Int Ques General Mcse NW
Int Ques General Mcse NW
Packet format:-
Prevention:-
Packet filtering: - to allow packets with recognized formats to enter the network
Using special routers and firewalls.
Encrypting the session
MTU:- Maximum Transmission Unit is the size of the largest packet that a
communication protocol can pass. The size can be fixed by some standard or decided
at the time of connection
13 :: What is LAN?
LAN is a computer network that spans a relatively small area. Most LANs are
confined to a single building or group of buildings. However, one LAN can be
connected to other LANs over any distance via telephone lines and radio waves. A
system of LANs connected in this way is called a wide-area network (WAN). Most LANs
connect workstations and personal computers. Each node (individual computer) in a
LAN has its own CPU with which it executes programs, but it also is able to access
data and devices anywhere on the LAN. This means that many users can share
expensive devices, such as laser printers, as well as data. Users can also use the
LAN to communicate with each other, by sending e-mail or engaging in chat sessions.
From within a company, an intranet server may respond much more quickly than a
typical Web site. This is because the public Internet is at the mercy of traffic
spikes, server breakdowns and other problems that may slow the network. Within a
company, however, users have much more bandwidth and network hardware may be more
reliable. This makes it easier to serve high-bandwidth content, such as audio and
video, over an intranet.
18 :: What is a network? What are the different kinds of network? Explain them.
A network is a group of computers or nodes connected together. They are connected
with each other by communication paths.
Types of Networks:
LAN � Local Area Network connects a group of nodes covering a small physical area.
LAN�s are most commonly seen in offices, building etc. LAN�s enable higher transfer
rate of data, smaller coverage of area and hence less wiring.
WAN � Wide Area Network connects a group of nodes covering a wide area. WAN
typically connects and allow communication between regions or national boundaries.
The most common example of WAN is internet.
VPN � Virtual Private Network connects or links nodes in some larger area by open
connections or virtual circuits in some larger network (e.g., the Internet) instead
of by physical wires. It is used for secure communication through the public
internet. VPN alone may not support explicit security features, such as
authentication or content encryption.
19 :: What are network topologies? Explain Ring, Bus and Star topology.
A network topology describes the layout of a network. It describes how different
nodes and elements are connected to each other. Different types of topology:
a. Ring:-
b. Bus
* All nodes connected to a central and a common cable called as a back bone.
* In bus topology, the server is at one end and the clients are connected at
different positions across the network.
* Easy to manage and install.
* If the backbone fails, the entire communication fails.
c. Star
IP � Internet protocol is used for transmission of data over the internet. IP uses
IP addresses to identity each machine uniquely. Message is sent using small
packets. The packet contains both the sender and receivers address. IP does not
guarantee the delivery in the same order as sent. This is because the packets are
sent via different routes. It is a connectionless communication protocol at the
third level (network) of the OSI model.
Private address: these IP addresses are used exclusively within a private network
and not for public to see.
Each IP address has a network address and a host address. IP addresses are
expressed in four sets of three numbers, separated with dots. Each set is called as
an octet because when converted to binary; it denotes eight binary
22 :: What is multicasting?
Multicasting allows a single message to be sent to a group of recipients. Emailing,
teleconferencing, are examples of multicasting. It uses the network infrastructure
and standards to send messages.
26 :: Define DNS
The DNS translates Internet domain and host names to IP addresses. DNS
automatically converts the names we type in our Web browser address bar to the IP
addresses of Web servers hosting those sites. DNS implements a distributed database
to store this name and address information for all public hosts on the Internet.
27 :: Define Telnet
Telnet is the main Internet protocol for creating a connection to a remote server.
28 :: Define SMTP
SMTP - Short for Simple Mail Transfer Protocol, a protocol for sending e-mail
messages between servers.
32 :: What is VPN?
A VPN is a service that offers secure, reliable connectivity over a shared public
network infrastructure such as the Internet. VPNs maintain the same security and
management policies as a private network. They are the most cost effective method
of establishing a virtual point-to-point connection between remote users and an
enterprise customer's network.
34 :: Bridge vs switch.
A bridge connects two different LAN networks. A switch is something like you can
connect many computers to a switch and then one computer can connect to another
through the switch. Switch is a unicast one to one connection
35 :: What is a Router?
A router is a device or sometimes a software in a computer which decides the next
network point to which a packet should be forwarded to reach its destination on
Internet. It is usually included as part of the network switch and is located at a
gateway, including each point-of-presence on the Internet. The router is connected
to at least two networks and determines which way to send each information packet
based on its understanding of the state of the networks it is connected to.
36 :: Define gateway.
A gateway is a network point that provides entrance into another network. On the
Internet, a node or stopping point can be either a gateway node or a host (end-
point) node. Both the computers of Internet users and the computers that serve
pages to users are host nodes. The computers that control traffic within your
company's network or at your local Internet service provider (ISP) are gateway
nodes.
37 :: What is firewall?
A firewall is a hardware or software installed to provide security to the private
networks connected to the internet. They can be implemented in both hardware and
software, or a combination of both. All data entering or leaving the Intranet
passes through the firewall which allows only the data meeting the administrators�
rules to pass through it.
Computer-based Firewall:
It's a firewall stored in server with an existing Operating System like Windows and
UNIX.
Proxy Server:
Proxy server allows all clients to access Internet with different access limits.
Proxy server has its own firewall which filters the all packet from web server.
Internal components:
* ROM:- Used to store the routers bootstrap details, operating system software.
* Flash memory: - holds the operating systems images. The content is retained when
the router is restarted.
* RAM: - Used to store the Routing tables, configuration files, caching and
buffering details. Content is lost when lost router is switched off or restarted.
* NVRAM:- Stores the routers startup config files. Data is non volatile.
* Network interfaces to connect router to network.
External components:
The Distance Vector protocol initially prepares a Routing table which is shared
with other routers. This routing table is shared between routers present in the
same network. A new routing table is prepared when some new information is received
from some other router. Now, the bad routing paths are removed keeping only the
smallest hop paths. This new table is then communicated to other routers.
Untrusted networks:
Such networks are usually administered by the owners. They can allow improper
access to sensitive or personal data. These machines are usually separate. Such
machines could me more prone to attacks.
75 :: What is Tunneling?
Tunneling is a mechanism provided to transfer data securely between two networks.
The data is split into smaller packets and passed through the tunnel. The data
passing through the tunnel has 3 layers of encryption. The data is encapsulated.
Tunneling can be approached by Point to Point tunneling protocol.
Compulsory tunneling:
In compulsory tunneling, instead of the user a vpn remote access server configures
and creates a tunnel. Hence, the end point is the Remote sever not the user.
83 :: What is RTP?
1. RTP can be used to transfer Real time data like voice packets.
2. RTP can be used with RTCP which makes it possible to monitor data.
3. Packet loss can be detected by RTP using Sequence number
87 :: What is multicasting?
Multicasting allows a single message to be sent to a group of recipients. Emailing,
teleconferencing, are examples of multicasting. It uses the network infrastructure
and standards to send messages.
88 :: Define IP multicast.
IP multicast technology reduces traffic by sending stream of information to many
recipients at one go. Video conferencing, stock quotas are the examples based on IP
multicast.
99 :: Define IP multicast.
IP multicast technology reduces traffic by sending stream of information to many
recipients at one go. Video conferencing, stock quotas are the examples based on IP
multicast.
107 :: What are the the core naming mechanism, Domain Name System (DNS)?
A Domain Name system is used to convert the names of the website on the internet to
IP addresses. The domain names for each IP addresses are stored in a database that
is distributed across different servers. A domain name space consists of a tree of
domain names. The tree has zones. Zones consist of a collection of connected nodes.
These nodes are served by a name server. A domain name is usually in the form of
mydomain.com. Here, .com is the top level domain. Where as mydomain is the sub
domain or subdivision. A host name is a domain name that has one or more IP
addresses associated with it.
111 :: If you have 10 systems, what would you connect it with? Switch or hub?
To connect 10 systems we can use either switch or hub. As switch is better because,
it does unicasting whereas, Hub does broadcasting. In addition, we have to select
star, bus, ring topology.
113 :: What is mean by spare ware? What is the difference between spare ware and
anti virus?
A spare ware is software that monitors the user's behavior and anti-virus is
software that protects the system from viruses.
The speed is first feature upon which Ethernet is better than Internet Others
features are direct access to computers.
119 :: From which DHCP server is the client going to take IP, if 2 DHCP servers are
present in Network?
There will not be two DHCP servers in one network.
128 :: Users are complaining of delay when using the network. How would you resolve
it?
Mostly the physical layer is responsible for the delay in the network, so first
check the connection and if still it does not work,call a network administrator
from some reputed company.
The flag bits in the data link layer are of the form 01111110. If there is data
that takes the same form, it will be misinterpreted as a flag bit. In order to
avoid this we stuff additional bits at the sending end and de-stuff the same at the
receiving end.
132 :: Is the client a server at a particular point of time? If yes then why what
is it called?
No. client is not a server at a particular point of time. However, in some other
time it may act as a server depending upon its configuration.
136 :: What is the difference between unshielded twisted pair (UTP) and Shielded
twisted pair (STP)?
The most commonly used form of twisted pair is unshielded twisted pair (UTP). It is
just two insulated wires twisted together. Any data communication cables and normal
telephone cables are this type. Shielded twisted pair (STP) differs from UTP in
that it has a foil jacket that helps prevent crosstalk and noise from outside
source. In data communications there is a cable type called FTP (foil-shielded
pairs) which consists of four twisted pair inside one common shield (made of
aluminum foil).
139 :: What is the difference between Client and desktop Operating systems?
Desktop operating system is a standalone operating system, able to perform all
operations and requests independently. Client o/s cannot do that, moreover client
uses all s/w via requests to servers. A node connected to server (Linux concept).
140 :: What is the difference between L3 Switch and Router, if they perform the
same function why do we need both of them?
Layer 3 switches do routing with ASIC chips. Routers do it with a microprocessor
and its associated software. Therefore, the Layer 3 switches are much faster than
traditional but cost more. We need them both because in many situations a slow
router is sufficient and cheaper than a gigabit layer 3-switch router.
141 :: A person would like to access a file on another computer (connected via LAN)
while working with safe mode. What should he do?
Start the computer with "safe mode with networking". While starting the computer
press F8� and four five option will come choose the above option then hope you will
access that particular file through LAN.
142 :: Explain distance vector routing algorithm with the help of suitable example.
Distance Vector Routing Algorithms calculate a best route to reach a destination
based solely on distance. E.g., RIP. RIP calculates the reach ability based on hop
count. It is different from link state algorithms, which consider some other
factors like bandwidth and other metrics to reach a destination. Distance vector
routing algos are not preferable for complex networks and take longer to converge.
143 :: What are the features of BGP Protocol? How it is different to other protocol
Border Gateway Protocol is the core routing protocol .It works by maintaining a
table of IP networks, which designate network reach ability among autonomous
systems (AS). It is described as a path vector protocol BGP does not use
traditional IGP metrics, but makes routing decisions based on path, network
policies, and/or rule sets. BGP replace the EGP routing protocol to allow fully
decentralized routing in order to allow the removal of the NSFNet internet backbone
network.
144 :: User(s) are complaining of delays when using the network. What would you do?
1. If you are using a hub, replacing that with switches will reduce the delay in
case many users simultaneously access the network, copy files etc.2. Firewalls and
antivirus software's cause network delay. If you have some AV of firewalls
installed, uninstall it and check the speed. If you find improvement, u can install
a better AV although that will cause delay to some extent.3. Virus / malwares cause
network delay. Reinstall the OS, use some updated AV, and check it.4. If you mean
delay in Internet connectivity then you have to go for greater bandwidth.
147 :: What is HPOV? How does it work? What are its monitoring tools?
HP Open View is a suite of business computer management or "e-services" programs
from Hewlett-Packard, which states that the suite is "among the world's 20 largest
software businesses". The Open View programs HP 9000 and e3000 business server
customers. An HP customer's IT professionals can use Open View to manage
applications, device availability, network conditions and status, system
performance, service and program maintenance, and storage resources.
154 :: What is intra-VLAN how does it work. Where do we create a VLAN if we enable
one trucking on each side of switch. What is supernating?
Virtual LANs (VLANs) divide one physical network into multiple broadcast domains.
However, VLAN-enabled switches cannot by themselves, forward traffic across VLAN
boundaries. Therefore, you need to have routing between these VLANs, which is
inter- VLAN routing. You can achieve this by using either a Layer 3 switch or a
router.Host Portion Borrowed From Network Portion is Called SUPERNATING
156 :: Why do we need IP address when the MAC address is unique? Cant we
communicate only with the MAC address?
MAC address is the basis on which communication occurs. However, we need IP address
to be able to create a routing table, which enables faster communication. Many
communication algorithms take use of IP addresses (Network address + Subnet masks)
to be able to route packages faster.
1. All computers are peers; no computer has control over another computer.
2. Each computer has a set of user accounts. To use any computer in the workgroup,
you must have an account on that computer.
3. There are typically no more than ten to twenty computers.
4. All computers must be on the same local network or subnet.
Domain:
1. One or more computers are servers. Network administrators use servers to control
the security and permissions for all computers on the domain. This makes it easy to
make changes because the changes made to all computers.
2. If you have a user account on the domain, you can log on to any computer on the
domain without needing an account on that computer.
3. There can be hundreds or thousands of computers.
4. The computers can be on different local networks.
158 :: What is the difference between packet switched, cell switched and circuit
switched technology?
Packet switch: here the packets send by the user takes different path each time it
is send.
Circuit switch: here the packets are send through a virtual connection is this
every packet from a sender at a particular time is send through that dedicated path
only
Cell switch: in ATM jargon the packets are called are cells
Private IP's are the IP that are accessed by every one, I.e. they are excessively
owned by an organization, only the user of that organization has the access to this
IP's.
1B----64kbps
1D ----16Kbps
Host ID : 0.0.0.1
76 :: I cannot seem to access the Internet, do not have any access to the corporate
network and on ip configuration my address is 169.254.*.*. What happened?
The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the
DHCP server is not available. The name for the technology is APIPA (Automatic
Private Internet Protocol Addressing).
177 :: We have installed a new Windows-based DHCP server, however, the users do not
seem to be getting DHCP leases off it.
The server should authorize first with the Active Directory.
178 :: How can you force the client to give up the DHCP lease if you have access to
the client PC?
Ipconfig /release
179 :: What authentication options do Windows 2000 Servers have for remote clients?
Windows 2000 Servers have PAP, SPAP, CHAP, MS-CHAP and EAP.
180 :: What are the networking protocol options for the Windows clients if for some
reason you do not want to use TCP/IP?
NWLink (Novell), NetBEUI, AppleTalk (Apple)
181 :: What is data link layer in the OSI reference model responsible? Data link
layer is located above the physical layer, but below the network layer.
Taking raw data bits and packaging them into frames. The network layer will be
responsible for addressing the frames, while the physical layer is responsible for
retrieving and sending raw data bits.
186 :: What is the difference between forward lookup and reverse lookup in DNS?
Forward lookup is name-to-address; the reverse lookup is address-to-name.
It uses inexpensive, readily available copper phone wire. UTP wire is much easier
to install and debug than coax. UTP uses RG-45 connectors, which are cheap and
reliable.
Deadlock is a situation when two or more processes are waiting indefinitely for an
event that can be caused by only one of the waiting processes. The implementation
of a semaphore with a waiting queue may result in this situation.
192 :: What is difference between NAT and PAT?
NAT is Network address Translation (IP address translate from local IP to global IP
and vice versa)PAT is Port address translation (port are translate from local to
global IP's) like on port 8080 web service port 80 will work on PAT. It is more
over NAT only.
196 :: What is active Directory? What is main role in windows 2003 server?
Active directory is the main part of 2003 server. The active directory installing
the computer all hosts provide rooming service. In addition, user all information
contain in the active directory.
198 :: What is the command to start a service in Windows from command line?
Start-Run-Type CMD -- Then type below command in commandPrompt Net stop <service
name> Net start "<service>"
199 :: How do you check the listening ports on a windows box Command line?
Netstat-a : displays IP, listening port idsNetstat /? : help
201 :: Why does blue screen of death occur while installing the windows XP or any
other OS installation?
This situation occurs when the minimum hardware requirements of OS is not
sufficient then blue screen appears.
204 :: What are the most typical functional units of the Client/Server
applications?
User interface
# Shared data
205 :: TP Monitor does mainly two things extremely well. They are Process
management and Transaction management.
They were originally introduced to run classes of applications that could service
hundreds and sometimes thousands of clients. TP Monitors provide an OS - on top of
existing OS - that connects in real time
these thousands of humans with a pool of shared server processes.