Vous êtes sur la page 1sur 5

1) What is router Router is a layer 3 device which is used to connect 2 or more networks or subnets.

Its is device used to filter or route interesting traffic through it. This device is also called a gateway. Routers break up broadcast domains. Routers also break up collision domains. Routers also provide connections between Virtual LANs (VLANs). 2) Difference between PAP and CHAP PAP stands for password auth. protocol. It is commonly used in internet and it sends password as clear text rather than encrypted format. CHAP stands for challenge handshaking auth. protocol. It sends password in secure encrypted format using MD5 algorithm. 3) Difference between HUB and Switch HUB 1) It is a layer 1 device 2) It is simply a multi-port repeater 3) Cannot be used to configured for VLAN 4) Lower in transmission than Switch because Of high broadcast and collision 5) Single collision and single Broadcast domain 6) No facility for loop avoidance Switch 1) It is a layer-2, layer 3, layer 4 device 2) It reduce broadcast 3) Can be used to configured VLAN 4) Faster in transmission than HUB as less broadcast and collision 5) Every port is single collision domain An entire switch is single broadcast domain 6) Contain STP protocol for loop avoidance

4) What is Nating? It is an algorithm instrumental in minimizing the requirement for globally unique IP addresses, permitting an organization whose addresses are not all globally unique to connect to the Internet, regardless, by translating those addresses into globally routable address space. In simple language Nating is used to convert non-routable or private IP address to global IP for global communication. 5) Difference between RIP and IGRP RIP 1) RIP is an industry standard routing protocol 2) RIP used hop count method for selecting the best route path 3) RIP use maximum of 15 hops 4) Less reliable than IGRP IGRP IGRP is a Cisco proprietary protocol IGRP use distance vector algorithm along with cost to determine the best route path IGRP use maximum of 255 hops More reliable than RIP

5) Subnet and Subnet Mask

subnetwork : Any network that is part of a larger IP network and is identified by a subnet address. A network administrator segments a network into subnetworks in order to provide a hierarchical, multilevel routing structure, and at the same time protect the subnetwork from the addressing complexity of networks that are attached. Also known as a subnet. In simple language a network when divided in to multiple logical parts or sub-networks using IP address and subnet mask is called as subnet. For each subnet to communicate with each other we require a Router or Gateway which connect each subnet. subnet mask : Also simply known as mask, a 32-bit address mask used in IP to identify the bits of an IP address that are used for the subnet address. Using a mask, the router does not need to examine all 32 bits, only those selected by the mask. In simple language, subnet mask defines which portion of your IP address represents network ID and Host or Client ID. 6) System Policy Editor System policy editor is a utility used in Windows NT 4.0 environment for configure user environmental setting like desktop, appearance, enabling and disabling various tools like registry editing, etc. It is normally used to restrict user from performing unnecessary task. A simple policy setting are stored in a file called as NTCONFIG.POL (for Win NT 4.0) or CONFIG.POL (for Win 9x). This file is located in Net logon Share.

7) ERD (Emergency Repair Disk) ERD is disk used to repair a damage or non functional windows NT 4.0 server. We can create this disk at time of installation and update it accordingly using Rdisk.exe utility. ERD is not a bootable disk. To repair a Windows NT 4.0, we need a bootable disk and ERD. We can also back up the system registry and SAM (Security Accounts Manger) database in ERD using RDISK.EXE S command. 8) Booting files of Windows NT 4.0 The booting files of windows NT 4.0 are a) NTLDR : (called as kernal and which is first initilized during booting) b) BOOT.INI : (it contains the ARC path to select the operating systems and location of systemroot folder (i.e WINNT folder) ) c) NTDETECT.COM : (it is a file used to detect your hardware while booting) d) NTBOOTDD.SYS : (it is a file used as drivers for SCSI Hard disk is NT is installed on SCSI disk) 9) Proxy Server Proxy Server combines the simplicity of Network Address Translation with the flexibility and control to help communication on WAN network.Proxy server is nothing but a advance feature of Internet connection sharing (ICS) where multiple private network PC using a common Global IP addresing to communicate on WAN network. Nows-a-days, Proxy severs also as features like filtering which act a firewall to safeguard or network.

10) What is Classless IP A Superneted or subneted IP address is called as Classless IP. eg. A IP address which belongs to Class A but have different subnet mask. Classless IP address concept is used inorder to save IP addresses from being wastage. 11) Access List Access lists are essentially lists of conditions that control access or helps to pass or forward interesting traffic through a router. Access List also act as Firewall for preventing uninteresting traffic to forward or discard. With the right combination of access lists, network managers will be armed with the power to enforce nearly any access policy they can invent. The two commonly used access list are IP access list and IPX acces list. 12) MRTG (Multi Router Traffic Grapher)

13) BGP (Border gateway protocol) BGPv4 is an exterior routing protocol. BGP is one of the most complex routing protocols used to connect multiple autonomous systems. BGP also helps in finding and distributing route information. 14) AS (Autonomous System) A group of networks under mutual administration that share the same routing methodology. In simple language autonomus sytem in nothing but grouping of router inorder to manage replication of routing table in a same AS network. 15) What is subnetting / Supernetting Subnetting is nothing but borrowing host ID from network ID Supernetting is nothing but borrowing Network ID from host ID 16) VLAN (Virtual LAN) Virtual Local Area Network (VLAN) is a logical grouping of network users and resources connected to defined ports on a switch. By creating VLANs, you are able to create smaller broadcast domains within a switch by assigning different ports in the switch to different subnetworks. A VLAN is treated like its own subnet or broadcast domain. This means that frames broadcasted onto a network are only switched between ports in the same VLAN. Router is a device used to connect two VLAN. 17) Exchange Server / Lotus notes Both exchange server / lotus domino are mail servers user for storing mailbox of recipient. Exchange server is a mail server while outlook and outlook express are commonly used client for it. While lotus domino is mail server and lotus notes is client for it. 18) Print server Print server is usually a PC to which a printer is connected and which is shared among many users in a network for printing. Now-a-day a dedicated Printer is used called as Network Interface Pirinter which has its work NIC and IP and which act as a node in a network. DLC protocol is used to configure such printers. 19) RAID Level There are total of 54 RAID level of which three RAID levels are commonly used. They are

RAID 0 (stripeset without parity) : Min 2 HD, max 32 HD No wastage of space

Inequal size of hard disk High read/write performance No fault tolerance RAID 1 (mirroring / duplexing) : Min 2 , max 2 50% wastage of space no performance increase fault tolerance equal size of disk space RAID 5 (stripeset with parity) Min 3 , max 32 Wastage of parity space Equal size of disk space from all hard disk High read performance Fault tolerance 20) Cabling CAT 1 : Category 1 unshielded twisted-pair (Cat 1 UTP) is a voice-grade only communication medium that should not be used as network media. CAT 2 : Category 2 unshielded twisted-pair (Cat 2 UTP) is a voice- or data-grade medium that is rarely used in modern networks but that does have the rating to transmit up to 4 Mbps. CAT 3 : Category 3 unshielded twisted-pair (Cat 3 UTP) is a voice- or data-grade medium that can transmit at 10 Mbps and that supports lOBaseT networking. CAT 4 : Category 4 unshielded twisted-pair (Cat 4 UTP) supports voice or data but is capable of a 16 Mbps transmission rate. CAT 5 : Category 5 unshielded twisted-pair (Cat 5 UTP) is the most popular installation medium today; this media type supports 100 Mbps transmission rates, but new standards attempt to achieve 1000 Mbps over CAT 5 cabling. 21) TFTP Backup TFTP is a protocol use for file transfer like FTP but the difference is that it uses UDP protocol while FTP used TCP protocol. TFTP uses less overheads as compare to FTP. Cisco used TFTP to backup IOS and configuration. Command to backup startup config to TFTP server Router(config)# copy startup-config tftp Command to restore startup config from TFTP server Router(config)# copy tftp startup-config 22) Various types of Ports and Port No. POP3 110

FTP TFTP SMTP SNMP HTTP TELNET

21 69 25 80 23

23) PPP (point-to-point protocol) PPP (Point-to-Point Protocol) is a data-link protocol that can be used over either asynchronous serial (dial-up) or synchronous serial (ISDN) media and that build and maintain data-link connections. The basic purpose of PPP is to transport layer-3 packets across a Data Link layer point-to-point link. 24) POP3 / SMTP POP3 is a protocol used to receiving e-mails SMTP is used to sends e-mails 25) PDC / BDC PDC (primary domain controller) it is a first pc install while creating a domain. PDC is nothing but a server or domain controller which auth. User logon. In a domain we can have only one pdc BDC (backup domain controller) are also servers or domain controller which auth. Users logon. BDC is normally used for load balancing and we can have multiple BDC in a domain according to requirement of company. 26) Types of Router Memory a) Flash : Contains IOS b) ROM : Contains Bootable version of IOS to boot the router c) DRAM : Contains running configuration of Router d) NVRAM : Contains start-up configuration of Router 27) Routing and Routed protocols Routing protocols are protocols, which does routing of packets based on Layer-3 address. While routed protocols are protocols which as the layer-3 address and has ability to route. NETBEUI is not routable protocols because it does not have any layer-3 address. Routing protocols RIP IGRP OSPF BGP EIGRP Routed protocols TCP/IP IPX/SPX AppleTalk

1) 2) 3) 4) 5)

Vous aimerez peut-être aussi