(networking +ad) questions

Upload: abhishek-sachan

Post on 01-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 (Networking +AD) questions

    1/27

    1. What is Protocol?a protocol is the special set of rules that end points in atelecommunication connection use when they communicate. Protocolsspecify interactions between the communicating entities.

    Protocols exist at several levels in a telecommunication connection. Forexample, there are protocols for the data interchange at the hardwaredevice level and protocols for data interchange at the applicationprogram level. In the standard model known as Open SystemsInterconnection OSI !, there are one or more protocols at each layer inthe telecommunication exchange that both ends of the exchange mustrecogni"e and observe. Protocols are often described in an industry orinternational standard.

    #he #$P%IP Internet protocols, a common example, consist of& #ransmission $ontrol Protocol #$P!, which uses a set of rules to

    exchange messages with other Internet points at the informationpacket level

    Internet Protocol IP!, which uses a set of rules to send and receivemessages at the Internet address level

    'dditional protocols that include the (ypertext #ransfer Protocol(##P! and File #ransfer Protocol F#P!, each with de)ned sets of rules

    to use with corresponding programs elsewhere on the Internet

    2. What is the diference between protocol & standard?' protocol is a series of prescribed steps to be taken, usually in order toallow for the coordinated action of multiple parties.Standards are simply agreed*upon models for comparison, such as themeter and the gram. In the world of computers, standards are often usedto de)ne syntactic or other rule sets, and occasionally protocols, that are

    used as a basis for comparison.

    3. What is the diference between proprietary & nonproprietary protocols?

    Open protocols are designed so that they are non*proprietary, whichmeans that the public in general can see the underlying codes andspeci)cations. ' programmer can use the open protocol access systemsoftware without having to pay for a licensing fee+ open*protocol

    http://searchnetworking.techtarget.com/definition/OSIhttp://searchnetworking.techtarget.com/definition/TCP-IPhttp://searchunifiedcommunications.techtarget.com/definition/Internet-Protocolhttp://searchenterprisewan.techtarget.com/definition/File-Transfer-Protocolhttp://searchnetworking.techtarget.com/definition/OSIhttp://searchnetworking.techtarget.com/definition/TCP-IPhttp://searchunifiedcommunications.techtarget.com/definition/Internet-Protocolhttp://searchenterprisewan.techtarget.com/definition/File-Transfer-Protocol
  • 8/9/2019 (Networking +AD) questions

    2/27

    applications include ireshark, 'pache and nginx software. $losedprotocols belong to the company that creates them and re-uire userlicenses to view the speci)cations. #he system codes are hidden from thegeneral public. Some closed protocol access system software include

    ($P, Skype protocol .

    4. What is Topology?In communication networks, a topology is a usually schematic descriptionof the arrangement of a network, including its nodes and connectinglines. #here are two ways of de)ning network geometry& the physicaltopology and the logical or signal! topology.

    5. What is the diference between L !" # !" W !" & $ !networ%?

    L ! /ocal 'rea 0etworks cover a small physical area, like a home,o1ce, or a small group of buildings, such as a school or airport.

    WL ! ireless /ocal 'rea 0etworks enable users to move aroundwithin a larger coverage area, but still be wirelessly connected tothe network.

    W ! ide 'rea 0etworks cover a broad area, like communicationlinks that cross metropolitan, regional, or national boundaries. #heInternet is the best example of a '0.

    # ! 2etropolitan 'rea 0etworks are very large networks thatcover an entire city.

    $ ! Storage 'rea 0etworks help attach remote computer storage

    devices, such as disk arrays, tape libraries, and optical 3ukeboxes, toservers in such a manner that that they appear to be locallyattached to the operating system.

    '. What is (ntranet?

  • 8/9/2019 (Networking +AD) questions

    3/27

    'n intranet is a network based on #$P%IP protocols an internet! belongingto an organi"ation, usually a corporation, accessible only by theorgani"ation4s members, employees, or others with authori"ation .

    ). What is *+tranet?'n extranet is a private network that uses Internet technology and thepublic telecommunication system to securely share part of a business4sinformation or operations with suppliers, vendors, partners, customers, orother businesses. 'n extranet can be viewed as part of acompany4s intranet that is extended to users outside the company.

    ,. What is the diference between (ntranet & *+tranet?bo-e

    . What is /P!?' -irt0al pri-ate networ% /P! ! extends a private network acrossa public network, such as the Internet . It enables a computer to send and

    receive data across shared or public networks as if it is directly connectedto the private network, while bene)ting from the functionality, securityand management policies of the private network. 567 ' 8P0 is created byestablishing a virtual point*to*point connection through the use of dedicated connections, virtual tunneling protocols, or tra1c encryptions

    1 . What is (nternet? #he (nternet is a global system of interconnected computernetworks that use the standard Internet protocol suite #$P%IP! to linkseveral billion devices worldwide. It is a network of networks that consistsof millions of private, public, academic, business, and governmentnetworks, of local to global scope, that are linked by a broad array of electronic, wireless, and optical networking technologies. #he Internetcarries an extensive range of information resources and services, such asthe inter*linked hypertext documents and applications of the orld ide

    eb !, the infrastructure to support email, and peer*to*peer networks for )le sharing and telephony

    11. What is $( #odel *+plain it. #he Open Systems Interconnect OSI! model has seven layers. #his articledescribes and explains them, beginning with the 4lowest4 in the hierarchy

    the physical! and proceeding to the 4highest4 the application!. #he layersare stacked this way&

    'pplication Presentation Session #ransport

    http://www.webopedia.com/TERM/T/TCP_IP.htmlhttp://www.webopedia.com/TERM/A/authorization.htmlhttp://searchwindevelopment.techtarget.com/definition/intranethttp://en.wikipedia.org/wiki/Private_networkhttp://en.wikipedia.org/wiki/Publichttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Virtual_private_network#cite_note-1http://en.wikipedia.org/wiki/Point-to-point_(network_topology)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internet_protocol_suitehttp://en.wikipedia.org/wiki/Hypertexthttp://en.wikipedia.org/wiki/Web_applicationhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Information_infrastructurehttp://en.wikipedia.org/wiki/Peer-to-peerhttp://en.wikipedia.org/wiki/Peer-to-peerhttp://en.wikipedia.org/wiki/File_sharinghttp://en.wikipedia.org/wiki/VOIPhttp://www.webopedia.com/TERM/T/TCP_IP.htmlhttp://www.webopedia.com/TERM/A/authorization.htmlhttp://searchwindevelopment.techtarget.com/definition/intranethttp://en.wikipedia.org/wiki/Private_networkhttp://en.wikipedia.org/wiki/Publichttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Virtual_private_network#cite_note-1http://en.wikipedia.org/wiki/Point-to-point_(network_topology)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internet_protocol_suitehttp://en.wikipedia.org/wiki/Hypertexthttp://en.wikipedia.org/wiki/Web_applicationhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Information_infrastructurehttp://en.wikipedia.org/wiki/Peer-to-peerhttp://en.wikipedia.org/wiki/Peer-to-peerhttp://en.wikipedia.org/wiki/File_sharinghttp://en.wikipedia.org/wiki/VOIP
  • 8/9/2019 (Networking +AD) questions

    4/27

    0etwork ata /ink Physical

    P(9SI$'/ /'9:;

    #he physical layer, the lowest layer of the OSI model, is concerned withthe transmission and reception of the unstructured raw bit stream over a

    physical medium. It describes the electrical%optical, mechanical, andfunctional interfaces to the physical medium, and carries the signals forall of the higher layers. It provides&

    ata encoding& modi)es the simple digital signal pattern 6s and

  • 8/9/2019 (Networking +AD) questions

    5/27

    /ink establishment and termination& establishes and terminates thelogical link between two nodes.

    Frame tra1c control& tells the transmitting node to =back*oA= whenno frame buAers are available.

    Frame se-uencing& transmits%receives frames se-uentially. Frame acknowledgment& provides%expects frame acknowledgments.

    etects and recovers from errors that occur in the physical layer byretransmitting non*acknowledged frames and handling duplicateframe receipt.

    Frame delimiting& creates and recogni"es frame boundaries. Frame error checking& checks received frames for integrity. 2edia access management& determines when the node =has the

    right= to use the physical medium.

    0:# O;@ /'9:;

    #he network layer controls the operation of the subnet, deciding whichphysical path the data should take based on network conditions, priorityof service, and other factors. It provides&

    ;outing& routes frames among networks. Subnet tra1c control& routers network layer intermediate systems!

    can instruct a sending station to =throttle back= its frametransmission when the router4s buAer )lls up.

    Frame fragmentation& if it determines that a downstream router4smaximum transmission unit 2#>! si"e is less than the frame si"e, a

    router can fragment a frame for transmission and re*assembly at thedestination station. /ogical*physical address mapping& translates logical addresses, or

    names, into physical addresses. Subnet usage accounting& has accounting functions to keep track of

    frames forwarded by subnet intermediate systems, to produce billinginformation.

    o 0nications $0bnet

    #he network layer software must build headers so that the network layersoftware residing in the subnet intermediate systems can recogni"e themand use them to route data to the destination address.

    #his layer relieves the upper layers of the need to know anything aboutthe data transmission and intermediate switching technologies used toconnect systems. It establishes, maintains and terminates connectionsacross the intervening communications facility one or severalintermediate systems in the communication subnet!.

  • 8/9/2019 (Networking +AD) questions

    6/27

    In the network layer and the layers below, peer protocols exist between anode and its immediate neighbor, but the neighbor may be a nodethrough which data is routed, not the destination station. #he source anddestination stations may be separated by many intermediate systems.

    #;'0SPO;# /'9:;

    #he transport layer ensures that messages are delivered error*free, in

    se-uence, and with no losses or duplications. It relieves the higher layerprotocols from any concern with the transfer of data between them andtheir peers.

    #he si"e and complexity of a transport protocol depends on the type ofservice it can get from the network layer. For a reliable network layer withvirtual circuit capability, a minimal transport layer is re-uired. If thenetwork layer is unreliable and%or only supports datagrams, the transportprotocol should include extensive error detection and recovery.

    #he transport layer provides& 2essage segmentation& accepts a message from the session! layer

    above it, splits the message into smaller units if not already smallenough!, and passes the smaller units down to the network layer. #hetransport layer at the destination station reassembles the message.

    2essage acknowledgment& provides reliable end*to*end messagedelivery with acknowledgments.

    2essage tra1c control& tells the transmitting station to =back*oA=when no message buAers are available.

    Session multiplexing& multiplexes several message streams, orsessions onto one logical link and keeps track of which messagesbelong to which sessions see session layer!.

    #ypically, the transport layer can accept relatively large messages, butthere are strict message si"e limits imposed by the network or lower!layer. $onse-uently, the transport layer must break up the messages intosmaller units, or frames, prepending a header to each frame.

    #he transport layer header information must then include controlinformation, such as message start and message end Bags, to enable thetransport layer on the other end to recogni"e message boundaries. Inaddition, if the lower layers do not maintain se-uence, the transportheader must contain se-uence information to enable the transport layeron the receiving end to get the pieces back together in the right orderbefore handing the received message up to the layer above.

    *nd to end layers

    >nlike the lower =subnet= layers whose protocol is between immediatelyad3acent nodes, the transport layer and the layers above are true =source

  • 8/9/2019 (Networking +AD) questions

    7/27

    to destination= or end*to*end layers, and are not concerned with thedetails of the underlying communications facility. #ransport layer software

    and software above it! on the source station carries on a conversationwith similar software on the destination station by using messageheaders and control messages.

    S:SSIO0 /'9:;

    #he session layer allows session establishment between processesrunning on diAerent stations. It provides&

    Session establishment, maintenance and termination& allows twoapplication processes on diAerent machines to establish, use andterminate a connection, called a session.

    Session support& performs the functions that allow these processesto communicate over the network, performing security, namerecognition, logging, and so on.

    P;:S:0#'#IO0 /'9:;

    #he presentation layer formats the data to be presented to theapplication layer. It can be viewed as the translator for the network. #hislayer may translate data from a format used by the application layer intoa common format at the sending station, then translate the commonformat to a format known to the application layer at the receivingstation.

    #he presentation layer provides&

    $haracter code translation& for example, 'S$II to :C$ I$. ata conversion& bit order, $;*$;%/F, integer*Boating point, and so

    on. ata compression& reduces the number of bits that need to be

    transmitted on the network. ata encryption& encrypt data for security purposes. For example,

    password encryption.'PP/I$'#IO0 /'9:;

    #he application layer serves as the window for users and applicationprocesses to access network services. #his layer contains a variety ofcommonly needed functions&

  • 8/9/2019 (Networking +AD) questions

    8/27

    ;esource sharing and device redirection ;emote )le access ;emote printer access Inter*process communication 0etwork management irectory services :lectronic messaging such as mail! 0etwork virtual terminals

    12. Why $( #odel is called as pen $yste(nterconnection.

    .. pen D eans the concepts are non*proprietary+ can be used byanyone

    13. What is the 60nction o6 pplication layer? & why it sona ed?

    7e6er to answer 11

    14. What is the 60nction o6 Presentation layer? & why it sona ed?

    7e6er to answer 11

    15. What is the 60nction o6 $ession layer? & why it sona ed? 7e6er to answer 11

    1'. What is the 60nction o6 Transport layer? & why it sona ed? 7e6er to answer 11

    1). What is the 60nction o6 !etwor% layer? & why it sona ed?

    7e6er to answer 11

    1,. What is the 60nction o6 8ata Lin% layer?

    7e6er to answer 11

  • 8/9/2019 (Networking +AD) questions

    9/27

    1 . What is the 60nction o6 # & why it so na ed?

    #he primary functions performed by the 2'$ layer are&

    Frame delimiting and recognition 'ddressing of destination stations both as individual stations and as

    groups of stations!

    $onveyance of source*station addressing information #ransparent data transfer of //$ P >s, or of e-uivalent information

    in the :thernet sublayer Protection against errors, generally by means of generating and

    checking frame check se-uences $ontrol of access to the physical transmission medium

    2 . What is LL ?

    #he //$ sublayer is primarily concerned with&

    2ultiplexing protocols transmitted over the 2'$ layer whentransmitting! and decoding them when receiving!.

    Providing node*to*node Bow and error control

    21. What is the 60nction o6 Physical layer? 7e6er to answer 11

    22. What is *ncaps0lation?hen referring to networking, encaps0lation is the process of taking

    data from one protocol and translating it into another protocol, so the datacan continue across a network

    23. What is the diference between *ncaps0lation & 8eencaps0lation?

    ecapsulation is the inverse of the encapsulation process. :ncapsulation

    is the process of wrapping the data while the decapsulation process is aprocess of opening packs. #he process was reversed from theencapsulation process. :ncapsulation #he process starts from theuppermost layer 'pplication /ayer! to the lowest layer Physical layer!while the decapsulation process starts from the lowest layer Physical/ayer! to the uppermost layer 'pplication /ayer!

    24. What is the diference between 7epeater and 90b?

    http://en.wikipedia.org/wiki/Multiplexinghttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://www.computerhope.com/jargon/p/protocol.htmhttp://en.wikipedia.org/wiki/Multiplexinghttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://www.computerhope.com/jargon/p/protocol.htm
  • 8/9/2019 (Networking +AD) questions

    10/27

    ' repeater is speci)c hardware designed to overcome signal attenuation,it usually has only two ports and is designed to pure boost or amplify asignal.

    ' hub is very similar to a repeater. It allows for multiple machines toconnect to the same network, by broadcasting tra1c to all of its ports. ietra1c from a machine on port 6 going to a machine on port E will also besent to any device connected to ports , G, and H. #he most practicalimplication of this is that only one device can send data at a time,otherwise a collision occurs. (ubs implement a collision detectionmultiple access method to detect when two machines attempt to senddata at the same time

    25. What is the diference between 90b and $witch?

    90b $witch

    Layer Physical layer ata /ink /ayerPorts G%6 ports G%6 ports8e-ice Type Passive evice 'ctive evice ith

    Software! 0etworkingdevice

    Trans ission Type (ubs always performframe Booding+ may beunicast, multicast or

    broadcast

    First broadcast+ thenunicast multicast asneeded.

    Table ' network hub cannotlearn or store 2'$address.

    ' network switch stores2'$ addresses in alookup table.

    Trans ission #ode (alf duplex Full duplex

    2'. What is a 7epeater?In telecommunications , a repeater is an electronic device that receivesa signal and retransmits it at a higher level or higher power, or onto theother side of an obstruction, so that the signal can cover longerdistances.

    2). What is a $witch" de:ne it?

    http://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Electronicshttp://en.wikipedia.org/wiki/Signal_(information_theory)http://en.wikipedia.org/wiki/Retransmission_(data_networks)http://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Electronicshttp://en.wikipedia.org/wiki/Signal_(information_theory)http://en.wikipedia.org/wiki/Retransmission_(data_networks)
  • 8/9/2019 (Networking +AD) questions

    11/27

    Switch is a device that channels incoming data from any of multipleinput ports to the speci)c output port that will take the data toward itsintended destination.

    2,. What is the diference between anageable and nonanageable switches?

    2anaged switch has the ability to tra1c control, 8/'0S, Port blockingand a

    web interface for settings etc. ' managed switch may also have layer E

    functionality and can be used to perform the same functions of a;O>#:;.

    >nmanaged switch does not have such abilities in fact no ability othersimple

    switching i.e. they 3ust repeat what they receive on their port toremaining

    ports, unmanaged switches are also called dumb such as a dumb*hub.Futher

    2anaged switch is good if you have more than 6

  • 8/9/2019 (Networking +AD) questions

    12/27

    31. What is the diference between Layer 3 $witch &7o0ter?

    32. What is irc0it $witching?In circ0it switching , this path is decided upon before the datatransmission starts. #he system decides on which route to follow, basedon a resource*optimi"ing algorithm, and transmission goes according tothe path. For the whole length of the communication session between thetwo communicating bodies, the route is dedicated and exclusive, andreleased only when the session terminates.

    33. What is Pac%et $witching?In pac%et switching , the packets are sent towards the destinationirrespective of each other. :ach packet has to )nd its own route to thedestination. #here is no predetermined path+ the decision as to whichnode to hop to in the next step is taken only when a node is reached.:ach packet )nds its way using the information it carries, such as the

    source and destination IP addresses.

    34. What is the diference between irc0it $witching &Pac%et $witching?

    Packet*switched networks move data in separate, small blocks ** packets** based on the destination address in each packet. hen received,packets are reassembled in the proper se-uence to make up themessage. $ircuit*switched networks re-uire dedicated point*to*pointconnections during calls.

    $ircuit*switched networks and packet*switched networks havetraditionally occupied diAerent spaces within corporations. $ircuit*switched networks were used for phone calls and packet*switchednetworks handled data. Cut because of the reach of phone lines and thee1ciency and low cost of data networks, the two technologies haveshared chores for years.

    35. What is the diference between Pac%et & 8atagra ?It means that packets are connected with #$P and datagrams with > P

    3'. What is the a or diference between $( #odel &T P;(P #odel?

    $( has ) layers and T P;(P ha-e 4.3). What is an (P ddress?

    uni-ue string of numbers separated by full stops that identi)es eachcomputer using the Internet Protocol to communicate over a network

  • 8/9/2019 (Networking +AD) questions

    13/27

    .3,. What is a # address?

    ' edia access control address # address ! is a uni-ue identi)erassigned to network interfaces for communications on the physicalnetwork segment. 2'$ addresses are used as a network address for mostI::: J< network technologies, including :thernet . /ogically, 2'$addresses are used in the media access control protocol sublayer of theOSI reference model .

    3 . What is the diference between (P ddress & #address?

    'n IP address is the location of a given computer or other network deviceon an IP network. It tells other devices where to go to =talk= to thatcomputer%device. #hink of it like a phone number.

    ' 2'$ address is kind of a serial number for network devices likeethernet cards * the )rst half of the 2'$ address tells what brand%model

    the card is, and the second half is a uni-ue identi)er speci)c to that card

    @4 .What is P(!A 0tility?P(!A B Pac%et (nternet Aopher 0tility that -eri:es connectionsto one or ore re ote hosts. The ping co and 0ses the ( #Pecho reC0est and echo reply pac%ets to deter ine whether apartic0lar (P syste on a networ% is 60nctional. Ping is 0se60l 6ordiagnosing (P networ% or ro0ter 6ail0res.

    @41.What is $0bnetting? Why is it 0sed?=sed in (P !etwor%s to brea% 0p larger networ%s into s allers0bnetwor%s. (t is 0sed to red0ce networ% traDc" pti iEednetwor% per6or ance" and si pli6y anage ent i.e. to identi6yand isolate networ% proble s.

    @43.8iference between the o 0nication and Trans ission?o 0nication is the process o6 sending and recei-ing data byeans o6 a data cable that is connected e+ternally.

    Trans ission eans the trans6er o6 data 6ro the so0rce to thedestination.

    @44.What are 1 >ase2" 1 >ase5 and 1 >aseT *thernet L !s?1 >ase2 an *thernet ter eaning a a+i 0 trans6er rate o6 1 #egabits per second that 0ses baseband signaling" with acontig0o0s cable seg ent length o6 2 eters F1,5 tsG. Hnownas Thinnet.1 >ase5 an *thernet ter eaning a a+i 0 trans6er rate o6 1 #egabits per second that 0ses baseband signaling" with a

    http://en.wikipedia.org/wiki/Unique_identifierhttp://en.wikipedia.org/wiki/Network_interface_controllerhttp://en.wikipedia.org/wiki/Network_addresshttp://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Media_access_controlhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Unique_identifierhttp://en.wikipedia.org/wiki/Network_interface_controllerhttp://en.wikipedia.org/wiki/Network_addresshttp://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Media_access_controlhttp://en.wikipedia.org/wiki/OSI_model
  • 8/9/2019 (Networking +AD) questions

    14/27

    contig0o0s cable seg ent length o6 5 eters. Hnown asThic%net.1 >aseT an *thernet ter eaning a a+i 0 trans6er rate o6 1 #egabits per second that 0ses two pairs o6 twisted pairbaseband signaling" with a contig0o0s cable seg ent length o6 1 eters.

    @45.What is $0bnetting? Why is it 0sed?=sed in (P !etwor%s to brea% 0p larger networ%s into s allers0bnetwor%s. (t is 0sed to red0ce networ% traDc" pti iEednetwor% per6or ance" and si pli6y anage ent i.e. to identi6yand isolate networ% proble s.

    @4'.8iference between the o 0nication and Trans ission?o 0nication is the process o6 sending and recei-ing data byeans o6 a data cable that is connected e+ternally.

    Trans ission eans the trans6er o6 data 6ro the so0rce to the

    destination.

    @4)What are 1 >ase2" 1 >ase5 and 1 >aseT *thernet L !s?1 >ase2 an *thernet ter eaning a a+i 0 trans6er rate o6 1 #egabits per second that 0ses baseband signaling" with acontig0o0s cable seg ent length o6 2 eters F1,5 tsG. Hnownas Thinnet.1 >ase5 an *thernet ter eaning a a+i 0 trans6er rate o6 1 #egabits per second that 0ses baseband signaling" with acontig0o0s cable seg ent length o6 5 eters. Hnown asThic%net.1 >aseT an *thernet ter eaning a a+i 0 trans6er rate o6 1 #egabits per second that 0ses two pairs o6 twisted pairbaseband signaling" with a contig0o0s cable seg ent length o6 1 eters.

    @4 .What are the possible ways o6 data e+change?6. Simplex

    . (alf*duplexE. Full*duplex

    @5 .What is diference between >aseband and >roadbandTrans ission?

    In a baseband transmission, the entire bandwidth of the cable isconsumed by a single signal.

  • 8/9/2019 (Networking +AD) questions

    15/27

    In broadband transmission, signals are sent on multiple fre-uencies,allowing multiple signals to be sent simultaneously.

    @51.What is Passi-e Topology?

    hen the computers on the network simply listen and receive the signal,they are referred to as passive because they donKt amplify the signal in

    any way.

    @52.9ow Aateway is diferent 6ro 7o0ters?

    Lateway ' device connected to multiple physical #$P%IP networks capableof routing or delivering IP packets between them.

    ;outer, ItKs a layer E device that connects diAerent networks and routespackets of data from one network to another. It breaks up Croadcastdomain as well as $ollision omain.

    @53.What is >ro0ter?

    ItKs a (ybrid device that combines the features of both bridges androuters.

    @54.What is ( #P?

    It is a 0etwork /ayer Internet protocol, which can report errors and statusinformation. e can use the ping command to send I$2P echo re-uestmessages and record the receipt of I$2P echo reply messages. iththese messages, we can detect network or host communication failuresand troubleshoot common #$P%IP connectivity problems.

    @55.What is diference between 7P and 7 7P?

    ';P M 'ddress ;esolution Protocol #he protocol that traces IP addresses to2'$ addresses.

    ;';P M ;everse 'ddress ;esolution Protocol #he protocol within the #$P%IPstack that maps 2'$ addresses to IP addresses.

    @5'.What is the diference between T

  • 8/9/2019 (Networking +AD) questions

    16/27

    #F#P M #rivial File #ransfer Protocol ' stripped down version of F#P, easy touse and fast. #F#P has no irectory browsing, no 'uthentication andinsecure it can only send and receive )les.

    F#P M File #ransfer Protocol #he #$P%IP protocol used for transmitting )lesbetween network nodes. F#P allows access to both irectories and )les,manipulating directories, typing )le contents and copying )les betweenhosts.

    @5).What is /irt0al Path?

    'long any transmission path from a given source to a given destination, agroup of virtual circuits can be grouped together into what is called path.

    @5,.What is the diference between interior and e+teriorneighbor gateways?

    Interior gateways connect /'0s of one organi"ation, whereas exteriorgateways connect the organi"ation to the outside world.

    @5 .What is a 8!$ reso0rce record?

    ' resource record is an entry in a name server4s database. #here areseveral types of resource records used, including name*to*addressresolution information. ;esource records are maintained as 'S$II )les.

    @' .Which o6 the three switching ethods is 6astest" and why?

    I$ut*#hrough switching is the fastest method because the switches readonly the )rst six bytes of the frame before forwarding it.

    @'1.What is /irt0al Path?

    'long any transmission path from a given source to a given destination, agroup of virtual circuits can be grouped together into what is called path.

    @'2.What is the diference between interior and e+teriorneighbor gateways?

    Interior gateways connect /'0s of one organi"ation, whereas exteriorgateways connect the organi"ation to the outside world.

  • 8/9/2019 (Networking +AD) questions

    17/27

    @'3.What is a 8!$ reso0rce record?

    ' resource record is an entry in a name server4s database. #here areseveral types of resource records used, including name*to*addressresolution information. ;esource records are maintained as 'S$II )les.

    @'4.Which o6 the three switching ethods is 6astest" and why?

    I$ut*#hrough switching is the fastest method because the switches readonly the )rst six bytes of the frame before forwarding it.

    @'5. an yo0 e+plain the concept o6 /L$#?

    8ariable /ength Subnet 2asking * 8/S2 * is a techni-ue that allows

    network administrators to divide an IP address space into subnets ofdiAerent si"es, unlike simple same*si"e Subnetting.

    8ariable /ength Subnet 2ask 8/S2! in a way, means subnetting asubnet. #o simplify further, 8/S2 is the breaking down of IP addressesinto subnets multiple levels! and allocating it according to the individualneed on a network. It can also be called a classless IP addressing. 'classful addressing follows the general rule that has been proven toamount to IP address wastage.

    @''.*+plain abo0t s0perneting ?

    Supernetting refers to increase host and reduce the subnet4s. It meanreduce the network bits and increase the host bits. e do usesupernetting because when the P$s in the network increase where weneed the more valid IP4s in the same network.

    @').9ow do 8ata Lin% layer addresses and !etwor% addresses

    difer? Ai-e a description o6 each.Cesides the names suggesting that addresses reside at diAerent layers,other diAerences do exist. ata /ink layer addresses are assigned by themanufacturer and identify the actual hardware device. ' 0etwork layeraddress is a logical address assigned by the network administrator toidentify a device running a 0etwork layer protocol, such as IP.

  • 8/9/2019 (Networking +AD) questions

    18/27

    @',.What is the diference between interior and e+teriorneighbor gateways?

    Interior gateways connect /'0s of one organi"ation, whereas exteriorgateways connect the organi"ation to the outside world.

    @' .What is the 9*LL protocol 0sed 6or?

    #he (://O protocol uses time instead of distance to determine optimalrouting. It is an alternative to the ;outing Information Protocol.

    @) .What is the diference between ro0table and non ro0tableprotocols?

    ;outable protocols can work with a router and can be used to build largenetworks. 0on*;outable protocols are designed to work on small, localnetworks and cannot be used with a router.

    @)1.What is the diference between T

  • 8/9/2019 (Networking +AD) questions

    19/27

    N G. hat is the role of 0S in 'ctive irectory?cti-e 8irectory relies hea-ily on 8!$ Fdo ain na e

    syste G to 60nction" b0t not 0st any 8!$. cti-e 8irectory ishighly dependent on the #icroso6t 8!$ ser-ice 6o0nd onWindows ser-er syste s or eC0i-alents. 9owe-er" tho0ghnot highly reco ended" it is possible integrate a non#icroso6t 8!$ to 0se with cti-e 8irectory

    N H. Why is replication i portant to cti-e 8irectory?;eplication is the process of sending update information for data that haschanged in the directory to other domain controllers. It is key to thehealth and stability of an 'ctive irectory environment, as without properand timely replication, a domain will be unable to function eAectively.

    #here are three main elements or components that are replicatedbetween domain controllers& the domain partition replica, the globalcatalog and the schema. It is important to have a )rm understanding of

    replication and how it takes place, both within the domain and inmultiple*site environments

    N . WhatJs new in cti-e 8irectory 6or Windows $er-er 2 ,?indows

    'n organi"ational unit O>! is a container within a 2icrosoft 'ctiveirectory domain which can hold users, groups and computers. It is thesmallest unit to which an administrator can assign Lroup Policy settingsor account permissions. 'n organi"ational unit can have multiple O>swithin it, but all attributes within the containing O> must be uni-ue.'ctive irectory organi"ational units cannot contain ob3ects from otherdomains

    N J. hat is 'ctive irectory Forest.

    'n 'ctive irectory forest is the highest level of organi"ation within'ctive irectory. :ach forest shares a single database , a single globaladdress list and a security boundary. Cy default, a user or administrator inone forest cannot access another forest

    N Q. hat is #ree in ' .

    'n 'ctive irectory tree is a collection of domains within a 2icrosoft'ctive irectory network.

    http://searchwindowsserver.techtarget.com/tip/Windows-Server-2008-A-look-inside-the-new-features-for-Active-Directoryhttp://searchwindowsserver.techtarget.com/definition/Active-Directoryhttp://searchwindowsserver.techtarget.com/definition/Active-Directoryhttp://searchwindowsserver.techtarget.com/definition/Group-Policyhttp://searchwindowsserver.techtarget.com/definition/Active-Directory-domain-AD-domainhttp://searchwindowsserver.techtarget.com/definition/Active-Directoryhttp://searchsqlserver.techtarget.com/definition/databasehttp://searchwindowsserver.techtarget.com/definition/Active-Directoryhttp://searchsoa.techtarget.com/definition/domainhttp://searchwindowsserver.techtarget.com/tip/Windows-Server-2008-A-look-inside-the-new-features-for-Active-Directoryhttp://searchwindowsserver.techtarget.com/definition/Active-Directoryhttp://searchwindowsserver.techtarget.com/definition/Active-Directoryhttp://searchwindowsserver.techtarget.com/definition/Group-Policyhttp://searchwindowsserver.techtarget.com/definition/Active-Directory-domain-AD-domainhttp://searchwindowsserver.techtarget.com/definition/Active-Directoryhttp://searchsqlserver.techtarget.com/definition/databasehttp://searchwindowsserver.techtarget.com/definition/Active-Directoryhttp://searchsoa.techtarget.com/definition/domain
  • 8/9/2019 (Networking +AD) questions

    20/27

    #he term refers to the fact that each domain has exactly one parent,leading to a hierarchical tree structure . ' group of 'ctive irectory treesis known as a forest . omains within the 'ctive irectory tree structurehave a transitive trust relationship, meaning that if a domain 3oins a tree,it automatically trusts all other domains in the tree.

    NJ

  • 8/9/2019 (Networking +AD) questions

    21/27

    ' trust is a relationship established between domains that enables usersin one domain to be authenticated by a domain controller in the otherdomain. #rust relationships in indows 0# are diAerent than in

    indows

  • 8/9/2019 (Networking +AD) questions

    22/27

    NJJ.

    9ow do ( loo% 0p a 8!$ na e or (P address?

    6. Open the $ommand Prompt window by clicking the $tart button .In the search box, type o and Pro pt , and then, in the list ofresults, click o and Pro pt .

    . 't the command prompt, type nsloo%0p , a space, and the IPaddress or domain name for example, nsloo%0p icroso6t.co !,and then press :nter.

    NJQ What is the ain p0rpose o6 a 8!$ ser-er?0S servers are used to resolve FN 0 hostnames into IP addresses and

    vice versa.

    NQ

  • 8/9/2019 (Networking +AD) questions

    23/27

    responsible for maintaining the "one. SO' records contain the currentserial number of the "one, which is used in "one transfers.

    NQJ >y de6a0lt" i6 the na e is not 6o0nd in the cache or localhosts :le" what is the :rst step the client ta%es to resol-e the

  • 8/9/2019 (Networking +AD) questions

    24/27

    @1 2. o0 installed a new 8 do ain and the new Fand :rstG 8has not registered its $7/ records in 8!$. !a e a 6ew possibleca0ses.

    #he machine cannot be con)gured with 0S client her own . #he 0S service cannot be run

    N6

  • 8/9/2019 (Networking +AD) questions

    25/27

    ($P IS$O8:;!, looking for a ($P server to answer.3. #he router directs the IS$O8:; packet to the correct ($P server.4. #he server receives the IS$O8:; packet. Cased on availability andusage policies set on the server, the server determines an appropriateaddress if any! to give to the client. #he server then temporarily reservesthat address for the client and sends back to the client an OFF:; or

    ($POFF:;! packet, with that address information. #he server alsocon)gures the client4s 0S servers, I0S servers, 0#P servers, andsometimes other services as well.5. #he client sends a ;:N>:S# or ($P;:N>:S#! packet, letting theserver know that it intends to use the address.'. #he server sends an '$@ or ($P'$@! packet, con)rming that theclient has a been given a lease on the address for a server*speci)edperiod of time.

    N66G What is dhcp scope ?($P scopes are used to de)ne ranges of addresses from which a ($P

    server can assign IP addresses to clients.N66H. Types o6 scopes in windows dhcp ?0ormal Scope * 'llows ', C and $ $lass IP address ranges to be speci)edincluding subnet masks, exclusions and reservations. :ach normal scopede)ned must exist within its own subnet.

    2ulticast Scope * >sed to assign IP address ranges for $lass networks.2ulticast scopes do not have subnet masks, reservation or other #$P%IPoptions.

    2ulticast scope address ranges re-uire that a #ime #o /ive ##/! value bespeci)ed essentially the number of routers a packet can pass through onthe way to its destination!.

    Superscope * :ssentially a collection of scopes grouped together suchthat they can be enabled and disabled as a single entity

    N66 What is 0thoriEing 89 P $er-ers in cti-e 8irectory ?If a ($P server is to operate within an 'ctive irectory domain and is

    not running on a domain controller! it must )rst be authori"ed. #his can be achieved either as part of the ($P Server role installation,or subse-uently using either ($P console or at the command promptusing the netsh tool.If the ($P server was not authori"ed during installation, invoke the

    ($P console Start *U 'll Programs *U 'dministrative #ools *U ($P!,right click on the ($P to be authori"ed and select 'uthori"e. #o achievethe same result from the command prompt, enter the followingcommand&

    netsh dhcp server serverI initiate auth

  • 8/9/2019 (Networking +AD) questions

    26/27

    In the above command syntax, serverI is replaced by the IP address orfull >0$ name of system on which the ($P server is installed.

    N66 What ports are 0sed by 89 P and the 89 P clients ?;e-uests are on > P port J, Server replies on > P

    N66J >ene:ts o6 0sing 89 P($P provides the following bene)ts for administering your #$P%IP*based

    network&Safe and reliable con)guration. ($P avoids con)guration errors causedby the need to manually type in values at each computer. 'lso, ($Phelps prevent address conBicts caused by a previously assigned IPaddress being reused to con)gure a new computer on the network.;educes con)guration management.

    >sing ($P servers can greatly decrease time spent to con)guring andrecon)guring computers on your network. Servers can be con)gured tosupply a full range of additional con)guration values when assigningaddress leases. #hese values are assigned using ($P options. 'lso, the

    ($P lease renewal process helps assure that where client con)gurationsneed to be updated often such as users with mobile or portablecomputers who change locations fre-uently!, these changes can be madee1ciently and automatically by clients communicating directly with ($Pservers

    N66Q 9ow to a0thoriEe a 89 P ser-er in cti-e 8irectory pen89 P ?.In the console tree, click ($P. On the 'ction menu, click 2anage authori"ed servers.. #he 2anage 'uthori"ed Servers dialog box appears. $lick 'uthori"e.. hen prompted, type the name or IP address of the ($P server to beauthori"ed, and then click O@

    N6 < What is 89 P(!< 7# ?($PInform is a ($P message used by ($P clients to obtain ($P

    options. hile PPP remote access clients do not use ($P to obtain IPaddresses for the remote access connection, indows

  • 8/9/2019 (Networking +AD) questions

    27/27

    "