SlideShare une entreprise Scribd logo
1  sur  6
1


               SOME IMPORTANT NETWORKING                                         QUESTIONS


1) Serial0 is up, line protocol is down!

1). The cable connected from the router may be Bad.
 2). The CU is not sending the clock. Check whether all the pins such as
         DCD, DSR, DTR,RTS,CTS are UP.
3). There should be same config for Keepalive at both the ends. Either no
     keepalive or keepalive set
4). The encapsulation type should be same at both the ends.
 5). The cable is not connected at the remote end.

2)What is difference b/w static ip address and dynamic ip address
Static Ip is assigned manually
Dy.Ip assigned by DHCP Server using its IP range.
Static can be modified as needed
Dy.IP will be ther till its Lease Duration
St.Ip may be Permanent
Dy.Ip will be changing after Lease Duration
3) what is a protocol?
he protocols is used to moved the data in the network with
some set of rules and regulation

example :-1. Routed protocols
2. Routing Protocols
like RIP,IGRP,EIGRP,OSPF etc.

4) Explain the purpose of ip address? And also Give the brief description about Class
A,Class B and Class c?

IP addresses are 32 bit long and are used in the source and destination address fields of IP
packets.The purpose of the IP address is that not only identifying the individual devices but also
to identify the host to the network.

 Class A: If the first bit of IP address is 0,it is the address of class A.The next 7 bits identify the
network and the last 24 bits identify the host.There are fewer than 128 class A network numbers,
but each class A network can be composed of millions of hosts.

Class B: If the first 2 bits of IP address is 1 0,it is the address of class B.The next 14 bits identify
the network and the last 16 bits identify the host.There are thousands of class B network
numbers and each class B network can be composed of thousands of hosts.
2


Class C: If the first 3 bits of IP address is 1 1 0,it is the address of class C.The next 21 bits
identify the network and the last 8 bits identify the host.There are millions of class C network
numbers and each class C network can be composed of fewer than 254 hosts.

5) Suppose in DHCP server running network(assigning ip addresses automatically), you
connect a Laptop in the same n/w, now how the DHCP is going to assign a IP add. to it and
how it will came to know that there's one new machine added.

When a client computer added into the domain it searches for dhcp server by sending the
broadcast packets which is called dhcp discover than dhcp server sends dhcp offer to
client which contains IP address after that client receives the dhcp offer and it sends a request
packet to the dhcp server than dhcp after receiving the dhcp request from the client reserves the
IP for client with the leased duration of time. this complete process called DORA.

6) What is a wildcard mask, and how is it different from a netmask?

wildcard mask A 32-bit quantity used in conjunction with an IP address to determine which bits
in an IP address should be ignored when comparing that address with another IP
address. A wildcard mask is specified when setting up access lists. the differnence is wildcard
mask is used in ACL, OSPF etc., where has netmask is the mask use to define ip addersing


7) Which processes does TCP, but not UDP, use?
A. Windowing
B. Acknowledgements
C. Source Port
D. Destination Port

Ans A & B
UDP (User Datagram Protocol) does not use sequence or acknowledgement fields in transmission.
UDP is a connectionless and unreliable protocol, since there is no delivery checking mechanism in the
UDP data format.

8) Identify 3 characteristics of switches?

A.) Increase available bandwidth
B.) Decrease broadcast traffic
C.) Support full duplex in a multipoint topology
D.) Make forwarding decision using MAC address
E.) Create collision domains

Ans A D E
Switches operate at layer 2. They increase bandwidth by reducing the number of devices sharing the
media. They isolate collisions. Like a bridge they forward traffic based upon layer 2 address/ MAC
address.
3


9)what is difference between Switch and Hub?

Switch:
Switches operate at Layer 2 Data Link Layer
Address Learning
Forward / Filter decision using MAC address
Loop Avoidance
Breakup collision domains
Switches create separate collision domains but a single broadcast domain

Hub:
Hub operates at Layer 1 Physical Layer
No Filtering
No Addressing
Hub creates single collision domain and single broadcast domain
Make forwarding to all the ports when signal is arrived

10)What is PING Utility?

PING – Packet Internet Gopher
A utility that verifies connections to one or more remote hosts. The ping command uses the ICMP echo
request and echo reply packets to determine whether a particular IP system on a network is functional.
Ping is useful for diagnosing IP network or router failures.

11) what is VLAN?what does VLAN provide?
VLAN – Virtual Local Area Network
Vlan is a logical grouping or segmenting a network connected to administratively defined ports on a
switch, they provide Broadcast control, Security and Flexibility.

12)what is subnetting?why it is used ?

Used in IP Networks to break up larger networks into smaller subnetworks. It is used to reduce network
traffic, Optimized network performance, and simplify management i.e. to identify and isolate network
problems.

13)Difference between the communication and transmission?

Communication is the process of sending and receiving data by means of a data cable that is connected
externally.Transmission means the transfer of data from the source to the destination.

14)What is RAID in CCNA?

A method used to standardize and categorize fault-tolerant disk systems. RAID levels provide various
mixes of performance, reliability, and cost. Some servers provide three of the RAID levels: Level 0
(striping), Level 1 (mirroring), and Level 5 (striping & parity).

15)What are 10Base2,10Base5 and 10BaseT Ethernet LANS?
4


10Base2 an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses
baseband signaling, with a contiguous cable segment length of 200 meters (185mts). Known as Thinnet.

10Base5 an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses
baseband signaling, with a contiguous cable segment length of 500 meters. Known as Thicknet.

10BaseT an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses two
pairs of twisted-pair baseband signaling, with a contiguous cable segment length of 100 meters.

16)What are the possible ways of data exchange in CCNA?

Possible ways of data exchange in ccna are
Simplex
Half-duplex
Full-duplex

17)what is the difference between Baseband and Broadband Transmission ?

In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal.

In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent
simultaneously.

18)what are major types of Networks ?

Peer-to-Peer Network
Computers can act as both servers sharing resources and as clients using the resources.


Server-based Network
Provide centralized control of network resources and rely on server computers to provide security and
network administration

19)what is passive topology ?

When the computers on the network simply listen and receive the signal, they are referred to as passive
because they don’t amplify the signal in any way.

20)How Network Gateway is different from Routers?

Gateway
A device connected to multiple physical TCP/IP networks capable of routing or delivering IP packets
between them.

Router
It’s a layer 3 device that connects 2 different networks and routes packets of data from one network to
another. It breaks up Broadcast domain as well as Collision Domain.
5


21)what is Frame Relay in which layer it comes?

Frame relay is an industry standard, shared access, switched Data Link Layer encapsulation that services
multiple virtual circuits and protocols between connected mechanism.
Frame relay is a packet-switched technology.

22)what is the Terminal Emulation ,in which layer it comes?

The use of software, installed on PC or LAN server, that allows the PC to function as if it were dumb
terminal directly attached to a particular type of mainframe.
Telnet is also called as terminal emulation. It belongs to application layer.

23)what is NetBIOS and NetBEUI?

NetBIOS – Network Basic Input / Output System
An application-programming interface (API) that can be used by programs on a local area network
(LAN). NetBIOS provides programs with a uniform set of commands for requesting the lower-level
services required to manage names, conduct sessions, and send datagrams between nodes on a network.

NetBEUI – NetBIOS Extended User Interface
An improved version of the NetBIOS protocol, a network protocol native to Microsoft Networking. It is
usually used in small, department-size local area networks (LANs) of 1 to 200 clients. It can use Token
Ring source routing as its only method of routing.

24)what is the ICMP Protocol?

ICMP – Internet Control Message Protocol
It is a Network Layer Internet protocol, which can report errors and status information. We can use the
ping command to send ICMP echo request messages and record the receipt of ICMP echo reply messages.
With these messages, we can detect network or host communication failures and troubleshoot common
TCP/IP connectivity problems.

25)what is the difference between ARP and RARP?

ARP – Address Resolution Protocol
The protocol that traces IP addresses to MAC addresses.

RARP – Reverse Address Resolution Protocol
The protocol within the TCP/IP stack that maps MAC addresses to IP addresses.

26)what is the difference between TFTP and FTP application layer protocols?

TFTP – Trivial File Transfer Protocol
A stripped down version of FTP, easy to use and fast. TFTP has no Directory browsing, no
Authentication and insecure it can only send and receive files.
6


FTP – File Transfer Protocol
The TCP/IP protocol used for transmitting files between network nodes. FTP allows access to both
Directories and files, manipulating directories, typing file contents and copying files between hosts.

27)what is the difference between routable and nonroutable protocols?

Routable protocols can work with a router and can be used to build large networks. Non-Routable
protocols are designed to work on small, local networks and cannot be used with a router.

28)what is logical link control?

One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard.
This sublayer is responsible for error detection but not correction, flow control and framing.

29)what is IGP(Interior Gateway protocol)?

Any protocol used by an internetwork to exchange routing data within an autonomous system. E.g. RIP,
IGRP and OSPF.

Contenu connexe

Tendances

Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theoriesRavi Yasas
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking NetworkJGrace Johnny
 
CCNA question and answer
CCNA question and answer   CCNA question and answer
CCNA question and answer AnamikaSinha57
 
Basics Of Comuter Networking
Basics Of Comuter NetworkingBasics Of Comuter Networking
Basics Of Comuter Networkinganishgoel
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Networking basic fundamental
Networking basic fundamentalNetworking basic fundamental
Networking basic fundamentalSatish Sehrawat
 
Computer network assignment help
Computer network assignment helpComputer network assignment help
Computer network assignment helpJacob William
 
Computer networking
Computer networkingComputer networking
Computer networkingaslamslides
 

Tendances (20)

Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
 
CCNA question and answer
CCNA question and answer   CCNA question and answer
CCNA question and answer
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
 
Basics Of Comuter Networking
Basics Of Comuter NetworkingBasics Of Comuter Networking
Basics Of Comuter Networking
 
Computer network
Computer networkComputer network
Computer network
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Networking Brief Overview
Networking Brief OverviewNetworking Brief Overview
Networking Brief Overview
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Networking basic fundamental
Networking basic fundamentalNetworking basic fundamental
Networking basic fundamental
 
Computer network assignment help
Computer network assignment helpComputer network assignment help
Computer network assignment help
 
Computer networking
Computer networkingComputer networking
Computer networking
 

Similaire à Some important networking questions

Networking questions
Networking questionsNetworking questions
Networking questionsrajujast
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)Krishan Pareek
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabhaSuprabha Sahoo
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingMohsen Sarakbi
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1Roman Brovko
 
100 network question and answers
100 network question and answers100 network question and answers
100 network question and answersRoman Orlowski
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptximacomobio
 
Connecting network
Connecting networkConnecting network
Connecting networkimacomobio
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1Techglyphs
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018Download Mipdfcom
 

Similaire à Some important networking questions (20)

ch5-network.ppt
ch5-network.pptch5-network.ppt
ch5-network.ppt
 
Tcp
TcpTcp
Tcp
 
Networks faq
Networks faqNetworks faq
Networks faq
 
Networking questions
Networking questionsNetworking questions
Networking questions
 
CCNA
CCNACCNA
CCNA
 
Ccnafile
CcnafileCcnafile
Ccnafile
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
100 network question and answers
100 network question and answers100 network question and answers
100 network question and answers
 
Internetworking
InternetworkingInternetworking
Internetworking
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptx
 
Connecting network
Connecting networkConnecting network
Connecting network
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Unit 1 qb
Unit 1 qbUnit 1 qb
Unit 1 qb
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
 

Plus de Srikanth

Password recovery
Password recoveryPassword recovery
Password recoverySrikanth
 
Multipath channels
Multipath channelsMultipath channels
Multipath channelsSrikanth
 
SEO made easy
SEO made easySEO made easy
SEO made easySrikanth
 
Java script questions
Java script questionsJava script questions
Java script questionsSrikanth
 
Dbms questions
Dbms questionsDbms questions
Dbms questionsSrikanth
 
Datastructure notes
Datastructure notesDatastructure notes
Datastructure notesSrikanth
 
C aptitude questions
C aptitude questionsC aptitude questions
C aptitude questionsSrikanth
 
C aptitude.2doc
C aptitude.2docC aptitude.2doc
C aptitude.2docSrikanth
 
C - aptitude3
C - aptitude3C - aptitude3
C - aptitude3Srikanth
 
10 reasons why p cs crash
10 reasons why p cs crash 10 reasons why p cs crash
10 reasons why p cs crash Srikanth
 

Plus de Srikanth (10)

Password recovery
Password recoveryPassword recovery
Password recovery
 
Multipath channels
Multipath channelsMultipath channels
Multipath channels
 
SEO made easy
SEO made easySEO made easy
SEO made easy
 
Java script questions
Java script questionsJava script questions
Java script questions
 
Dbms questions
Dbms questionsDbms questions
Dbms questions
 
Datastructure notes
Datastructure notesDatastructure notes
Datastructure notes
 
C aptitude questions
C aptitude questionsC aptitude questions
C aptitude questions
 
C aptitude.2doc
C aptitude.2docC aptitude.2doc
C aptitude.2doc
 
C - aptitude3
C - aptitude3C - aptitude3
C - aptitude3
 
10 reasons why p cs crash
10 reasons why p cs crash 10 reasons why p cs crash
10 reasons why p cs crash
 

Dernier

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Some important networking questions

  • 1. 1 SOME IMPORTANT NETWORKING QUESTIONS 1) Serial0 is up, line protocol is down! 1). The cable connected from the router may be Bad. 2). The CU is not sending the clock. Check whether all the pins such as DCD, DSR, DTR,RTS,CTS are UP. 3). There should be same config for Keepalive at both the ends. Either no keepalive or keepalive set 4). The encapsulation type should be same at both the ends. 5). The cable is not connected at the remote end. 2)What is difference b/w static ip address and dynamic ip address Static Ip is assigned manually Dy.Ip assigned by DHCP Server using its IP range. Static can be modified as needed Dy.IP will be ther till its Lease Duration St.Ip may be Permanent Dy.Ip will be changing after Lease Duration 3) what is a protocol? he protocols is used to moved the data in the network with some set of rules and regulation example :-1. Routed protocols 2. Routing Protocols like RIP,IGRP,EIGRP,OSPF etc. 4) Explain the purpose of ip address? And also Give the brief description about Class A,Class B and Class c? IP addresses are 32 bit long and are used in the source and destination address fields of IP packets.The purpose of the IP address is that not only identifying the individual devices but also to identify the host to the network. Class A: If the first bit of IP address is 0,it is the address of class A.The next 7 bits identify the network and the last 24 bits identify the host.There are fewer than 128 class A network numbers, but each class A network can be composed of millions of hosts. Class B: If the first 2 bits of IP address is 1 0,it is the address of class B.The next 14 bits identify the network and the last 16 bits identify the host.There are thousands of class B network numbers and each class B network can be composed of thousands of hosts.
  • 2. 2 Class C: If the first 3 bits of IP address is 1 1 0,it is the address of class C.The next 21 bits identify the network and the last 8 bits identify the host.There are millions of class C network numbers and each class C network can be composed of fewer than 254 hosts. 5) Suppose in DHCP server running network(assigning ip addresses automatically), you connect a Laptop in the same n/w, now how the DHCP is going to assign a IP add. to it and how it will came to know that there's one new machine added. When a client computer added into the domain it searches for dhcp server by sending the broadcast packets which is called dhcp discover than dhcp server sends dhcp offer to client which contains IP address after that client receives the dhcp offer and it sends a request packet to the dhcp server than dhcp after receiving the dhcp request from the client reserves the IP for client with the leased duration of time. this complete process called DORA. 6) What is a wildcard mask, and how is it different from a netmask? wildcard mask A 32-bit quantity used in conjunction with an IP address to determine which bits in an IP address should be ignored when comparing that address with another IP address. A wildcard mask is specified when setting up access lists. the differnence is wildcard mask is used in ACL, OSPF etc., where has netmask is the mask use to define ip addersing 7) Which processes does TCP, but not UDP, use? A. Windowing B. Acknowledgements C. Source Port D. Destination Port Ans A & B UDP (User Datagram Protocol) does not use sequence or acknowledgement fields in transmission. UDP is a connectionless and unreliable protocol, since there is no delivery checking mechanism in the UDP data format. 8) Identify 3 characteristics of switches? A.) Increase available bandwidth B.) Decrease broadcast traffic C.) Support full duplex in a multipoint topology D.) Make forwarding decision using MAC address E.) Create collision domains Ans A D E Switches operate at layer 2. They increase bandwidth by reducing the number of devices sharing the media. They isolate collisions. Like a bridge they forward traffic based upon layer 2 address/ MAC address.
  • 3. 3 9)what is difference between Switch and Hub? Switch: Switches operate at Layer 2 Data Link Layer Address Learning Forward / Filter decision using MAC address Loop Avoidance Breakup collision domains Switches create separate collision domains but a single broadcast domain Hub: Hub operates at Layer 1 Physical Layer No Filtering No Addressing Hub creates single collision domain and single broadcast domain Make forwarding to all the ports when signal is arrived 10)What is PING Utility? PING – Packet Internet Gopher A utility that verifies connections to one or more remote hosts. The ping command uses the ICMP echo request and echo reply packets to determine whether a particular IP system on a network is functional. Ping is useful for diagnosing IP network or router failures. 11) what is VLAN?what does VLAN provide? VLAN – Virtual Local Area Network Vlan is a logical grouping or segmenting a network connected to administratively defined ports on a switch, they provide Broadcast control, Security and Flexibility. 12)what is subnetting?why it is used ? Used in IP Networks to break up larger networks into smaller subnetworks. It is used to reduce network traffic, Optimized network performance, and simplify management i.e. to identify and isolate network problems. 13)Difference between the communication and transmission? Communication is the process of sending and receiving data by means of a data cable that is connected externally.Transmission means the transfer of data from the source to the destination. 14)What is RAID in CCNA? A method used to standardize and categorize fault-tolerant disk systems. RAID levels provide various mixes of performance, reliability, and cost. Some servers provide three of the RAID levels: Level 0 (striping), Level 1 (mirroring), and Level 5 (striping & parity). 15)What are 10Base2,10Base5 and 10BaseT Ethernet LANS?
  • 4. 4 10Base2 an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 200 meters (185mts). Known as Thinnet. 10Base5 an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 500 meters. Known as Thicknet. 10BaseT an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses two pairs of twisted-pair baseband signaling, with a contiguous cable segment length of 100 meters. 16)What are the possible ways of data exchange in CCNA? Possible ways of data exchange in ccna are Simplex Half-duplex Full-duplex 17)what is the difference between Baseband and Broadband Transmission ? In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously. 18)what are major types of Networks ? Peer-to-Peer Network Computers can act as both servers sharing resources and as clients using the resources. Server-based Network Provide centralized control of network resources and rely on server computers to provide security and network administration 19)what is passive topology ? When the computers on the network simply listen and receive the signal, they are referred to as passive because they don’t amplify the signal in any way. 20)How Network Gateway is different from Routers? Gateway A device connected to multiple physical TCP/IP networks capable of routing or delivering IP packets between them. Router It’s a layer 3 device that connects 2 different networks and routes packets of data from one network to another. It breaks up Broadcast domain as well as Collision Domain.
  • 5. 5 21)what is Frame Relay in which layer it comes? Frame relay is an industry standard, shared access, switched Data Link Layer encapsulation that services multiple virtual circuits and protocols between connected mechanism. Frame relay is a packet-switched technology. 22)what is the Terminal Emulation ,in which layer it comes? The use of software, installed on PC or LAN server, that allows the PC to function as if it were dumb terminal directly attached to a particular type of mainframe. Telnet is also called as terminal emulation. It belongs to application layer. 23)what is NetBIOS and NetBEUI? NetBIOS – Network Basic Input / Output System An application-programming interface (API) that can be used by programs on a local area network (LAN). NetBIOS provides programs with a uniform set of commands for requesting the lower-level services required to manage names, conduct sessions, and send datagrams between nodes on a network. NetBEUI – NetBIOS Extended User Interface An improved version of the NetBIOS protocol, a network protocol native to Microsoft Networking. It is usually used in small, department-size local area networks (LANs) of 1 to 200 clients. It can use Token Ring source routing as its only method of routing. 24)what is the ICMP Protocol? ICMP – Internet Control Message Protocol It is a Network Layer Internet protocol, which can report errors and status information. We can use the ping command to send ICMP echo request messages and record the receipt of ICMP echo reply messages. With these messages, we can detect network or host communication failures and troubleshoot common TCP/IP connectivity problems. 25)what is the difference between ARP and RARP? ARP – Address Resolution Protocol The protocol that traces IP addresses to MAC addresses. RARP – Reverse Address Resolution Protocol The protocol within the TCP/IP stack that maps MAC addresses to IP addresses. 26)what is the difference between TFTP and FTP application layer protocols? TFTP – Trivial File Transfer Protocol A stripped down version of FTP, easy to use and fast. TFTP has no Directory browsing, no Authentication and insecure it can only send and receive files.
  • 6. 6 FTP – File Transfer Protocol The TCP/IP protocol used for transmitting files between network nodes. FTP allows access to both Directories and files, manipulating directories, typing file contents and copying files between hosts. 27)what is the difference between routable and nonroutable protocols? Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router. 28)what is logical link control? One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for error detection but not correction, flow control and framing. 29)what is IGP(Interior Gateway protocol)? Any protocol used by an internetwork to exchange routing data within an autonomous system. E.g. RIP, IGRP and OSPF.