Short Questions: Past Papers Network Design & Management
Short Questions: Past Papers Network Design & Management
Short Questions
1. Which types of business constraints can occur during network design?
The business constraints related to the politics and religion, budgetary and staffing, and project
scheduling can occur and affect network design
2. What is router on a stick (ROAS)?
Router on a stick is a network configuration used to allow the routing of traffic between different
VLANs. That kind of a setup consists of a router and a switch connected through one Ethernet
link configured as an 802.1q trunk link. Such a configuration is typical in networks where no
layer-3 switch exists. But first, let’s find out why it is so.
3. What is frame tagging in VLANs?
When VLANs are implemented in a switched network, the switches need a method to make
sure intra-VLAN traffic goes to the correct interfaces. To benefit from the advantages of LANs,
the switches need to ensure that traffic destined for a particular VLAN goes to that VLAN and
not to any other VLAN. This can be accomplished by tagging frames with VLAN information
using the IEEE 802.1Q standard.
4. Define protocol analyzer with its working?
A network protocol analyzer is a tool used to monitor data traffic and analyze captured signals
as they travel across communication channels. Protocol analyzer tools capture data as it
moves across communication busses in embedded systems, along with traffic entering and
leaving LAN, PAN, and even wireless networks. Protocol scanners provide the ability to
constantly monitor and decode bus data, which can be leveraged to generate reports and
valuable insights for network admins when interpreted by network protocol analysis tools.
5. What is meant by mean time between failures and mean to repair. Also write formula of
availability.
MTBF, or Mean Time Between Failures, is a metric that concerns the average time elapsed
between a failure and the next time it occurs. These lapses of time can be calculated by using
a formula.
Whereas the MTTR, or Mean Time To Repair, is the time it takes to run a repair after the
occurrence of the failure. That is, it is the time spent during the intervention in a given process.
MTBF (Mean Time Between Failures) and MTTR (Mean Time To Repair) are two very
important indicators when it comes to availability of an application.
When specifying availability using MTBF and MTTR, the equation to use is as follows:
Availability = MTBF / (MTBF + MTTR)
6. How traffic flow of voice over IP is different from other types of data?
Voice transmission has different issues than data transmission because voice traffic cannot be
re-sent if it is lost. Three unique problems that affect call quality are latency, jitter, and packet
loss. In addition, voice traffic can have roaming issues because people are more apt to walk
around with phones.
7. What are types of access control lists? Why they are used in networks?
There are two types of ACLs:
Standard ACLs (1 – 99 and 1300 - 1999)
Extended ACLs (100 – 199 and 2000 - 2699)
Access Control Lists are the set of conditions grouped together by name or number. These
conditions are used in filtering the traffic passing from router. Through these conditions we can
filter the traffic; either when it enters in router or when it exits from router.
8. Define usability and adaptability with example?
Usability: refers to the ease of use with which network users can access the network and
services. Usability focuses on making network users’ jobs easier. It is important to gain an
2. Define and explain broadcast domain and collision domain with the help of network diagram.
3. Differentiate between switching and routing protocols. What is the selection criteria for
switching and routing protocols? Enlist and explain the working of dynamic routing protocols
with diagram.
4. Why the testing of a network is preferred. Explain the components and types of test in details.
5. For a corporate level network what security tools can be implemented in the network for
ensuring secure working of network? What point must be kept in mind while designing a secure
network?
6. Why we need IPV6? What are the approaches to upgrading to IPV6 elaborate in detail?
7. Compare and contrast distance-vector and link-state routing. If you were designing a new
routing protocol, which would you use and why?(chp7 review q 1)
8. How can a network manager secure a wireless network discuss in detail?