You are on page 1of 62

Networking

1) What is a Link?

A link refers to the connectivity between two devices. It includes the type of cables and
protocols used in order for one device to be able to communicate with the other.

2) What are the layers of the OSI reference model?

There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer,
Session Layer, Presentation Layer and Application Layer.

3) What is backbone network?

A backbone network is a centralized infrastructure that is designed to distribute different


routes and data to various networks. It also handles management of bandwidth and various
channels.

4) What is a LAN?

LAN is short for Local Area Network. It refers to the connection between computers and
other network devices that are located within a small physical location.

5) What is a node?

A node refers to a point or joint where a connection takes place. It can be computer or device
that is part of a network. Two or more nodes are needed in order to form a network
connection.

6) What are routers?

Routers can connect two or more network segments. These are intelligent network devices
that store information in its routing table such as paths, hops and bottlenecks. With this info,
they are able to determine the best path for data transfer. Routers operate at the OSI Network
Layer.

7) What is point to point link?

UMESH PRAJAPATI
It refers to a direct connection between two computers on a network. A point to point
connection does not need any other network devices other than connecting a cable to the NIC
cards of both computers.

8) What is anonymous FTP?

Anonymous FTP is a way of granting user access to files in public servers. Users that are
allowed access to data in these servers do not need to identify themselves, but instead log in
as an anonymous guest.

9) What is subnet mask?

A subnet mask is combined with an IP address in order to identify two parts: the extended
network address and the host address. Like an IP address, a subnet mask is made up of 32
bits.

10) What is the maximum length allowed for a UTP cable?

A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation
can be overcome by using repeaters and switches.

11) What is data encapsulation?

Data encapsulation is the process of breaking down information into smaller manageable
chunks before it is transmitted across the network. It is also in this process that the source and
destination addresses are attached into the headers, along with parity checks.

12) Describe Network Topology

Network Topology refers to the layout of a computer network. It shows how devices and
cables are physically laid out, as well as how they connect to one another.

13) What is VPN?

VPN means Virtual Private Network, a technology that allows a secure tunnel to be created
across a network such as the Internet. For example, VPNs allow you to establish a secure
dial-up connection to a remote server.

14) Briefly describe NAT.

NAT is Network Address Translation. This is a protocol that provides a way for multiple
computers on a common network to share single connection to the Internet.

15) What is the job of the Network Layer under the OSI reference model?

The Network layer is responsible for data routing, packet switching and control of network
congestion. Routers operate under this layer.

UMESH PRAJAPATI
16) How does a network topology affect your decision in setting up a network?

Network topology dictates what media you must use to interconnect devices. It also serves as
basis on what materials, connector and terminations that is applicable for the setup.

17) What is RIP?

RIP, short for Routing Information Protocol is used by routers to send data from one network
to another. It efficiently manages routing data by broadcasting its routing table to all other
routers within the network. It determines the network distance in units of hops.

18) What are different ways of securing a computer network?

There are several ways to do this. Install reliable and updated anti-virus program on all
computers. Make sure firewalls are setup and configured properly. User authentication will
also help a lot. All of these combined would make a highly secured network.

19) What is NIC?

NIC is short for Network Interface Card. This is a peripheral card that is attached to a PC in
order to connect to a network. Every NIC has its own MAC address that identifies the PC on
the network.

20) What is WAN?

WAN stands for Wide Area Network. It is an interconnection of computers and devices that
are geographically dispersed. It connects networks that are located in different regions and
countries.

21) What is the importance of the OSI Physical Layer?

The physical layer does the conversion from data bits to electrical signal, and vice versa. This
is where network devices and cable types are considered and setup.

22) How many layers are there under TCP/IP?

There are four layers: the Network Layer, Internet Layer, Transport Layer and Application
Layer.

23) What are proxy servers and how do they protect computer networks?

Proxy servers primarily prevent external users who identifying the IP addresses of an internal
network. Without knowledge of the correct IP address, even the physical location of the
network cannot be identified. Proxy servers can make a network virtually invisible to external
users.

24) What is the function of the OSI Session Layer?

This layer provides the protocols and means for two devices on the network to communicate
with each other by holding a session. This includes setting up the session, managing

UMESH PRAJAPATI
information exchange during the session, and tear-down process upon termination of the
session.

25) What is the importance of implementing a Fault Tolerance System? Are there
limitations?

A fault tolerance system ensures continuous data availability. This is done by eliminating a
single point of failure. However, this type of system would not be able to protect data in some
cases, such as in accidental deletions.

26) What does 10Base-T mean?

The 10 refers to the data transfer rate, in this case is 10Mbps. The word Base refers to base
band, as oppose to broad band. T means twisted pair, which is the cable used for that
network.

27) What is a private IP address?

Private IP addresses are assigned for use on intranets. These addresses are used for internal
networks and are not routable on external public networks. These ensures that no conflicts are
present among internal networks while at the same time the same range of private IP
addresses are reusable for multiple intranets since they do not “see” each other.

28) What is NOS?

NOS, or Network Operating System, is specialized software whose main task is to provide
network connectivity to a computer in order for it to be able to communicate with other
computers and connected devices.

29) What is DoS?

DoS, or Denial-of-Service attack, is an attempt to prevent users from being able to access the
internet or any other network services. Such attacks may come in different forms and are
done by a group of perpetuators. One common method of doing this is to overload the system
server so it cannot anymore process legitimate traffic and will be forced to reset.

30) What is OSI and what role does it play in computer networks?

OSI (Open Systems Interconnect) serves as a reference model for data communication. It is
made up of 7 layers, with each layer defining a particular aspect on how network devices
connect and communicate with one another. One layer may deal with the physical media
used, while another layer dictates how data is actually transmitted across the network.

31) What is the purpose of cables being shielded and having twisted pairs?

The main purpose of this is to prevent crosstalk. Crosstalks are electromagnetic interferences
or noise that can affect data being transmitted across cables.

32) What is the advantage of address sharing?

UMESH PRAJAPATI
By using address translation instead of routing, address sharing provides an inherent security
benefit. That’s because host PCs on the Internet can only see the public IP address of the
external interface on the computer that provides address translation and not the private IP
addresses on the internal network.

33) What are MAC addresses?

MAC, or Media Access Control, uniquely identifies a device on the network. It is also known
as physical address or Ethernet address. A MAC address is made up of 6-byte parts.

34) What is the equivalent layer or layers of the TCP/IP Application layer in terms of
OSI reference model?

The TCP/IP Application layer actually has three counterparts on the OSI model: the Session
layer, Presentation Layer and Application Layer.

35) How can you identify the IP class of a given IP address?

By looking at the first octet of any given IP address, you can identify whether it’s Class A, B
or C. If the first octet begins with a 0 bit, that address is Class A. If it begins with bits 10 then
that address is a Class B address. If it begins with 110, then it’s a Class C network.

36) What is the main purpose of OSPF?

OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to
determine the best possible path for data exchange.

37) What are firewalls?

Firewalls serve to protect an internal network from external attacks. These external threats
can be hackers who want to steal data or computer viruses that can wipe out data in an
instant. It also prevents other users from external networks from gaining access to the private
network.

38) Describe star topology

Star topology consists of a central hub that connects to nodes. This is one of the easiest to
setup and maintain.

39) What are gateways?

Gateways provide connectivity between two or more network segments. It is usually a


computer that runs the gateway software and provides translation services. This translation is
a key in allowing different systems to communicate on the network.

40) What is the disadvantage of a star topology?

One major disadvantage of star topology is that once the central hub or switch get damaged,
the entire network becomes unusable.

UMESH PRAJAPATI
41) What is SLIP?

SLIP, or Serial Line Interface Protocol, is actually an old protocol developed during the early
UNIX days. This is one of the protocols that are used for remote access.

42) Give some examples of private network addresses.

10.0.0.0 with a subnet mask of 255.0.0.0


172.16.0.0 with subnet mask of 255.240.0.0
192.168.0.0 with subnet mask of 255.255.0.0

43) What is tracert?

Tracert is a Windows utility program that can used to trace the route taken by data from the
router to the destination network. It also shows the number of hops taken during the entire
transmission route.

44) What are the functions of a network administrator?

A network administrator has many responsibilities that can be summarize into 3 key
functions: installation of a network, configuration of network settings, and
maintenance/troubleshooting of networks.

45) Describe at one disadvantage of a peer to peer network.

When you are accessing the resources that are shared by one of the workstations on the
network, that workstation takes a performance hit.

46) What is Hybrid Network?

A hybrid network is a network setup that makes use of both client-server and peer-to-peer
architecture.

47) What is DHCP?

DHCP is short for Dynamic Host Configuration Protocol. Its main task is to automatically
assign an IP address to devices across the network. It first checks for the next available
address not yet taken by any device, then assigns this to a network device.

48) What is the main job of the ARP?

The main task of ARP or Address Resolution Protocol is to map a known IP address to a
MAC layer address.

49) What is TCP/IP?

TCP/IP is short for Transmission Control Protocol / Internet Protocol. This is a set of protocol
layers that is designed to make data exchange possible on different types of computer
networks, also known as heterogeneous network.

UMESH PRAJAPATI
50) How can you manage a network using a router?

Routers have built in console that lets you configure different settings, like security and data
logging. You can assign restrictions to computers, such as what resources it is allowed
access, or what particular time of the day they can browse the internet. You can even put
restrictions on what websites are not viewable across the entire network.

51) What protocol can be applied when you want to transfer files between different
platforms, such between UNIX systems and Windows servers?

Use FTP (File Transfer Protocol) for file transfers between such different servers. This is
possible because FTP is platform independent.

52) What is the use of a default gateway?

Default gateways provide means for the local networks to connect to the external network.
The default gateway for connecting to the external network is usually the address of the
external router port.

53) One way of securing a network is through the use of passwords. What can be
considered as good passwords?

Good passwords are made up of not just letters, but by combining letters and numbers. A
password that combines uppercase and lowercase letters is favorable than one that uses all
upper case or all lower case letters. Passwords must be not words that can easily be guessed
by hackers, such as dates, names, favorites, etc. Longer passwords are also better than short
ones.

54) What is the proper termination rate for UTP cables?

The proper termination for unshielded twisted pair network cable is 100 ohms.

55) What is netstat?

Netstat is a command line utility program. It provides useful information about the current
TCP/IP settings of a connection.

56) What is the number of network IDs in a Class C network?

For a Class C network, the number of usable Network ID bits is 21. The number of possible
network IDs is 2 raised to 21 or 2,097,152. The number of host IDs per network ID is 2 raised
to 8 minus 2, or 254.

57) What happens when you use cables longer than the prescribed length?

Cables that are too long would result in signal loss. This means that data transmission and
reception would be affected, because the signal degrades over length.

58) What common software problems can lead to network defects?

UMESH PRAJAPATI
Software related problems can be any or a combination of the following:
– client server problems
– application conflicts
– error in configuration
– protocol mismatch
– security issues
– user policy and rights issues

59) What is ICMP?

ICMP is Internet Control Message Protocol. It provides messaging and communication for
protocols within the TCP/IP stack. This is also the protocol that manages error messages that
are used by network tools such as PING.

60) What is Ping?

Ping is a utility program that allows you to check connectivity between network devices on
the network. You can ping a device by using its IP address or device name, such as a
computer name.

61) What is peer to peer?

Peer to peer are networks that does not reply on a server. All PCs on this network act as
individual workstations.

62) What is DNS?

DNS is Domain Name System. The main function of this network service is to provide host
names to TCP/IP address resolution.

63) What advantages does fiber optics have over other media?

One major advantage of fiber optics is that is it less susceptible to electrical interference. It
also supports higher bandwidth, meaning more data can be transmitted and received. Signal
degrading is also very minimal over long distances.

64) What is the difference between a hub and a switch?

A hub acts as a multiport repeater. However, as more and more devices connect to it, it would
not be able to efficiently manage the volume of traffic that passes through it. A switch
provides a better alternative that can improve the performance especially when high traffic
volume is expected across all ports.

65) What are the different network protocols that are supported by Windows RRAS
services?

There are three main network protocols supported: NetBEUI, TCP/IP, and IPX.

66) What are the maximum networks and hosts in a class A, B and C network?

UMESH PRAJAPATI
For Class A, there are 126 possible networks and 16,777,214 hosts
For Class B, there are 16,384 possible networks and 65,534 hosts
For Class C, there are 2,097,152 possible networks and 254 hosts

67) What is the standard color sequence of a straight-through cable?

orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.

68) What protocols fall under the Application layer of the TCP/IP stack?

The following are the protocols under TCP/IP Application layer: FTP, TFTP, Telnet and
SMTP.

69) You need to connect two computers for file sharing. Is it possible to do this without
using a hub or router?

Yes, you can connect two computers together using only one cable. A crossover type cable
can be use in this scenario. In this setup, the data transmit pin of one cable is connected to the
data receive pin of the other cable, and vice versa.

70) What is ipconfig?

Ipconfig is a utility program that is commonly used to identify the addresses information of a
computer on a network. It can show the physical address as well as the IP address.

71) What is the difference between a straight-through and crossover cable?

A straight-through cable is used to connect computers to a switch, hub or router. A crossover


cable is used to connect two similar devices together, such as a PC to PC or Hub to hub.

72) What is client/server?

Client/server is a type of network wherein one or more computers act as servers. Servers
provide a centralized repository of resources such as printers and files. Clients refers to
workstation that access the server.

73) Describe networking.

Networking refers to the inter connection between computers and peripherals for data
communication. Networking can be done using wired cabling or through wireless link.

74) When you move the NIC cards from one PC to another PC, does the MAC address
gets transferred as well?

Yes, that’s because MAC addresses are hard-wired into the NIC circuitry, not the PC. This
also means that a PC can have a different MAC address when the NIC card was replace by
another one.

75) Explain clustering support

UMESH PRAJAPATI
Clustering support refers to the ability of a network operating system to connect multiple
servers in a fault-tolerant group. The main purpose of this is the in the event that one server
fails, all processing will continue on with the next server in the cluster.

76) In a network that contains two servers and twenty workstations, where is the best
place to install an Anti-virus program?

An anti-virus program must be installed on all servers and workstations to ensure protection.
That’s because individual users can access any workstation and introduce a computer virus
when plugging in their removable hard drives or flash drives.

77) Describe Ethernet.

Ethernet is one of the popular networking technologies used these days. It was developed
during the early 1970s and is based on specifications as stated in the IEEE. Ethernet is used in
local area networks.

78) What are some drawbacks of implementing a ring topology?

In case one workstation on the network suffers a malfunction, it can bring down the entire
network. Another drawback is that when there are adjustments and reconfigurations needed
to be performed on a particular part of the network, the entire network has to be temporarily
brought down as well.

79) What is the difference between CSMA/CD and CSMA/CA?

CSMA/CD, or Collision Detect, retransmits data frames whenever a collision occurred.


CSMA/CA, or Collision Avoidance, will first broadcast intent to send prior to data
transmission.

80) What is SMTP?

SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all Internal mail,
and provides the necessary mail delivery services on the TCP/IP protocol stack.

81) What is multicast routing?

Multicast routing is a targeted form of broadcasting that sends message to a selected group of
user, instead of sending it to all users on a subnet.

82) What is the importance of Encryption on a network?

Encryption is the process of translating information into a code that is unreadable by the user.
It is then translated back or decrypted back to its normal readable format using a secret key or
password. Encryption help ensure that information that is intercepted halfway would remain
unreadable because the user has to have the correct password or key for it.

83) How are IP addresses arranged and displayed?

UMESH PRAJAPATI
IP addresses are displayed as a series of four decimal numbers that are separated by period or
dots. Another term for this arrangement is the dotted decimal format. An example is
192.168.101.2

84) Explain the importance of authentication.

Authentication is the process of verifying a user’s credentials before he can log into the
network. It is normally performed using a username and password. This provides a secure
means of limiting the access from unwanted intruders on the network.

85) What do mean by tunnel mode?

This is a mode of data exchange wherein two communicating computers do not use IPSec
themselves. Instead, the gateway that is connecting their LANs to the transit network creates
a virtual tunnel that uses the IPSec protocol to secure all communication that passes through
it.

86) What are the different technologies involved in establishing WAN links?

Analog connections – using conventional telephone lines; Digital connections – using digital-
grade telephone lines; switched connections – using multiple sets of links between sender and
receiver to move data.

87) What is one advantage of mesh topology?

In the event that one link fails, there will always be another available. Mesh topology is
actually one of the most fault-tolerant network topology.

88) When troubleshooting computer network problems, what common hardware-


related problems can occur?

A large percentage of a network is made up of hardware. Problems in these areas can range
from malfunctioning hard drives, broken NICs and even hardware startups. Incorrectly
hardware configuration is also one of those culprits to look into.

89) What can be done to fix signal attenuation problems?

A common way of dealing with such a problem is to use repeaters and hub, because it will
help regenerate the signal and therefore prevent signal loss. Checking if cables are properly
terminated is also a must.

90) How does dynamic host configuration protocol aid in network administration?

Instead of having to visit each client computer to configure a static IP address, the network
administrator can apply dynamic host configuration protocol to create a pool of IP addresses
known as scopes that can be dynamically assigned to clients.

91) Explain profile in terms of networking concept?

UMESH PRAJAPATI
Profiles are the configuration settings made for each user. A profile may be created that puts
a user in a group, for example.

92) What is sneakernet?

Sneakernet is believed to be the earliest form of networking wherein data is physically


transported using removable media, such as disk, tapes.

93) What is the role of IEEE in computer networking?

IEEE, or the Institute of Electrical and Electronics Engineers, is an organization composed of


engineers that issues and manages standards for electrical and electronic devices. This
includes networking devices, network interfaces, cablings and connectors.

94) What protocols fall under the TCP/IP Internet Layer?

There are 4 protocols that are being managed by this layer. These are ICMP, IGMP, IP and
ARP.

95) When it comes to networking, what are rights?

Rights refer to the authorized permission to perform specific actions on the network. Each
user on the network can be assigned individual rights, depending on what must be allowed for
that user.

96) What is one basic requirement for establishing VLANs?

A VLAN is required because at switch level there is only one broadcast domain, it means
whenever new user is connected to switch this information is spread throughout the
network. VLAN on switch helps to create separate broadcast domain at switch level. It is
used for security purpose.

97) What is IPv6?

IPv6 , or Internet Protocol version 6, was developed to replace IPv4. At present, IPv4 is being
used to control internet traffic, butis expected to get saturated in the near future. IPv6 was
designed to overcome this limitation.

98) What is RSA algorithm?

RSA is short for Rivest-Shamir-Adleman algorithm. It is the most commonly used public key
encryption algorithm in use today.

99) What is mesh topology?

Mesh topology is a setup wherein each device is connected directly to every other device on
the network. Consequently, it requires that each device have at least two network
connections.

100) what is the maximum segment length of a 100Base-FX network?

UMESH PRAJAPATI
The maximum allowable length for a network segment using 100Base-FX is 412 meters. The
maximum length for the entire network is 5 kilometers.

Describe Domain Name System.


There are two types of client/server programs.

First is used directly by the user, such as e-mail, Second supports other application programs.
The Domain Name System (DNS) is a supporting program that is used by other programs
such as to find the IP address of an e-mail recipient.
Describe Hierarchical Namespace.
In a hierarchical name space, each name is combination of several parts as:

Type of the organization.


Name of an organization.
Departments in the organization.

A central authority can assign the part of the name that defines the nature and name of the
organization. The other things of the name the organization provides itself. The organization
can add suffixes (or prefixes) to the name to define its host.

The company need not worry about the prefix if it is same as that of another organization
because, even if part of an address is the same, the whole address is different.

Example:

Suppose central authority has given names ABC.com and XYZ.com to two separate
organization but these organization can add prefix as career so the name becomes
career.XYZ.com and career.ABC.com. The names are unique without the need for
assignment by a central authority. The central authority controls only part of the name, not
the whole.

UMESH PRAJAPATI
Define Fully Qualified Domain Name and Partially
Qualified Domain Name.
In hierarchical name space, names are defined in an inverted-tree structure with the root at the
top. The tree can have only 128 levels: level 0 (root) to level 127.

Each node in the tree has a label, which is a string with a maximum of 63 characters.
The root label is a null string (empty string). In this tree, all the labels have different name,
which guarantee the uniqueness of the domain names.

A full domain name is a sequence of labels separated by dots (.). The domain names are
always read from the node up to the root.

Fully Qualified Domain Name

If a label is terminated by a null string or empty string, it is called a fully qualified domain
name (FQDN).

Partially Qualified Domain Name

If a label is not terminated by a null string, it is called a partially qualified domain name
(PQDN). A PQDN starts from a node, but it does not end with the root.

What is transmission impairment?


Signals need transmission media for travel from one point to another. Transmission media are
not perfect because it provides resistance. The imperfection causes signal impairment. This
means that the signal at the beginning of the medium is not the same as the signal at the end
of the medium. What is sent is not what is received. There are three causes of impairment are
attenuation, distortion, and noise.

UMESH PRAJAPATI
Describe attenuation, distortion, and noise in brief.
Attenuation: When a signal travels through a medium, it loses some of its energy due to
resistance of the medium. This loss of energy is called Attenuation. This is the reason why a
wire carrying electric signals gets warm. Some of the electrical energy in the signal is
converted to heat. To overcome for this problem, amplifiers are used to amplify the signal.

Unit of the decibel is used to find out if a signal has lost or gained strength. The decibel (dB)
measures the relative strengths of two signals or one signal at two different points. If decibel
is negative then a signal is attenuated and if positive signal is amplified.

Formula:

Where PI and P2 are the variable and the powers of a signal at points 1 and 2, respectively.

Distortion

When the signal travels through the medium from one point to another it may chance to
change the form or shape of signal. It is called distortion.

Distortion can occur in a composite signal, made up of different frequencies. Each signal
component has its own propagation speed through a travelling medium and, therefore, its
own delay in reaching at the final destination. Means signal components at the receiver have
phases different from what they had at the sender.

Noise

The third cause of impairment is Noise. Following types of noise are possible.

-Thermal noise.
-Induced noise.
-Crosstalk noise.
-Impulse noise.

UMESH PRAJAPATI
These noise may corrupt the signal.

Thermal noise is produced due to the random motion of electrons in a wire which creates an
extra signal not originally sent by the transmitter.
Induced noise comes from sources such as motors and other electronic appliances.
These devices act as a sending antenna, and the transmission medium acts as the receiving
antenna.
Crosstalk is the effect of one wire on the other.
Impulse noise comes from power lines, lightning etc.
Describe composite single.
Composite Signals are the combination of more than one sine waves. Simple sine waves can
be used to carry electric energy from one place to another or we can use a single sine wave to
send an alarm to a security center when a thief opens a door or window in the house.

A single frequency sine wave is not useful in data communications we need to send a
composite signal. A composite signal can be periodic or non-periodic.

The figure of composite periodic signal is given below.

Describe MIME
Electronic mail has a simple structure. It can send messages only in NVT 7-bit ASCII format.
It cannot be used for those languages that are not supported by 7-bit ASCII characters so
languages such as French, German, Hebrew, Russian, Chinese etc cannot use this format.
Also, it cannot be used to send binary files or video or audio data.

We need a protocol that allows non-ASCII data to be sent through e-mail. So Multipurpose
Internet Mail Extensions (MIME) is the answer. MIME transforms non-ASCII data at the
sender site to NVT (Network Virtual Terminal) ASCII data and delivers them to the client
MTA to be sent through the Internet. The message at the receiving side is transformed back
to the original data. Main task of MIME is to transform non-ASCII data to ASCII data and
vice versa.

UMESH PRAJAPATI
MIME header

Multipurpose Internet Mail Extensions defines five types of header.

SMTP is push protocol Justify your answer.


SMTP is a push protocol; it pushes the message from the client to the server. For sending
email SMTP is used two times, between the sender and the sender's mail server and between
the two mail servers. To send mail, a system must have the client MTA (Message transfer
agents), and to receive mail, a system must have a server MTA. SMTP uses commands and
responses to transfer messages between an MTA client and an MTA server. Commands are
sent from the client to the server and Responses are sent from the server to the client. SMTP
is not used in pulling the message.

Describe the POP3 protocol.


Post Office Protocol, version 3 is used for accessing the message. POP3 is very simple
protocol and has limited functionality. POP has different version but currently version 3 is
used. A POP3 server listens on well-known port 110. POP3 supports two types of mode.

Delete Mode: In this mode, the mail is deleted from the mailbox after each retrieval.

UMESH PRAJAPATI
Keep Mode. The mail remains in the mailbox after retrieval.
Describe IMAP4 (Internet Mail Access Protocol) in detail.
This protocol is also used in Internet for accessing the mail. IMAP4 has more feature than
POP3 and is more powerful.

Main difference in POP3 and IMAP4 are as follows.

What is Anonymous FTP?


Some sites provide the functionality that user can access the file with limited access. To
access these files, a user does not need to have an account or password. For using FTP, the
user enters "anonymous" as a user ID and guest as password. Usually, you can enter anything
as a password.
What is User Agent?
User agent is a software that provides the service to the user to make the process of sending
and receiving a message easier. The following are User Agent services.

Describe Classful Addressing


IPv4 addressing uses the concept of classes. In classful addressing, the address space is
divided into five classes:A, B, C, D, and E. We can find the class of an address when the

UMESH PRAJAPATI
given address is in binary notation or dotted-decimal notation.
Example

Find the error, if any, in the following IPv4 addresses.


a. 200.56.045.78
b. 22.34.7.8.20
c. 75.45.279.14
d. 11100010.23.24.66

Solution

a. There must be no leading zero (045).


b. There can be no more than four numbers in an IPv4 address.
c. Each number needs to be less than or equal to 255 (279 is outside this range).
d. A mixture of binary notation and dotted-decimal notation is not allowed.
Describe how many types are wireless transmission?
In general we can divide five types of wireless transmission

1. The Electromagnetic Transmission


2. Radio Transmission
3. Microwave Transmission
4. Infrared Transmission
5. Light Transmission

1. The Electromagnetic Transmission


When electrons move, they create electromagnetic waves that can propagate through space
and in a vacuum. The electromagnetic waves can be broadcast efficiently and received by a
receiver some distance away.

2. Radio Transmission
Radio waves are easy to generate, can travel long distances, and can penetrate buildings
easily, so they are widely used for communication. These waves can travel in all directions.

3. Microwave Transmission
Microwaves travel in a straight line, so if the towers are too far apart, the earth will get in the
way. Thus, repeaters are needed periodically. The higher the towers are, the farther apart they
can be. Unlike radio waves at lower frequencies, microwaves do not pass through buildings
well.

UMESH PRAJAPATI
4. Infrared Transmission
It is used for short-range communication. The remote controls used for televisions, VCRs,
and stereos, use infrared communication. They are relatively directional and can not pass
through solid objects.

5. Light Transmission
These types of wave can easily effected by wind and temperature changes. They normally
work well on sunny days.
Explain Random Excess Method.
In Random Excess Method, any station can send the data at any time without the permission
of other station. At any time, if a station has information to send to other station, it uses a
specific method defined by the protocol to make a decision on whether or not to send.

There is no scheduled time for a station to transmit the data that is why it is called Random
Excess Protocol. Random protocol has the following types.

Explain Channelization in networks.


Channelization is a multiple-access method in which the available bandwidth of a link is
shared in time, frequency, or through code, between different stations. There are three basic
approaches to achieve channelization.

Describe FDMA and TDMA in short.


In frequency-division multiple access (FDMA), the available bandwidth is divided into
frequency bands. Each station is allocated a band to send its data. Different frequency bands

UMESH PRAJAPATI
are used by different stations.

In time-division multiple access (TDMA), the stations share the bandwidth of the channel in
time. Each station is allocated a time slot during which it can send data. Each station
transmits its data in is assigned time slot.

Explain CDMA in wireless networks.


CDMA differs from FDMA and TDMA because only one channel occupies the entire
bandwidth of the link and also there is no timesharing. In CDMA a code is available for every
station wanting to send the data. In this protocol the assigned codes have two properties.

1. If we multiply each code by another, we get zero.


2. If we multiply each code by itself, we get the number of stations.

So suppose there are three stations and code and data are (c1, d1), (c2, d2), (c3, d3)
respectively. The data that go on the channel are the sum of all these terms. Any station
wanting to receive data from one of the other two, multiplies the data on the channel by the
code of the sender. For example, suppose stations 1 and 2 are talking to each other. Station 2
wants to hear what station I is saying. It multiplies the data on the channel by cl the code of
station 1.

Because (cl . cl) is 3, but (c2 . cI) and (c3 . cI) are all Zero, station 2 divides the result by 3 to
get the data from station 1.
Describe the functionality of data link layer.
Data Link Layer is the second layer from the bottom in OSI model. This layer has two main
functions

- Data link control


- Media access control.

Data link control provides the functionality of include framing, flow and error control that
provide smooth and reliable transmission of frames between nodes. Media Access Control
(MAC) handles the sharing of link.

UMESH PRAJAPATI
Explain Stop-and-Wait Automatic Repeat Request for
noisy channel.
In this protocol the sending device keeps a copy of the last frame transmitted until it receives
an acknowledgment for that frame. A data frames uses a sequence number; an ACK frame
uses an acknowledgment number. The sender has a control variable, which we call Sn
(sender, next frame to send), that holds the sequence number for the next frame to be sent (0
or 1).
What is the difference between Pure ALOHA and Slotted
Aloha protocol?
In Pure Aloha, station can send data in a continuous time manner whereas in Slotted Aloha,
time is divided in slots. Pure ALOHA doesn't check whether the channel is busy before
transmission. In slotted ALOHA, a frame can be sent only at fixed times, whereas in pure
ALOHA, you can send any time. Pure ALOHA has a vulnerable time of 2 x Tfr. Whereas in
Slotted ALOHA vulnerable time = Tfr {Tfr: Average transmission time for a frame}.
Differentiate between hub and switch.
a.) Hub is a layer 1 device while Switch is layer 2 device.
b.) Hub works on single collision and single broadcast domain while switch works on per
port collision and single broadcast domain.
What is FQDN?
- FQDN is the abbreviation for Fully Qualified Domain Name.
- It contains both the hostname and a domain name.
- It uniquely identifies a host within a DNS hierarchy
Tell us something about LMHOSTS files.
- It is a text file that resolves NetBIOS names to IP addresses.
- It can be compared with the HOSTS file which is a static method of resolving domain
names into IP addresses.
- LMHOSTS files must be manually configured and updated.
What are the main qualities of an effective and efficient
network?
a. Performance
b. Reliability
c. Security
What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
10Base2 -
- It is an Ethernet term which means a maximum transfer rate of 10 Megabits per second that
uses baseband signaling, with a contiguous cable segment length of 100 meters and a
maximum of 2 segments.

UMESH PRAJAPATI
10Base5
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses
baseband signaling, with 5 continuous segments not exceeding 100 meters per segment.

10BaseT
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses
baseband signaling and twisted pair cabling.
What is anonymous FTP? What is its use?
- It is an FTP that enables the users to connect to a host without a valid login and password.
- The login used is anonymous or guest, with the password usually requesting the user's ID.
- It enables a large number of users to access the files on the host without needing to set up a
login for all of them.
- It exercises a strict control over the areas an anonymous user can access.
Which factors mark the reliability of the network?
a. Frequency of failure
b. Downtime / Time taken for recovery.
Name the factors that tell us about the security of the
network.
a. Virus attacks on the system.
b. Unauthorized access to the system.
Define Bandwidth and Latency?
- Bandwidth/ Throughput – It means the number of bits which can be transmitted over the
network in a specified time.
- Latency – It is the time taken by a message to travel from one side to another.

Bandwidth and latency describe the performance of a network.


What is point to point link?
- Direct connection between two computers on a network is called as point to point link.
- No other network devices other than a connecting cable are required for point to point
connection.
- The cable connects the NIC card of both the devices.
When is a switch said to be congested?
- Sometimes a switch receives the packets faster than they can be accommodated in the
shared link. These packets are stored in the memory for sometime.
- However, after sometime the buffer space will exhaust and some packets will start getting
dropped off.
- The switch is called as congested in this state.
Explain a.) Uni-casting, b.) Multicasting and c.)

UMESH PRAJAPATI
Broadcasting
a.) Uni-casting - Message is sent from a source to a single destination node.
b.) Multicasting - Message is sent from a source to some subsets of other nodes.
c.) Broadcasting - Message is sent from a source to all the nodes in the network.
What are the various types of Multiplexing?
The various types of multiplexing are:
a. Frequency Division Multiplexing (FDM)
b. Time Division Multiplexing (TDM)
i. Synchronous TDM
ii. Asynchronous TDM
c. Wave Division Multiplexing (WDM)
Which layers of OSI are referred to as network support
layers?
The following 3 layers of OSI are referred to as network support layers:

a. Physical Layer
b. Data link Layer and
c. Network Layers
Which layers of OSI are referred to as user support
layers?
The block of user support layers consists of:
a. Session Layer
b. Presentation Layer and
c. Application Layer
What does the Data Link Layer do?
- The Data Link Layer transforms the physical layer to a reliable link.
It takes care of:

a. Node to node delivery.


b. Framing
c. Physical Addressing
d. Flow Control
e. Error Control
f. Access Control
What is NIC?
- NIC stands for Network Interface Card.
- It is a peripheral card attached to a PC to helps it connect to a network.
- The MAC address of the card helps the network in identifying the PC.

UMESH PRAJAPATI
What are the responsibilities of Network Layer?
- The Network Layer aids in source-to-destination delivery of packet across multiple
networks.
- It performs:
a. Logical Addressing
b. Routing
Name the various error detection methods.
The various error detection methods are:
a. Vertical Redundancy Check (VRC)
b. Longitudinal Redundancy Check (VRC)
c. Cyclic Redundancy Check (VRC)
d. Checksum
What is Bit Stuffing?
- Bit stuffing means adding one extra 0 whenever five consecutive 1s follow a 0.
- This is done so that the pattern 0111110 is not mistaken for a flag.
How does dynamic host configuration protocol aid in
network administration?
- In a large set up where it is difficult to manually configure the IP address of each system,
dynamic host configuration protocol comes very helpful.
- Using this protocol, the administrator can create a pool of IP addresses which are called
scopes. These can be then dynamically assigned to the systems.
Describe the Packet Format of ARP (Address Resolution
Protocol)?
The fields of the packet format of ARP are as follows:
-Hardware type: It is a 16-bit field . Each LAN has been assigned an integer based on its type.
For example, Ethernet is given the type 1.
-Protocol type: This is a 16-bit field defining the protocol. For example, the value of this field
for IPv4 protocol is 0800.
-Hardware length: This is an 8-bit field defining the length of the physical address in bytes.
For example, for Ethernet the value is 6.
-Protocol length: This is an 8-bit field defining the length of the logical address in bytes. For
example, for IPv4 protocol the value is 4.
-Operation: This is a 16-bitfield defining the type of packet. Two packet types are defined:
ARP request (1), ARP reply (2).
-Sender hardware address: This is a variable-length field defining the physical address of the
sender. For example, for Ethernet this field is 6 bytes long.
-Sender protocol address: This is a variable-length field defining the logical (for example, IP)
address of the sender. For the IP protocol, this field is 4 bytes long.
-Target hardware address: This is a variable-length field defining the physical address of the
target. For example, for Ethernet this field is 6 bytes long.
-Target protocol address: This is a variable-length field defining the logical (for example, IP)
address of the target. For IPv4 protocol, this field is 4 bytes long.

UMESH PRAJAPATI
What are the advantages of IPv6 over IPv4?
The next generation IP, or IPv6 has some advantages over IPv4 that can be summarized as
follows:
- Larger Address Space: An IPv6 address is 128 bytes long where IPv4 has 32-bit address
only, this is a huge increase in the address space.
- Better Header Format: IPv6 uses a new header format which simplifies and speeds up the
routing process because most of the options do not need to be checked by routers.
- New Options: IPv6 has new options to allow for additional functionalities.
- Allowance for extension: In IPv6 new technologies can easily embedded.
-Support For Resource Allocation: In IPv6, flow label has been added to enable the source to
request special handling of the packet. This mechanism can be used to support traffic such as
real-time audio and video.
-Support For More Security: The encryption and authentication options in IPv6 provide
confidentiality and integrity of the packet.
What are the different design goals of ATM?
Asynchronous Transfer Mode (ATM) is the cell relay protocol.
The Design Goals of ATM are as follows:
- A technology is needed to take advantage of high rate transmission media and less
susceptible to noise degradation for maximizing the data rates.
-The system must interface with existing systems and provide wide-area inter-connectivity
between.
-The implementation of design must be cheaper enough so that everyone can afford it. If
ATM is to become the backbone of international communications, as indeed, it must be
available at low cost to every user who wants it.
-The new system must be able to work with and support the existing telecommunication
hierarchies.
- The new system must be connection-oriented to ensure accurate and predictable delivery.
- One objective is to move as many of the functions to hardware as possible (for speed) an
eliminate as many software functions as possible (again for speed).
In which switching physical path is present and how it is
different from packet switching?
- Circuit switching uses physical path for transmission of data.
- Here initially a physical connection is established between source and destination & then
data is sent .
- In packet switching data is broken into small parts called packets.
- Numbered packets may take any shortest route for transmission.
- In packet switching virtual connection is made between source and destination.
Give the frame format for data link layer.
- Header, payload filled, trailer are the main parts of a frame.
- Header contains the number of characters in a frame & source and desitnation address.
- Payload filled contains the data to be sent.
- Trailer is the end of packet and it also contains the starting and ending bits.
- This frame is sent to network layer.

UMESH PRAJAPATI
Why acknowledged service is better?
- When data is sent acknowledgement at reception of data occurs.
- If frame is lost, then error is detected and the data is sent again.
- Recovery of data takes place easily.
- It works for reliable channels where error is minimum.
- This is a time saving method and better than unacknowledged service .
What are the problems in Character count framing
method.
- In character count the header gives number of characters in frame.
- E.g. 2,3,4,2,5,7, 0,4
- Initially two frames will be sent as header shows 2 i.e. 3 and 4.
- Again 2 frames will be sent shown by next header and frames are 5and 7.
- 3rd Header is 0 which lead to wastage of time and bandwidth and no frame is sent.
- This leads to error and should be avoided.
Explain Echoplex
- It is a method used to detect error in data link layer and is also called echo checking.
- Here reciever retransmits the data back to the transmitter after reception.
- It requires a full duplex operation for sending and receiving data.
- When data is received at the transmitter,error can be detected by the human operator .
- Its disadvantage is that it depends on humans for error detection and correction.
What is D T E-Data Terminal Equipment.
- It is a Digital device than generates, transmits and recieves messages.
- Terminal here is used to show the movement of messages in and out of the terminal.
- Server and the hosts maintain data and give information to Terminals.
- Examples: TTY: Teletypewriter or Keyboard.
ATMs. Automatic Teller Machines
Explain front end processcor (FEP).
- It is a type of data Terminal Equipment which is a digital device used to input data and give
the required output.
- Performs data communications at host location.
- Host can communicate with all data circuits present at its server.
- The host location can also be remote from the server.
- The main advantage of FEP is it avoids slow processing.
Explain line control Unit (LCU).
- Performs communication related to remote location.
- Directs the flow of data from communication channel to terminals present at remote
location.
- Perform serial to parrellel data conversion at transmitter and vice-versa at reciever.
- Also perform the error detection and correction of the packets sent.
- Control characters can be inserted or deleted from the packets easily .

UMESH PRAJAPATI
Explain UART.
- Called Universal asynchronous receiver transmitter.
- Serial to parrallel conversion of data takes place at transmitter and vice –versa occurs at
reciever.
- Start and stop bits are send with data without any clock pulses for synchronization .
- Formating of Data in Transmitter and Receiver takes place.
- Also allows Voltage level conversion at both ends. Error detection and correction and bits
synchronization is possible and data is sent in form of bytes.
Explain USRT.
- Called universal synchronous receiver transmitter .
- Here clocking information in form of bits is also transferred with the data.
- Here no start and stop bits are transmitted with the data.
- Parity bits are inserted and data sent in form of Blocks.
- Transmit and receive status information is send or received.
- The synchronous & asynchronous receiver transmitter can be combined forming USART.
Explain SNRM
- Set normal response mode is an unnumbered command of synchronous data link control.
- This command places secondary station into normal response mode.
- In normal mode only the secondary station sends and receives information frames.
- Secondary station remains in normal mode until it receives a disconnect command.
- It is disconnected with an unnumbered acknowledgement.
What does address FF hex specify in SDLC address field.
- Synchronous data link control address field is 8 bit and FF hex represents the last address.
- This address is called as the broadcast address and is common to all secondary stations.
- Frame sent with broadcast address is simultaneously sent to all other stations.
- Since it is a 8 bit address so 256 addresses are possible.
- Remaining address can also be used as unique stations or as groups.
Explain BSC
- It is called as binary synchronous communications and is a type of synchronous data link
protocol.
- It is sometimes also called as the bisync or bisynchronous communications.
- Each data transmission precedes a unique synchronization character (SYC).
- The message block can be poll, selection or an acknowledgement.
- The SYC character for ASCII is 16 hex.
What is block mode?
- Block mode is a data transmission mode used for transmitting and receiving data.
- Here data characters are not transmitted as they are typed.
- Here initially the data characters are stored in buffers at the time of typing.
- When the sender presses Enter key then only data is transmitted.
- This set of characters stored in buffers and then sent are called blocks.
- This mode is used in multidrop data communications.

UMESH PRAJAPATI
Explain BOP.
- BOP is called as the bit oriented protocol used in data link protocols.
- It is used for serial bit by bit data transfer over communication channel.
- These bits can be interpreted individually or groups of bits rather fixed length groups.
- Here no dedicated data link control characters are required.
- Example: high level data link communications (HDLC).
Explain stop and wait flow control.
- Here transmitter sends one message and waits for acknowledgement(ACK)
- After receiving ACK it transmits next message.
- Its main advantage is it is very simple and easy to understand.
- Its main disadvantage is its speed is very slow and time is wasted.
- Here it takes twice as long to transmit data and receive ACK.
Explain Poll/select.
- It is a line discipline used for centrally controlled networks.
- Here primary station controls data and secondary station responds to instructions.
- Primary polls to secondary to determine if it has data to transmit.
- If secondary has data it responds to poll with a message and acts as a transmitter.
- If primary selects secondary, it identifies secondary as the receiver and checks if it is ready
to receive data.
Explain the function of line discipline.
- Line discipline is used in the data link layer which coordinates hop to hop data delivery.
- Here the hop can be a computer or a network controller.
- It also coordinates the half duplex transmission on data communication network.
- Acknowledgement discipline is used for simple networks.
- Poll/select is used for centrally controlled data networks.
Give the difference between cable and voice modems.
- Cable modem operates on higher frequencies up to 850MHz.
- Cable modem uses more complex modulation and demodulation techniques than simple
FSK modulation.
- Cable modems connect subscribers to cable tv and voice modem connect subscriber to the
telephone network.
- Cable modem works on Bit rate of 30Mbps and voice modem works on 56000 bps.
- Cable modem works on voice and video whereas voice modem work only on voice.
What are scramble and descramble circuits used for?
- Scramble circuit detects the undesirable sequence of 0 and 1 and convert them into
sequence more acceptable.
- It randomizes the data to convert data back at the receiver.
- For this different algorithms are used both at the transmitter and the receiver.
- Descramble circuit generates the original sequence at the receiver.
- Example: eight consecutive 0’s are converted to alternate 0’s and 1’s which is more
acceptable to the clock recovery.

UMESH PRAJAPATI
Explain adaptive equalizers.
- These are located in the receiver section of the modem.
- It automatically adjusts the gain and delay of the input received to compensate for the phase
and amplitude impairments.
- It determines the quality of the received signal.
- It continuously vary its settings to achieve bandwidth characteristics for the circuit.
- Because of their adjusting property they are called adaptive equalizers
Issues for data interfacing in physical layer.
- Raw data is to be converted into binary form 0 and 1 to be sent to the next layer.
- Different voltages are required for representing 0(0 to1.5 volts) and 1(3 to 5 volts).
- How many nano seconds a bit should last.
- How transmission may proceed from physical layer to data link layer or from
communication channel to physical layer .
- How many pins network connectors may use for serial communication.
Which physical property of information is changed for
transmission?
- Current or Voltage of signal is changed for transmitting it in the form of zeros and ones.
- Signal broken into harmonics called frequency using Fourier transform.
- Amplitude of signals due to Fourier transform may be reduced.
- A filter is attached before the transmission medium which allows only required harmonics
to pass through the medium.
- Signal at the receiver end can be reconstructed from harmonics using inverse Fourier
transform .
Explain resource sharing
- Different resources are attached to a computer and if they can be used by other computers in
the same network it is called resource sharing.
- It is generally possible in local area networks confined to offices or institutes.
- The host requires an operating system to access the resources of the server.
- FTP called the file transfer protocol is used to provide the shared access between host and
the server.
- It is cheaper, faster and easier to maintain.
Which transmission medium radiates and how it can be
avoided?
- Twisted pair cable radiates energy during transmission.
- Two wires present in the cable constitute an Antenna which radiates energy in all directions.
- The wires are twisted like a DNA present in human blood.
- Waves coming out from the two twisted wires are out of phase by 180 degree so they cancel
out.
- Leads to no radiations and also sheath could be provided outside the cable to provide
insulation.

UMESH PRAJAPATI
Which category of twisted pair is mainly used.
- There are up to 7 categories of twisted pair but Category 3 and 5 twisted pairs are mostly
used.
- Category 3 has 2 individually insulated wires twisted together .
- 4 such twisted pairs are put together in a sheath to form the medium.
- Category 5 is same as 3 with more number of twist per cm. More the number of twists the
better the communication medium .
- Leads to less cross talk and better signal transmission over longer distances.
Which transmission medium works at 2 giga bits per
second.
- The fiber cable sends data at rate of 2 giga bites per second.
- Cable consists of Hair like thin fiber which works on the principle of total internal
reflection.
- It transmits data with speed of light and works on bandwidth up to terahertz.
- Transmitting medium is fiber of glass which is insulated on the outside.
- Advantage:Attenuation of signal is minimum.

Speed of transmission is very high.


Can infrared be used for transmission
- The infrared waves can be used for short range communication in networking (up to 45
km).
- It is wireless communication so no physical medium is required to connect the transmitter
and receiver .
- Works on line of sight system i.e. the transmitting and receiving antennas should be in the
sight of each other.
- No government license is needed till now for this communication .
- Example :used in television ,stereos.
Compare satellite and cable medium for transmission.
- Delay given by satellite during its transmission is 3 micro seconds per km.
- Delay given by cable wire is 5 micro seconds per km.
- Satellite is broadcast media placed in the geo stationary orbit around the earth.
- Satellite is used in wireless communication system and cable is used in wired
communication.
- On security grounds cable is better than a satellite.
Explain Store and forward Network.
- Store and forward method is used in message switching. Example: SMS
- The data sent by the sender is first stored at the server.
- Data is later forwarded from the server to the receiver.
- It may use time division multiple access for transmission i.e. the whole bandwidth is given
to single user for smalltime slots.
- No physical path is required for transmission of data from sender to the receiver.

UMESH PRAJAPATI
Networking Interview Questions and Answers - Part 2

• Home >> Networking

Data Encryption Standard (DES) weakness and strength

Network Security - Data Encryption Standard (DES) weakness and strength - The Data Encryption
Standard (DES) is a symmetric key block cipher which takes 64-bit plaintext...........

If you are a victim of Denial of Service (Dos) then what you do?

Network Security - The function of a denial of service attack is to flood its target machine with too
much traffic.............

What are Brute Force Attacks?

Network Security - What are Brute Force Attacks? - Brute forcing is a mechanism which is used by an
attacker to break the encryption............

How do you use RSA for both authentication and secrecy?

Network Security - How do you use RSA for both authentication and secrecy? - RSA is a public key
encryption algorithm. The RSA algorithms are based...........

Can you differentiate among encoding, encryption and hashing?

Network Security - Can you differentiate among encoding, encryption and hashing? - RSA is a public
key encryption algorithm. Encoding: Basically encoding is used to protect the integrity of data
as............

Have to generate a hash function?

Network Security - A secure hash function should have the following characteristics:.......

What is digital signature? Differentiate between Physical and Digital Signature

Network Security - A digital signature is an electronic analogue of a written signature; the digital
signature can be used to provide assurance............

What is Authentication Header and how it provides the protection to IP header?

Network Security - Basically Authentication Header protects IP header and provides the complete
authenticity to the IP packets.............

Explain SSL Protocol. How does it protect internet users from various threats?

Network Security - The SSL protocol (Secure Socket Layer protocol) was originally developed by
Netscape..............

What is PIX firewall security? How does it differ from a firewall?

Network Security - What is PIX firewall security? How does it differ from a firewall? - It is a popular IP
firewall and NAT (Network Address Translation) appliance..............

What are Malware? Explain different types of Malware

Network Security - What are Malware? Explain different types of Malware - Malware is a software

UMESH PRAJAPATI
program which is developed to destroy a computer system...............

What are replay attacks? Give an example of replay attack

Network Security - What are replay attacks? - Replay attacks are the network attacks in which an
attacker spies the conversation...............

‘encrypt’ and ‘compress’ data during transmission

Network Security - ‘encrypt’ and ‘compress’ data during transmission - Data should be transmitted
over any communication network in such a way..............

What is the goal of Information Security in an organization?

Network Security - What is the goal of Information Security in an organization? - Confidentiality,


Integrity and Availability...............

What is Symmetric-Key cryptography and Asymmetric-Key cryptography?

Network Security - Symmetric-Key Cryptography: Symmetric-key cryptography uses a single key for
both encryption and decryption...............

Networking - Explain the services provided by IP (Internet Protocol)

IP (Internet Protocol) - Addressing: For the purpose of delivering datagram packets, IP needs to know
about the address of the destination........

Networking - Explain the classes of IP address

Classes of IP address - IP addresses are organized into classes. For convenience of humans, IP
addresses are expressed in the decimal format........

Networking - Define Broadcast, Unicast and Multicast

Broadcast, Unicast and Multicast - Unicast: A term used in communication to describe a piece of
information to send from one point to another........

Networking - What is Network Mask?

What is Network Mask? - A network mask is used for determination of what subnet an IP address
belongs to........

Networking - Define Subnetting

Subnetting - A subnet describes a set of networked computers which have common IP address
routing prefix.........

Networking - What is the User Datagram Protocol (UDP)?

User Datagram Protocol (UDP) - User datagram protocol allows computer applications to send
messages as datagram packets from source to destination on an Internet Protocol.......

Networking - Explain TCP Windowing concept

TCP Windowing concept - TCP Windowing is a concept that is used for avoiding congestion in the
network traffic........

UMESH PRAJAPATI
Networking - What is the Domain Name System (DNS)? What are the advantages of it?

Domain Name System (DNS) - A hierarchical naming system for computer systems, services or for
that matter any resource participating in the internet........

Networking - What is the TTL (Time to Live)? Why is it required?

What is the TTL (Time to Live)? - TTL is a value in data packet of Internet Protocol. It communicates
to the network router whether or not the packet........

Networking - Explain the use of Internet Control Message Protocol (ICMP)

Use of Internet Control Message Protocol (ICMP) - Internet Control Message Protocol is one of the
important protocols in the Internet Protocol suite.........

Networking - What is the use of IGMP protocol?

What is the use of IGMP protocol? - Internet Group Management Protocol: - It allows internet hosts
to participate in multicasting.........

Networking - What are Ping and Tracert?

What are Ping and Tracert? - Ping and tracert are the commands used to send information to some
remote computers to receive some information..........

Networking - Explain RSVP. How does it work?

Explain RSVP. How does it work? - Resource Reservation protocol is used to reserve resources across
a network. It is used for requesting a specific Quality of Service (QoS) from the network.......

Networking - Explain the concept of DHCP

Explain the concept of DHCP - Dynamic Host Configuration Protocol is used assigning IP addresses to
computers in a network.........

Networking - Differences between a domain and a workgroup

differences between a domain and a workgroup - In a domain, one or more computer can be a
server to manage the network. On the other hand in a workgroup........

Networking - Explain how NAT works

Explain how NAT works - Network Address Translation translates and IP address used in a network to
another IP address........

Networking - What is PPP protocol? Explain PPP packet format

What is PPP protocol? Explain PPP packet format - Point to Point protocol helps communication
between 2 computers over a serial cable, phone line or........

Networking - What is IP Spoofing and how can it be prevented?

What is IP Spoofing and how can it be prevented? - IP spoofing is a mechanism used by attackers to
gain unauthorized access to a system. Here, the........

Networking - Explain IP datagram, Fragmentation and MTU

IP datagram, Fragmentation and MTU - IP datagram can be used to describe a portion of IP data.

UMESH PRAJAPATI
Each IP datagram has set of fields arranged.........

Networking - What is an application gateway?

What is an application gateway? - An application gateway is an application program that runs on a


firewall between two networks. An.........

Networking - Explain Circuit Level Gateway.

Circuit Level Gateway - A circuit level gateway is used to find if a session in TCP handshaking is
legitimate or not. It can be.........

Networking - What is 'Gateway Of Last Resort'?

What is 'Gateway Of Last Resort'? - A Gateway of Last Resort or Default gateway is a route used by
the router when no other known route.........

Networking - What are switches? Explain the concepts of Layer-3 switches

What are switches? Explain the concepts of Layer-3 switches - It is a device that connects multiple
network segments..........

Networking - What is Router? Explain components of Routers

What is Router? Explain components of Routers - The way switches connect multiple computers, a
router connects multiple networks. Routers comprise .........

Networking - Overview of OSI layer

Overview of OSI layer - OSI stands for Open Systems Interconnection........

Networking - Different layers in the OSI model.

Different layers in the OSI model - Application Layer: Closest to the end user, Interact directly with
the software application........

Networking - Concept and capabilities of Unicast IP Addresses

Unicast IP Addresses - It is an IP address that uniquely identifies a host in a network..........

Networking - What is IP Multicasting?

What is IP Multicasting? - It is an IP address that identifies a particular group of hosts in


network.........

Networking - Explain the classes of IP addresses. Why do we need them?

Classes of IP addresses. Why do we need them? .........

Networking - What is Subneting? Explain the advantages of using Subneting.

What is Subneting? Explain the advantages of using Subneting - Subneting is dividing a network into
several subnets......

Networking - What is Superneting? Explain the concept of custom Subneting

What is Superneting? Concept of custom Subneting - Supernetting or Classless Inter-Domain Routing


(CIDR)........

UMESH PRAJAPATI
Networking - What is VLSM, Variable length subnet masking?

What is VLSM, Variable length subnet masking? - VLSM is a means of allocating IP addressing
resources to subnets according to their individual need .......

Networking - What is Data Fragmentaion? Explain how Data Fragmentaion works

What is Data Fragmentaion? Explain how Data Fragmentaion works - Fragmentation occurs when
storage space is used inefficiently due to which storage capacity and performance is reduced. ........

Networking - Explain the concepts and capabilities of IP Datagram

Concepts and capabilities of IP Datagram - Data transmitted over an internet using IP is carried in
messages called IP datagrams.........

Basic Networking Interview Questions - Networking FAQs

• Home >> Networking

Difference between the communication and transmission - Networking

The differences between the communication and transmission are: Physical movement of
information and concerning about bit priority, synchronization, clock etc is referred as
transmission.......

Difference between TFTP and FTP application layer protocols? - Networking

The differences between FTP and TFTP: FTP is connection oriented, where as TFTP is not........

Difference between bit rate and baud rate - Networking

The differences between bit rate and baud rate: Bit rate is measured as number of data bits
transmitted / second in communication channel........

What are NETBIOS and NETBEUI? - Networking

Network Basic Input Output System provides session layer of OSI model related services which
allows the applications on different computers for communicating over a LAN.......

Difference between ARP and RARP - Networking

The differences between ARP and RARP: Address Resolution Protocol is utilized for mapping IP
network address to the hardware address that uses data link protocol.........

Difference between POP3 and IMAP Mail Server - Networking

POP3: All emails are to be downloaded again if used by another desktop PC for checking the
email.........

What is a Transaction server? - Networking

A transaction server is software that is used for implementing transactions.......

UMESH PRAJAPATI
What is Message Oriented Middleware (MOM)? - Networking

An infrastructure focuses on sending and receiving messages to increment interoperability, flexibility


and flexibility of an application......

What is Groupware server? - Networking

Groupware server is software that allows the collaboration of users, irrespective of location through
the internet.....

What are TP-Lite and TP-Heavy Monitors? - Networking

TP-Lite Monitor: The integration of TP monitors functions in a database engines is called as TP-Lite
monitor........

What is MAC address? - Networking

Media Access Control address is an identifier for assigned to most network adapters or Network
Interface Cards by the manufacturer for the purpose of identification.......

Networking - What is LAN?

What is LAN? - LAN is a computer network that spans a relatively small area. Most LANs are confined
to a single building or group of buildings..........

Networking - Difference Between an Intranet and the Internet

Difference Between an Intranet and the Internet - There's one major distinction between an intranet
and the Internet: The Internet is an open, public space.........

Networking - Define the term Protocol

Define the term Protocol - Protocol is a standard way of communicating across a network. A protocol
is the language of the network. ........

Networking - Define File Transfer Protocol

Define File Transfer Protocol - File Transfer Protocol (FTP), a standard Internet protocol, is the
simplest way to exchange files between computers on the Internet.........

Networking - Explain the 7 Layers of OSI

Explain the 7 Layers of OSI - Layer 1: Physical layer It represents all the electrical and physical
specifications for devices. ........

Networking - What is a network? What are the different kinds of network?

What is a network? What are the different kinds of network? - A network is a group of computers or
nodes connected together. They are connected with each other by communication paths........

Networking - What are network topologies? Explain Ring, Bus and Star topology

What are network topologies? Explain Ring, Bus and Star topology - A network topology describes
the layout of a network. It describes how different nodes and elements.........

Networking - Explain IP, TCP and UDP

Explain IP, TCP and UDP - Transmission control Protocol is used to establish communication between

UMESH PRAJAPATI
nodes or networks and exchange data packets.........

Networking - How would you define IP address?

How would you define IP address? - IP address or Internet Protocol address is the address of a device
attached to an IP network (TCP/IP network)........

Networking - What is multicasting?

What is multicasting? - Multicasting allows a single message to be sent to a group of recipients.......

Networking - Explain the functionality of PING

Explain the functionality of PING - Ping Is particularly used to check if the system is in network or
not. It also gives packet lost information.........

Networking - Explain the core naming mechanism, Domain Name System (DNS)

Explain the core naming mechanism, Domain Name System (DNS) - A Domain Name system is used
to convert the names of the website on the internet to IP addresses..........

Networking - What is NAT? Explain how NAT actually works.

What is NAT? Explain how NAT actually works - Network Address Translation is the full form of
NAT........

Networking - Concept of Collision Domain. Explain why collisions occur in HUBS and Repeaters.

Concept of Collision Domain - If two computer systems transmit at the same time a collision
occurs.......

Networking - concepts and capabilities of Routing Table

Concepts and capabilities of Routing Table - The information about the data packets route over an
Internet Protocol will be determined.......

Networking - What is static and dynamic routing?

What is static and dynamic routing? - In static routing the routes are described by fixed paths
through a data network.......

Networking - What is Routing Protocol?

What is Routing Protocol? - Routing protocol specifies how the routers communicate, disseminating
the information which enables the routers to be selected between two nodes in a network.......

Networking - Explain Interior and Exterior Routing Protocols

Explain Interior and Exterior Routing Protocols - Autonomous system’s routing is handled by Interior
Gateway Protocols.......

Networking - Define Distance vector routing protocol

Define Distance vector routing protocol - Packet switched networks utilizes Distance Vector Routing
Protocol for the purpose of deciding the best packet forwarding path.......

Networking - Difference between Broadcast and Multicast

UMESH PRAJAPATI
Difference between Broadcast and Multicast - Broadcast : Every device on the network will receive
the transmitted packets........

Networking - Distance Vector vs. Link-State Protocol

Distance Vector vs. Link-State Protocol - Each router in the protocol sends information about
destination and next hop to reach there, to its neighbor routers......

Networking - Explain the concept of RIP protocol

Explain the concept of RIP protocol - Routing Information Protocol is widely used protocol for the
purpose of managing router information within a self containing network such as LAN.......

Networking - Explain the techniques to avoid Routing Loop issue in RIP

Explain the techniques to avoid Routing Loop issue in RIP - Hold-down timer: Prevention of sending
inaccurate routing updates by routers is done by Hold-down timer........

Networking - Explain the concepts of IGRP(Interior gateway protocol)

Explain the concepts of IGRP(Interior gateway protocol) - Interior Gateway Routing Protocol is the
proprietary protocol developed by CISCO for addressing the issues associated with routing in large
and heterogeneous networks.......

Networking - Concept of EIGRP(Enhanced interior gateway routing protocol)

Concept of EIGRP(Enhanced interior gateway routing protocol) - EIGRP transmits the subnet mask
for each routing entry by which EIGRP’s VLSM and route summarization is enabled........

Networking - Explain the different types of packets in EIGRP

Explain the different types of packets in EIGRP - Hello Packets: EIGRP neighbor ship is discovered and
maintained by Hello Packets. If the router fails to receive a hello packet within the hold timer, the
corresponding router will be declared dead. .......

Networking - What is Dual and Successor in EIGRP?

What is Dual and Successor in EIGRP? - DUAL is a convergence algorithm. Loop free operations are
provided by this algorithm at every instant through a route computation.......

Networking - Explain the different tables used in EIGRP

Explain the different tables used in EIGRP - Neighbor table: The neighbor relationships are tracked in
this table which are the basis for EIGRP routing and convergence activity.......

Networking - What are Passive and Acitve route states?

What are Passive and Acitve route states? - An operational route’s normal condition is known as
‘Passive State’. The router will not seek to replace a lost route, when it is in the normal condition.......

Networking - Explain the OSPF, Open Shortest Path First. What are the different areas in OSPF?

Explain the OSPF, Open Shortest Path First - OSPF is a protocol for routing to be used in IP networks.
It is a link-state routing protocol and is a part of interior gateway protocols group.......

UMESH PRAJAPATI
Networking Questions for Freshers with Answers

• Home >> Networking

Symmetric Cryptosystems and Asymmetric Cryptosystems - Networking

Symmetric Cryptosystems: The same key is used for both encryption and decryption......

Disadvantages of Symmetric Cryptosystems - Networking

The following are the disadvantages of Symmetric Cryptosystems: - Key transportation is one
disadvantage of Symmetric Cryptosystems.......

Disadvantages of Asymmetric Cryptosystems - Networking

The following are the disadvantages of Asymmetric Cryptosystems: -The encryption speed is the
disadvantage of Asymmetric Cryptosystems. Popular secret-key encryption methods......

Concept of PKI, Public Key Infrastructure - Networking

Public Key Infrastructure: A set of hardware, software, people, policies and procedures comprises
the Public Key Infrastructure (PKI) and digital certificates are revoked.......

Different components of PKI - Networking

PKI Client: PKI Client is software which enables the USB of eToken operation and implementation of
eToken solutions which are PKI based.......

Concepts of digital certificates - Networking

A digital certificate is a credential which validates the certificate owner’s identity.......

What is Tunneling? - Networking

A way in which data is transmitted between networks in a secured manner. The complete data is
segmented into packets and then transmitted through the tunnel........

What is VPN Tunneling Packets? - Networking

VPN Tunneling Packets are packets to transmit over VPN in a specific VPN protocol format........

Concept of Voluntary and Compulsory Tunnels - Networking

Voluntary Tunnel: The user creates a voluntary tunnel model. This model is typically uses a L2TP
enabled client........

What are Static and Dynamic Tunnels? - Networking

Static Tunnel: The manually created tunnels are called Static Tunnels. Static tunnels creation is the
only choice......

What is PPP Protocol? - Networking

Point-to-Point Protocol is known as data link protocol. This protocol is most commonly for
establishment of direct connection among network nodes........

PPP Packet Format - Networking

UMESH PRAJAPATI
The following are the fields in the format of PPP packet. The fields transmission is from left to
right........

Point-To-Point Tunneling Protocol, PPTP - Networking

PPTP is one of the methods to implement Virtual Private Networks. Confidentiality or encryption
does not provided by PPTP.......

What is GRE (Generic Routing Encapsulation) in PPTP? - Networking

Generic Routing Encapsulation is a protocol for Point-to-Point Protocol........

What is CHAP (Challenge-Handshake Authentication protocol)? - Networking

Challenge-Handshake Authentication Protocol authenticates to an authenticating entity of a user or


network.......

What is PAP (Password Authentication Protocol)? - Networking

Password Authentication Protocol is one of the simple authentication protocols which are used for
the purpose of authenticating a user to a network access server........

What is Authentication header (AH) protocol? - Networking

Data origin authentication, data integrity and replay protection are provided by the Authentication
Header protocol......

What is ESP (Encapsulating Security Payload)? - Networking

Encapsulating Security Payload is a protocol for the inter security architecture. It is the key
protocol.......

What is NetBIOS Protocol? - Networking

NetBIOS protocol utilizes the 802.2 type 1 mode for the purpose of providing the NetBIOS/NetBEUI
name service and also the datagram service......

Explain the use of IGMP Protocol - Networking

The transmission of datagram to a host group is done in IP multicasting by setting zero or more hosts
that are identified by a single IP destination address......

What is Multicasting? Explain the different types of hosts in Multicasting - Networking

Multicasting is a technology for the purpose of delivering information to a destinations group


simultaneously........

What are Ping and Tracert? - Networking

Ping: Ping is used for verification of IP-Level connectivity. The following are the processes for using
ping:........

Explain how Tracert works - Networking

An ICMP echo packet to the named host is sent by Tracert. It sends packet with a TTL of 1, then TTL
of 2 and so on.......

UMESH PRAJAPATI
Use of RTP and RTCP protocols - Networking

Real-time Transport Protocol is a standardized packet format. It is used for delivering audio and
video over internet........

Explain the concepts of RTP Multiplexing - Networking

RTP multiplexing is a concept used for carrying multiple voice streams between IP telephony
gateways, in one RTP packet........

What is RSVP? How it works? - Networking

RSVP allocates resources for signaling messages which traverse the network. RSVP is receiver-
initiated.......

What is TCP/IP protocol? - Networking

The basic communication protocol for internet is TCP/IP. It is also being used as communication
protocol in a private network.......

Architecture of TCP/IP protocol - Networking

TCP/IP protocol maps four layers namely Application Layer, Transport and Internet Layer and
Network Interface Layer.......

TCP header - Networking

TCP headers should perform various tasks. The tasks are performed by various ports as follows:.......

Concept of CDMA - Networking

CDMA is communication technique which is based on multiple-access scheme........

Concept of DHCP - Networking

Dynamic Host Configuration Protocol is one of the communication protocol which lets the network
administrators manage and assignment of internet protocol addresses of an enterprise
automatically.......

Difference between Domain and Workgroup - Networking

In a workgroup: All computer systems are peers and no computer can not control another
computer......

Difference between baseband and broadband - Networking

Baseband: Digital signals are used, Frequency division multiplexing is not possible.......

What is RAID? - Networking

The core concept of Redundant Array of Independent Disks is two or more drives are combined
together for improvement of performance and fault tolerance......

Difference between terminal services and remote desktop - Networking

Terminal service is a client-server environment. In this environment, one computer acts as a server
which receives requests from the clients........

UMESH PRAJAPATI
Problems associated with operating a switched LAN - Networking

The following are the problems in brief in a switched LAN. Packet sniffing – the ports need to be
picked by one and replicate them for monitoring port........

How do we monitor data in Sockets? - Networking

Socket activities are monitored by IP and Socket Monitor tool. Socket monitor is designed for
programming using IP and Sockets.......

Difference between MUTEX and Semaphore - Networking

Mutex: A mutex object allows only one thread among the threads concurrently executed, into a
controlled section in a serialized fashion.......

Priority Inversion - Networking

Priority inversion is the scenario in scheduling where a task holds shared resources which have lower
priority for the higher priority resource.......

Explain MSMQ - Networking

Microsoft Message Queue is a protocol for messaging. Applications are allowed for running on
disparate servers for communicating in a fail-safe manner.......

Networking notes

• Home >> Networking

What are Passive and Active FTPs? - Networking

Active FTP: A Client connects from a random unprivileged port to the FTP server port 21, using Active
FTP......

What is Maximum Transmission Unit (MTU)? - Networking

Maximum Transmission Unit is the size of a layer of communication protocols of the largest protocol
data unit which it can pass onwards........

What is the Ethernet technology? - Networking

Ethernet is a LAN architecture, which was developed by Xerox Corporation in cooperation with DEC
and Intel.......

What is Ethernet Access Scheme? - Networking

Ethernet Access Scheme is called Carrier Sense Multiple Access with Collision Detect (CSMA/CD).......

What is the token ring technology? - Networking

Token ring is a LAN technology that resides at the Data Link Layer of the OSI model. Special three-

UMESH PRAJAPATI
byte frame is used to travels around the ring.......

What is the network segmentation? What is Collision Domain? - Networking

Network segment is a portion in a computer network where communication among every device is
done using the same physical layer........

Explain the functionality of a hub, a bridge and switch - Networking

Hub: Hub is a device in a network, Data packet from one port is sent to all other ports in a
network........

Functionality of a Router - Networking

A packet is like a device or in some cases, a software. A router determines the next network point to
which the data packet should be sent towards its destination........

Functionality of a Gateway - Networking

A set of data rates are advertised by any gateway server. Some streams can be blocked by a gateway
server from reaching the SP, in case the SP is opted for this service.......

What is a MAC address? - Networking

A Media Access Control address is a unique identifier that is assigned to the network adapters or
NICs by the manufacturers.......

Spanning-Tree protocols - Networking

Spanning Trees are a standard technique implemented in LAN connections. On a mesh topology, a
set of spanning tree algorithms were developed for prevention of redundant transmission of data
along intermediate hops between a source and a destination host.......

ATM technology vs. Ethernet technology - Networking

Ethernet technology: - Delivers high bandwidth to high-speed server connections. - Familiar


technology and relatively inexpensive........

What is the use of VPN technology? - Networking

A Virtual Private Network is a private data network which is used for public telecommunication
infrastructure.......

Public vs. Private IP addresses - Networking

Private IP Address: An IP address is private if the number is within a specific range which is reserved
for private uses by Internet Standards group......

MAC address vs. IP address - Networking

MAC Address: A MAC address is a digital name of interface. Each and every network interface has a
unique MAC address with unique ones.......

Use of Address Resolution Protocol - Networking

Address Resolution Protocol is used for networks that support hardware broadcast. An ARP will not
work on x.25 network.......

UMESH PRAJAPATI
What is the Reverse Address Resolution Protocol (RARP)? - Networking

Reverse Address Resolution Protocol (RARP) is a link layer networking protocol that is used by a host
computer system which obtain its IP address......

What is the TTL (Time to Live)? Why is it required? - Networking

TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or
not the packet should be in the network for too long or discarded.......

Use of Internet Control Message Protocol (ICMP) - Networking

Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It
is mainly used in operating system of networked computers.......

Services provided by IP (Internet Protocol) - Networking

Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of
the destination. By including the host addressing, this task is carried out by IP.....

Classes of IP address - Networking

IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in
the decimal format.......

Define Broadcast, Unicast and Multicast - Networking

Unicast: A term used in communication to describe a piece of information to send from one point to
another........

What is Network Mask? - Networking

A network mask is used for determination of what subnet an IP address belongs to. An IP address
has network address and the host address.....

Define Subnetting - Networking

A subnet describes a set of networked computers which have common IP address routing
prefix.........

What is the User Datagram Protocol (UDP)? - Networking

User datagram protocol allows computer applications to send messages as datagram packets from
source to destination on an Internet Protocol........

TCP Windowing concept - Networking

TCP Windowing is a concept that is used for avoiding congestion in the network traffic......

Domain Name System (DNS). What are the advantages of it? - Networking

A hierarchical naming system for computer systems, services or for that matter any resource
participating in the internet.......

Data encoding and modulation. How do they differ from one another? - Networking

Data Encoding: A technique that requires the polar change in the line level after each bit. To gain the

UMESH PRAJAPATI
control circuitry that ensures consistent level discrimination.......

Packet Switched, Cell Switched and Circuit Switched Technology - Networking

Packet Switching: A method of transmitting data group with the concern of content, type or
structure into suitably-sized blocks.......

Explain what POP3 is. How does is differ from POP? - Networking

POP3 is a protocol that is used for downloading email from an ISP to the recipient mail program.......

Why we need IP address over Mac address? - Networking

IP address is a logical address of a computer system, where as MAC address is the physical address
of a computer system that is usually persisted in network card........

What is a hardware loopback plug? - Networking

A hardware loopback pug is a simple device for redirecting the outgoing transmissions from a system
directly back into it........

What is pulse code modulation? - Networking

Pulse Code Modulation: A digital representation of an analog signal. Signal sampling is done with the
magnitude of the signal regularly at uniform intervals.......

Why do we use Subnet mask? What are its uses? - Networking

Subnet mask is utilized for isolating the network id and host ids. This is to reduce the broadcast
domain or to reduce heavy network traffic.......

What do you mean by Twisted-pair Cabling? - Networking

A twisted pair is a cable in which the cables are twisted at regular distances. Twisted pairs are used
for transferring signals with high frequency........

What is the use of Kerberos protocol? - Networking

Kerberos is an authentication protocol in a compute network that makes the nodes communicates
over a non-secure network for providing their identification to one another in most secure
manner......

Difference between ISDN and ATM - Networking

ISDN uses circuit switching where as ATM uses packet switching communication.......

Networking - Application Layer Interview Questions

• Home >> Networking

Networking - What is application layer?

UMESH PRAJAPATI
What is application layer? - The application layer is located at the top of the TCP/IP protocol
layers.........

Networking - Define DNS

Define DNS - The DNS translates Internet domain and host names to IP addresses.......

Networking - Define Telnet

Define Telnet - Telnet is the main Internet protocol for creating a connection to a remote
server..........

Networking - Define SMTP

Define SMTP - SMTP - Short for Simple Mail Transfer Protocol, a protocol for sending e-mail
messages between servers.........

Networking - Data Link Layer Interview Questions

• Home >> Networking

Networking - What is a MAC Address?

What is a MAC Address? - MAC (Media Access Control) addresses are globally unique addressed that
are written into hardware at the time of manufacture.........

Networking - MAC vs. IP Addressing

MAC vs. IP Addressing - Whereas MAC addressing works at the data link layer, IP addressing
functions at the network layer (layer 3).........

Networking - Define Spanning-Tree Protocol (STP)

Define Spanning-Tree Protocol (STP) - Spanning-Tree Protocol (STP) as defined in the IEEE 802.1D is a
link management protocol that provides path redundancy........

Networking - What is VPN?

What is VPN? - A VPN is a service that offers secure, reliable connectivity over a shared public
network infrastructure such as the Internet..........

Networking IP Layer - Answers to Networking IP Layer Interview Questions

• Home >> Networking

Networking - Difference between Static and Dynamic IP

Difference between Static and Dynamic IP - Static IP is also called as permanent address assigned to

UMESH PRAJAPATI
each device in a network, whereas Dynamic .......

Networking - Difference between public and private IP

Difference between public and private IP - A public IP address allows equipment accessible to
everyone on the internet.........

Networking - What is Network Address Translation?

What is Network Address Translation? - Network Address Translation acts as an agent between the
Internet and a local network........

Networking - What is subneting?

What is subneting? - Subnet adds one level to the way IP address is represented. It logically
organizes the network.........

Networking - Define Address Resolution Protocol

Define Address Resolution Protocol - Address Resolution Protocol ARP, is responsible for mapping an
IP address to its corresponding ........

Networking - Maximum Transfer Unit, MTU

Maximum Transfer Unit, MTU - MTU specifies the largest amount of data that can be transferred
across a network..........

Networking - Explain the structure and use of internet addresses

Explain the structure and use of internet addresses - Each IP address is 32 bit long. In human
language the IP addresses are written in dotted decimal notation........

Networking - Explain how names are translated (resolved) into IP address

Explain how names are translated (resolved) into IP address - Domain Name server or DNS is used to
resolve names into IP addresses. When a web address is entered into the browser........

Networking - Describe the basics of internet routing

Describe the basics of internet routing - When a source sends a packet to a destination, this packet
has a specific path or route it follows. ........

UMESH PRAJAPATI
UMESH PRAJAPATI
Ethernet Networking Interview Questions and Answers - Ethernet FAQs

• Home >> Networking

Networking - Define broadcast domain

Define broadcast domain - It is a logical area in a computer network where any computer connected
to the network can directly ........

Networking - Define Bridge vs switch

Bridge vs switch - A bridge connects two different LAN networks. A switch is something like you can
connect many .........

Networking - What is a Router?

What is a Router? - A router is a device or sometimes a software in a computer which decides the
next network point to .........

Networking - Define gateway

Define gateway - A gateway is a network point that provides entrance into another network. On the
Internet, a node or stopping point........

UMESH PRAJAPATI
UMESH PRAJAPATI
Firewall Interview Questions and Answers - Firewall FAQs

• Home >> Networking

Networking - What is firewall?

What is firewall? - A firewall is a hardware or software installed to provide security to the private
networks connected to the internet.........

Networking - What are the types of firewalls?

What are the types of firewalls? - Packet Filtering Firewall:This type of Firewall detects packets and
block unnecessary packets and makes network traffic release.........

Networking - Digital Signatures

Digital Signatures - Digital signature is an attachment to an electronic message used for security
purpose..........

Network Technology - Answers to Network Technology Interview Questions

• Home >> Networking

Networking - What is Ethernet technology?

What is Ethernet technology? - Ethernet technology is a high speed broadcast bus technology..........

Networking - Explain the use of network interface card, NIC

Explain the use of network interface card, NIC - NIC is used to connect computer to an Ethernet
network.........

Networking - Explain token ring technology

Explain token ring technology - In this technology, all the devices are arranged in a circle. A token
moves around the circular network.........

Networking - What is CSMA and CD concept?

What is CSMA and CD concept? - In CSDA (carrier sense multiple access), presence of any digital
signal in a network is checked before transmission. ........

Networking Protocols Interview Questions and Answers - Protocols FAQs

• Home >> Networking

Networking - What is NetBIOS protocol?

UMESH PRAJAPATI
What is NetBIOS protocol? - NetBIOS (Network Basic Input/Output System) Protocol allows
applications on separate computers to communicate over a LAN.........

Networking - What is IGMP protocol?

What is IGMP protocol? - Internet Group Management Protocol, allows internet hosts to multicast.
i.e. to send messages to a group of computers. .........

Networking - What is TCP/IP protocol?

What is TCP/IP protocol? - Transmission Control Protocol / Internet Protocol: - It is a family of


protocols used for communication ........

Networking - What is HTTP (Hypertext Transfer Protocol)?

What is HTTP (Hypertext Transfer Protocol)? - HTTP or Hyper Text Transfer Protocol is provides a set
of rules to transfer files, videos, images over the world wide web..........

Networking - What is NNTP (Network News Transfer Protocol)?

What is NNTP (Network News Transfer Protocol)? - NNTP or Network News Transfer Protocol is used
to manage the notes posted on Unset newsgroup (a collection of posted notes on a subject posted
by different users).........

Networking - What is POP3 (Post Office Protocol 3)?

What is POP3 (Post Office Protocol 3)? - POP3 or Post Office Box 3 is used fro receiving emails. It is a
client server protocol which holds the email. .........

Networking - What is SNMP (Simple Network Management Protocol)?

What is SNMP (Simple Network Management Protocol)? - SNMP or Simple Network Management
Protocol is typically used for managing the network. Managing the network includes managing the
nodes present in the network.........

UMESH PRAJAPATI
Routers Interview Questions and Answers - Routers FAQs

• Home >> Networking

Networking - What is Routing table?

What is Routing table? - A routing table stores the routes of the various nodes in a network. Nodes
can be any electronic device connected to the network..........

Networking - What is Routing Protocols?

What is Routing Protocols? - Routing protocols are used to assist in achieving the basic purpose of
routing. They specify the routers the method to communicate with each other.........

Networking - What is Distance Vector Routing Protocols?

What is Distance Vector Routing Protocols? - The main goal of Distance Vector Routing Protocols Is
to find out the best path for he data packet to reach the destination..........

UMESH PRAJAPATI
UMESH PRAJAPATI
Security - Answers to Security Interview Questions

• Home >> Networking

Networking - What is Data encryption?

What is Data encryption? - Data encryption ensures data safety and very important for confidential
or critical data..........

Networking - What is the Public Key Encryption?

What is the Public Key Encryption? - Public key encryption use public and private key for encryption
and decryption. In this mechanism, .........

Networking TCP Layer Interview Questions and Answers - TCP Layer FAQs

• Home >> Networking

Networking - Explain Transmission Control Protocol, TCP

Transmission Control Protocol, TCP - TCP ensures reliable and end to end delivery of segments of
information. Segments are acknowledged to the source when received by the destination..........

Networking - User Datagram Protocol, UDP

User Datagram Protocol, UDP - The UDP is a connectionless, unreliable service. UDP messages can
be lost and duplicated........

Networking - What is TCP windowing concept?

What is TCP windowing concept? - TCP windowing concept is primarily used to avoid congestion in
the traffic. It controls the amount of unacknowledged data.......

Networking TCP Layer Interview Questions and Answers - TCP Layer FAQs

• Home >> Networking

Networking - Explain Transmission Control Protocol, TCP

Transmission Control Protocol, TCP - TCP ensures reliable and end to end delivery of segments of
information. Segments are acknowledged to the source when received by the destination..........

Networking - User Datagram Protocol, UDP

User Datagram Protocol, UDP - The UDP is a connectionless, unreliable service. UDP messages can
be lost and duplicated........

Networking - What is TCP windowing concept?

What is TCP windowing concept? - TCP windowing concept is primarily used to avoid congestion in
the traffic. It controls the amount of unacknowledged data.......

UMESH PRAJAPATI
UMESH PRAJAPATI
VPN Interview Questions and Answers - VPN Interview FAQ

• Home >> Networking

Networking - What is Trusted and Untrusted Networks?

What is Trusted and Untrusted Networks? - Trusted networks: Such Networks allow data to be
transferred transparently. The machines using a trusted network are usually administered by an
Administrator to ensure that private........

Networking - What are the different types of VPN?

What are the different types of VPN? - Remote Access VPN:- Also called as Virtual Private dial-up
network (VPDN) is mainly used in scenarios where remote access to a network becomes
essential.........

Networking - What are the different authentication methods used in VPNs?

What are the different authentication methods used in VPNs? - The authentication method uses an
authentication protocol. The methods are:........

Tunneling Interview Questions

• Home >> Networking

Networking - What is Tunneling?

What is Tunneling? - Tunneling is a mechanism provided to transfer data securely between two
networks. The data is split........

Networking - What are voluntary and compulsory tunnels?

What are voluntary and compulsory tunnels? - Users computer is an end point of the tunnel and acts
as tunnel client. Here the client or user issues a request to configure and create a voluntary
tunnel..........

Networking - Explain static and dynamic tunnels

Explain static and dynamic tunnels - Tunnels that are created manually are static tunnels. Tunnels
that are auto discovered are dynamic tunnels. .........

UMESH PRAJAPATI
Subneting Interview Questions

• Home >> Networking

Networking - Explain the importance of increasing and decreasing subnet bits

Importance of increasing and decreasing subnet bits - Adding 1’s as a bit means increasing the
subnets and decreasing the hosts. Removing or decreasing........

Networking - Why do we need a subnet mask?

Why do we need a subnet mask? - A subnet mask allows identification of host part and network part
of an IP address..........

RTP - Real-Time Transfer Protocol

• Home >> Networking

Networking - What is RTP?

What is RTP? - Real-Time Transfer Protocol lays a standard or a way to transfer or manage real time
data over a network.........

Networking - What is RTP Multiplexing?

What is RTP Multiplexing? - RTP multiplexing allows multiple media flows within a single RTP data
payload between two points.........

Networking - Explain the use of RTP and RTCP protocols

Explain the use of RTP and RTCP protocols - Use of RTP and RTCP:- RTP can be used to transfer Real
time data like voice packets.........

Networking - Describe the format of RTP and RTCP packets

Describe the format of RTP and RTCP packets - The 32 bits of RTP packet format is as follows:- (L to
R).........

Multicasting Interview Questions and Answers

• Home >> Networking

Networking - Define IP multicast

IP multicast - IP multicast technology reduces traffic by sending stream of information to many


recipients at one go. ......

Networking - Describe how the multicast protocol works

Describe how the multicast protocol works - Multicast protocol or Internet protocol delivers a singles
message to multiple machines. One packet from the source is replicated and sent to the

UMESH PRAJAPATI
destination.........

Describe how to control the scope of multicast transmissions - Controlling the scope of multicast
transmission restricts the range of group members. TTL (Time To Live) is one of the mechanisms to
limit the scope.........

Networking - Explain why use Multicasting

Explain why use Multicasting - When the same message or packet needs to be sent to multiple
destinations, multicasting is used.........

UMESH PRAJAPATI
Socket Programming Interview Questions and Answers

• Home >> Networking

Networking - What is a socket?

What is a socket? - A socket is used to connect an application to a network protocol. A socket


enables communication between a client and a server.........

Networking - Datagram vs. stream

Datagram vs. stream - Stream can be considered as a pipe that allows full duplex connection. A
datagram or a packet on the other hand, has a source and a destination.........

Networking - What is a stream socket?

What is a stream socket? - A stream socket provides two way communications between a client and
server. This communication is reliable and sequenced.........

UMESH PRAJAPATI
Secured Socket Layer (SSL) Interview Questions - SSL FAQs

• Home >> Networking

Networking - What is SSL?

What is SSL? - SSL is Secured Socket Layer. SSL is used to establish a secured and an encrypted
connection between a server and the browser.........

Networking - What are the two important TCP Socket classes?

What are the two important TCP Socket classes? - The Socket class provides enriched methods and
properties for network communications.......

Networking - What are the advantages and disadvantages of Java Sockets?

What are the advantages and disadvantages of Java Sockets? - Advantages: Flexible and powerful,
cause low network traffic if efficiently used, only updated information can be sent..........

Networking - What is race condition? How does the race condition occur?

What is race condition? How does the race condition occur? - A race condition occurs when there
are two or more processes trying to access the same data concurrently or performing the same
operation concurrently.......

Networking - What is meant by Symmentric Multiprocessing (SMP)?

What is meant by Symmentric Multiprocessing (SMP)? - Symmetric Multiprocessing allows any


processor to do work of another processor.........

Networking - What are TP-Lite and TP-Heavy Monitors?

What are TP-Lite and TP-Heavy Monitors? - TP – Lite is an integration of TP Monitor functions in a
database engine......

UMESH PRAJAPATI

You might also like