SlideShare a Scribd company logo
Explain hidden shares. How do they work?
idden or administrative shares are share names with a dollar sign ($) appended to their names.
Administrative shares are usually created automatically for the root of each drive letter. They do
not display in the network browse list.
Name of seven layers in Open System Interconnection model.
They are Application, Presentation, Session, Transport, Network, Data link, and Physical.
What is the difference between ARP and RARP?
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit
physical address, used by a host or a router to find the physical address of another host on its
network by sending a ARP uery packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet address
when it knows only its physical address.
What is Client/Server?
Clients and Servers are separate logical entities that work together over a network to accomplish
a task. Many systems with very different architectures that are connected together are also called
Client/Server.
What is MAC address?
It is the 48 bit hardware address of LAN card. MAC address is usually stored in ROM on the
network adapter card and it is unique.
What are the perquisites to configure server?
 LAN card should be connected:
 Root (partition on which window is installed) should in NTFS
 Server should be configured with a static IP address
How we will configure ADS?
Start ==> RUN ==> DCPROMO
How will you test LAN card?
Ping 127.0.0.1
If getting reply its fine
What are the difference between DOMAIN and WORKGROUP?
Workgroup:-
(i)Every PC is responsible for itssecurity own.
(ii)No centralizeadministration
(iii)Main aim to save hardware recourse
(iv)Best suite in school, traininginstitute, cyber café
Domain: -
(i)Server is responsible for data safety.
(ii)Centralizeadministration
(iii)Main aim isto secure data
(iv)Best suite in company environments
Which command is used to check the IP address of your system?
ipconfig
Which set wizard will run to do peer to peer networking in XP?
Small home andoffice setup wizard
Which command is used to check the physical connectivity between two computers?
Ping
What is map drive?
A special feature that will map networkresource to my computer.
What is Proxy Server?
Most large businesses, organizations, and universitiesthese daysuse a proxy server. Thisis a server that all computerson the local network
have to go through before accessing informationon the Internet. By using a proxy server, an organization canimprove thenetwork
performance and filter what usersconnected to the networkcan access.
Which folder contains ADS installed on server?
NTDS
What is the full form of Internet?
International Networking
Which are the bootable files of 98 and XP ?
In windows98 it iscommand.com
In XP it is NTLDR
In which partition Linux is installed ?.
Linux doesn’t support windowsfile system that contain partitionscheme. It (Linux) hasitsown file system known as ext2, an d ext3. it will
install only on it.In linux filesystem it will install on / (root) partition.
What is size of SWAP ?
It’s the hard disk space that is used as RAM for fast processing. In window it’sknown as virtual memory and could be set as per retirement
via thispath
My Computer ==> properties==> advance
In Linux it’sknown as SWAP space and generally taken the doublesize of physical RAM For exampleif you have 256(MB) DDR ph ysical
ram then swap space would be 512 MB.
What is full form of C.M.O.S ?
Complementary metal oxide semiconductor
How will you check ip address without using network place ?
Start ==> Run ==> Command ==>ipconfig
What is IP?
Internet Protocol (IP) isan unreliable, best effort delivery, connection-lessprotocol used for transmitting and receiving databetween hosts in
a TCP/IP network
What are the difference between hub and switch?
Hub is a layer 1 device. It will out the signal from all of its port except the one from where its
insert. It is unable to detect the collision. It works on single collision and single broadcast
domain.
Switch is layer 2 device. It maintains a CAM table that store the MAC address of devices
attached on its port. CAM table is used to make the forwarding decision. It works on per port
collision and single broadcast domain.
What is layer?
Layer is a completely logical partition of PDU (protocol data unit) process. That define how the
information is travel form one computer to other over the network.
What is TCP/IP?
It is combination of two protocols TCP and IP. It is used for reliable data transfer.
What is operating system?
An operating system (sometimes abbreviated as "OS") is the program that, after being initially
loaded into the computer by a boot program, manages all the other programs in a computer. It
provides a platform to application software.
What is package software?
The collection of mostly used software released in package Form Company. For Example Ms-
Office that contain word, power point, Excel, etc.
Full form of .co.in, .com
 COM - ".com" stands for "commercial".
 NET - ".net" stands for "network"
 ORG - ".org" stands for "organization"
 INFO - ".info" stands for "information"
 BIZ - ".biz" stands for "business".
 IN - 'IN' stands for India. The 'IN' is a 2-letter country code for India.
What is ring topology?
In a ring topology, deviceone connectsto devicetwo, devicetwo connectsto device three, and so on to the last device, whichconnectsback
to device one.
Which cable is used in LAN?
Generally coaxial andTP media isused in LAN networking.
What are Difference between STP and UTP?
STP cable is mostly used by IBM; it hasan extra cover over each pair.
UTP cable isused in star topology. It hasa single cover over all pair.
Full form of ping.
PING stand for Packet Internet Grouper
What are the minimum requirements for xp installation?
64MB RAM
1.5GB free HDD space
233MHz minimum processor.
What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
10Base2— An Ethernet term meaninga maximum transfer rate of 10 Megabitsper second that usesbaseband signaling, with a contiguous
cable segment lengthof 100 metersand a maximum of 2 segments.
10Base5—An Ethernetterm meaninga maximum transfer rate of 10 Megabitsper second that usesbaseband signaling,with 5 continuous
segmentsnot exceeding100 metersper segment.
10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabitsper second that usesbaseband signalingand twisted pair
cabling.
What is the difference between an unspecified passive open and a fully specified
passive open?
An unspecified passive openhasthe server waiting for a connectionrequest from a client.
A fully specified passive open hasthe server waiting for a connection from a specific client.
Explain the function of Transmission Control Block
A TCB is a complex datastructure that containsa considerableamountof information about each connection.
What is a Management Information Base (MIB)?
A Management Information Base ispart of every SNMP-manageddevice. EachSNMP agent hasthe MIB database that containsinformation
about the device'sstatus, its performance, connections, and configuration.TheMIB isqueriedby SNMP.
What is anonymous FTP and why would you use it?
AnonymousFTP enablesusers to connect to a host without using a valid loginand password. Usually, anonymousFTP uses a login called
anonymousor guest, with the password usually requesting theuser'sID for tracking purposesonly. AnonymousFTP isused to e nable a
large number of usersto access fileson the host without having to go to the troubleof setting uplog insfor them all.AnonymousFTP
systems usually have strict controlsover the areasan anonymoususer can access.
What is a pseudo tty?
A pseudo tty or false terminal enablesexternal machinesto connect through Telnet or rlogin.Without a pseudo tty, no connectioncan take
place.
What does the Mount protocol do?
The Mount protocol returnsa file handle andthe name of the filesystem in which a requested file resides. The message isse nt to the client
from the server after reception of a client'srequest
What is External Data Representation?
External Data Representationisa method of encodingdata within an RPC message, used to ensure that the data isnot system -dependent.
When were OSI model developed and why its standard called 802.XX and so on?
OSI model wasdeveloped inFebruary1980that why these also known as 802.XX Standard (Notice80 means==> 1980, 2means==>
February)
What is Full form of ADS?
Active Directory Structure
How will you register and activate windows?
If you have not activatedwindowsXP, you can do so at any time by clicking the windowsActivationiconin the system tray to initiate
activation. Once you haveactivated windowsXP, thisicon disappearsfrom the system tray.
For registration
Start ==> Run ==> regwiz /r
Where do we use cross and standard cable?
Computer to computer ==> cross
Switch/hub to switch/hub==>cross
Computer to switch/hub ==>standard
How many pins do serial ports have?
In computer it'sknown as com port and could be available in9pin or 25 pin.On router it have 60 pins.
How will check ip address on 98?
Start ==> Run ==> command ==> winipcfg
How will you make partition after installing windows?
My computer ==> right click==> manage ==> diskmanagement ==>
select free space ==> right click==> New partition
What is IP?
It's a unique 32 bitssoftware address of a node in a network.
What is private IP?
Three rangesof IP addresses have been reserved for private addressand they are not validfor use on the Internet. If you wa nt to access
internet with these addressyou must have to use proxy server or NAT server (on normal cases the role of proxy server is played by your
ISP.).If you do decide to implement a private IP addressrange, you can use IP addresses from any of the following classes:
Class A 10.0.0.0 10.255.255.255
Class B 172.16.0.0 172.31.255.255
Class C 192.168.0.0 192.168.255.255
What is public IP address?
A public IP addressis an address leased from an ISP that allowsor enablesdirect Internet communication.
What's the benefit of subnetting?
Reduce the size of the routing tables.
Reduce networktraffic. Broadcast traffic can be isolatedwithin a singlelogical network.
Provide a way to secure networktraffic by isolating itfrom the rest of the network.
What are the differences between static ip addressing and dynamic ip addressing?
With static IP addressing, a computer (or other device) isconfigured to alwaysuse the same IP address. With dynamic addressing, the IP
address can change periodically andismanaged by a centralized networkservice
What is APIPA?
Automatic privateIP addressing (APIPA) isa feature mainly found in Microsoft operatingsystems. APIPA enablesclientsto st ill
communicatewith other computerson the same networksegment until an IP addresscan be obtained from a DHCP server, allowingthe
machine to fully participateon the network. The range of these IP addressare the 169.254.0.1 to 169.254.255.254 witha defa ultClassB
subnet mask of 255.255.0.0.
What are the LMHOSTS files?
The LMHOSTSfile isa static method of resolving NetBIOS namesto IP addresses in the same way that the HOSTS file isa static method of
resolving domain namesinto IP addresses. An LMHOSTS file isa text file thatmapsNetBIOS namesto IP addresses; it must be manually
configured andupdated.
What is DHCP scope?
A scope is a range, or pool, of IP addresses that can be leased to DHCP clientson a given subnet.
What is FQDN?
An FQDN contains(fully qualifieddomain name) boththe hostname anda domainname. It uniquely identifiesa h ost within a DNS hierarchy
What is the DNS forwarder?
DNS servers often must communicatewith DNS servers outside of the local network. A forwarder is an entry that isused when a DNS server
receivesDNS queriesthat it cannot resolve locally. It then forwardsthose requeststo external DNS servers for resolution.
Which command will you use to find out the name of the pc in networks?
NSLOOKUP [192.168.0.1]
[Ip of target computer]
How will enable sound service in 2003?
By default thisservice remain disableto enablethisservice
Start ==> administrative tools==> service ==> windowsaudio ==> start up type ==> automatic
How will enable CD burning service in 2003?
By default thisservice remain disableto enablethisservice
Start ==> administrative tools==> service ==> IMAPI CD burning com service ==> start up type ==> automatic
What do you need to do that your browser will point URL www.example.com to the
internal IP address 127.99.11.01?
Make changesin the hosts file in C:WINDOWSsystem32driversetc
The Hosts file islooked at first before going out to theDNS (Domain NameService) servers. you have to put the following on new linesat the
end of hosts file:
127.99.11.01example.com
127.99.11.01www.example.com
What can you suggest to enhance testing process on windows OS?
Put shortcut to notepad.exein SendTo folder. It isspeed up work with different fileslike hosts, configuration files. Locat ion of thisfolder is
C:Documentsand SettingsDefault Usersendto.
Open it and create shortcut of notpad.exe
What is FTP?
FTP is short for File Transfer Protocol. Thisisthe protocol used for file transfer over the Internet.
How will you make XP home the client of server 2003?
XP home editionismade only for home purpose so we can’t use it as the client. And same ruleapply on windowsvista editionsalso.
Where do you take back up from?
ClickStart, point to All Programs, point to Accessories, point to System Tools, and thenclickBackup.
Bedside's it?
If OS support then Select Drive ==> properties==> backup now
What is router?
Router is a device that isused to connect two different networks.
How will you configure ADS?
Start ==> Run ==> DCPROMO
Or
Start==> Configure your server ==> add/Removea Role
What is ADS?
A central component of the Windowsplatform, Active Directory service providesthe meansto managethe identitiesand relationshipsthat
make up network environments.
What if this wizard (ADS) is not running?
Check the network cable it should be plugged
Check root partition it should be inNTFS
Check IP of server it should be configured statically
How will you add a client to server? /
How’s the client join a domain?
What are the client configurations?
On Server
Configure ADS (for exampleit’sconfigured withxyz.com)
On Client
Log in form local administrator account
My Computer ==> Properties==> Computer Name ==> Change
==>Domain ==>xyz.com ==> username Administrator (of xyz.com)
Password xxxxxxxxxxx (of admin of xyz.com)
Welcome to xyz.com ==> Restart the computer
Does it necessary to use administrator account to configure the client?
Not every time but you are required a properly configured user account indomain controller security policy.
ISO stand for?
International standard organization
OSI stand for?
Open System Interconnection
What is full form DHCP and how will you configure it?
Dynamic host configuration protocol
To configure iton Server
Configure your server ==>Add/Removea role ==>DHCP server ==>completethe wizard
Start ==> Administrative tools==> DHCP ==>New scope ==> Wizard
Now authorized thisserver and do activate it
On client
Local area network==> tcp/ip ==> obtain ipautomatically
Obtain DNS automatically
What is difference between physical and logical topology?
A physical topology describeshow devicesare physically cabledtogether.
A logical topology describeshow devicescommunicateacrossthe physical topology
How many types of topology are available?
A point-to-point topology has a single connection betweentwo devices.
In a star topology, a central devicehasmany point-to-point connectionsto other devices.
A bus topology uses a single connection or wire to connectall devices.
In a ring topology, device one connectsto device two, device two connectsto device three, and so on to the last device, which connects
back to device one.
How many times computer reboot when server 2000 install?
2 times.
How will you remove this error “ ntldr missing press any key to reboot the system” ?
Reboot the system with XP, ( apply also on server2003,) cd
On setup screen press to R to repair the window
Now provide the administrator password
C:>cd f:( your cd drive latter, f istaken as the example)
f:>cd i386
f:>copy ntldr c:
f:>exit
reboot the system
Why do we do networking?
For data sharing
To accumulate hardware resource
What are the benefits of networking?
There are lotsof advantagesfrom buildup a network, but the three big factsare-
File Sharing
From sharing filesyou can view, modify, andcopy filesstored on a different computer on the networkjust as easily as if they were stored on
your computer.
Resource Sharing
Resources such as printers, fax machines, StorageDevices(HDD, FDD and CD Drives), Webcam, Scanners, Mod em and many more
devicescan be shared.
Program Sharing
Just as you can share fileson a network, you can often also share program on a network. For example, ifyou have theright t ypeof software
license, you can have a shared copy of Microsoft Office, or some other program,and keep it on the networkserver, from where it isalso run
What is network?
A network is basically all of the components(hardware and software) involvedin connecting computersacross small and large distances.
What is networking?
A process that is describeshow the network will connect.
What is topology?
A topology defineshow the devicesare connected. Further it isdividedin physical andlogical topology.
What are the differences between FAT and NTFS ?
FAT
Doesn't provide local security Provide local security
Doesn't provide disk quota Providediskquota
Doesn't provide file compression Provide file compression
Doesn't provide other security feature Provide other security feature
Difference between XP home and XP professional ?
Feature that isnot available inXP homeedition
Remote Desktop
Off line fileand folder
Encrypting file system
Group policy
Roaming profile
Remote installation
Joining Domain
The featureslisted aboveare only available in XP professional
Which OSI layer does IP belong?
P belongsto the Network Layer (layer 3) in the OSI model.
What is a subnet mask?
Subnet maskis a 4 byte (32 bit) number used to identify the sub-networkID and the host ID from an IP address. All the hostsin a sub-
network will have the same subnet mask. E.g. 255.255.255.0, 255.255.127.0, 255.255.0.0
Where are the Windows NT Primary Domain Controller (PDC) and its Backup
Domain Controller (BDC) in Server 2003?
The scheme of PDC and BDC is replaced by The Active Directory in server 2000 and further.
Now all domain controllers share a multi master peer-to-peer read and write relationship that
hosts copies of the Active Directory.
How can group policy be refreshed?
1. Restart the server
2. Leave the server ideal for 90 minute
3. Run ==> gpupdate (server 2003 only)
What is LILO?
LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory,
and tell the system which partition and hard drive to boot from.
I can't seem to access the Internet, don't have any access to the corporate
network and on IP configuration on my address is 169.254.*.*. What happened?
The 169.254.*.* net mask is assigned to Windows machines running 98/2000/XP if the DHCP
server is not available. The name for the technology is APIPA (Automatic Private Internet
Protocol Addressing).
We've installed a new Windows-based DHCP server, however, the users do not seem
to be getting DHCP leases off of it.
The server must be authorized first with the Active Directory.
What's the difference between local, global and universal groups?
Domain local groupsassign access permissionsto domain groupsfor local domainresources. Global groupsprovide accessto re sources in
entire domains.
What's the major difference between FAT and NTFS on a local machine?
FAT and FAT32 provide no security over locally logged-on users. Only native NTFS providesextensive permission control on both remote
and local files.
What is presentation layer and how it is responsible for in the OSI model?
The presentationlayer establishesthe data formatprior to passing it along to thenetworkapplication'sinterface. TCP/IP networksperform
thistask at the applicationlayer
When were OSI model developed and why its standard called 802.XX and so on?
OSI model wasdeveloped inFebruary1980that why these also known as 802.XX Standard (Notice80 means==> 1980, 2means==>
February)
What is Full form of ADS?
Active Directory Structure
How will you register and activate windows?
If you have not activatedwindowsXP, you can do so at any time by clicking the windowsActivationiconin the system tray to initiate
activation. Once you haveactivated windowsXP, thisicon disappearsfrom the system tray.
For registration
Start ==> Run ==> regwiz /r
Where do we use cross and standard cable?
Computer to computer ==> cross
Switch/hub to switch/hub==>cross
Computer to switch/hub ==>standard
How many pins do serial ports have?
In computer it'sknown as com port and could be available in9pin or 25 pin.On router it have 60 pins.
How will check ip address on 98?
Start ==> Run ==> command ==> winipcfg
What is source route?
It is a sequence of IP addresses identifyingthe routea datagram must follow. A source route may optionally be included in a nIP datagram
header.
What is RIP (Routing Information Protocol)?
It is a simple protocol used to exchange information between therouters.
What is SLIP (Serial Line Interface Protocol)?
It is a simple protocol used for transmission of IP datagramsacross a serial line.
What is Proxy ARP?
It is using a router to answer ARP requests. Thiswill be donewhen the originating host believesthat a destination islocal, when infact islies
beyond router.
What is OSPF?
It is an Internet routing protocol thatscaleswell, can route traffic alongmultiple paths, and usesknowledge of an Internet'stopology to make
accurate routing decisions.
What is Kerberos?
It is an authentication service developed at the MassachusettsInstitute of Technology. Kerberosuses encryption to prevent i ntrudersfrom
discovering passwords and gaining unauthorizedaccessto files.
What is a Multi-homed Host?
It is a host that has a multiple networkinterfacesand thatrequiresmultiple IP addresses is called asa Multihomed Host.
What is NVT (Network Virtual Terminal)?
It is a set of rulesdefininga very simple virtual terminal interaction. The NVT isused in the start of a Telnet session.
What is Gateway-to-Gateway protocol?
It is a protocol formerly used to exchange routinginformation betweenInternet core routers.
What is BGP (Border Gateway Protocol)?
It is a protocol used to advertise the set of networks that can be reached with inan autonomoussystem. BGP enablesthisinf ormation to be
shared with the autonomoussystem. Thisisnewer than EGP (Exterior Gateway Protocol).
What is autonomous system?
It is a collectionof routersunder the control of a single administrativeauthority and thatusesa common Interior Gateway Protocol.
What is EGP (Exterior Gateway Protocol)?
t is the protocol the routersin neighboringautonomoussystems use to identify the set of networksthat can be reached withinor via each
autonomoussystem.
What is IGP (Interior Gateway Protocol)?
It is any routing protocol used within an autonomoussystem.
What is Mail Gateway?
It is a system that performsa protocol translation betweendifferentelectronic mail delivery protocols.
What is wide-mouth frog?
Wide-mouth frog isthe simplest known key distributioncenter (KDC) authentication protocol.
What is silly window syndrome?
It is a problem thatcan ruin TCPperformance. Thisproblem occurswhen data are passed to the sending TCP entity in large bl ocks, but an
interactive applicationon the receiving side reads1 byte at a time.
What is region?
When hierarchical routingisused, the routersare divided into what we call regions, with each router knowing all the detailsabout how to
route packets to destinationswithin itsown region, but knowingnothing about theinternal structure of other regions.
What is multicast routing?
Sending a message to a group iscalledmulticasting, and itsroutingalgorithm iscalled multicast routing.
What is traffic shaping?
One of the main causesof congestion isthat traffic isoften busy. If hostscould be made to transmitat a uniform rate, congestion would be
less common. Another open loopmethodto helpmanagecongestionisforcing the packet to be transmittedat a more predictable rate. This
is called traffic shaping.
What is packet filter?
Packet filter isa standard router equipped with some extra functionality.Theextra functionality allowsevery incoming or outgoing packet to
be inspected. Packetsmeetingsome criterion are forwardednormally. Those that fail the test are dropped.
BOOTP helps a diskless workstation boot. How does it get a message to the network
looking for its IP address and the location of its operating system boot files?
BOOTP sendsa UDP message with a subnet work broadcast address and waitsfor a reply from a server that givesit the IP addre ss. The
same message might containthe name of themachine thathasthe boot fileson it. If the boot image location isnot specified, the workstation
sends another UDP message to query the server.
What is a DNS resource record?
resource record is an entry in a name server's database. There are several typesof resource records used, includingname-to-address
resolution information.Resource recordsare maintainedasASCII files.
What protocol is used by DNS name servers?
DNS uses UDP for communicationbetweenservers. It is a better choice thanTCP because of the improved speed a connectionlessprotocol
offers. Of course, transmission reliability sufferswith UDP.
What is the difference between interior and exterior neighbor gateways?
Interior gatewaysconnect LANsof one organization, whereasexterior gatewaysconnect theorganizationto the outsideworld.
What is the HELLO protocol used for?
The HELLO protocol usestime instead of distance to determineoptimal routing. It isan altern ative to the Routing Information Protocol.
What are the three type of routing tables and What are the advantages and
disadvantages of these?
The three typesof routing tablesare fixed, dynamic, and fixed central.
A fixed table must be manually modified every time there isa change.
A dynamic tablechangesitsinformation based on networktraffic, reducing theamount of manual maintenance.
A fixed central table letsa manager modify only one table, whichisthen read by other devices. The fixed central table reducesthe need to
update each machine'stable, aswith the fixedtable. Usually a dynamic table causesthe fewest problemsfor a networkadmini strator,
althoughthe table'scontentscan change without the administrator being aware of thechange.
What is MAC address ?
The addressfor a device asit is identifiedat the Media Access Control (MAC) layer in the networkarchitecture. MAC addressis usually
stored in ROM on the networkadapter card and isunique.
What is attenuation?
The degenerationof a signal over distanceon a networkcable iscalled attenuation.
What is cladding?
A layer of a glass surrounding the center fiber of glassinside a fiber-optic cable.
What is RAID?
A method for providing faulttoleranceby using multiple hard disk drives.
What is NETBIOS and NETBEUI?
NETBIOS is a programming interface that allowsI/O requeststo be sent to and received from a remote computer and it hidesthe networking
hardware from applications.
NETBEUI is NetBIOS extendeduser interface.A transport protocol designed by Microsoft and IBM for the use on small subnets.
What is redirector?
Redirector is software that intercept
What is Beaconing?
The process that allowsa networkto self-repair networks problems. The stationson the networknotify the other stationson the ring when
they are not receiving thetransmissions. Beaconingisused in Token ring and FDDI networks.
What is terminal emulation, in which layer it comes?
Telnet isalso called asterminal emulation. It belongsto application layer.
What is frame relay, in which layer it comes?
Frame relay isa packet switching technology. It will operate inthe datalinklayer.
What do you meant by "triple X" in Networks?
The function of PAD (Packet Assembler Disassembler) is described in a document known asX.3. The standard protocol hasbeen defined
between the terminal andthe PAD, calledX.28; another standard protocol existsbetween hte PAD and thenetwork, called X.29. Together,
these three recommendationsare often called "triple X".
What is SAP?
Seriesof interface pointsthat allow other computersto communicate withthe other layersof networkprotocol stack.
What is subnet?
A generic term for section of a large networksusually separated by a bridge or router.
What is subnet mask?
It is a term that makesdistinguish betweennetworkaddressand host address in IP address. Subnet maskvalue 0 defineshost partition in IP
address and value 1 – 255 definesNetworkaddress.
Describe Various Network Type
Local Area Networks Local areanetworks(LANs) are used to connect networking devicesthat are in a very close geographic area, such as
a floor of a building,a building itself, or a campusenvironment.
Wide Area Networks Wide area networks(WANs) are used to connect LANstogether. Typically,WANsare used when the LANs that must
be connected are separated by a largedistance.
Metropolitan Area Networks A metropolitanarea network(MAN) is a hybrid betweena LAN and a WAN.
Content Networks Content networks (CNs) were developedto ease users’ access to Internet resources. Companiesdeploy basically two
types of CNs:
1.Caching downloaded Internet information
2.DistributingInternet traffic loadsacross multiple servers
Storage Area Networks Storage area networks(SANs) provide a high-speed infrastructure to movedata betweenstorage devicesand file
servers.
Advantage
Performance isfast.
Availability ishigh because of the redundancy featuresavailable.
Distances can span up to 10 kilometers.
Managementiseasy because of the centralizationof data resources.
Overhead islow (uses a thin protocol).
Disadvantage of SANsistheir cost.
Intranet An intranet isbasically a networkthat islocal to a company. In other words, users from within thiscompany can find all of their
resources without having to go outside of the company. An intranet can includeLANs, private WANsand MANs,
Extranet An extranet isan extended intranet, where certain internal servicesare made available to known external usersor external
business partners at remote locations.
Internet An internet isused when unknown external usersneed to access internal resourcesin your network. In other words, your compa ny
might have a web site that sellsvariousproducts, and you want any external user to be able to accessthisservice.
VPN A virtual privatenetwork(VPN) is a special type of secured network. A VPN is used to provide a secure connection acrossa p ublic
network, such as an internet. Extranetstypically use a VPN to provide a secure connection between a company and itsknown external users
or offices. Authentication isprovided to validatethe identitiesof the two peers. Confidentiality providesencryption of the data to keep it
private from prying eyes. Integrity isused to ensure that the data sent between thetwo devicesor sites has not been tampered with.

More Related Content

What's hot

CCNA ALL IN ONE
CCNA ALL IN ONE CCNA ALL IN ONE
CCNA ALL IN ONE
Sripati Mahapatra
 
Nat pat
Nat patNat pat
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
Sonal Chandel
 
NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
singhsukdeep
 
Ip protocol
Ip protocolIp protocol
Ip protocolH K
 
IPv6 theoryfinalx
IPv6 theoryfinalxIPv6 theoryfinalx
IPv6 theoryfinalx
Pawan Sharma
 
IPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryIPv6 - Neighbour Discovery
IPv6 - Neighbour Discovery
Heba_a
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
mithilak
 
What is a static ip address
What is a static ip addressWhat is a static ip address
What is a static ip address
Hexa Howe
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
ITExamAnswers.net
 
Lec 1 DPT
Lec 1 DPTLec 1 DPT
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
Theon Jum
 
IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6
Ankita Mahajan
 
Network configuration in Linux
Network configuration in LinuxNetwork configuration in Linux
Network configuration in Linux
Mohammed Yazdani
 
Network address translations
Network address translations Network address translations
Network address translations Shahzad shareef
 

What's hot (18)

CCNA ALL IN ONE
CCNA ALL IN ONE CCNA ALL IN ONE
CCNA ALL IN ONE
 
Nat pat
Nat patNat pat
Nat pat
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
 
Ip protocol
Ip protocolIp protocol
Ip protocol
 
IPv6 theoryfinalx
IPv6 theoryfinalxIPv6 theoryfinalx
IPv6 theoryfinalx
 
NAT_Final
NAT_FinalNAT_Final
NAT_Final
 
IPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryIPv6 - Neighbour Discovery
IPv6 - Neighbour Discovery
 
Network administration
Network administrationNetwork administration
Network administration
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
What is a static ip address
What is a static ip addressWhat is a static ip address
What is a static ip address
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
Lec 1 DPT
Lec 1 DPTLec 1 DPT
Lec 1 DPT
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6
 
01 Ipv6 Addressing
01 Ipv6 Addressing01 Ipv6 Addressing
01 Ipv6 Addressing
 
Network configuration in Linux
Network configuration in LinuxNetwork configuration in Linux
Network configuration in Linux
 
Network address translations
Network address translations Network address translations
Network address translations
 

Similar to Networking question

Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
mandarshetye45
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
AKHIL969626
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address Translation
Erin Moore
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnetrosu555
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
Mark John Lado, MIT
 
Mcse question
Mcse questionMcse question
Cisco doc
Cisco docCisco doc
Cisco doc
Prakash V
 
Interview Questions
Interview QuestionsInterview Questions
Interview Questions
rajusandeep12
 
Ip Subnet Design
Ip Subnet DesignIp Subnet Design
Ip Subnet Design
Heather Dionne
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
Susan Cox
 
Iap final
Iap finalIap final
Iap final
GLIM Digital
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingKumar
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
sonuagain
 
Network Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) EssayNetwork Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) Essay
Jill Crawford
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
eyebolloptics
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
Deepak Singh
 
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by KeylabsSAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
keylabstraining
 
1.sap basis material_keylabs1
1.sap basis material_keylabs11.sap basis material_keylabs1
1.sap basis material_keylabs1chipanda
 

Similar to Networking question (20)

Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address Translation
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
Mcse question
Mcse questionMcse question
Mcse question
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
Interview Questions
Interview QuestionsInterview Questions
Interview Questions
 
Ip Subnet Design
Ip Subnet DesignIp Subnet Design
Ip Subnet Design
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 
Iap final
Iap finalIap final
Iap final
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshooting
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Network Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) EssayNetwork Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) Essay
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by KeylabsSAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
 
1.sap basis material_keylabs1
1.sap basis material_keylabs11.sap basis material_keylabs1
1.sap basis material_keylabs1
 

Recently uploaded

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 

Recently uploaded (20)

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 

Networking question

  • 1. Explain hidden shares. How do they work? idden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list. Name of seven layers in Open System Interconnection model. They are Application, Presentation, Session, Transport, Network, Data link, and Physical. What is the difference between ARP and RARP? The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP uery packet that includes the IP address of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address. What is Client/Server? Clients and Servers are separate logical entities that work together over a network to accomplish a task. Many systems with very different architectures that are connected together are also called Client/Server. What is MAC address? It is the 48 bit hardware address of LAN card. MAC address is usually stored in ROM on the network adapter card and it is unique. What are the perquisites to configure server?  LAN card should be connected:  Root (partition on which window is installed) should in NTFS  Server should be configured with a static IP address How we will configure ADS? Start ==> RUN ==> DCPROMO How will you test LAN card? Ping 127.0.0.1 If getting reply its fine What are the difference between DOMAIN and WORKGROUP? Workgroup:- (i)Every PC is responsible for itssecurity own. (ii)No centralizeadministration (iii)Main aim to save hardware recourse (iv)Best suite in school, traininginstitute, cyber café Domain: - (i)Server is responsible for data safety. (ii)Centralizeadministration (iii)Main aim isto secure data (iv)Best suite in company environments Which command is used to check the IP address of your system? ipconfig
  • 2. Which set wizard will run to do peer to peer networking in XP? Small home andoffice setup wizard Which command is used to check the physical connectivity between two computers? Ping What is map drive? A special feature that will map networkresource to my computer. What is Proxy Server? Most large businesses, organizations, and universitiesthese daysuse a proxy server. Thisis a server that all computerson the local network have to go through before accessing informationon the Internet. By using a proxy server, an organization canimprove thenetwork performance and filter what usersconnected to the networkcan access. Which folder contains ADS installed on server? NTDS What is the full form of Internet? International Networking Which are the bootable files of 98 and XP ? In windows98 it iscommand.com In XP it is NTLDR In which partition Linux is installed ?. Linux doesn’t support windowsfile system that contain partitionscheme. It (Linux) hasitsown file system known as ext2, an d ext3. it will install only on it.In linux filesystem it will install on / (root) partition. What is size of SWAP ? It’s the hard disk space that is used as RAM for fast processing. In window it’sknown as virtual memory and could be set as per retirement via thispath My Computer ==> properties==> advance In Linux it’sknown as SWAP space and generally taken the doublesize of physical RAM For exampleif you have 256(MB) DDR ph ysical ram then swap space would be 512 MB. What is full form of C.M.O.S ?
  • 3. Complementary metal oxide semiconductor How will you check ip address without using network place ? Start ==> Run ==> Command ==>ipconfig What is IP? Internet Protocol (IP) isan unreliable, best effort delivery, connection-lessprotocol used for transmitting and receiving databetween hosts in a TCP/IP network What are the difference between hub and switch? Hub is a layer 1 device. It will out the signal from all of its port except the one from where its insert. It is unable to detect the collision. It works on single collision and single broadcast domain. Switch is layer 2 device. It maintains a CAM table that store the MAC address of devices attached on its port. CAM table is used to make the forwarding decision. It works on per port collision and single broadcast domain. What is layer? Layer is a completely logical partition of PDU (protocol data unit) process. That define how the information is travel form one computer to other over the network. What is TCP/IP? It is combination of two protocols TCP and IP. It is used for reliable data transfer. What is operating system? An operating system (sometimes abbreviated as "OS") is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. It provides a platform to application software. What is package software? The collection of mostly used software released in package Form Company. For Example Ms- Office that contain word, power point, Excel, etc. Full form of .co.in, .com  COM - ".com" stands for "commercial".  NET - ".net" stands for "network"  ORG - ".org" stands for "organization"  INFO - ".info" stands for "information"  BIZ - ".biz" stands for "business".  IN - 'IN' stands for India. The 'IN' is a 2-letter country code for India. What is ring topology? In a ring topology, deviceone connectsto devicetwo, devicetwo connectsto device three, and so on to the last device, whichconnectsback to device one. Which cable is used in LAN? Generally coaxial andTP media isused in LAN networking.
  • 4. What are Difference between STP and UTP? STP cable is mostly used by IBM; it hasan extra cover over each pair. UTP cable isused in star topology. It hasa single cover over all pair. Full form of ping. PING stand for Packet Internet Grouper What are the minimum requirements for xp installation? 64MB RAM 1.5GB free HDD space 233MHz minimum processor. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs? 10Base2— An Ethernet term meaninga maximum transfer rate of 10 Megabitsper second that usesbaseband signaling, with a contiguous cable segment lengthof 100 metersand a maximum of 2 segments. 10Base5—An Ethernetterm meaninga maximum transfer rate of 10 Megabitsper second that usesbaseband signaling,with 5 continuous segmentsnot exceeding100 metersper segment. 10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabitsper second that usesbaseband signalingand twisted pair cabling. What is the difference between an unspecified passive open and a fully specified passive open? An unspecified passive openhasthe server waiting for a connectionrequest from a client. A fully specified passive open hasthe server waiting for a connection from a specific client. Explain the function of Transmission Control Block A TCB is a complex datastructure that containsa considerableamountof information about each connection. What is a Management Information Base (MIB)? A Management Information Base ispart of every SNMP-manageddevice. EachSNMP agent hasthe MIB database that containsinformation about the device'sstatus, its performance, connections, and configuration.TheMIB isqueriedby SNMP. What is anonymous FTP and why would you use it? AnonymousFTP enablesusers to connect to a host without using a valid loginand password. Usually, anonymousFTP uses a login called anonymousor guest, with the password usually requesting theuser'sID for tracking purposesonly. AnonymousFTP isused to e nable a large number of usersto access fileson the host without having to go to the troubleof setting uplog insfor them all.AnonymousFTP systems usually have strict controlsover the areasan anonymoususer can access. What is a pseudo tty?
  • 5. A pseudo tty or false terminal enablesexternal machinesto connect through Telnet or rlogin.Without a pseudo tty, no connectioncan take place. What does the Mount protocol do? The Mount protocol returnsa file handle andthe name of the filesystem in which a requested file resides. The message isse nt to the client from the server after reception of a client'srequest What is External Data Representation? External Data Representationisa method of encodingdata within an RPC message, used to ensure that the data isnot system -dependent. When were OSI model developed and why its standard called 802.XX and so on? OSI model wasdeveloped inFebruary1980that why these also known as 802.XX Standard (Notice80 means==> 1980, 2means==> February) What is Full form of ADS? Active Directory Structure How will you register and activate windows? If you have not activatedwindowsXP, you can do so at any time by clicking the windowsActivationiconin the system tray to initiate activation. Once you haveactivated windowsXP, thisicon disappearsfrom the system tray. For registration Start ==> Run ==> regwiz /r Where do we use cross and standard cable? Computer to computer ==> cross Switch/hub to switch/hub==>cross Computer to switch/hub ==>standard How many pins do serial ports have? In computer it'sknown as com port and could be available in9pin or 25 pin.On router it have 60 pins. How will check ip address on 98? Start ==> Run ==> command ==> winipcfg How will you make partition after installing windows? My computer ==> right click==> manage ==> diskmanagement ==> select free space ==> right click==> New partition
  • 6. What is IP? It's a unique 32 bitssoftware address of a node in a network. What is private IP? Three rangesof IP addresses have been reserved for private addressand they are not validfor use on the Internet. If you wa nt to access internet with these addressyou must have to use proxy server or NAT server (on normal cases the role of proxy server is played by your ISP.).If you do decide to implement a private IP addressrange, you can use IP addresses from any of the following classes: Class A 10.0.0.0 10.255.255.255 Class B 172.16.0.0 172.31.255.255 Class C 192.168.0.0 192.168.255.255 What is public IP address? A public IP addressis an address leased from an ISP that allowsor enablesdirect Internet communication. What's the benefit of subnetting? Reduce the size of the routing tables. Reduce networktraffic. Broadcast traffic can be isolatedwithin a singlelogical network. Provide a way to secure networktraffic by isolating itfrom the rest of the network. What are the differences between static ip addressing and dynamic ip addressing? With static IP addressing, a computer (or other device) isconfigured to alwaysuse the same IP address. With dynamic addressing, the IP address can change periodically andismanaged by a centralized networkservice What is APIPA? Automatic privateIP addressing (APIPA) isa feature mainly found in Microsoft operatingsystems. APIPA enablesclientsto st ill communicatewith other computerson the same networksegment until an IP addresscan be obtained from a DHCP server, allowingthe machine to fully participateon the network. The range of these IP addressare the 169.254.0.1 to 169.254.255.254 witha defa ultClassB subnet mask of 255.255.0.0. What are the LMHOSTS files? The LMHOSTSfile isa static method of resolving NetBIOS namesto IP addresses in the same way that the HOSTS file isa static method of resolving domain namesinto IP addresses. An LMHOSTS file isa text file thatmapsNetBIOS namesto IP addresses; it must be manually configured andupdated. What is DHCP scope? A scope is a range, or pool, of IP addresses that can be leased to DHCP clientson a given subnet. What is FQDN? An FQDN contains(fully qualifieddomain name) boththe hostname anda domainname. It uniquely identifiesa h ost within a DNS hierarchy
  • 7. What is the DNS forwarder? DNS servers often must communicatewith DNS servers outside of the local network. A forwarder is an entry that isused when a DNS server receivesDNS queriesthat it cannot resolve locally. It then forwardsthose requeststo external DNS servers for resolution. Which command will you use to find out the name of the pc in networks? NSLOOKUP [192.168.0.1] [Ip of target computer] How will enable sound service in 2003? By default thisservice remain disableto enablethisservice Start ==> administrative tools==> service ==> windowsaudio ==> start up type ==> automatic How will enable CD burning service in 2003? By default thisservice remain disableto enablethisservice Start ==> administrative tools==> service ==> IMAPI CD burning com service ==> start up type ==> automatic What do you need to do that your browser will point URL www.example.com to the internal IP address 127.99.11.01? Make changesin the hosts file in C:WINDOWSsystem32driversetc The Hosts file islooked at first before going out to theDNS (Domain NameService) servers. you have to put the following on new linesat the end of hosts file: 127.99.11.01example.com 127.99.11.01www.example.com What can you suggest to enhance testing process on windows OS? Put shortcut to notepad.exein SendTo folder. It isspeed up work with different fileslike hosts, configuration files. Locat ion of thisfolder is C:Documentsand SettingsDefault Usersendto. Open it and create shortcut of notpad.exe What is FTP? FTP is short for File Transfer Protocol. Thisisthe protocol used for file transfer over the Internet. How will you make XP home the client of server 2003? XP home editionismade only for home purpose so we can’t use it as the client. And same ruleapply on windowsvista editionsalso. Where do you take back up from? ClickStart, point to All Programs, point to Accessories, point to System Tools, and thenclickBackup. Bedside's it? If OS support then Select Drive ==> properties==> backup now
  • 8. What is router? Router is a device that isused to connect two different networks. How will you configure ADS? Start ==> Run ==> DCPROMO Or Start==> Configure your server ==> add/Removea Role What is ADS? A central component of the Windowsplatform, Active Directory service providesthe meansto managethe identitiesand relationshipsthat make up network environments. What if this wizard (ADS) is not running? Check the network cable it should be plugged Check root partition it should be inNTFS Check IP of server it should be configured statically How will you add a client to server? / How’s the client join a domain? What are the client configurations? On Server Configure ADS (for exampleit’sconfigured withxyz.com) On Client Log in form local administrator account My Computer ==> Properties==> Computer Name ==> Change ==>Domain ==>xyz.com ==> username Administrator (of xyz.com) Password xxxxxxxxxxx (of admin of xyz.com) Welcome to xyz.com ==> Restart the computer Does it necessary to use administrator account to configure the client? Not every time but you are required a properly configured user account indomain controller security policy. ISO stand for? International standard organization OSI stand for? Open System Interconnection What is full form DHCP and how will you configure it?
  • 9. Dynamic host configuration protocol To configure iton Server Configure your server ==>Add/Removea role ==>DHCP server ==>completethe wizard Start ==> Administrative tools==> DHCP ==>New scope ==> Wizard Now authorized thisserver and do activate it On client Local area network==> tcp/ip ==> obtain ipautomatically Obtain DNS automatically What is difference between physical and logical topology? A physical topology describeshow devicesare physically cabledtogether. A logical topology describeshow devicescommunicateacrossthe physical topology How many types of topology are available? A point-to-point topology has a single connection betweentwo devices. In a star topology, a central devicehasmany point-to-point connectionsto other devices. A bus topology uses a single connection or wire to connectall devices. In a ring topology, device one connectsto device two, device two connectsto device three, and so on to the last device, which connects back to device one. How many times computer reboot when server 2000 install? 2 times. How will you remove this error “ ntldr missing press any key to reboot the system” ? Reboot the system with XP, ( apply also on server2003,) cd On setup screen press to R to repair the window Now provide the administrator password C:>cd f:( your cd drive latter, f istaken as the example) f:>cd i386 f:>copy ntldr c: f:>exit reboot the system Why do we do networking? For data sharing To accumulate hardware resource What are the benefits of networking? There are lotsof advantagesfrom buildup a network, but the three big factsare- File Sharing From sharing filesyou can view, modify, andcopy filesstored on a different computer on the networkjust as easily as if they were stored on your computer. Resource Sharing Resources such as printers, fax machines, StorageDevices(HDD, FDD and CD Drives), Webcam, Scanners, Mod em and many more devicescan be shared. Program Sharing Just as you can share fileson a network, you can often also share program on a network. For example, ifyou have theright t ypeof software license, you can have a shared copy of Microsoft Office, or some other program,and keep it on the networkserver, from where it isalso run
  • 10. What is network? A network is basically all of the components(hardware and software) involvedin connecting computersacross small and large distances. What is networking? A process that is describeshow the network will connect. What is topology? A topology defineshow the devicesare connected. Further it isdividedin physical andlogical topology. What are the differences between FAT and NTFS ? FAT Doesn't provide local security Provide local security Doesn't provide disk quota Providediskquota Doesn't provide file compression Provide file compression Doesn't provide other security feature Provide other security feature Difference between XP home and XP professional ? Feature that isnot available inXP homeedition Remote Desktop Off line fileand folder Encrypting file system Group policy Roaming profile Remote installation Joining Domain The featureslisted aboveare only available in XP professional Which OSI layer does IP belong? P belongsto the Network Layer (layer 3) in the OSI model. What is a subnet mask? Subnet maskis a 4 byte (32 bit) number used to identify the sub-networkID and the host ID from an IP address. All the hostsin a sub- network will have the same subnet mask. E.g. 255.255.255.0, 255.255.127.0, 255.255.0.0 Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003? The scheme of PDC and BDC is replaced by The Active Directory in server 2000 and further. Now all domain controllers share a multi master peer-to-peer read and write relationship that hosts copies of the Active Directory. How can group policy be refreshed? 1. Restart the server 2. Leave the server ideal for 90 minute 3. Run ==> gpupdate (server 2003 only)
  • 11. What is LILO? LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory, and tell the system which partition and hard drive to boot from. I can't seem to access the Internet, don't have any access to the corporate network and on IP configuration on my address is 169.254.*.*. What happened? The 169.254.*.* net mask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing). We've installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it. The server must be authorized first with the Active Directory. What's the difference between local, global and universal groups? Domain local groupsassign access permissionsto domain groupsfor local domainresources. Global groupsprovide accessto re sources in entire domains. What's the major difference between FAT and NTFS on a local machine? FAT and FAT32 provide no security over locally logged-on users. Only native NTFS providesextensive permission control on both remote and local files. What is presentation layer and how it is responsible for in the OSI model? The presentationlayer establishesthe data formatprior to passing it along to thenetworkapplication'sinterface. TCP/IP networksperform thistask at the applicationlayer When were OSI model developed and why its standard called 802.XX and so on? OSI model wasdeveloped inFebruary1980that why these also known as 802.XX Standard (Notice80 means==> 1980, 2means==> February) What is Full form of ADS? Active Directory Structure How will you register and activate windows? If you have not activatedwindowsXP, you can do so at any time by clicking the windowsActivationiconin the system tray to initiate activation. Once you haveactivated windowsXP, thisicon disappearsfrom the system tray. For registration Start ==> Run ==> regwiz /r Where do we use cross and standard cable?
  • 12. Computer to computer ==> cross Switch/hub to switch/hub==>cross Computer to switch/hub ==>standard How many pins do serial ports have? In computer it'sknown as com port and could be available in9pin or 25 pin.On router it have 60 pins. How will check ip address on 98? Start ==> Run ==> command ==> winipcfg What is source route? It is a sequence of IP addresses identifyingthe routea datagram must follow. A source route may optionally be included in a nIP datagram header. What is RIP (Routing Information Protocol)? It is a simple protocol used to exchange information between therouters. What is SLIP (Serial Line Interface Protocol)? It is a simple protocol used for transmission of IP datagramsacross a serial line. What is Proxy ARP? It is using a router to answer ARP requests. Thiswill be donewhen the originating host believesthat a destination islocal, when infact islies beyond router. What is OSPF? It is an Internet routing protocol thatscaleswell, can route traffic alongmultiple paths, and usesknowledge of an Internet'stopology to make accurate routing decisions. What is Kerberos? It is an authentication service developed at the MassachusettsInstitute of Technology. Kerberosuses encryption to prevent i ntrudersfrom discovering passwords and gaining unauthorizedaccessto files. What is a Multi-homed Host? It is a host that has a multiple networkinterfacesand thatrequiresmultiple IP addresses is called asa Multihomed Host. What is NVT (Network Virtual Terminal)?
  • 13. It is a set of rulesdefininga very simple virtual terminal interaction. The NVT isused in the start of a Telnet session. What is Gateway-to-Gateway protocol? It is a protocol formerly used to exchange routinginformation betweenInternet core routers. What is BGP (Border Gateway Protocol)? It is a protocol used to advertise the set of networks that can be reached with inan autonomoussystem. BGP enablesthisinf ormation to be shared with the autonomoussystem. Thisisnewer than EGP (Exterior Gateway Protocol). What is autonomous system? It is a collectionof routersunder the control of a single administrativeauthority and thatusesa common Interior Gateway Protocol. What is EGP (Exterior Gateway Protocol)? t is the protocol the routersin neighboringautonomoussystems use to identify the set of networksthat can be reached withinor via each autonomoussystem. What is IGP (Interior Gateway Protocol)? It is any routing protocol used within an autonomoussystem. What is Mail Gateway? It is a system that performsa protocol translation betweendifferentelectronic mail delivery protocols. What is wide-mouth frog? Wide-mouth frog isthe simplest known key distributioncenter (KDC) authentication protocol. What is silly window syndrome? It is a problem thatcan ruin TCPperformance. Thisproblem occurswhen data are passed to the sending TCP entity in large bl ocks, but an interactive applicationon the receiving side reads1 byte at a time. What is region? When hierarchical routingisused, the routersare divided into what we call regions, with each router knowing all the detailsabout how to route packets to destinationswithin itsown region, but knowingnothing about theinternal structure of other regions. What is multicast routing?
  • 14. Sending a message to a group iscalledmulticasting, and itsroutingalgorithm iscalled multicast routing. What is traffic shaping? One of the main causesof congestion isthat traffic isoften busy. If hostscould be made to transmitat a uniform rate, congestion would be less common. Another open loopmethodto helpmanagecongestionisforcing the packet to be transmittedat a more predictable rate. This is called traffic shaping. What is packet filter? Packet filter isa standard router equipped with some extra functionality.Theextra functionality allowsevery incoming or outgoing packet to be inspected. Packetsmeetingsome criterion are forwardednormally. Those that fail the test are dropped. BOOTP helps a diskless workstation boot. How does it get a message to the network looking for its IP address and the location of its operating system boot files? BOOTP sendsa UDP message with a subnet work broadcast address and waitsfor a reply from a server that givesit the IP addre ss. The same message might containthe name of themachine thathasthe boot fileson it. If the boot image location isnot specified, the workstation sends another UDP message to query the server. What is a DNS resource record? resource record is an entry in a name server's database. There are several typesof resource records used, includingname-to-address resolution information.Resource recordsare maintainedasASCII files. What protocol is used by DNS name servers? DNS uses UDP for communicationbetweenservers. It is a better choice thanTCP because of the improved speed a connectionlessprotocol offers. Of course, transmission reliability sufferswith UDP. What is the difference between interior and exterior neighbor gateways? Interior gatewaysconnect LANsof one organization, whereasexterior gatewaysconnect theorganizationto the outsideworld. What is the HELLO protocol used for? The HELLO protocol usestime instead of distance to determineoptimal routing. It isan altern ative to the Routing Information Protocol. What are the three type of routing tables and What are the advantages and disadvantages of these? The three typesof routing tablesare fixed, dynamic, and fixed central. A fixed table must be manually modified every time there isa change. A dynamic tablechangesitsinformation based on networktraffic, reducing theamount of manual maintenance. A fixed central table letsa manager modify only one table, whichisthen read by other devices. The fixed central table reducesthe need to update each machine'stable, aswith the fixedtable. Usually a dynamic table causesthe fewest problemsfor a networkadmini strator, althoughthe table'scontentscan change without the administrator being aware of thechange.
  • 15. What is MAC address ? The addressfor a device asit is identifiedat the Media Access Control (MAC) layer in the networkarchitecture. MAC addressis usually stored in ROM on the networkadapter card and isunique. What is attenuation? The degenerationof a signal over distanceon a networkcable iscalled attenuation. What is cladding? A layer of a glass surrounding the center fiber of glassinside a fiber-optic cable. What is RAID? A method for providing faulttoleranceby using multiple hard disk drives. What is NETBIOS and NETBEUI? NETBIOS is a programming interface that allowsI/O requeststo be sent to and received from a remote computer and it hidesthe networking hardware from applications. NETBEUI is NetBIOS extendeduser interface.A transport protocol designed by Microsoft and IBM for the use on small subnets. What is redirector? Redirector is software that intercept What is Beaconing? The process that allowsa networkto self-repair networks problems. The stationson the networknotify the other stationson the ring when they are not receiving thetransmissions. Beaconingisused in Token ring and FDDI networks. What is terminal emulation, in which layer it comes? Telnet isalso called asterminal emulation. It belongsto application layer. What is frame relay, in which layer it comes? Frame relay isa packet switching technology. It will operate inthe datalinklayer. What do you meant by "triple X" in Networks? The function of PAD (Packet Assembler Disassembler) is described in a document known asX.3. The standard protocol hasbeen defined between the terminal andthe PAD, calledX.28; another standard protocol existsbetween hte PAD and thenetwork, called X.29. Together, these three recommendationsare often called "triple X".
  • 16. What is SAP? Seriesof interface pointsthat allow other computersto communicate withthe other layersof networkprotocol stack. What is subnet? A generic term for section of a large networksusually separated by a bridge or router. What is subnet mask? It is a term that makesdistinguish betweennetworkaddressand host address in IP address. Subnet maskvalue 0 defineshost partition in IP address and value 1 – 255 definesNetworkaddress. Describe Various Network Type Local Area Networks Local areanetworks(LANs) are used to connect networking devicesthat are in a very close geographic area, such as a floor of a building,a building itself, or a campusenvironment. Wide Area Networks Wide area networks(WANs) are used to connect LANstogether. Typically,WANsare used when the LANs that must be connected are separated by a largedistance. Metropolitan Area Networks A metropolitanarea network(MAN) is a hybrid betweena LAN and a WAN. Content Networks Content networks (CNs) were developedto ease users’ access to Internet resources. Companiesdeploy basically two types of CNs: 1.Caching downloaded Internet information 2.DistributingInternet traffic loadsacross multiple servers Storage Area Networks Storage area networks(SANs) provide a high-speed infrastructure to movedata betweenstorage devicesand file servers. Advantage Performance isfast. Availability ishigh because of the redundancy featuresavailable. Distances can span up to 10 kilometers. Managementiseasy because of the centralizationof data resources. Overhead islow (uses a thin protocol). Disadvantage of SANsistheir cost. Intranet An intranet isbasically a networkthat islocal to a company. In other words, users from within thiscompany can find all of their resources without having to go outside of the company. An intranet can includeLANs, private WANsand MANs, Extranet An extranet isan extended intranet, where certain internal servicesare made available to known external usersor external business partners at remote locations. Internet An internet isused when unknown external usersneed to access internal resourcesin your network. In other words, your compa ny might have a web site that sellsvariousproducts, and you want any external user to be able to accessthisservice. VPN A virtual privatenetwork(VPN) is a special type of secured network. A VPN is used to provide a secure connection acrossa p ublic network, such as an internet. Extranetstypically use a VPN to provide a secure connection between a company and itsknown external users or offices. Authentication isprovided to validatethe identitiesof the two peers. Confidentiality providesencryption of the data to keep it private from prying eyes. Integrity isused to ensure that the data sent between thetwo devicesor sites has not been tampered with.