Interview - Questions HCL
Interview - Questions HCL
Interview - Questions HCL
Networking:
1. Difference between Modem, Router and switch and hub.
Answer 1: Have you ever wondered what the difference is among these boxes? Learn the difference
between a router, a switch and a hub.
Some technicians have a tendency to use the terms routers, hubs and switches interchangeably. One minute they're
talking about a switch and discussing router settings the next. Throughout the conversation, however, they're still
looking at only one box. Have you ever wondered what the difference is among these devices?
A common connection point for devices in a network. Hubs are commonly used to connect segments of aLAN.
A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of
the LAN can see all packets.
Switch
In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link
layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any
packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet
networks, switched Ethernet LANs.
Router
A device that forwards data packets along networks. A router is connected to at least two networks, commonly
two LANs or WANs or a LAN and its ISP.s network. Routers are located at gateways, the places where two or more
networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets,
and they use protocols such as ICMP to communicate with each other and configure the best route between any two
hosts.
In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that the frame is only
destined for one port. The hub has no way of distinguishing which port a frame should be sent to. Passing it along to
every port ensures that it will reach its intended destination. This places a lot of traffic on the network and can lead to
poor network response times.
Additionally, a 10/100Mbps hub must share its bandwidth with each and every one of its ports. So when only one PC
is broadcasting, it will have access to the maximum available bandwidth. If, however, multiple PCs are broadcasting,
then that bandwidth will need to be divided among all of those systems, which will degrade performance.
A switch, however, keeps a record of the MAC addresses of all the devices connected to it. With this information, a
switch can identify which system is sitting on which port. So when a frame is received, it knows exactly which port to
send it to, without significantly increasing network response times. And, unlike a hub, a 10/100Mbps switch will
allocate a full 10/100Mbps to each of its ports. So regardless of the number of PCs transmitting, users will always
have access to the maximum amount of bandwidth. It's for these reasons a switch is considered to be a much better
choice than a hub.
Routers are completely different devices. Where a hub or switch is concerned with transmitting frames, a router's job,
as its name implies, is to route packets to other networks until that packet ultimately reaches its destination. One of
the key features of a packet is that it not only contains data, but the destination address of where it's going.
A router is typically connected to at least two networks, commonly two Local Area Networks (LANs) or Wide Area
Networks (WAN) or a LAN and its ISP's network . for example, your PC or workgroup and EarthLink. Routers are
located at gateways, the places where two or more networks connect. Using headers and forwarding tables, routers
determine the best path for forwarding the packets. Router use protocols such as ICMP to communicate with each
other and configure the best route between any two hosts.
All routers have a WAN Port that connects to a DSL or cable modem for broadband Internet service and the
integrated switch allows users to easily create a LAN. This allows all the PCs on the LAN to have access to the
Internet and Windows file and printer sharing services.
RECOMMENDED READING: Did You Know...All About Broadband/ICS Routers
Routers might have a single WAN port and a single LAN port and are designed to connect an existing LAN hub or
switch to a WAN. Ethernet switches and hubs can be connected to a router with multiple PC ports to expand a LAN.
Depending on the capabilities (kinds of available ports) of the router and the switches or hubs, the connection
between the router and switches/hubs may require either straight-thru or crossover (null-modem) cables. Some
routers even have USB ports, and more commonly, wireless access points built into them.
Some of the more high-end or business class routers will also incorporate a serial port that can be connected to an
external dial-up modem, which is useful as a backup in the event that the primary broadband connection goes down,
as well as a built in LAN printer server and printer port.
Besides the inherent protection features provided by the NAT, many routers will also have a built-in, configurable,
hardware-based firewall. Firewall capabilities can range from the very basic to quite sophisticated devices. Among the
capabilities found on leading routers are those that permit configuring TCP/UDP ports for games, chat services, and
So, in short, a hub glues together an Ethernet network segment, a switch can connect multiple Ethernet segments
more efficiently and a router can do those functions plus route TCP/IP packets between multiple LANs and/or WANs;
and much more of course.
Did You Know... Routers are also the only one of these three devices that will allow you to share a single IP address
among multiple network clients.
Answer 2: Routers: these devices connect different networks, operating at Layer 3 (the
network layer) of the OSI model. They maintain routing tables which map IP
addresses (more correctly, IP prefixes) to anoutgoing interface. Note that an interface may
contain one or more ports (See below).
Switches: these maintain forwarding tables which map MAC addresses to physical ports,
operating at Layer 2 (the data link layer) of the OSI model. This is not necessarily a oneto-one mapping; many MAC addresses can be bound to the same physical port. This is the
case where you have multi-layer switched networks (think a Netgear or Belkin switch
plugged into your office or university network), or a hub connected to a switch port.
Hubs: these are essentially multi-port signal repeaters, operating at Layer 1 (the phyiscal
layer) of the OSI model. They can be either unpowered (simply providing a physical
connection for the existing signal to propagate along), or powered, where they actually
regenerate and/or amplify the signal they receive. The point to note here is that hubs are a
single collision domain. A collision domain represents a set of devices all connected to the
same physical transmission medium, such that only one of them can transmit at any given
time (ignoring multiplexing technologies like wavelength division multiplexing, frequencydivision multiplexing, time-division multiplexing, etc etc.).
In practice, hubs are found less and less in today's data networks, as they have poor
performance (as only one user can transmit at a time) and poor security (anyone connected
to the same hub can hear everything all other users transmit and receive).
Modems: MOdulator-DEModulator. Responsible for establishing a digital channel over an
analogue medium, most commonly the telephone network. Modems again operate at Layer
2 (the data link layer), but use different protocols than Ethernet to communicate. They then
offer protocols such asPPP to the network layer, to allow IP traffic to flow over their links.
2. IP Class.
A 1-126
B 128-191
C 192-223
D 224-239
E 240-255
Total # Of
Bits For
First
Octet of
# Of
Network
Usable # Number of
Of
Possible
# Of Host
IDs Per
IP
Address
ID Bits
Used To
Identify
Class
Network
ID Bits
Network
IDs
Network ID
8 / 24
0xxx xxxx
8-1 = 7
27-2 = 126
224-2 =
16,277,214
Class B
16 / 16
10xx xxxx
16-2 = 14
214 =
16,384
216-2 =
65,534
Class C
24 / 8
110x xxxx
24-3 = 21
221 =
2,097,152
28-2 = 254
Class
Network
ID / Host
ID
Class A
Let's walk through one line of this table so we can see how it works. I'll stick
with class B since it's "in the middle". The basic division is into 16 bits for
network ID and 16 bits for host ID. However, the first two bits of all class B
addresses must be "10, so that leaves only 14 bits to uniquely identify the
network ID. This gives us a total of 214 or 16,384 class B network IDs. For
each of these, we have 216 host IDs, less two, for a total of 65,534.
Why less two? For each network ID, two host IDs cannot be used: the host ID
with all zeroes and the ID with all ones. These are addresses with "special
meanings" as described in the topic that follows. You will also notice that 2 has
been subtracted from the number of network IDs for class A. This is because
two of the class A network IDs (0 and 127) are reserved. There are actually
several other address ranges that are set aside in all three of the classes that
I haven't shown here. They are listed in the topic on reserved, private and
loopback addresses. (The exclusion of 0 and 127 from class A is probably the
best-known address range reservation which is why I am explicit with that one
in the table above.)
Answer 2: INTERNET
In the above table, you can see the 5 Classes. Our first Class is A and our last is E. The first 3 classes ( A,
B and C) are used to identify workstations, routers, switches and other devices whereas the last 2
Classes ( D and E) are reserved for special use.
As you would already know an IP Address consists of 32 Bits, which means it's 4 bytes long. The first
octec (first 8 Bits or first byte) of an IP Address is enough for us to determine the Class to which it
belongs. And, depending on the Class to which the IP Address belongs, we can determine which portion
of the IP Address is the Network ID and which is the Node ID.
For example, if I told you that the first octec of an IP Address is "168" then, using the above table, you
would notice that it falls within the 128-191 range, which makes it a Class B IP Address.
Explanation:
In the above picture, you can see a small network. We have assigned a Class C IP Range for this
network. Remember that Class C IP Addresses are for small networks. Looking now at Host A, you will
see that its IP Address is 192.168.0.2. The Network ID portion of this IP Address is in blue, while the Host
ID is in orange.
I suppose the next question someone would ask is: How do I figure out which portion of the IP Address is
the Network ID and which is the Host ID ?
That's what we are going to answer next.
Explanation:
The table above might seem confusing at first but it's actually very simple. We will take Class A as an
example and analyse it so you can understand exactly what is happening here:
Any Class A network has a total of 7 bits for the Network ID (bit 8 is always set to 0) and 24 bits for the
Host ID. Now all we need to do is calculate how much 7 bits is:
2 to the power of 7 = 128 Networks and for the hosts : 2 to the power of 24 = 16,777,216 hosts in each
Network, of which 2 cannot be used because one is the Network Address and the other is the Network
Broadcast address (see the table towards the end of this page). This is why when we calculate the "valid"
hosts in a network we always subtract "2". So if I asked you how many "valid" hosts can you have a on
Class A Network, you should answer 16,777,214 and NOT 16,777,216.
Below you can see all this in one picture:
The same story applies for the other 2 Classes we use, that's Class B and Class C, the only difference is
that the number of networks and hosts changes because the bits assigned to them are different for each
class.
Class B networks have 14 bits for the Network ID (Bits 15, 16 are set and can't be changed) and 16 bits
for the Host ID, that means you can have up to '2 to the power of 14' = 16,384 Networks and '2 to the
power of 16' = 65,536 Hosts in each Network, of which 2 cannot be used because one is the Network
Address and the other is the Network Broadcast address (see the table towards the end of this page). So
if I asked you how many "valid" hosts can you have a on Class B Network, you should answer 65,534 and
NOT 65,536.
Class C networks have 21 bits for the Network ID (Bits 22, 23, 24 are set and can't be changed) and 8
bits for the Host ID, that means you can have up to '2 to the power of 21' = 2,097,152 Networks and '2 to
the power of 8' = 256 Hosts in each Network, of which 2 cannot be used because one is the Network
Address and the other is the Network Broadcast address (see the table towards the end of this page). So
if I asked you how many "valid" hosts can you have a on Class C Network, you should answer 254 and
NOT 256.
Now, even though we have 3 Classes of IP Addresses that we can use, there are some IP Addresses that
have been reserved for special use. This doesn't mean you can't assign them to a workstation but in the
case that you did, it would create serious problems within your network. For this reason it's best that you
avoid using these IP Addresses.
The following table shows the IP Addresses that you should avoid using:
IP Address
Network 0.0.0.0
Network 127.0.0.0
Function
Refers to the default route. This route is to simplify routing tables used by IP.
Reserved for Loopback. The Address 127.0.0.1 is often used to refer to the local host. Using
this Address, applications can address a local host as if it were a remote host.
Now make sure you keep to the above guidelines because you're going to bump into a lot of problems if
you don't !
IMPORTANT NOTE: It is imperative that every network, regardless of Class and size, has a Network Address (first IP Address e.g
192.168.0.0 for Class C network) and a Broadcast Address (last IP Address e.g 192.168.0.255 for Class C network), as mentioned in
the table and explanation diagrams above, which cannot be used.
So when calculating available IP Addresses in a network, always remember to subtract 2 from the number of IP Addresses within
that network.
Next, is the Subnetting section, and before you proceed, make sure you're comfortable with the new
concepts and material we have covered, otherwise subnetting will be very hard to understand.
3. ISO Layers
Answer 1:
Related Terms
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in
seven layers. Use this handy guide to compare the different layers of the OSI model and understand how
they interact with each other.
Physical (Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal through the network at the electrical and
mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining
cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.
Layer 1 Physical examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and
management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is
divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The
MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The
LLC layer controls frame synchronization, flow control and error checking.
Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame
Relay.
Network (Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for
transmitting data from node to node. Routing and forwarding are functions of this layer, as well
as addressing,internetworking, error handling, congestion control and packet sequencing.
Layer 3 Network examples include AppleTalk DDP, IP, IPX.
Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end
error recovery and flow control. It ensures complete data transfer.
Layer 4 Transport examples include SPX, TCP, UDP.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets up,
coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals
with session and connection coordination.
Layer 5 Session examples include NFS, NetBios names, RPC, SQL.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by translating from
application to network format, and vice versa. The presentation layer works to transform data into the form that the
application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom
from compatibility problems. It is sometimes called the syntax layer.
Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
Application (Layer 7)
This layer supports application and end-user processes. Communication partners are identified, quality of service is
identified, user authentication and privacy are considered, and any constraints on data syntax are identified.
Everything at this layer is application-specific. This layer provides application services for file transfers,e-mail, and
other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered
application architectures are part of this layer.
Application
Message Passing
Layer 6
Presentation
Encoding
Layer 5
Session
Layer 4
Transport
Layer 3
Network
Datagrams
Layer 2
Data Link
Layer 1
Physical Hardware
OSI Network Protocol Suite in detail, since it never gained great popularity in the
United States. Essentially, it is a collection of standards created on paper by an
international committee primarily of European telephone company representatives. It
is not clear to me if they ever managed to create working systems for ordinary
computers that conformed to the OSI standards and interconnected a variety of
operating systems.
Physical Hardware Connection
Layer 1 deals primarily with the signaling and wiring standards. For signaling, a
standard typically specifies things such as the voltages used to signal a binary digit or
special information such as the beginning or end of a data frame. For wiring, a
standard typically specifies things like the shape of the connectors at the end of the
wires, the electrical properties of the wire. In the case of the standard for 10BASE-5
Ethernet, the wiring standard not only specifies a one half inch diameter for the
coaxial cable, but suggests that the outer insulation be orange. Furthermore, it
suggests that it be marked every few meters where taps may be placed.
Repeaters are the most interesting category of networking devices that operate
exclusively at layer 1. They are capable of receiving a somewhat distorted analog
signal for a bit and transmitting a cleaner analog signal for the bit. Repeaters permit
the wiring to span greater lengths than would otherwise be possible, but also
contribute a small, non-negligible delay to the signal that may contribute to other
problems. For example, according to the standard a coaxial 10BASE-2 Ethernet cable
may not extend for more than 200 meters. Inserting a repeater in the middle of a 300
meter cable brings a non-conforming and possible non-functional cable back into
conformance with the standard. The standard also specifies that the signal must
propagate from any device to any other device in less than 5 microseconds. A repeater
adds a delay on the order of hundreds of nanoseconds and each 200 meter wire cable
has a propagation time of about a microsecond or so. Hence, it is typically
recommended that one never place more than 3 repeaters between any two devices in
such an Ethernet.
Another category of networking devices that operate at layer 1 are media converters.
Many actual networks are built using a variety of types of wiring and may include a
mixture of optical signal carriers and electrical media (generically called "wiring"
even when one may include glass fiber in the set of things one is talking about). In
order to connect different types of media to each other, one uses a media converter
which performs the same basic function as a repeater: it takes a signal from one
medium and converts it, bit by bit, into a signal for another medium.
Data Link / Hardware Interface
Layer 2 deals primarily with frames and packets. Layer 1 exclusively deals with
hardware, but layer 2 deals with a combination of hardware and software. Layer 1 is
essentially for the media that connect networking devices whereas layer 2 deals with
the circuitry inside the networking device as well as the software that may control it.
A frame is a group of bits traveling across the physical connection. A frame may be
referred to as a cell in a system where the grouping of bits is of small, fixed size. A
frame may contain information at its beginning, sometimes called a preamble, that is
not relevant to the software controlling the interface. A frame may also contain
information at its end, sometimes called a trailer, that is likewise not important to the
software part of the interface. For example, an Ethernet frame trailer contains a
checksum of the contents of the frame to verify that it was not garbled in transmission.
A packet is a frame with the preamble and trailer (if either or both exist in the
particular system) removed. A packet is the part of the frame that is passed to the
software part of an interface. Since a packet and a frame contain essentially the same
information, the terms are often used interchangeably.
Layer 2 devices deal with packets as a whole and include things like bridges and
switches which can filter and forward packets from one group of wires to another.
This process is fairly simple and can be accomplished without using a sophisticated
general-purpose CPU. Typically, such devices are controlled with special purpose
CPUs and firmware or they may be constructed out of very large scale integrated
(VLSI) application specific integrated circuits (ASICs). The VLSI/ASIC approach
generally yields a device with fewer "bells and whistles" but which is much cheaper
when mass produced. For example, the Ball State Computer Science Department just
purchased an Ethernet switch for under $2,000 with a VLSI/ASIC design instead of a
functionally similar software controlled switch that would have cost about $15,000.
For very high speed devices such as an ATM switch, the VLSI/ASIC approach is the
only one currently practical.
Network
Layer 5 deals with establishing and maintaining a context for a sequence of messages
delivered by layer 4. A network session is directly analogous to a terminal session
where a user logs in, sends keystrokes and receives text characters, and then logs out.
The session layer is responsible for maintaining the context in which layer 4 data is
interpreted, just as a login session maintains a context for the incoming keystrokes. In
establishing this context, the session layer may need to verify the identity of the party
at the other end of the communication path. The process of establishing this identity is
calledauthentication, since it is intended to demonstrate that the data is authentic.
Authentication is separate from, but often related to authorization, which is the
process of determining if some action is allowed.
Since the session layer typically not part of the package delivered with an operating
system, it is somewhat less standardized and well developed. In many cases, it is a
null layer. That is, no attempt is made to provide the services this layer should
provide. Only in the last few years have serious standards been proposed and adopted
in a widespread manner.
Presentation
Layer 6 is the one charged with interpreting the meaning of the bits sent from one
program to another via encoding standards. Different machines may represent
numbers and characters with different bit patterns. IBM mainframes often use the
EBCDIC encoding of characters, whereas most other modern systems use the ASCII
encoding. Many machines use the 2's compliment representation of signed integers,
but may differ in the number of bits used to represent them. Even machines that use a
32-bit IEEE representation of numbers may differ in the order in which the 8-bit bytes
are stored internally.
More significant problems result when one considers how to transmit data types that
are not built in to typical hardware such as something as simple as a date or time. At
one extreme, all data can be converted into a text string by the sender and parsed or
interpreted by the receiver. This wastes bandwidth and CPU cycles. At the other
extreme, all data can be transmitted in some standardized binary format that may or
may not be equivalent to the internal format used by the parties to the communication.
Either case leads to format conversions that may not be precise and may consume a
fair number of CPU cycles.
The top layer, layer 7, builds on the lower layers to actually get something useful to
end user's accomplished. One must be careful, however, to distinguish between
application protocols and applications. Often, the application that uses a given
protocol has the same name as the protocol. For example, the "File Transfer Protocol,"
FTP, is often employed by a program named "ftp." The confusion between application
layer protocols and application has lessened with the advent of the World Wide Web.
A typical Web browser will employ several application layer protocols such as HTTP,
FTP, POP, and SMTP.
Common Ethernet network cable are straight and crossover cable. This Ethernet network
cable is made of 4 pair high performance cable that consists twisted pair conductors that
used for data transmission. Both end of cable is called RJ45 connector.
The cable can be categorized as Cat 5, Cat 5e, Cat
6 UTP cable. Cat 5 UTP cable can support 10/100
Mbps Ethernet network, whereas Cat 5e and Cat 6 UTP cable can support Ethernet network
running at 10/100/1000 Mbps. You might heard about Cat 3 UTP cable, it's not popular
anymore since it can only support 10 Mbps Ethernet network.
Straight and crossover cable can be Cat3, Cat 5, Cat 5e or Cat 6 UTP cable, the only
difference is each type will have different wire arrangement in the cable for serving different
purposes.
Straight Cable
You usually use straight cable to connect different type of devices. This type of cable will be
used most of the time and can be used to:
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
3) Connect a router's WAN port to a cable/DSL modem's LAN port.
4) Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding
network)
5) Connect 2 switches/hubs with one of the switch/hub using an uplink port and the other
one using normal port.
If you need to check how straight cable looks like, it's easy. Both side (side A and side B)
of cable have wire arrangement with same color. Check out different types of straight
cable that are available in the market here.
Crossover Cable
Sometimes you will use crossover cable, it's usually used to connect same type of devices. A
crossover cable can be used to:
1) Connect 2 computers directly.
2) Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding
network)
3) Connect 2 switches/hubs by using normal port in both switches/hubs.
In you need to check how crossover cable looks like, both side (side A and side B) of
cable have wire arrangement with following different color . Have a look on
these crossover cables if you plan to buy one. You can also find more network cable choices
and information from Comtrad Cables.
In case you need to make a crossover cable yourself! You can use thiscrimper to do it.
Lastly, if you still not sure which type of cable to be used sometimes, try both cables and
see which works.
Note: If there is auto MDI/MDI-X feature support on the switch, hub, network card or
other network devices, you don't have to use crossover cable in the situation which I
mentioned above. This is because crossover function would be enabled automatically when
it's needed.
Answer 2 :
What is the defference between Cross Cable and Straight Cable
Now days, LAN card has intelligence, so that both cables can work.
They have a feature on lots of switches and hubs etc called "auto-mdix" or "auto mdi/mdix",
that is the new thing where it doesnt matter what kind of cable you use, it will just auto
detect the proper connection type no matter which cable you use.
The cable can be categorized as Cat 5, Cat 5e, and Cat 6 UTP cable. Cat 5 UTP cable can
support 10/100 Mbps Ethernet network, whereas Cat 5e and Cat 6 UTP cable can support
Ethernet network running at 10/100/1000 Mbps. You might hear about Cat 3 UTP cable, it's
not popular anymore since it can only support 10 Mbps Ethernet network.
Straight and crossover cable can be Cat3, Cat 5, Cat 5e or Cat 6 UTP cable, the only
difference is each type will have different wire arrangement in the cable for serving different
purposes.
Ethernet network cables are straight and crossover cable. This Ethernet network cable is
made of 4 pair high performance cable that consists of twisted pair conductors that used for
data transmission. Both end of cable is called RJ45 connector.
There are two types of network cables commonly used in PC networks - Straight-through and
cross-over.
Straight Cable
Usually use straight cable to connect different type of devices. This type of cable will be
used most of the time and can be used to:
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
3) Connect a router's WAN port to a cable/DSL modem's LAN port.
4) Connect a router's LAN port to a switch/hub's uplink port. (Normally used for expanding
network)
5) Connect two switches/hubs with one of the switch/hub using an uplink port and the other
one using normal port.
If you need to check how straight cable looks like, it's easy. Both sides (side A and side B) of
cable have wire arrangement with same color.
Crossover Cable
Sometimes you will use crossover cable, it's usually used to connect same type of devices. A
crossover cable can be used to:
1) Connect two computers directly.
2) Connect a router's LAN port to a switch/hub's normal port. (Normally used for expanding
network)
3) Connect two switches/hubs by using normal port in both switches/hubs.
In you need to check how crossover cable looks like, both side (side A and side B) of cable
have wire arrangement with following different color.
This cable (either straight cable or cross cable) has total 8 wires (or we can say lines), i.e.
four twisted pairs (4x2=8) with different color codes. Right now just forget about color
codes. It doesnt matter what color is given to the cable (but there is a standard).
In straight cable connectivity is like as follows
RJ451 Connected to RJ452
Pin1------------------------------------- Pin1
Pin2------------------------------------- Pin2
Pin3------------------------------------- Pin3
Pin4------------------------------------- Pin4
Pin5------------------------------------- Pin5
Pin6------------------------------------- Pin6
Pin7------------------------------------- Pin7
Pin8------------------------------------- Pin8
Now do this (if possible): connect cross cable between switch and PC and see what
happens..!
Hub
Hub
Switch
Router
Workstatio
n
Straight
Switch
Straight
Router
Straight
Straight
Crossove Crossover
r
Workstation
Straight
Straight
Crossove Crossover
r
-----------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------
5. What is an IP Address
6. Static Ip address vs dynamice Ip address
7. APIPA Automatic Private IP Addressing
APIPA enables clients to still communicate with other computers on the same network segment
until an IP address can be obtained from a DHCP server, allowing the machine to fully participate
on the network. The range of these IP address are the 169.254.0.1 to 169.254.255.254 with a
default Class B subnet mask of 255.255.0.0.
8. Proxy server
Windows
1. How to start and stop windows services.
2. How to access Windows System Registry.
3. Location of temp files
C:\Users\Username\AppData\Local\Temp (%temp)
C:\Windows\Temp (temp)
C:\Users\Username\AppData\Local\Microsoft\Windows\Temporary Internet Files
4.
5.
6.
7.
8.
9.
Windows 8
Processor: 1 gigahertz (GHz) or faster with support for PAE, NX, and SSE2 (more
info)
15.What is direct X?
16.Different File system Fat 32 vs NTFS
17.What are diff file partiotions.
Desktop
1.
2.
3.
4.
What is CPU.
What is cache
Different types of RAM
Diff bw RAM and ROM
How To Questions:
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
How
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
How
How
How
How
How
to
to
to
to
to
Issues:
Not able to send/recieve mails.( KB0012287)
Outlook is showing Offline/Not connected.
Outlook keep prompting for username/password.
Outlook profile is not launching due to profile corruption.
Outlook is not launching when clicking on Outlook icon.
Not able to save emails in PST file/Archive.
Recover Deleted items
Not able to find archive folder in Outlook.
PST file is corroupted.
Email addreess/name not resolving in outlook.
Genuine emails goin to junk mail folder.
Outlook Reminder not appearing.
New mail notification not coming.
Outlook slow response.(KB0012290)
Outlook Rules not working.
Blackberry:
How
How
How
How
How
How
How
How
to
to
to
to
to
to
to
to
Activ Sync:
Configure iPhone, iPads and Android phones using Active Sync.