Basic NETWORKING interview quotations
1. What is MAC address
The address for
a device as it is identified at the Media Access Control (MAC) layer in the
network architecture. MAC
address is
usually stored in ROM on the network
adapter card and
is unique.
2. What
is subnet
A generic term for section
of a large networks usually separated by a bridge or router.
3. What
is Brouter
Hybrid devices that combine
the features of both bridges and routers.
4. How
Gateway is different from Routers
A gateway operates at the
upper levels of the OSI model and translates information between two completely
different
network architectures or
data formats.
5. What
are the different type of networking / internetworking devices
Repeater:
Also called a regenerator,
it is an electronic device that operates only at physical layer. It receives
the signal in the
network before it becomes
weak, regenerates the original
bit pattern and puts the
refreshed copy back in to the link.
Bridges:
These operate both in the
physical and data link layers of LANs of same type. They divide a larger
network in to smaller
segments. They contain logic
that allow them to
keep the traffic for each
segment separate and thus are repeaters that relay a frame only the side of the
segment
containing the intended
recipent and control congestion.
Routers:
They relay packets among
multiple interconnected networks (i.e. LANs of different type). They operate in
the physical,
data link and network
layers. They contain software
that enable them to
determine which of the several possible paths is the best for a particular
transmission.
Gateways:
They relay packets among
networks that have different protocols (e.g. between a LAN and a WAN). They
accept a
packet formatted for one
protocol and convert it to a
packet formatted for another
protocol before forwarding it. They operate in all seven layers of the OSI
model.
What are the important topologies for networks
BUS topology:
In this each computer is
directly connected to primary network cable in a single line.
Advantages:
Inexpensive, easy to
install, simple to understand, easy to extend.
STAR topology:
In this all computers are
connected using a central hub.
Can be
inexpensive, easy to install and reconfigure and easy to trouble shoot physical
problems.
RING topology:
In this all
computers are connected in loop.
Advantages:
All computers
have equal access to network media, installation can be simple, and signal does
not degrade as much as
in other
topologies because each computer
regenerates it.
What is
point-to-point protocol
A communications protocol
used to connect computers to remote networking services including Internet
service
providers.
5.
Ip Address Ranges:
Class A: 0-126. 127 is a Broadcast
Class B: 128-191
Class C: 192-223
Class D: 224-239
Class E: 240-255.
Class A: 0-126. 127 is a Broadcast
Class B: 128-191
Class C: 192-223
Class D: 224-239
Class E: 240-255.
what is a Firewall:
Firewalls are of two types:
-Hardware Firewall
-Software Firewall.
Firewall in simple manner is bascially the utility to provide the security over the network. These are the security measures that prevents the network’s in and out traffic to pass through the specific Security filters so that the unwanted and unsecure data can be stopped from entering into the network..
further… as a security measure it also depends on the network designer and implementer that how to use a Firewall mean to say the security measures like how to present the content filtering and Url filtering which type of firewall should be used and where to put it..
Firewalls are of two types:
-Hardware Firewall
-Software Firewall.
Firewall in simple manner is bascially the utility to provide the security over the network. These are the security measures that prevents the network’s in and out traffic to pass through the specific Security filters so that the unwanted and unsecure data can be stopped from entering into the network..
further… as a security measure it also depends on the network designer and implementer that how to use a Firewall mean to say the security measures like how to present the content filtering and Url filtering which type of firewall should be used and where to put it..
first of all one should know what a
protocol actually means:
A Protocol is bascially set of rules designed and developed for the internetwork or can say intranetwork Communications How does a DHCP work ? When a pc with no Ip address just with an MAC addrress boots up , what are the steps that Happen till the time a Ip is given to the pc from a DHCP.
A Protocol is bascially set of rules designed and developed for the internetwork or can say intranetwork Communications How does a DHCP work ? When a pc with no Ip address just with an MAC addrress boots up , what are the steps that Happen till the time a Ip is given to the pc from a DHCP.
how to change MAC Address.?
you
can change a mac address easly. go to the desktop>write click on the my
computer icon>properties>device manager>Network Adapters>
properties> advance>network address.. and then chnage the value. The
value should be hexadecimal or 16 octat
Telnet --
A application layer process of
connection remote compter and local Area Network compter by specifing the ip
address by a specific port,
Firewall The rules which are used for Passing
traffic thats is packets in network layer and frame is datalink layer on a
specific port it can be two type
1.Hardware
2.Software
1.Hardware
2.Software
TCP - A transport layer protocol sued for reliable delivery of segmented packets
IP is network layer protocol used for end to end delivery of two nodes not reliable.
How ISA Server Works ?
ICS(Internet Connection Sharing)
In this method you can just enable Internet Connection Sharing check on your gateway.. The limitation of ICS is you must have 192.168.X.X IP addressing scheme on your network. another limitation of ICS is it can support upto 15 Computer(approx.. dont remember exact figure).
In this method you can just enable Internet Connection Sharing check on your gateway.. The limitation of ICS is you must have 192.168.X.X IP addressing scheme on your network. another limitation of ICS is it can support upto 15 Computer(approx.. dont remember exact figure).
What are some of the problems
associated with operating a switched LAN?
A switched LAN (Local Area Network) may use a Gigabit Ethernet switch that includes different ports connected to PCs and to layer 3 routers. The routers connected to different switch ports can not immediately identify failures either of other routers or of the ports and links by which they are connected to the switch. The routers currently have to rely on slow timeout mechanisms, such as missed hello packets, to detect failures on other links connected to the switch.
Thus, the time required to detect failures can and often does dominate the time required for a routing algorithm to determine a new network topology around a detected failure (convergence time).
A switched LAN (Local Area Network) may use a Gigabit Ethernet switch that includes different ports connected to PCs and to layer 3 routers. The routers connected to different switch ports can not immediately identify failures either of other routers or of the ports and links by which they are connected to the switch. The routers currently have to rely on slow timeout mechanisms, such as missed hello packets, to detect failures on other links connected to the switch.
Thus, the time required to detect failures can and often does dominate the time required for a routing algorithm to determine a new network topology around a detected failure (convergence time).
Ø What are the well known ports?
Netstat - 15
FTP – 20 (data) and 21(Control)
SSH -22
Telnet – 23
SMTP -25
Wins - 42
DNS -53
DHCP – server 67 & clint 68
TFTP – 69
HTTP – 80 Secure 81
Kerbros - 88 *
POP3 – 110
NNTP - 119
Net bios - 139
SNMP - 161
IMAP3 – 220
LDAP - 389
SSL - Secuer socket leyar - 443
RIP - 520
MS Sql - 1433
NFS - 2049
RDP - Remote Desk top Protocals - 3389
connection
a LAN, the question is..how does it identify, which computer it needs to send
the packet to. For this it uses the concept of ARP, Address Resolution
Protocol, which it uses over time to build up a table mapping from the Logical
addresses to the Physical addresses. Each computer is identified using its
MAC/Physical address ( u can use the ipconfig -all option to get ur MAC
address).
VPN(Virtual
Private Network )… these are bascially the logical networks on the physical
line… you can have many VPN oveer same line..
Need of VPN arises when your company need to increase the network but don’t want to buy any more switches.. take an eg. your dept. your room is packed with employees and ur company need to add 4 more persons to ur deptt. what will they do.. the solution is to create VPN’s…you can configure the switch ports in other deptts. and create a specific VLAN of ur deptt.so that the persons can sit there and access to the required pcs.
Need of VPN arises when your company need to increase the network but don’t want to buy any more switches.. take an eg. your dept. your room is packed with employees and ur company need to add 4 more persons to ur deptt. what will they do.. the solution is to create VPN’s…you can configure the switch ports in other deptts. and create a specific VLAN of ur deptt.so that the persons can sit there and access to the required pcs.
What are Pvt. IP address ?
Pvt. IP are IPs
which are not used in Internet or which are not routable in
Internet. They are also called as non-routable IP's.What is Subnet Mask ?
Subnet mask is used to differentiate Network ID and
Host ID from a given IP
address. The default subnet mask are as under
What is Loopback address ?
The loopback address is 127.0.0.1. This
address is used to check local TCP/IP
suite or local
machine.
What
portocol is used by PING ?
Ping uses ICMP(Internet Control Management
Protocol)
What is used of Tracert ?
Answer : Tracert is
a to find path information between source and desitnation. It show no.of hops
between source and desitination. Tracert also uses ICMP protocol.
What is full form of PING ?
Packet Internet Network Gopher
what
is bandwidth of of CAT5 cable
100 Mbps
What
is the recommanded CAT5 cable length between switch and PC ? 100 meters
Similar
device = cross cable
eg. switch to switch
PC to PC
Hub to HUB
Switch to HUB
PC to router
router to router
Unsimilar
device = straight cable
eg. PC to switch
PC to HUB and Router to Switch
Difference
between domain and workgroup
Domain
Workgroup
a. centralized
network model decentralized network
b. Domain is
controlled by DC No centrailzed control
c. Centralised login
Local login
d. centrailsed user
database local user databased
e. Easy and
centrailsed management NA
f. good for large network good for small network
What is Web Server ?
Web server is a server or application server
which host or stores websites.
Every web site
should have a name like www.vision.com and IP address. Eg. IIS, Apache server,
etc.
What is mail server ?
Mail server is a software which maintains user
mailboxes. eg : Exchange server
, Lotus domino, etc.
3)
What is mail client ?
A
sofware used by client to access to mails stores on mail server. using mail
client software you
can send mail and receive mail. Eg : Microsoft Outlook, Outlook
Express, Lotus
notes, etc.
What
is Proxy server ?
It is a softwar used
for sharing of internet connection. Eg. Wingate, Winproxy,
Analog proxy, etc.
Port
numbers for various application and services
There are total 65536 ports available. Below are the list of
some well-known ports
No comments:
Post a Comment