0% found this document useful (0 votes)
75 views

Questions

The document discusses various networking concepts and protocols. It begins by asking about differences between a hub and switch, and services provided by IP such as addressing, fragmentation, timeouts and options. It then asks about network masks, subnetting, UDP, TCP windowing, DNS advantages, TTL, ICMP uses, IGMP protocol, ping and tracert commands, RSVP, DHCP, domain vs workgroup differences, and how NAT works.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views

Questions

The document discusses various networking concepts and protocols. It begins by asking about differences between a hub and switch, and services provided by IP such as addressing, fragmentation, timeouts and options. It then asks about network masks, subnetting, UDP, TCP windowing, DNS advantages, TTL, ICMP uses, IGMP protocol, ping and tracert commands, RSVP, DHCP, domain vs workgroup differences, and how NAT works.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

ant by Router ?ion .by NIC (Network Interface Card) ?do u mean by Repeater ?

repeaterelectronicsignal,retransmitsthe Difference between HUB and SWITCH ?provide every port so thatAddress ?as physical address.?xplain the services provided by IP (Internet Protocol) Addressing, Fragmentation, Packet timeouts and optionsWhat is Network Mask?Define Subnetting.What is the User Datagram Protocol (UDP)?Explain TCP Windowing concept.What is the Domain Name System (DNS)? What are theadvantages of it?What is the TTL (Time to Live)? Why is it required?Explain the use of Internet Control Message Protocol(ICMP)What is the use of IGMP protocol?What are Ping and Tracert?the commands used toExplain RSVP. How does it work?Explain the concept of DHCP.What are the differences between a domain and aworkgroup?Explain how NAT works.What is PPP protocol? Explain PPP packet format.What is IP Spoofing and how can it be prevented?Explain IP datagram, Fragmentation and MTU.What is an application gateway?Explain Circuit Level Gateway.Read answerWhat is 'Gateway Of Last Resort'?What are switches? Explain the concepts of Layer3switches.What is Router? Explain components of Routers.Explain the concept and capabilities of Unicast IPAddresses.What is IP Multicasting?What is Subneting? Explain the advantages of usingSubneting.Read answerWhat is Superneting? Explain the concept of customSubneting.Explain the concepts and capabilities of IP Datagram.Read answerWhat is MAC address?Difference between the communication and transmission.What is the difference between TFTP and FTP applicationlayer protocols?Difference between bit rate and baud rateDifference between ARP and RARPRead answerWhat is a Transaction server?What is Message Oriented Middleware (MOM)?What is Groupware server?What are TP-Lite and TP-Heavy Monitors?Explain how Bluetooth devices integrate easily withTCP/IP network?Define the term 'Pairing' in Bluetooth.What kind of encryption is used for Bluetooth security?ExplainWhat do you mean by the term FrequencyHoppingSpread Spectrum (FHSS)?What is LAN?What's the difference Between an Intranet and theInternet?Define the term Protocol.Define File Transfer Protocol.What are network topologies? Explain Ring, Bus and Startopology.Read answerHow would you define IP address?What is

multicasting?Explain the core naming mechanism, Domain NameSystem (DNS).Define Telnet.Define SMTP.Explain Maximum Transfer Unit, MTU.What is Routing Protocol?What is Data encryption?What is the Public Key Encryption?Define Digital Signatures.hat is FTP (File Transfer Protocol)?What is HTTP (Hypertext Transfer Protocol)?What is NNTP (Network News Transfer Protocol)?

What is SMTP (Simple Mail Transfer Protocol)?What is POP3 (Post Office Protocol 3)?What is SNMP (Simple Network Management Protocol)?CP vs. UDP.What is VPN?What is a socket?Datagram vs. stream.What is a stream socket?rol Blockn?rk interfaces and that and, and ion. 34. What is silly window syndrome It is a problem that can ruin TCP performance. This problemoccurs when data are passed to the sending TCP entity in largeblocks, but an interactive application on thereceiving side reads 1 byte at a time. 35. What is region When hierarchical routing is used, the routers are divided intowhat we call regions, with each router knowing all the detailsabout how to route packets to destinationswithin its own region, but knowing nothing about the internalstructure of other regions. 36. What is multicast routing Sending a message to a group is called multicasting, and itsrouting algorithm is called multicast routing. 37. What is traffic shaping One of the main causes of congestion is that traffic is oftenbusy. If hosts could be made to transmit at a uniformrate,congestion would be less common. Another open loopmethod to help manage congestion is forcing the packet to betransmitted at a more predictable rate. This is called trafficshaping. 38. What is packet filter

Packet filter is a standard router equipped with some extrafunctionality. The extra functionality allows every incomingor outgoing packet to be inspected. Packets meetingsome criterion are forwarded normally. Those that fail the testare dropped. 39. What is virtual path Along any transmission path from a given source to a givendestination, a group of virtual circuits can be grouped togetherinto what is called path. 40. What is virtual channel Virtual channel is normally a connection from one source toone destination, although multicast connections are alsopermitted. The other name for virtual channel is virtual circuit. 41. What is logical link control One of two sublayers of the data link layer of OSI referencemodel, as defined by the IEEE 802 standard. This sublayer isresponsible for maintaining the link between computers whenthey are sending data across the physical network connection. 42. Why should you care about the OSI Reference Model It provides a framework for discussing network operations anddesign. 43. What is the difference between routable and non-routable protocols Routable protocols can work with a router and can be used tobuild large networks. Non-Routable protocols are designed towork on small, local networks and cannot be used with arouter. 44. What is MAU In token Ring , hub is called Multistation Access Unit(MAU). 45. Explain 5-4-3 rule In a Ethernet network, between any two points on the network,there can be no more than five network segments or fourrepeaters, and of those five segments only three of segments can be populated. 46. What is the difference between TFTP and FTPapplication layer protocols The Trivial File Transfer Protocol (TFTP) allows a local hostto obtain files from a remote host but does not providereliability or security. It uses the fundamental packet deliveryservices offered by UDP. The File Transfer Protocol (FTP) isthe standard mechanism provided by TCP / IP for copying afile from one host to another. It uses the services offered byTCP and so is reliable and secure. It establishes twoconnections (virtual circuits) between the hosts, one for datatransfer and another for control information.

47. What is the range of addresses in the classes of internetaddresses Class A 0.0.0.0 - 127.255.255.255Class B 128.0.0.0 - 191.255.255.255Class C 192.0.0.0 - 223.255.255.255Class D 224.0.0.0 - 239.255.255.255Class E 240.0.0.0 - 247.255.255.255 48. What is the minimum and maximum length of theheader in the TCP segment and IP datagram The header should have a minimum length of 20 bytes and canhave a maximum length of 60 bytes. 49. What is difference between ARP and RARP The address resolution protocol (ARP) is used to associate the32 bit IP address with the 48 bit physical address, used by ahost or a router to find the physical address of another host on its network by sending a ARP query packetthat includes the IP address of the receiver. The reverseaddress resolution protocol (RARP) allows a host to discoverits Internet address when it knows only its physical address. 50. What is ICMP ICMP is Internet Control Message Protocol, a network layerprotocol of the TCP/IP suite used by hosts and gateways tosend notification of datagram problems back to the sender. Ituses the echo test / reply to test whether a destination isreachable and responding. It also handles both control anderror messages. 51. What are the data units at different layers of the TCP / IP protocol suite The data unit created at the application layer is called amessage, at the transport layer the data unit created is calledeither a segment or an user datagram, at the network layer thedata unit created is called the datagram, at the data link layerthe datagram is encapsulated in to a frame and finallytransmitted as signals along the transmission media. 53. What is Bandwidth Every line has an upper limit and a lower limit on thefrequency of signals it can carry. This limited range is calledthe bandwidth. 54. Difference between bit rate and baud rate.Bit rate is the number of bits transmitted during onesecond whereas baud rate refers to the

number of signalunits persecond that are required to represent those bits.baud rate = bit rate / N where N is no-of-bits representedby each signal shift.55. What is MAC address The address for a device as it is identified at the Media AccessControl (MAC) layer in the network architecture. MACaddress is usually stored in ROM on the network adapter cardand is unique. 56. What is attenuation The degeneration of a signal over distance on a network cableis called attenuation. 57. What is cladding A layer of a glass surrounding the center fiber of glass inside afiber-optic cable. 58. What is RAID A method for providing fault tolerance by using multiple harddisk drives. 60. What is redirector Redirector is software that intercepts file or prints I/O requestsand translates them into network requests. This comes underpresentation layer .61. What is Beaconing The process that allows a network to self-repair networksproblems. The stations on the network notify the other stationson the ring when they are not receiving the transmissions.Beaconing is used in Token ring and FDDI networks. 62. What is terminal emulation, in which layer it comes Telnet is also called as terminal emulation. It belongs toapplication layer. 63. What is frame relay, in which layer it comes Frame relay is a packet switching technology. It will operatein the data link layer. 65. What is SAP Series of interface points that allow other computers tocommunicate with the other layers of network protocol stack. 66. What is subnet A generic term for section of a large networks usuallyseparated by a bridge or router. 67. What is Brouter Hybrid devices that combine the features of both bridges androuters. 68. How Gateway is different from Routers A gateway operates at the upper levels of the OSI model andtranslates information between two completely differentnetwork architectures or data formats .69. What are the different type of networking / internetworking devices

Repeater:Also called a regenerator, it is an electronic device thatoperates only at physical layer. It receives the signal in thenetwork before it becomes weak, regenerates the original bitpattern and puts the refreshed copy back in to the link. Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smallersegments. They contain logic that allow them to keep thetraffic for each segment separate and thus are repeaters thatrelay a frame only the side of the segment containing theintended recipent and control congestion. Routers: They relay packets among multiple interconnected networks(i.e. LANs of different type). They operate in the physical,data link and network layers. They contain software thatenable them to determine which of the several possible pathsis the best for a particular transmission. Gateways: They relay packets among networks that have differentprotocols (e.g. between a LAN and a WAN). They accept apacket formatted for one protocol and convert it to a packetformatted for another protocol before forwarding it. Theyoperate in all seven layers of the OSI model. 70. What is mesh network A network in which there are multiple network links betweencomputers to provide multiple paths for data to travel. 71. What is passive topology When the computers on the network simply listen and receive the signal, they are referred to as passive because they dont amplify the signal in any way. Example for passive topology -linear bus. 72. What are the important topologies for networksBUS topology: In this each computer is directly connected to primary network cable in a single line. Advantages: Inexpensive, easy to install, simple to understand, easy toextend. STAR topology: In this all computers are connected using a central hub. Advantages: Can be inexpensive, easy to install

and reconfigure and easy totrouble shoot physical problems. RING topology: In this all computers are connected in loop. Advantages: All computers have equal access to network media,installation can be simple, and signal does not degrade as much asin other topologies because each computer regenerates it. 73. What are major types of networks and explain Server-based network Peer-to-peer network Peer-to-peer network, computers can act as both serverssharing resources and as clients using the resources.Serverbased networks provide centralized control of network resources and rely on server computers to providesecurity and network administration 74. What is Protocol Data Unit The data unit in the LLC level is called the protocol data unit(PDU). The PDU contains of four fields a destinationservice access point (DSAP), a source service access point(SSAP), a control field and an information field. DSAP, SSAPare addresses used by the LLC to identify the protocol stackson the receiving and sending machines that are generating andusing the data. The control field specifies whether the PDUframe is a information frame (I -frame) or a supervisory frame (S - frame) or a unnumberedframe (U - frame). 75. What is difference between baseband and broadbandtransmission In a baseband transmission, the entire bandwidth of the cableis consumed by a single signal. In broadband transmission,signals are sent on multiple frequencies, allowing multiplesignals to be sent simultaneously. 76. What are the possible ways of data exchange (i) Simplex (ii) Half-duplex (iii) Full-duplex .78. Difference between the communication andtransmission. Transmission is a physical movement of information andconcern issues like bit polarity, synchronization, clock etc.Communication means the meaning full exchange of information between two communication media. 79.The Internet Control Message Protocol occurs at whatlayer of the seven layer model?

Network 80.Which protocol resolves an IP address to a MACaddress? ARP 81.MIDI and MPEG are examples of what layer of the OSIseven layer model? Presentation 82.What is the protocol number for UDP? 17 83.Which protocol is used for booting disklessworkstations? RARP 84.Which layer is responsible for putting 1s and 0s into alogical group? Physical 85.What does 'P' mean when running a Trace? Protocol unreachable 86.UDP works at which layer of the DOD model? Host to Host 87.What is the default encapsulation of Netware 3.12? 802.2 88.Ping uses which Internet layer protocol? ICMP 89.Which switching technology can reduce the size of abroadcast domain? VLAN 90.What is the first step in data encapsulation? User information is converted into data. 91.What is the protocol number for TCP? 6 92.What do you use the Aux port for? Modem 93.Repeaters work at which layer of the OSI model? Physical 94.WAN stands for which of the following? Wide Area Network 96.LAN stands for which of the following? Local Are Network

97.DHCP stands for Dynamic Host Configuration Protocol 98.What does the acronym ARP stand for? Address Resolution Protocol 99.Which layer is responsible for identifying andestablishing the availability of the intended communicationpartner? Application. 100.Which OSI layer provides mechanical, electrical,procedural for activating, maintaining physical link? Physical What is the data unit of Data Link layer? Frame What are the difference between TCP and UDP?

TCP: Connection oriented protocol, acknowledgedone, Point to point communication.

UDP: Connection less protocol, unreliable, less traffic What is the port no of DNS and Telnet?

DNS port no: 53

Telnet port no: 23 What is the port no of SMTP and POP3?

SMPT port no: 25

POP3 port no: 110 What is the functionality of network layer? Name thedata unint of network layer.

Functionality of network layer: Path determinationand logical addressing

Data unit of network layer: Packet Which three layers of OSI model is treated as "MediaLayers"? Physical layer, data link layer and network layer are treated as"Media Layers". What is deadlock? Deadlock is a situation when two or more processes arewaiting indefinitely for an event that can be caused by onlyone of the waiting processes. The implementation of asemaphore with a waiting queue may result in this situation. Mention the advantages and disadvantages of a router. Advantages:

Router can limit the collision domain and broadcastdomain Router can function both on LAN & WAN.

Different media & architectures can be connectedamong themselves through router.

Router can determine best path/route for data toreach

the destination.

Router can filter the broadcasts.

For communicating different networks, routers mustbe used. Disadvantage:

Router is more expensive than any other networkingdevices like Hub, Bridge & Switch.

Router only work with routable protocols.

Routing updates consume some bandwidth.

Increase latency due to greater degree of packet

filtering.

Routers function as software based and so it's slowercompared to switch. Mention the private IP address rannge of class B and C.

For Class B: 172.16.0.0

172.31.255.255

For Class C: 192.168.0.0 192.168.255.255 What is the IP range of class C IP address? 240.0.0.0 255.255.255.255 What is the default subnet mask of class C IP address? 255.255.255.0 Why do you need subnet mask? Subnet mask is required to divide a large network into severalsmall networks. Tell the full name: DNS, FTP

DNS: Domain Name System

FTP: File Transfer Protocol What is the functionality or ARP? ARP refers to Address Resolution Protocol. ARP is a computer networking protocol for determining a network host's link layer orhardware address when only its Internet Layer (IP) orNetwork Layer address is known. Which one is reliable: TCP or UDP? TCP is reliable and UDP is an unreliable service.

Computer Network Lab Viva Questions Download this Document for FreePrintMobileCollectionsReport Document This is a private document. Info and Rating Follow

Vivek Chand

Share & Embed Related Documents PreviousNext

1.

10 p.

8 p.

867 p.

2.

867 p.

867 p.

12 p.

3.

13 p.

54 p.

118 p.

4.

7 p.

738 p.

23 p.

5.

20 p.

1004 p.

986 p.

6.

28 p.

52 p.

38 p.

7.

10 p.

63 p.

19 p.

8.

986 p.

More from this user PreviousNext 1.

128 p.

54 p.

29 p.

2.

23 p.

11 p.

4 p.

Recent Readcasters

Add a Comment
7fa5af8d789c9da

Submit share: Characters: 400


document_comme

Anil Kumarleft a comment

thanks sir 03 / 04 / 2012 Reply Report

You might also like