- What is a ‘router’?
Ans. A router is a device that forwards data packets along with a network.
- What is a ‘protocol’ in networking?
Ans. A protocol in networking is a set of invisible computer rules that enable two devices to connect and transmit data to one another.
- Differentiate between a switch and a hub
Ans. Switches are used at the data link layer, while hubs are used at the physical layer.
- How many layers are there in an OSI reference model? Name them.
Ans. There are 7 layers in an OSI (Open Systems Interconnection) reference model. They are:
- Physical layer
- Data link layer
- Network layer
- Transport layer
- Session layer
- Presentation layer
- Application layer
- Explain the difference between a ‘broadcast domain’ and a ‘collision domain’?
Ans. A broadcast domain is a logical division of a computer network, in which all nodes can reach others by broadcast at the data link layer.
A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium or through repeaters.
- What is the size of an IP address?
Ans. 32 it for IPv4 and 128 bit for IPv6.
- What is a DLCI?
Ans. DLCI (Data Link Connection Identifiers) are used to uniquely identify each virtual circuit that exists on the network.
- Name different types of networks
Ans. There are two different types of networks – 1) peer-to-peer and 2) server-based.
- What is the difference between a ‘half-duplex’ and a ‘full-duplex’ system?
Ans. In a half-duplex system, communication takes place in only one direction, while in a full-duplex system, communication takes place in both directions.
- What is PoE (Power over Ethernet)?
Ans. Power over Ethernet (PoE) refers to the technology which allows electric power along with data on Ethernet cabling.
- Explain the use of ‘ping’ command?
Ans. Ping (Packet Internet Groper) is a computer network tool that is used to test whether a particular host is reachable across an IP network.
- Explain ‘round-trip time’?
Ans. Round-trip time, or round-trip delay, is the time required for a packet to travel from a specific source to a specific destination and back again.
- What is the difference between public and private IP?
Ans. Public IP is used across the internet, while private IP is used within the local LAN.
- What is the difference between ‘cross cable’ and ‘straight cable’?
Ans. Cross cables connect the same group devices while straight cables connect different group devices.
- At which layer of OSI does frame relay technology work?
Ans. At the data link layer.
- What is the size of a Cisco ping packet?
Ans. The size of a Ping packet in Cisco by default is 100 bytes.
- How many VTP modes are in a switch? Name them.
Ans. There are three types of VTP modes. They are – server, client, and transparent.
- Explain the difference between static and dynamic IP addressing?
Ans. Dynamic IP addresses can change every time a device connects to the internet. Static IP addresses are reserved. They do not change with time.
- What is ‘subnet’?
Ans. Subnets are used in IP networks to optimize the performance of a network because it reduces traffic by breaking a large network into smaller networks.
- What does MTU stand for? What is the default size?
Ans. MTU stands for the maximum transmission unit. The default MTU size is 1500 bytes.
- When does network congestion occur?
Ans. Network congestion happens when applications send more data than the network devices like routers and switches can accommodate. This is a common occurrence when many users try using the same bandwidth.
- What is the LLC sublayer and what is its function?
Ans. LLC is an abbreviation for Logical Link Control and it offers optional services to application developers. These options include providing flow control to the network layer by using stop/start codes. It also corrects an error in the network.
- What is BootP?
Ans. BootP or Boot Program is a protocol for booting diskless workstations in a network. These diskless workstations use BootP to determine their own as well as a server’s IP address.
- What is 100BaseFX?
Ans. 100BaseFX is a version of Fast Ethernet that uses fiber optic cable as the main transmission medium for wiring campus backbones. 100 stands for data speed in Mbps.
- What is HDLC?
Ans. HDLC stands for High-Level Data-Link Control protocol. It is a popular ISO-standard, bit-oriented, Data Link layer protocol for transmitting data. It is applicable for both point-to-point and point-to-multipoint communications.
HDLC organizes data into frames that allow the devices to control the data flow. The frame is transmitted via the network to the destination that verifies its successful arrival.
Some of the benefits of HDLC are:
- Supports both half and full-duplex communication.
- Offers full data transparency.
- Offers flexibility, reliability, and efficiency of operation for synchronous data communication.
- Supports both synchronous and asynchronous communication.
- Explain VLAN.
Ans. It is the abbreviation for Virtual Local Area Network. It provides data link connectivity for a subnet.
- What are the benefits of using VLANs?
Ans. There are three primary benefits of using VLANs, which include –
- Security, reduced number of trunk links
- Reduced costs
- Allows creating collision domains other than physical locations
- What is latency?
Ans. It is the expression of time taken for a data packet to move from one designated point to another.
- Can you tell me which the second layer of an OSI layer model is?
Ans. Data link layer is the second layer of an OSI model.
- What is BOOTP?
Ans. It is the short form of Bootstrap Protocol. BOOTP is a computer networking protocol, used in IP networks for automatically assigning an IP address to network devices from a configuration server.
- Tell me the easiest way to remotely configure a router?
Ans. To configure a router remotely, the most popular and easy way is using Cisco AutoInstall Procedure. However, it should ensure that the router is connected to the WAN or LAN.
- What is Route Poisoning?
Ans. Route Poisoning is the process of making a route unreachable by inserting a table entry of 16 to it. This is done to prevent the problems of inconsistent updates on a route.
- Name different types of passwords that can be used to secure a CISCO router?
Ans. 5 types of passwords can be used to secure a CISCO router, and these are –
- Console
- Aux
- VTY
- Enable password
- Enable secret
- Why should we use network segmentation to manage a large network?
Ans. Segmenting a network helps to ease network traffic and ensures that users receive high bandwidth at all times. This translates to better performance, especially for a growing network.
- Which IP address is used for loopback address and why?
Ans. 127.0.0.1 is used for the loopback address. A loopback address is a special IP address that a network administrator uses to treat the local machine as a remote machine. It is also used for local testing. Any traffic sent by a computer program on the loopback network is addressed to the same computer.
- Explain the different memories used in a CISCO router.
Ans. The following are the different memories used in a CISCO router:
- NVRAM (Non-Volatile Random Access Memory) – It stores the startup configuration file.
- DRAM (Dynamic Random Access Memory) – It stores the configuration file that is being executed.
- ROM (Read Only Memory) – It is the bootstrap software that runs and maintains instructions for POST diagnostics.
- Flash Memory – It stores the Cisco IOS.
- What is the difference between User Mode from Privileged Mode?
Ans. The differences between User Mode from Privileged Mode are:
User Mode | Privileged Mode |
It is used for the regular task while using a Cisco router. | Offers a lot of options, including those available in User mode. |
It enables you to view system information, connect to remote devices, check the status of the router, and more. | It allows users to make configurations on the router, such as making tests and debugging. |
- What is CDP? Explains its functions.
Ans. CDP stands for Cisco Discovery Protocol. It is a Layer 2 proprietary protocol that runs on Cisco devices including routers and switches. This protocol collects information about directly connected neighboring devices.
It discovers the nearby devices, identifies how they are configured, and enables the systems to learn about each other by using different network-layer protocols. CDP simplifies the process of keeping an up-to-date inventory of Cisco network devices.
The CDP finds out the following information:
- iOS version running on Cisco devices
- IP addresses
- Hardware platform of devices
- Interface details
- Hostname
- VTP domain
- Duplex setting
- Native VLAN
- How is TCP (Transmission Control Protocol) different from UDP (User Datagram Protocol)?
Ans. The difference between TCP and UDP are:
TCP (Transmission Control Protocol) | UDP (User Datagram Protocol) |
It is a connection-oriented protocol. | It is a connectionless protocol. |
The connection should be established before the data is transmitted over the network. | It sends the data without checking whether the system is ready to receive it or not. |
Delivery of data to the destination router is guaranteed. If the connection is lost during transferring files, the server would request the lost part. | It doesn’t guarantee the delivery of data to the destination. |
The message will be delivered in the order it is sent. | The message may not be delivered in the same order. |
It doesn’t support broadcasting. | It supports broadcasting. |
Data is read as a stream. When one packet ends, another begins. | Data Packets are transmitted individually. |
Header size is 20 bytes. | Header size is 8 bytes. |
It is slower than UDP | UDP is faster and more efficient than TCP |
This protocol is mainly used where a secure communication process is required. Example: web browsing and e-mail. | This protocol is used when fast communication is required. Example: VoIP, video, and music streaming. |
- What is LAN switching? What are its benefits?
Ans. LAN Switching is a form of packet switching used in Local Area Networks. It is a vital component of most networks and helps to improve the overall efficiency of LAN and address the existing bandwidth issues. It enables multiple users to communicate directly with each other. LAN switching creates a system of simultaneous, point-to-point connections between pairs of devices. It provides a collision-free network and high-speed networking.
The following are the benefits of LAN Switching:
- Increased network scalability
- Improved bandwidth performance
- Multiple simultaneous connections
- Reduced congestion and transmission delay
- No single point of failure
- Full-duplex data transmission
- Improved manageability and security
- Explain the terms Unicast, Multicast, Broadcast
Ans. In all these three terms, ‘cast’ refers to the transmission of data packets from the client to the recipient over the communication channel.
- Unicast (One-to-One):
It is a one-to-one communication technique, in which data communication takes place between a single sender and a single recipient in the network.
Examples of Unicast are:
- Browsing a website. The webserver is the sender and your computer is the receiver.
- Downloading a file from an FTP Server. FTP Server is the sender and your computer is the receiver.
- Broadcast (One-to-All):
It specifies one to all communication. Data communication takes place among all the devices available in the network. The data is sent from one computer once and a copy of that data will be forwarded to all the connected devices. Two types of Broadcast are: Limited Broadcasting and Direct Broadcasting.
Example of Broadcast:
- Television networks for video and audio distribution.
- Multicast (One-to-Many):
Multicast specifies one to group or one to many communication. In Multicast, one or more senders and one or more recipients participate in data transfer. IP multicast traffic is sent to a group and only members of that group receive the Multicast traffic. It uses IGMP (Internet Group Management Protocol) protocol to identify the group.
Examples of Multicast:
- Sending an e-mail to a particular mailing group.
————————————————————————————————————–