Latest Networking Questions with Answers
DNS - Domain Name System. DNS is the Naming System for the resources over Internet; includes Physical nodes and Applications. DNS –It is the easy way to locate to a resource easily over a network and serves to be an essential component necessary for the working of Internet.
A network means a set of devices that connected by physical media links. A network is recursively a connection of more than two nodes by a physical link or two or more networks connected by one or more nodes.
Each and Every Signal often has a limit of an upper range and lower range of frequency of signal it can carry. So this range of limit of network between its upper frequency and lower frequency is termed as Bandwidth.
A network Reliability is measured by the following factors.
At the basic level, a network includes two or more computers directly connected by some physical medium such as co-axial cable or optical fiber. And that physical medium is called a Link.
DNS servers usually communicate with outside DNS servers of the local network. A forwarder is an entry that is used when a DNS server receives DNS queries that it cant resolve locally. And then it forwards those requests to external DNS servers for resolution
A network consist of two or more computers which will be directly connected by some physical medium such as coaxial cable or optical fiber. And that physical medium is called as Links and the computer it connects is termed as Nodes.
A router or gateway is a node that is connected to two or more networks. In general it forwards message from one network to another.
If the physical links are limited to a pair of nodes then it is said to be point-point link.
A scope is a range, or pool of IP addresses that can be leased to DHCP clients on a given subnet.
An FQDN - fully qualified domain name contains both the hostname and a domain name. FQDN is uniquely identifies a host within a DNS hierarchy.
MAC - Media Access Control. MAC is the address of the device identified at Media Access Control Layer of Network Architecture. Similar to IP address MAC address is unique address, i.e., no two device can have same MAC address. MAC address is stored at the ROM Read Only Memory of the device.
MAC Address and Mac OS are two different things and it should not be confused with each other. Mac OS is a POSIX standard Operating System Developed upon FreeBSD used by Apple devices.
LAN is the connection of Computers a
HAN is LAN of Home which connects to homely devices ranging from a few personal computers, phone, fax and printers.
e) CAN(Campus Area
CAN is the connection of devices, printers, phones and accessories within a campus which Links to other departments of the organization within the same campus.
GAN connects mobiles across the globe using satellites.
POP3 stands for Post Office Protocol Version3 (Current Version). POP is a protocol which listens on port 110 and is responsible for accessing the mail service on a client machine. POP3 works in two modes such as Delete Mode and Keep Mode.
Start ==> Run ==> command ==> winipcfg
How will you make partition after installing windows?
My computer ==> right click ==> manage ==> disk management ==>
select free space ==> right click ==> New partition.
IP is a unique 32 bits software address of a node in a network.
Three ranges of IP addresses have been reserved for private address and they are not valid for use on the Internet. If you want to access internet with these address you must have to use proxy server or NAT server (on normal cases the role of proxy server is played by your ISP.).If you do decide to implement a private IP address range, you can use IP addresses from any of the following classes:
Class A: 10.0.0.0 10.255.255.255
Class B: 172.16.0.0 172.31.255.255
Class C: 192.168.0.0 192.168.255.255
A public IP address is an address leased from an ISP that allows or enables direct Internet communication.
Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer.
OSI model was developed in February1
ADS is Active Directory Structure
A Network cable may be crossove
RAID is a method for providing fault tolerance by using m
NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.
NETBEUI is NetBIOS extended user interface. A transport protocol designed by
The process that allows a network to self-rep
By default th
By default this service remain disable to enable this service
Start --------> administrative tools --------> service -------->IMAPI CD burning com service --------> start up type --------> automatic
Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.
Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.
It provides a framework for discussing network operations and design.
Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are also there which is designed to work on small, local networks and cannot be used with a router
In token Ring, hub is called Multi station Access Unit (MAU).
In an Ethernet network, between any two points on the network, there can be no more than five network segments or four repeaters and of those five segments only three of segments can be populated.
The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between PAD and the network, called X.29. Altogether, these 3 recommendations are called "triple X".
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.
The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.
Tel
Frame relay is a packet switching technology. It will operate in the data link layer.
Define about subnet mask?
A backbo
Anonymous FTP: it is a way of granting user access to files in public servers. Users that are allowed access to data in these s
A subnet mask is made up of 32 bits (Like IP address). A subnet m
A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can be overcome by using repeaters and switches.
There are four layers:
VPN - Virtual Private Network. It is a technology that allows a secure tunnel to be created across a network such as the Internet.
NAT -Network Address Translation. This NAT protocol that provides a way for multiple computers on a common network to share single connection to the Internet.
Network topology indicates what media you must use to interconnect devices. It also serves as basis on what materials, connector and terminations that is applicable for the setup.
RIP- Routing Information Protocol. It is us
There are several ways for securing a computer. Install reliable and updated anti-virus program on all computers. Make sure the firewalls are setup and configured properly. User authentication will also help a lot. Above mentioned all of these combined would make a secured network.
OSI Physical Layer does the conversion from data bits to electrical signal, and electrical signal to data bits. This is where network devices and cable types are considered and setup.