USB of eToken operation and implementation of
eToken solutions which are PKI based.......
A way in which data is transmitted between networks in a secured manner. The complete data is
segmented into packets and then transmitted through the tunnel........
VPN Tunneling Packets are packets to transmit over VPN in a specific VPN protocol format........
Voluntary Tunnel: The user creates a voluntary tunnel model. This model is typically uses a L2TP
enabled client........
Static Tunnel: The manually created tunnels are called Static Tunnels. Static tunnels creation is the
only choice......
Point-to-Point Protocol is known as data link protocol. This protocol is most commonly for
establishment of direct connection among network nodes........
UMESH PRAJAPATI
The following are the fields in the format of PPP packet. The fields transmission is from left to
right........
PPTP is one of the methods to implement Virtual Private Networks. Confidentiality or encryption
does not provided by PPTP.......
Password Authentication Protocol is one of the simple authentication protocols which are used for
the purpose of authenticating a user to a network access server........
Data origin authentication, data integrity and replay protection are provided by the Authentication
Header protocol......
Encapsulating Security Payload is a protocol for the inter security architecture. It is the key
protocol.......
NetBIOS protocol utilizes the 802.2 type 1 mode for the purpose of providing the NetBIOS/NetBEUI
name service and also the datagram service......
The transmission of datagram to a host group is done in IP multicasting by setting zero or more hosts
that are identified by a single IP destination address......
Ping: Ping is used for verification of IP-Level connectivity. The following are the processes for using
ping:........
An ICMP echo packet to the named host is sent by Tracert. It sends packet with a TTL of 1, then TTL
of 2 and so on.......
UMESH PRAJAPATI
Use of RTP and RTCP protocols - Networking
Real-time Transport Protocol is a standardized packet format. It is used for delivering audio and
video over internet........
RTP multiplexing is a concept used for carrying multiple voice streams between IP telephony
gateways, in one RTP packet........
RSVP allocates resources for signaling messages which traverse the network. RSVP is receiver-
initiated.......
The basic communication protocol for internet is TCP/IP. It is also being used as communication
protocol in a private network.......
TCP/IP protocol maps four layers namely Application Layer, Transport and Internet Layer and
Network Interface Layer.......
TCP headers should perform various tasks. The tasks are performed by various ports as follows:.......
Dynamic Host Configuration Protocol is one of the communication protocol which lets the network
administrators manage and assignment of internet protocol addresses of an enterprise
automatically.......
In a workgroup: All computer systems are peers and no computer can not control another
computer......
Baseband: Digital signals are used, Frequency division multiplexing is not possible.......
The core concept of Redundant Array of Independent Disks is two or more drives are combined
together for improvement of performance and fault tolerance......
Terminal service is a client-server environment. In this environment, one computer acts as a server
which receives requests from the clients........
UMESH PRAJAPATI
Problems associated with operating a switched LAN - Networking
The following are the problems in brief in a switched LAN. Packet sniffing – the ports need to be
picked by one and replicate them for monitoring port........
Socket activities are monitored by IP and Socket Monitor tool. Socket monitor is designed for
programming using IP and Sockets.......
Mutex: A mutex object allows only one thread among the threads concurrently executed, into a
controlled section in a serialized fashion.......
Priority inversion is the scenario in scheduling where a task holds shared resources which have lower
priority for the higher priority resource.......
Microsoft Message Queue is a protocol for messaging. Applications are allowed for running on
disparate servers for communicating in a fail-safe manner.......
Networking notes
Active FTP: A Client connects from a random unprivileged port to the FTP server port 21, using Active
FTP......
Maximum Transmission Unit is the size of a layer of communication protocols of the largest protocol
data unit which it can pass onwards........
Ethernet is a LAN architecture, which was developed by Xerox Corporation in cooperation with DEC
and Intel.......
Ethernet Access Scheme is called Carrier Sense Multiple Access with Collision Detect (CSMA/CD).......
Token ring is a LAN technology that resides at the Data Link Layer of the OSI model. Special three-
UMESH PRAJAPATI
byte frame is used to travels around the ring.......
Network segment is a portion in a computer network where communication among every device is
done using the same physical layer........
Hub: Hub is a device in a network, Data packet from one port is sent to all other ports in a
network........
A packet is like a device or in some cases, a software. A router determines the next network point to
which the data packet should be sent towards its destination........
A set of data rates are advertised by any gateway server. Some streams can be blocked by a gateway
server from reaching the SP, in case the SP is opted for this service.......
A Media Access Control address is a unique identifier that is assigned to the network adapters or
NICs by the manufacturers.......
Spanning Trees are a standard technique implemented in LAN connections. On a mesh topology, a
set of spanning tree algorithms were developed for prevention of redundant transmission of data
along intermediate hops between a source and a destination host.......
A Virtual Private Network is a private data network which is used for public telecommunication
infrastructure.......
Private IP Address: An IP address is private if the number is within a specific range which is reserved
for private uses by Internet Standards group......
MAC Address: A MAC address is a digital name of interface. Each and every network interface has a
unique MAC address with unique ones.......
Address Resolution Protocol is used for networks that support hardware broadcast. An ARP will not
work on x.25 network.......
UMESH PRAJAPATI
What is the Reverse Address Resolution Protocol (RARP)? - Networking
Reverse Address Resolution Protocol (RARP) is a link layer networking protocol that is used by a host
computer system which obtain its IP address......
TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or
not the packet should be in the network for too long or discarded.......
Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It
is mainly used in operating system of networked computers.......
Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of
the destination. By including the host addressing, this task is carried out by IP.....
IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in
the decimal format.......
Unicast: A term used in communication to describe a piece of information to send from one point to
another........
A network mask is used for determination of what subnet an IP address belongs to. An IP address
has network address and the host address.....
A subnet describes a set of networked computers which have common IP address routing
prefix.........
User datagram protocol allows computer applications to send messages as datagram packets from
source to destination on an Internet Protocol........
TCP Windowing is a concept that is used for avoiding congestion in the network traffic......
Domain Name System (DNS). What are the advantages of it? - Networking
A hierarchical naming system for computer systems, services or for that matter any resource
participating in the internet.......
Data encoding and modulation. How do they differ from one another? - Networking
Data Encoding: A technique that requires the polar change in the line level after each bit. To gain the
UMESH PRAJAPATI
control circuitry that ensures consistent level discrimination.......
Packet Switching: A method of transmitting data group with the concern of content, type or
structure into suitably-sized blocks.......
Explain what POP3 is. How does is differ from POP? - Networking
POP3 is a protocol that is used for downloading email from an ISP to the recipient mail program.......
IP address is a logical address of a computer system, where as MAC address is the physical address
of a computer system that is usually persisted in network card........
A hardware loopback pug is a simple device for redirecting the outgoing transmissions from a system
directly back into it........
Pulse Code Modulation: A digital representation of an analog signal. Signal sampling is done with the
magnitude of the signal regularly at uniform intervals.......
Subnet mask is utilized for isolating the network id and host ids. This is to reduce the broadcast
domain or to reduce heavy network traffic.......
A twisted pair is a cable in which the cables are twisted at regular distances. Twisted pairs are used
for transferring signals with high frequency........
Kerberos is an authentication protocol in a compute network that makes the nodes communicates
over a non-secure network for providing their identification to one another in most secure
manner......
ISDN uses circuit switching where as ATM uses packet switching communication.......
UMESH PRAJAPATI
What is application layer? - The application layer is located at the top of the TCP/IP protocol
layers.........
Define DNS - The DNS translates Internet domain and host names to IP addresses.......
Define Telnet - Telnet is the main Internet protocol for creating a connection to a remote
server..........
Define SMTP - SMTP - Short for Simple Mail Transfer Protocol, a protocol for sending e-mail
messages between servers.........
What is a MAC Address? - MAC (Media Access Control) addresses are globally unique addressed that
are written into hardware at the time of manufacture.........
MAC vs. IP Addressing - Whereas MAC addressing works at the data link layer, IP addressing
functions at the network layer (layer 3).........
Define Spanning-Tree Protocol (STP) - Spanning-Tree Protocol (STP) as defined in the IEEE 802.1D is a
link management protocol that provides path redundancy........
What is VPN? - A VPN is a service that offers secure, reliable connectivity over a shared public
network infrastructure such as the Internet..........
Difference between Static and Dynamic IP - Static IP is also called as permanent address assigned to
UMESH PRAJAPATI
each device in a network, whereas Dynamic .......
Difference between public and private IP - A public IP address allows equipment accessible to
everyone on the internet.........
What is Network Address Translation? - Network Address Translation acts as an agent between the
Internet and a local network........
What is subneting? - Subnet adds one level to the way IP address is represented. It logically
organizes the network.........
Define Address Resolution Protocol - Address Resolution Protocol ARP, is responsible for mapping an
IP address to its corresponding ........
Maximum Transfer Unit, MTU - MTU specifies the largest amount of data that can be transferred
across a network..........
Explain the structure and use of internet addresses - Each IP address is 32 bit long. In human
language the IP addresses are written in dotted decimal notation........
Explain how names are translated (resolved) into IP address - Domain Name server or DNS is used to
resolve names into IP addresses. When a web address is entered into the browser........
Describe the basics of internet routing - When a source sends a packet to a destination, this packet
has a specific path or route it follows. ........
UMESH PRAJAPATI
UMESH PRAJAPATI
Ethernet Networking Interview Questions and Answers - Ethernet FAQs
Define broadcast domain - It is a logical area in a computer network where any computer connected
to the network can directly ........
Bridge vs switch - A bridge connects two different LAN networks. A switch is something like you can
connect many .........
What is a Router? - A router is a device or sometimes a software in a computer which decides the
next network point to .........
Define gateway - A gateway is a network point that provides entrance into another network. On the
Internet, a node or stopping point........
UMESH PRAJAPATI
UMESH PRAJAPATI
Firewall Interview Questions and Answers - Firewall FAQs
What is firewall? - A firewall is a hardware or software installed to provide security to the private
networks connected to the internet.........
What are the types of firewalls? - Packet Filtering Firewall:This type of Firewall detects packets and
block unnecessary packets and makes network traffic release.........
Digital Signatures - Digital signature is an attachment to an electronic message used for security
purpose..........
What is Ethernet technology? - Ethernet technology is a high speed broadcast bus technology..........
Explain the use of network interface card, NIC - NIC is used to connect computer to an Ethernet
network.........
Explain token ring technology - In this technology, all the devices are arranged in a circle. A token
moves around the circular network.........
What is CSMA and CD concept? - In CSDA (carrier sense multiple access), presence of any digital
signal in a network is checked before transmission. ........
UMESH PRAJAPATI
What is NetBIOS protocol? - NetBIOS (Network Basic Input/Output System) Protocol allows
applications on separate computers to communicate over a LAN.........
What is IGMP protocol? - Internet Group Management Protocol, allows internet hosts to multicast.
i.e. to send messages to a group of computers. .........
What is HTTP (Hypertext Transfer Protocol)? - HTTP or Hyper Text Transfer Protocol is provides a set
of rules to transfer files, videos, images over the world wide web..........
What is NNTP (Network News Transfer Protocol)? - NNTP or Network News Transfer Protocol is used
to manage the notes posted on Unset newsgroup (a collection of posted notes on a subject posted
by different users).........
What is POP3 (Post Office Protocol 3)? - POP3 or Post Office Box 3 is used fro receiving emails. It is a
client server protocol which holds the email. .........
What is SNMP (Simple Network Management Protocol)? - SNMP or Simple Network Management
Protocol is typically used for managing the network. Managing the network includes managing the
nodes present in the network.........
UMESH PRAJAPATI
Routers Interview Questions and Answers - Routers FAQs
What is Routing table? - A routing table stores the routes of the various nodes in a network. Nodes
can be any electronic device connected to the network..........
What is Routing Protocols? - Routing protocols are used to assist in achieving the basic purpose of
routing. They specify the routers the method to communicate with each other.........
What is Distance Vector Routing Protocols? - The main goal of Distance Vector Routing Protocols Is
to find out the best path for he data packet to reach the destination..........
UMESH PRAJAPATI
UMESH PRAJAPATI
Security - Answers to Security Interview Questions
What is Data encryption? - Data encryption ensures data safety and very important for confidential
or critical data..........
What is the Public Key Encryption? - Public key encryption use public and private key for encryption
and decryption. In this mechanism, .........
Networking TCP Layer Interview Questions and Answers - TCP Layer FAQs
Transmission Control Protocol, TCP - TCP ensures reliable and end to end delivery of segments of
information. Segments are acknowledged to the source when received by the destination..........
User Datagram Protocol, UDP - The UDP is a connectionless, unreliable service. UDP messages can
be lost and duplicated........
What is TCP windowing concept? - TCP windowing concept is primarily used to avoid congestion in
the traffic. It controls the amount of unacknowledged data.......
Networking TCP Layer Interview Questions and Answers - TCP Layer FAQs
Transmission Control Protocol, TCP - TCP ensures reliable and end to end delivery of segments of
information. Segments are acknowledged to the source when received by the destination..........
User Datagram Protocol, UDP - The UDP is a connectionless, unreliable service. UDP messages can
be lost and duplicated........
What is TCP windowing concept? - TCP windowing concept is primarily used to avoid congestion in
the traffic. It controls the amount of unacknowledged data.......
UMESH PRAJAPATI
UMESH PRAJAPATI
VPN Interview Questions and Answers - VPN Interview FAQ
What is Trusted and Untrusted Networks? - Trusted networks: Such Networks allow data to be
transferred transparently. The machines using a trusted network are usually administered by an
Administrator to ensure that private........
What are the different types of VPN? - Remote Access VPN:- Also called as Virtual Private dial-up
network (VPDN) is mainly used in scenarios where remote access to a network becomes
essential.........
What are the different authentication methods used in VPNs? - The authentication method uses an
authentication protocol. The methods are:........
What is Tunneling? - Tunneling is a mechanism provided to transfer data securely between two
networks. The data is split........
What are voluntary and compulsory tunnels? - Users computer is an end point of the tunnel and acts
as tunnel client. Here the client or user issues a request to configure and create a voluntary
tunnel..........
Explain static and dynamic tunnels - Tunnels that are created manually are static tunnels. Tunnels
that are auto discovered are dynamic tunnels. .........
UMESH PRAJAPATI
Subneting Interview Questions
Importance of increasing and decreasing subnet bits - Adding 1’s as a bit means increasing the
subnets and decreasing the hosts. Removing or decreasing........
Why do we need a subnet mask? - A subnet mask allows identification of host part and network part
of an IP address..........
What is RTP? - Real-Time Transfer Protocol lays a standard or a way to transfer or manage real time
data over a network.........
What is RTP Multiplexing? - RTP multiplexing allows multiple media flows within a single RTP data
payload between two points.........
Explain the use of RTP and RTCP protocols - Use of RTP and RTCP:- RTP can be used to transfer Real
time data like voice packets.........
Describe the format of RTP and RTCP packets - The 32 bits of RTP packet format is as follows:- (L to
R).........
Describe how the multicast protocol works - Multicast protocol or Internet protocol delivers a singles
message to multiple machines. One packet from the source is replicated and sent to the
UMESH PRAJAPATI
destination.........
Describe how to control the scope of multicast transmissions - Controlling the scope of multicast
transmission restricts the range of group members. TTL (Time To Live) is one of the mechanisms to
limit the scope.........
Explain why use Multicasting - When the same message or packet needs to be sent to multiple
destinations, multicasting is used.........
UMESH PRAJAPATI
Socket Programming Interview Questions and Answers
Datagram vs. stream - Stream can be considered as a pipe that allows full duplex connection. A
datagram or a packet on the other hand, has a source and a destination.........
What is a stream socket? - A stream socket provides two way communications between a client and
server. This communication is reliable and sequenced.........
UMESH PRAJAPATI
Secured Socket Layer (SSL) Interview Questions - SSL FAQs
What is SSL? - SSL is Secured Socket Layer. SSL is used to establish a secured and an encrypted
connection between a server and the browser.........
What are the two important TCP Socket classes? - The Socket class provides enriched methods and
properties for network communications.......
What are the advantages and disadvantages of Java Sockets? - Advantages: Flexible and powerful,
cause low network traffic if efficiently used, only updated information can be sent..........
Networking - What is race condition? How does the race condition occur?
What is race condition? How does the race condition occur? - A race condition occurs when there
are two or more processes trying to access the same data concurrently or performing the same
operation concurrently.......
What are TP-Lite and TP-Heavy Monitors? - TP – Lite is an integration of TP Monitor functions in a
database engine......
UMESH PRAJAPATI