Wednesday, March 24, 2010

MCSE CCNA CCNP

Q Explain the services provided by IP (Internet Protocol) - Addressing, Fragmentation, Packet timeouts and options
Latest answer: Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP. As IP operates in an internet, its systems are designed to accept the addressing of devices which are unique.............
Read answer


Q Explain the classes of IP address
Latest answer: IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format. Every number in each class is represented as binary to computers..................
Read answer


Q Define Broadcast, Unicast and Multicast.
Latest answer: Unicast: A term used in communication to describe a piece of information to send from one point to another. There are only sender and receiver................
Read answer


Q What is Network Mask?
Latest answer: A network mask is used for determination of what subnet an IP address belongs to. An IP address has network address and the host address.................
Read answer


Q Define Subnetting.
Latest answer: A subnet describes a set of networked computers which have common IP address routing prefix..................
Read answer


Q What is the User Datagram Protocol (UDP)?
Latest answer: User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol,..................
Read answer


Q Explain TCP Windowing concept.
Latest answer: TCP Windowing is a concept that is used for avoiding congestion in the network traffic..................
Read answer


Q What is the Domain Name System (DNS)? What are the advantages of it?
Latest answer: A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet...................
Read answer


Q What is the TTL (Time to Live)? Why is it required?
Latest answer: TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded.................
Read answer


Q Explain the use of Internet Control Message Protocol (ICMP)
Latest answer: Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers..................
Read answer


Q What is the use of IGMP protocol?
Latest answer: Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups..............
Read answer


Q What are Ping and Tracert?
Latest answer: Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets..............
Read answer


Q Explain RSVP. How does it work?
Latest answer: Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network...............
Read answer


Q Explain the concept of DHCP.
Latest answer: Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The IP addresses are assigned dynamically...............Read answer


Q What are the differences between a domain and a workgroup?
Latest answer: In a domain, one or more computer can be a server to manage the network. On the other hand in a workgroup all computers are peers having no control on each other.............
Read answer


Q Explain how NAT works.
Latest answer: Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is maintained for global to local and local to mapping of IP’s................
Read answer


Q What is PPP protocol? Explain PPP packet format.
Latest answer: Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host................
Read answer


Q What is IP Spoofing and how can it be prevented?
Latest answer: IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host...............
Read answer


Q Explain IP datagram, Fragmentation and MTU.
Latest answer: IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged in an order. The order is specific which helps to decode and read the stream easily..............
Read answer


Q What is an application gateway?
Latest answer: An application gateway is an application program that runs on a firewall between two networks. An application gateway is used for establishing connection between client program and destination service..................
Read answer


Q Explain Circuit Level Gateway.
Latest answer: A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be considered as a layer between application layer and transport layer..................
Read answer


Q What is 'Gateway Of Last Resort'?
A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to transmit the IP packet. Known routes are present in the routing table.................
Read answer


Q What are switches? Explain the concepts of Layer-3 switches.
Latest answer: It is a device that connects multiple network segments. A switch analyzes the MAC address and then determines where to send the data..............
Read answer


Q What is Router? Explain components of Routers.
Latest answer: The way switches connect multiple computers, a router connects multiple networks. Routers comprise of data consisting of large tables of networks and addresses..................
Read answer


Q Overview of OSI layer.
Latest answer: OSI stands for Open Systems InterconnectionThe OSI reference model gives an overview of the layered communications and computer network protocol design...................
Read answer


Q Explain different layers in the OSI model.
Latest answer: Application Layer: Closest to the end user, Interact directly with the software application.Presentation Layer: Translates application to network format, and vice versa, Works to transform data into the form that the application layer can accept, Formats and encrypts data to be sent across a network.........................
Read answer


Q Explain the concept and capabilities of Unicast IP Addresses.
Latest answer: It is an IP address that uniquely identifies a host in a network. The datagram with a unicast IP address is received and processed by only a single host.
Read answer


Q What is IP Multicasting?
Latest answer: It is an IP address that identifies a particular group of hosts in network. This group of hosts is called a multicast group..............
Read answer


Q Explain the classes of IP addresses. Why do we need them?
Latest answer: Class A:Range: from 0.0.0.0 to 127.255.255.255.Leftmost bit: 0.First 8 bits: netid.Remaining 24 bits: hostid..............
Read answer


Q What is Subneting? Explain the advantages of using Subneting.
Latest answer: Subneting is dividing a network into several subnets.This is usually done for the following purposes:..................
Read answer


Q What is Superneting? Explain the concept of custom Subneting.
Latest answer: Supernetting or Classless Inter-Domain Routing (CIDR) : It is a way to aggregate multiple Internet addresses of the same class..............
Read answer


Q What is VLSM, Variable length subnet masking?
Latest answer: VLSM is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule................
Read answer


Q What is Data Fragmentaion? Explain how Data Fragmentaion works.
Latest answer: Fragmentation occurs when storage space is used inefficiently due to which storage capacity and performance is reduced................
Read answer

Q Explain the concepts and capabilities of IP Datagram.
Latest answer: Data transmitted over an internet using IP is carried in messages called IP datagrams. Like all network protocol messages, IP uses a specific format for its datagrams...................
Read answer


Q What is MAC address?
Media Access Control address is an identifier for assigned to most network adapters or Network Interface Cards by the manufacturer for the purpose of identification...............
Read answer


Q Difference between the communication and transmission.
The differences between the communication and transmission are: Physical movement of information and concerning about bit priority, synchronization, clock etc is referred as transmission................
Read answer


Q What is the difference between TFTP and FTP application layer protocols?
The differences between FTP and TFTP: FTP is connection oriented, where as TFTP is not. TFTP uses error checking and flow control, where as TFTP does not cause error checking.................
Read answer


Q Difference between bit rate and baud rate
The differences between bit rate and baud rate: Bit rate is measured as number of data bits transmitted / second in communication channel...............
Read answer

Q What are NETBIOS and NETBEUI?
Network Basic Input Output System provides session layer of OSI model related services which allows the applications on different computers for communicating over a LAN...............
Read answer


Q Difference between ARP and RARP
The differences between ARP and RARP: Address Resolution Protocol is utilized for mapping IP network address to the hardware address that uses data link protocol..............
Read answer


Q What is the difference between POP3 and IMAP Mail Server?
POP3: All emails are to be downloaded again if used by another desktop PC for checking the email. May leads to confusion if used for checking email in office and at home pc.............
Read answer


Q What is a Transaction server?
A transaction server is software that is used for implementing transactions. A transaction comprises of multiple steps that must automatically be completed..............
Read answer


Q What is Message Oriented Middleware (MOM)?
An infrastructure focuses on sending and receiving messages to increment interoperability, flexibility and flexibility of an application..............
Read answer


Q What is Groupware server?
Groupware server is software that allows the collaboration of users, irrespective of location through the internet or intranet..............
Read answer


Q What are TP-Lite and TP-Heavy Monitors?
TP-Lite Monitor: The integration of TP monitors functions in a database engines is called as TP-Lite monitor.............
Read answer