Question 7: What are Asynchronous links?

Similar documents
Cisco Cisco Certified Network Associate (CCNA)

CCNA MCQS with Answers Set-1

TCP/IP Protocol Suite and IP Addressing

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Internetwork Basic. Possible causes of LAN traffic congestion are

Study Guide. Module Two

Configuring IPv4. Finding Feature Information. This chapter contains the following sections:

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Hands-On Network Security: Practical Tools & Methods

2. What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet? A. NAT B.

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

CCNA Exam File with Answers. Note: Underlines options are correct answers.

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

1: Review Of Semester Provide an overview of encapsulation.

SYSTEMS ADMINISTRATION USING CISCO (315)

Section 1. General Networking Theory

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Cisco CCNA (ICND1, ICND2) Bootcamp

Defining Networks with the OSI Model. Module 2

Address Resolution Protocol

IP Protocols. ALTTC/Oct

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Solved MCQ of Computer networking. Set-1

CISCO EXAM QUESTIONS & ANSWERS

Lecture 3. The Network Layer (cont d) Network Layer 1-1

TCP /IP Fundamentals Mr. Cantu

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

Introduction to Internetworking

Switching & ARP Week 3

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

Module 7 Internet And Internet Protocol Suite

ICS 451: Today's plan

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

TSIN02 - Internetworking

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Chapter 5: Ethernet. Introduction to Networks - R&S 6.0. Cisco Networking Academy. Mind Wide Open

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Agenda L2 versus L3 Switching IP Protocol, IP Addressing IP Forwarding ARP and ICMP IP Routing First Hop Redundancy

Chapter 7. Local Area Network Communications Protocols

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Lecture (03) Internet Protocol tcp/ip> OSI>

Chapter 5 Reading Organizer After completion of this chapter, you should be able to:

CISCO SYSTEM ADMINISTRATION (41)

CHAPTER-2 IP CONCEPTS

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

H

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ]

Cisco Interconnecting Cisco Networking Devices Part 1.

Internet Control Message Protocol (ICMP)

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦

Telecommunication Protocols Laboratory Course. Lecture 3

Data Link Protocols. TCP/IP Suite and OSI Reference Model

EEC-684/584 Computer Networks

Interconnecting Networks with TCP/IP

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

CCNA Cisco Certified Network Associate CCNA (v3.0)

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

Lecture-4. TCP/IP-Overview:

Position of IP and other network-layer protocols in TCP/IP protocol suite

UNIT III. 3.1 Circuit switching vs. packet switching / Packet switched networks. Figure 3.1.1: Switching Techniques

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Chapter 6: Network Layer

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

Interconnecting Cisco Networking Devices Part 1 ICND1

Chapter 5 Network Layer

ET4254 Communications and Networking 1

ICS 351: Networking Protocols

6 Chapter 6. Figure 1 Required Unique Addresses

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

1. Which OSI layers offers reliable, connection-oriented data communication services?

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

H

SYED AMMAL ENGINEERING COLLEGE

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Networking interview questions

CCNA. Course Catalog

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview


CCNA 4 - Final Exam (B)

Chapter 2. Switch Concepts and Configuration. Part I

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Transcription:

Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2: What are unicast frames? Answer. Unicast frames are the most common type of network traffic. A unicast frame is a frame intended for only one host. The only station that processes this frame is one station that has its own MAC address in the destination portion of packet. Question 3: What is the destination address of broadcast frames? The destination address of broadcast frames (Layer 2 broadcast addresses) is FF-FF-FF-FF- FF-FF, or all 1s in binary. Question 4: What is Routing? Routing is the process of finding a path on which data can pass from source to destination. Routing is done by a device called routers, which are network layer devices. Question 5: What is the purpose of the Data Link? The job of the Data Link layer is to check messages are sent to the right device. Another function of this layer is framing. Question 6: What are synchronous links? Synchronous links have identical frequencies and contain individual characters encapsulated in control bits, called start/stop bits that designate the beginning and end of each character. Synchronous links try to use the same speed as the other end of a serial link. Question 7: What are Asynchronous links? Answer. Asynchronous links send digital signals without timing. Asynchronous links agree on the same speed, but there is no check or adjustment of the rates if they are slightly different. Only 1 byte per transfer is sent.

Question 8: What are the three layers of the Cisco Hierarchical Model? Answer. The three layers of the Cisco Hierarchical Model are: 1 the access layer the distribution layer the core layer Question 9: What is the key advantage of using switches? When a switch receives a signal, it creates a frame out of the bits that was extracted from that signal. With this process, it gains access and reads the destination address, after which it forwards that frame to the appropriate port. This is a very efficient means of data transmission, instead of broadcasting it on all ports. Question10:When does network congestion occur? Network congestion occurs when too many users are trying to use the same bandwidth. This is especially true in big networks that do not resort to network segmentation. Question11: What is a Window in networking terms? A Window refers to the number of segments that is allowed to be sent from source to destination before an acknowledgement is sent back. Question 12: What are broadcast domains? A broadcast domain defines a group of devices that receive each others' broadcast messages. As with collisions, the more broadcasts that occur on the network, the slower your network will be. This is because every device that receives a broadcast must process it to see if the broadcast is intended for it. Question 13: What is the difference between a routing protocol and a routed protocol? Routing protocols determine how to route traffic to the best location of a routed protocol. Examples of routing protocols are RIP, EIGRP, OSFP, and BGP. Examples of routed protocols are IP and IPX.

Question14:What is a gateway or Router? A node that is connected to two or more networks is commonly called as router or Gateway. It generally forwards message from one network to another. Question15: Define the terms Unicasting, Multicasting and Broadcasting? If the message is sent from a source to a single destination node, it is called Unicasting. If the message is sent to some subset of other nodes, it is called Multicasting. If the message is sent to all the m nodes in the network it is called Broadcasting. Question16: What is CRC? CRC, is the most powerful of the redundancy checking techniques, is based on binary division. Question17: What is Checksum? Checksum is used by the higher layer protocols (TCP/IP) for error detection Question18:What is Sliding Window? The sliding window is an abstract concept that defines the range of sequence numbers that is the concern of the sender and receiver. In other words, he sender and receiver need to deal with only part of the possible sequence numbers. Question19: Does a bridge divide a network into smaller segments? Not really. What a bridge actually does is to take the large network and filter it, without changing the size of the network

Question20: What is the role of the LLC sublayer? The LLC sublayer, short for Logical Link Control, can provide optional services to an application developer. One option is to provide flow control to the Network layer by using stop/start codes. The LLC can also provide error correction. Question21:What are the different memories used in a CISCO router? NVRAM stores the startup configuration file DRAM stores the configuration file that is being executed Flash Memory stores the Cisco IOS. Question22:What is the function of the Application Layer in networking? The Application Layer supports the communication components of an application and provides network services to application processes that span beyond the OSI reference model specifications. It also synchronizes applications on the server and client. Question23: Difference between the communication and transmission. Transmission is a physical movement of information and concern issues like bit polarity, synchronization, clock etc. Communication means the meaning full exchange of information between two communication media. Question24: Differentiate User Mode from Privileged Mode in cisco IOS User Mode is used for regular task when using a CISCO router, such as to view system information, connecting to remote devices, and checking the status of the router. On the other hand, privileged mode includes all options that are available for User Mode, plus more. You can use this mode in order to make configurations on the router, including making tests and debugging.

Question25:What is 100BaseFX? This is Ethernet that makes use of fiber optic cable as the main transmission medium. The 100 stands for 100Mbps, which is the data speed. Question26: Differentiate full-duplex from half-duplex. In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot receive while it is transmitting, and vice versa. Question27: What is MAC address? The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique. Question28: Difference between bit rate and baud rate. Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits. Baud rate = (bit rate / N) where N is no-of-bits represented by each signal shift. Question29: What is ICMP? ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages. Question30: What is MTU? MTU stands for Maximum Transmission Unit. It refers to the maximum packet size that can be sent out onto the data line without the need to fragment it.

Question31: What is latency? Latency is the amount of time delay that measures the point from which a network device receives a data frame to the time it sends it out again towards another network segment. Question32: Utilizing RIP, what is the limit when it comes to number of hops? The maximum limit is 15 hop counts. Anything higher than 15 indicates that the network is considered unreachable. Question33:What is a Frame Relay? Frame Relay is a WAN protocol that provides connection-oriented communication by creating and maintaining virtual circuits. It has a high performance rating and operates at the Data Link and Physical Layers. Question34: What is difference between ARP and RARP? The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending an ARP query packet that includes the IP address of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address. Question 35: What is Proxy ARP? It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router.

Question36: What is the minimum and maximum length of the header in the TCP segment and IP datagram? The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes. Question37:Explain the benefits of VLANs. VLANs allow the creation of collision domains by groups other than just physical location. Using VLANs, it is possible to establish networks by different means, such as by function, type of hardware, protocol, among others. This is a big advantage when compared to conventional LANs wherein collision domains are always tied to physical location. Question 38:What is subletting? Subletting is the process of creating smaller networks from a big parent network. Being a part of a network, each subnet is assigned some additional parameters or identifier to indicate its subnet number. Question39: What are the advantages of a layered model in the networking industry? A layered network offers many advantages. It allows administrators to make changes in one layer without the need to make changes in the other layers. Specialization is encouraged, allowing the network industry to make progress faster. A layered model also lets administrators troubleshoot problems more efficiently. Question40: What are some standards supported by the Presentation layer? Presentation layer supports many standards, which ensures that data is presented correctly. These include PICT, TIFF and JPEG for graphics, MIDI, MPEG and QuickTime for Video/Audio. Question41: What is HDLC? HDLC is short for High Level Data Link Control protocol, and is a propriety protocol of CISCO. It is the default encapsulation operated within CISCO routers.

Question42:What is Bandwidth? Bandwidth refers to the transmission capacity of a medium. It is a measure of how much volume a transmission channel can handle, and is measured in Kbps. Question43:How does Hold-downs work? Hold-downs prevent regular update messages from reinstating a downed link by removing that link from update messages. It uses triggered updates to reset the hold-down timer. Question44:What are packets? Packets are the results of data encapsulation. These are data that has been wrapped under the different protocols of the OSI layers. Packets are also referred to as datagrams. Question45:What are segments? Segments are sections of a data stream that comes from the upper OSI layers and ready for transmission towards the network. Segments are the logic units at the Transport Layer. Question46:Give some benefits of LAN switching. Allows full duplex data transmission and reception media rate adaption easy and efficient migration Question47:What is Route Poisoning? Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable. This technique is used in order to prevent problems caused by inconsistent updates on a route.

Question48:How do you find valid hosts in a subnet? The best way to go about this is to use the equation 256 minus the subnet mask. The hosts that are considered valid are those that can be found between the subnets. Question49:Why is network segmentation a good idea when managing a large network? For a network administration, segmenting a network would help ease network traffic and ensures that high bandwidth is made available at all times for all users. This translates to better performance especially for a growing network. Question50: Mention what is the difference between the switch, hub? Hub Switch Hub has single broadcast domain and collision domain. Anything comes in one port is sent out to the others. It is a device that filters and forwards packets between LAN segments. Switches have single broadcast domain and multiple collision domains. It supports any packet protocol, as such it operates at the data link layer 2 and layer 3 Question51:Mention what is the size of IP address? Size of IP address is 32 bit for IPv4 and 128 bit for IPv6.

Question52:Mention what is DHCP? DHCP stands for Dynamic Host Configuration Protocol. DHCP assigns an IP address automatically to a given workstation client. You can also make static IPS for machines like printers, servers, routers and scanners. Question53:Mention what is BOOTP? BOOTP is a computer networking protocol used to deploy an IP address to network devices from a configuration server. Question54:Mention differences betweentcp and UDP? CP (Transmission Control Protocol) UDP (User Datagram Protocol) TCP is connection oriented protocol. When connection lost during transferring iles, the server would request the lost part. While transferring a message, there s no corruption while transferring a message The message will deliver in the order it is sent Data in TCP is read as a stream, where one packet ends, and another begins Example of TCP includes World Wide Web, file transfer protocol, e-mail, Question55: What command do we give if router IOS is stucked? UDP is based on connectionless protocol. When you send data, there is no guarantee whether your transferred message will reach there without any leakage The message you sent may not be in the same order Packets are transmitted individually and are guaranteed to be whole if they arrive Example for UDP are VOIP (Voice Over Internet Protocol) TFTP ( Trivial File Transfer Protocol), Cntrl+Shift+F6 and X is the command we give if router IOS is stucked.