Important
Important
• Routing Table: Contains the best routes to reach destinations based on hop count.
OSPF (Open Shortest Path First): OSPF maintains several tables, including:
Static route 1
External BGP 20
EIGRP 90
OSPF 110
RIP 120
External EIGRP 170
Internal BGP 200
Unknown 255 (This route is not used)
96. What is an Autonomous System?
An Autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control
of one or more network operators on behalf of a single administrative entity or domain, that presents a common
and clearly defined routing policy to the Internet.
97. What is IGP and EGP?
IGP (Interior Gateway Protocol): IGP is a type of routing protocol used for routing within an autonomous system
(AS). Common IGPs include RIP, OSPF, and EIGRP.
EGP (Exterior Gateway Protocol): EGP is a type of routing protocol used for routing between different
autonomous systems (ASes). BGP (Border Gateway Protocol) is a widely used EGP for internet routing between
ASes.
98. Basic Function of Router:
Routers forward data between different networks or subnets based on routing tables.
99. How many types of modes are used in data transferring through networks?
1. Simplex: Data transferring which takes place only in one direction is called Simplex. In Simplex mode, the data
gets transferred either from sender to receiver or from receiver to sender. For Example, Radio signal, the print
signal given from computer to printer, etc.
2. Half Duplex: Data transferring can happen in both directions but not at the same time. Alternatively, the data is
sent and received. For Example, Browsing through the internet, a user sends the request to the server and later
the server processes the request and sends back the web page.
3. Full Duplex: Data transferring happens in both directions that too simultaneously. For Example, Two-lane roads
where traffic flows in both directions, communication through telephone, etc.
100. Concept of TTL (Time to Live):
TTL is a field in IP packets that limits the lifespan of a packet. It decrements as the packet traverses routers and is
used to prevent indefinite loops.
101. Layers Important for Network Communication:
The Network (Layer 3) and Transport (Layer 4) layers are crucial for network communication, routing, and end-to-
end data transfer.
102. Difference between Network Address and Host Address:
The Network Address identifies the network portion of an IP address.
The Host Address identifies a specific device within that network.
103. Topology Used for Fault Tolerance:
A Mesh Topology is often used for fault tolerance because it provides multiple paths for communication,
minimizing the impact of a single point of failure.
104. What is Spanning Tree Protocol (STP)?
Spanning Tree Protocol (STP) is a Layer 2 protocol used to prevent looping within a network topology to ensure
that you do not create loops when you have redundant paths in your network.
105. What is Rapid Spanning Tree Protocol (RSTP)?
Rapid Spanning Tree Protocol (RSTP) is a network protocol that is an advancement over Spanning Tree Protocol
that promotes high availability and “loop-free” topology within Ethernet networks.
106. Concept of HTTPS:
HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that uses encryption (usually TLS/SSL) to
ensure secure data transfer between a web browser and a server.
107. What is POST?
POST stands for Power On Self Test. It's a series of diagnostic tests that a computer performs when it's turned on
to check for hardware issues. POST is performed by firmware or software before the computer boots up the
operating system.
108. What is RAID?
RAID stands for Redundant Array of Inexpensive Disks. It's a data storage virtualization technology that
combines multiple physical disk drives into one or more logical units. RAID stores the same data in different
places on multiple hard disks or solid-state drives (SSDs) to protect data in the case of a drive failure.
Types:
Striping (RAID 0) writes some data to one drive and some data to another, minimizing read and write access times and
improving I/O performance.
Mirroring (RAID 1) replicates data on two drives, preventing loss of data in the event of a drive failure.
RAID 5 (Striping with Parity) stripes data blocks across all drives in an array (at least 3 to a maximum of 32), and also
distributes parity data across all drives. In the event of a single drive failure, the system reads the parity data from the
working drives to rebuild the data blocks that were lost.
RAID 6 (Striping with Dual Parity) requires a minimum of 4 drives and a maximum of 32 drives to be implemented.
Usable capacity is always two less than the number of available drives in the RAID set.
RAID 10 (Striping and Mirroring) offers very good performance with good data protection and no parity calculations.
RAID 10 requires a minimum of four drives, and usable capacity is 50% of available drives. It should be noted, however,
that RAID 10 can use more than four drives in multiples of two.
133. What is the role of an Intrusion Detection System (IDS) in network security?
An IDS monitors network or system activities for malicious activities or security policy violations. It generates alerts or takes
actions to respond to potential threats.
• Flow control is used in both the data link layer and the network layer to prevent buffer overflow,
maintain synchronization, manage congestion, promote fair resource allocation.
•