Vous êtes sur la page 1sur 22

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

1)-What is wide-mouth frog? Ans- Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol. OR The Wide Mouth Frog protocol is a computer network authentication protocol designed for use on insecure networks (the Internet for example). It allows individuals communicating over a network to prove their identity to each other while also preventing eavesdropping or replay attacks, and provides for detection of modification and the prevention of unauthorized reading. 2)-What is PING utility? Ans- PING : Packet Internet Gropper it's a diagnostic utility , which diagnose devices connectivity. it use ICMP: Internet Control Messaging protocol to send echo requests ( usually 4 packets) and receive echo replies (4 packets) Ping is a computer network tool used to test whether a particular host is reachable across an IP network. It works by sending ICMP ?echo request? packets to the target host and listening for ICMP ?echo response? replies. Ping estimates the round-trip time, generally in milliseconds, and records any packet loss, and prints a statistical summary when finished. 3)-What is MAC address? Ans- MAC address is abbreviated form of Media Access Control.MAC address represent in hexadecimal format and it is 48 byte addressing scheme.eg:00-1cc0-69-87-81.So each quarter consists two 4 byte code and finally 48 bytes. The MAC address is stored within the NIC(Network Interface Card).And the main purpose of MAC address is to uniquely identify a system. The MAC address works in Layer 2(Data link layer) of ISO model. Where layer 2 is only associated with MAC address or Physical address. And the layer 2 device switch contains MAC address table to occur switching between source and destination. OR MAC address is a unique 48 bit serial number stored on the ROM carried by network card adapter which is used to identify a computer in a Ethernet network. 4)-What is RAID?

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

Ans- RAID standa for Redudant Array of Inexpensive Disk.A group of hard disks that operate together to improve performance or provide fault tolerance and error recovery through data striping, mirroring, and other techniques.

5)-What are the advantages an disadvantages of the three types of routing tables? Ans- The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be manually modified every time there is a change. A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine's table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the table's contents can change without the administrator being aware of the change. 6)-What are the different type of networking / internetworking devices? Ans- Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link. Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion. Routers: They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission.

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

Gateways: They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model. 7)-Why should we care about the OSI Reference Model ? What is the main purpose for creating this OSI model? Why it is a layered model? Ans- We Shud care about this model cuz this was the 1st model to be created for internet standard. so this is a internet standard model n all the standard made after this model follow all the rules of this model too Main purpose to create this model is sending data from one terminal to another terminal without ny loss in data It's layered model cuz every layer is used for some specific work n one layer is not capable to do all the things.

8)-What are 10Base2, 10Base5 and 10BaseT Ethernet LANs ? Ans- 10Base2?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments. 10Base5?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. 10BaseT?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling. All these 3 are related to Ethernet cables, where 10base2 can define as maximum rate of data transfer is 10megabits per second ,B stand for baseband signaling and 2 is for 200 meter of length... this is same for 10base5 but where in 10baset T stands for twisted pair of cable 9)-If you are given the IP address can u tell how many computers can be connected? What do you look at?

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

Ans- Depending on the address given (Class A, Class B, or Class C) you can determine how many hosts are available. This is also subject to whether the address is classless or classful. If it is classful the a Class C address can have 254 valid hosts, a Class B can have 64,534 and a Class A can allow over 16 million hosts! If the address is classless then more focus is on the subnet mask. To illustrate a quick example, if you had the subnet address 255.255.255.240, you know that it is a Class C address, but the last octet has been submitted. Converting 240 into binary gives 11110000. This means that 4 bits were used for sub netting (1111) and four bits are left for network addresses (0000). If you did all the possible ranges in binary, starting with 0000 and working all the way til 1111 you see that you get 16 binary instances. Knowing that you cannot use the first and last address you are left with 14, and since the .240 address splits the octet down the middle, you get 14 subnets and 14 valid hosts.

10)-Difference between the communication and transmission? Ans- Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc. Communication means the meaning full exchange of information between two communication media. 11)-What is the difference between TFTP and FTP application layer protocols? Ans- The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP. The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information. 12)-What is region?

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

Ans- When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions. 13)-What is the difference between physical address and logical address? Ans- A Physical address is a 48-bit flat address burned into the ROM of the NIC card which is a Layer1 device of the OSI model. This iis divided into 24-bit vendor code and 24-bit serial address. This is unique for each system and cannot be changed. A Logical address is a 32- bit address assigned to each system in a network. This works in Layer-3 of OSI Model. This would be generally the IP address. Simply we can say that Physical address is MAC address (Media Access Control) which inbuilt and Logical Address is the IP which is given manually. 14)-What is a VLAN?What does VLAN provide? Ans- VLAN is a technology by which we can administratively assign different ports of the same layer2 switch to different sub networks. This is particularly useful when different departments of a company have offices in different floors of the same office. The different departments can be connected via a layer2 switch , which is having configuration for other sub network also. So practically the same switch acts as if it is more than one. Packets destined for the specific sub network are forwarded to those ports only. But the switch does not make any routing decisions. For interconnecting different sub networks, routers are needed. VLAN essentially provides segmentation between different sub networks. 15)-What is difference between baseband and broadband transmission? Ans- In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously. In base band transmission we transmit digital signal without converting it into analog. here a low pass channel is used. In broad band transmission we transmit digital signal by converting it into analog. Here a band pass channel is used.

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

16)-What is SIP? how does it work? what are the alternatives if any? current and future practice and application standards? Ans- SIP is meant for Session Initiation Protocol. It works in application layer. It specially used for initiating, modifying and terminating a session. you can find all details in rfc3261. 17)-What are the Advantages and Disadvantages of DHCP? Ans- Advantages:All the IP configuration information gets automatically configured for your client machine by the DHCP server. If you move your client machine to a different subnet, the client will send out its discover message at boot time and work as usual. However, when you first boot up there you will not be able to get back the IP address you had at your previous location regardless of how little time has passed. Disadvantage:Your machine name does not change when you get a new IP address. The DNS (Domain Name System) name is associated with your IP address and therefore does change. This only presents a problem if other clients try to access your machine by its DNS name.

18)-Describe a 3-way TCP/IP Handshake. Ans- To establish a connection, TCP uses a 3-way handshake. Before a client attempts to connect with a server, the server must first bind to a port to open it up for connections: this is called a passive open. Once the passive open is established then a client may initiate an active open. To establish aconnection, the 3-way (or 3-step) handshake occurs: The active open is performed by sending a SYN to the server. In response, the server replies with a SYN-ACK. Finally the client sends an ACK back to the server. At this point, both the client and server have received an acknowledgement of the connection.

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

when we want to connect to server for communication we need to establish a connection between server and client. The procedure used for this is called 3-way handshake...this is described as follows 1. Initillay the server is ready to accept the incoming connection by binding to local port. This is called passive open. 2. The client now can connect to server by sending SYN J segment to server. The server responds with SYN J+1 and ACK K 3. At the end the client sends ACK K+1 to server.. At this stage we say that client and server are connected

19)-What is a difference between switch and Hub? Ans- HUB is layer 1 device which do not breaks collision domain.ie if more devices are added the bandwith will be shared. SWITCH is layer 2 device which breaks collision domain.ie every device connected to the switch has the equal bandwidth. A hub contains multiple ports. When a packet arrives at one port, it is copied to all the ports of the hub. When the packets are copied, the destination address in the frame does not change to a broadcast address. It does this in a rudimentary way, it simply copies the data to all of the Nodes connected to the hub. Switches are a marketing term that encompasses routers and bridges, as well as devices that may distribute traffic on load or by application content a device that operates simultaneously at more than one of these layers is called a multilayer switch. 20)-What is SAP? Ans- Series of interface points that allow other computers to communicate with the other layers of network protocol stack. 21)-What do you meant by "triple X" in Networks? Ans- The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X".

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

22)-What are the data units at different layers of the TCP / IP protocol suite? Ans- The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media. Transport Layer : Segment Network Layer : Packets Data Link layer : Frame Physical Layer : Bits 23)-Difference between bit rate and baud rate?

Ans- Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits. baud rate = bit rate / N where N is no-of-bits represented by each signal shift.

24)-Explain the function of Transmission Control Block Ans- A TCB is a complex data structure that contains a considerable amount of information about each connection. 25)-What are the types of Transmission media? Ans- Signals are usually transmitted over some transmission media that are broadly classified in to two categories:Guided Media: These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

and transports signals in the form of light. Unguided Media: This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony. 26)-What is Bandwidth? Ans- Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth. bandwidth is the maximum of data or frequency of signals can be carried over the link in sec. 27)-What is ICMP? Ans- ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages. ICMP stands for internet control message protocol used to get a reply from the destination node for ping command , 28)- What is the Network Time Protocol ? Ans- The Network Time Protocol (NTP) is a protocol for synchronising the clocks of computer systems over packet-switched, variable-latency data networks. NTP uses UDP as its transport layer. It is designed particularly to resist the effects of variable latency. RAID - Redundant Array of Independent / Inexpensive Disks.normally it have 6 level from 0 to 5.it is for improving the speed of storing & accesing of data

29)- What is subnetting? why is it used? Ans- A portion of a network that shares a common address component. On TCP/IP networks, subnets are defined as all devices whose IP Address have the same prefix. For example, all devices with IP addresses that start with

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

100.100.100. would be part of the same subnet. Dividing a network into subnets is useful for both security and performance reasons. IP networks are divided using a subnet mask 30)- What does the Mount protocol do ? Ans- The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request. 31)- What is frame relay, in which layer it comes? Ans- Frame relay is a packet switching technology. It will operate in the data link layer. 32)- What is difference between ARP and RARP? Ans- The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address. ARP-Address resulution protocol Used to find the physical address if it knows the logical address. RARP-Reverse address resolution protocol Used to find the logical address if it knows the physical address. 33)- What is Proxy ARP? Ans- It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router. 34)- What is cladding? Ans- A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

35)- What is the HELLO protocol used for? Ans- The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol. The HELLO protocol initialize & wait for ack 36)-What is attenuation? Ans- The degeneration of a signal over distance on a network cable is called attenuation. Attenuation means signal loose some of its energy during transmission. so we need to amplify the signal before it becomes very weak. 37)-Explain 5-4-3 rule? Ans- In a Ethernet network, between any two points on the network, there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated. 38)- How Gateway is different from Routers? Ans- A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats 39)- The middleware buliding block runs on both the client and server sides of an application? Ans- * Transport stack * Network OS * Service-specific middleware. 40)- Explain the building blocks of Client/Server? Ans- The client side building block runs the client side of the application. The server side building block runs the server side of the application. 41)- What are all the Base services provided by the OS? Ans- * Task preemption * Task priority * Semaphores * Interprocess communications (IPC) * Local/Remote Interprocess communication * Threads

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

* Intertask protection * Multiuser * High performance file system * Efficient memory management and * Dynamically linked Run-time extensions. 42)- What is the purpose of exchanging beginning sequence numbers during the the connection in the TCP client-server model? Ans- To ensure that any data lost during data transfer can be retransmitted. 43)- What are the main components of Transaction-based Systems? Ans- * Resource Manager * Transaction Manager and * Application Program.

44)- What is Message Oriented Middleware (MOM)? Ans- MOM allows general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate over networks by simply putting messages in the queues and getting messages from queues. It typically provides a very simple high level APIs to its services. MOM's messaging and queuing allow clients and servers to communicate across a network without being linked by a private, dedicated, logical connection. The clients and server can run at different times. It is a post-office like metaphor. 45)- Given a Class B Network with subnet mask of 255.255.248.0 and a packet addressed to 130.40.32.16, what is the subnet address? Ans- Take the 2 addresses, write them in binary form, then AND them. The answer is 130.40.32.0 46)- What is meant by Symmentric Multiprocessing (SMP)? Ans- It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided into threads that can run concurrently on any available processor. Any processor in the pool can run the OS kernel and execute user-written threads. 47)- What are Service-specific middleware?

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

Ans- It is needed to accomplish a particular Client/Server type of services which includes:* Database specific middleware * OLTP specific middleware * Groupware specific middleware * Object specific middleware * Internet specific middleware and * System management specific middleware. 48)- What are called Fat clients and Fat servers? Ans- If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal software. If the bulk of the application runs on the Server side, then it is Fat servers. It tries to minimize network interchanges by creating more abstract levels of services.

49)- What is meant by Horizontal scaling and Vertical scaling? Ans- Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers.

50)- What is Load balancing? Ans- If the number of incoming clients requests exceeds the number of processes in a server class, the TP Monitor may dynamically start new ones and this is called Load balancing. 51)- TP Monitor does mainly two things extremely well. They are Process management and Transaction management.? Ans- They were originally introduced to run classes of applications that could service hundreds and sometimes thousands of clients. TP Monitors provide an OS - on top of existing OS - that connects in real time these thousands of humans with a pool of shared server processes. 52)- What is terminal emulation, in which layer it comes? Ans- Telnet is also called as terminal emulation. It belongs to application layer

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

53)- What is Beaconing? Ans- The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks. 54)- What is meant by Asymmetrical protocols? Ans- There is a many-to-one relationship between clients and server. Clients always initiate the dialog by requesting a service. Servers are passively awaiting for requests from clients. 55)- What is redirector? Ans- Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer. 56)- What are the types of Transparencies? Ans- The types of transparencies the NOS middleware is expected to provide are:* Location transparency * Namespace transparency * Logon transparency * Replication transparency * Local/Remote access transparency * Distributed time transparency * Failure transparency and * Administration transparency. 57)- What is supernetting?why it is used? Ans- Supernetting refers to increase host and reduce the subnet's. It mean reduce the network bits and increase the host bits. We do use supernetting because when the PCs in the network increase where we need the more valid IP's in the same network. 58)- What is a Multi-homed Host? Ans- It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host. 59)- What is NVT (Network Virtual Terminal)?

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

Ans- It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session. 60)- What is Brouter? Ans- Hybrid devices that combine the features of both bridges and routers. 61)- What is Protocol Data Unit? Ans- The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame). 62)- What is Gateway-to-Gateway protocol? Ans- It is a protocol formerly used to exchange routing information between Internet core routers. 63)- Whatz the difference between DNS and WINS? Ans- DNS- Domain Name Server or Services. WINS- Windows Internet Name Service. DNS is resolve the web site name to IP address or you can say. In WINS used a file name those is LMhost, this file in the System32, and when we put the websit name and its IP address, then it resolve the particular IP address those insert in the LMhost file. 64)- What is External Data Representation? Ans- External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent. 65)- What is SLIP (Serial Line Interface Protocol)? Ans- It is a very simple protocol used for transmission of IP datagrams across a serial line. 66)- What is Recovery Console?

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

Ans- Recovery Console:That helps you restore your operating system when you cannot start your system.

67)- What is ERD(Emergency Repair Disk)? Ans- Emergency Repair Disk, an ERD is a diskette that creates backups of important system files and settings and is used to help troubleshootand fix issues for Microsoft WINNT and WIN 2000. The ERD is used in conjunction with the Windows repair option and you will be prompted for the diskette when needed. Note: The ERD is not to be confused with a standard boot diskette as it cannot be used alone. The ERD is capable of performing such checks as: 1. Verifying the boot sector is not corrupt. 2. Repairing any startup files. 3. Locate any missing or damaged system files. 68)- What is an email client? what is differnce between email client and web mail? Ans- Email ClientEmail clients download your emails onto your computer. Using a specialized email program such as Outlook Express or Apple Mail has the advantage of giving you complete control over your email; every email you receive is placed on your computer and you can keep as many large file attachments as you want. WebmailIf you host with Needmore Designs, you have a limited amount of space available for your web mailbox. For daily use, you will want to use anemail client. Nevertheless, you might find that you want to check your email while traveling. Checking your email through our webmail is similar to using Hotmail or YAHOO! Mail. You never actually copy your messages to your computer; in fact, you are looking at them through your web browser on somebody else's computer. When you are not online, you are not able to see your email. 69)- What is the difference between interior and exterior neighbor gateways? Ans- Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

70)- Name three network tools used to determine where a network connectivity is lost between two sites A&B? Ans- PING TRACEROUTE PATHPING 71)- What difference between a directory and active directry? Ans- An Directory is the database that holds information about component locations, users, groups, passwords, security, and other COM information. Some of this information is currently stored in the Registry, but will eventually (with Windows 2000) be moved to the Active Directory. 72)- If a person is accessing his corporate network from home, how is the connection established and how does the data flow from internet to intra net? Ans- If u want to access ur corporate network from ur public network(internet) u have to use VPN. It carries the data in a secured mode in public network. For this u need to install VPN software n u need some authentication for that from u r company. Now a days u can access ur internal site from normal internet.It is with this kind of secured con nection only. If u want to know more abt this, search regarding VPN in Google u can finds tonns of data. 73)- How do you ping from one host to another in IPv6 without ARP? Ans- By using the Neighbors Discovery Protocol (NDP) 74)- What is OSPF? Ans- It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions. Its administrative distance is 110 75)- What is logical link control? Ans- One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

76)- What is silly window syndrome? Ans- It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time. 77)- What is piggy backing? Ans- Piggybacking is gaining access to restricted communication channel by using session that another user has already established. Piggybacking can be defeated by logging off before leaving a workstation or terminal or by initiating a protected mode, such as via a screensaver, that requires re-authentication before access can be resumed. 78)- Which protocol is used for retrieving mails? Ans- POP3 - download emails into your PC / Outlook IMAP - we can access email from webserver, it not store on your PC 79)- Can we use static and dynamic routing in one network? Ans- we can use static and Dynamic Routing in one network. However Dyanmic Routing is used to have the best path no matter what the status of the physical links.All routing protocols have some sort of shortest-path or lowest-cost or bestchoice algorithm to help you weigh all the options available. Static routing can be used in a small network to reduce the work of the network administrator or to use a particular route only to forward the packet; we need static routing. 80)- What is point-to-point protocol? Ans- A communications protocol used to connect computers to remote networking services including Internet service providers. 81)- What is .ost file? Ans- In Microsoft Office Outlook 2003, a new offline folder file format is introduced that offers greater storage capacity for items and folders and supports multilingual Unicode data. An offline file folder is used to keep a local copy of your Exchange Server mailbox on your computer. The items in your .ost file are synchronized with the server when a connection is available.

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

82)- What is meant by transparency of location servers? Ans- Location transparency : Users and client/server applications can access resources by referring to their logical names, without knowing their location. DCE directory services provide dynamic server identification and location within the network. Resources can be moved or reconfigured as required without affecting programs or the people who use those resources. 83)- How many server connecting to lan server connection? Ans- You can connect as many as you can.But the thing is number of server should be increased and should be strong by using linux,unix 84)- What is the difference between routable and non- routable protocols? Ans- Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router. 85)- What is a File server? Ans- File servers are useful for sharing files across a network. With a file server, the client passes requests for file records over nerwork to file server. 86)- What are the functions of the typical server program? Ans- It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiates and runs background task activity. Keeps running. Grown bigger and faster. 87)- What are called Non-GUI clients, GUI Clients and OOUI Clients? Ans- Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction. GUI Clients: These are applicatoins, where occassional requests to the server result from a human interacting with a GUI (Example: Windows 3.x, NT 3.5) OOUI clients : These are applications, which are highly-iconic, object-oriented user interface that provides seamless access to information in very visual formats. (Example: MAC OS, Windows 95, NT 4.0) 88)- command will delete a file in linux Ans- m or rm -rf this both command will delete a file

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

89)- What are all the Extended services provided by the OS? Ans- * Ubiquitous communications * Network OS extension * Binary large objects (BLOBs) * Global directories and Network yellow pages * Authentication and Authorization services * System management * Network time * Database and transaction services * Internet services * Object- oriented services 90)- What are the possible ways of data exchange? Ans- (i) Simplex (ii) Half-duplex (iii) Full-duplex. 91)- How does Asynchronous Transfer Mode (ATM) work? Ans- ATM works by transmitting all traffic in small, fixed-sized cells. These small, fixed-size cells reduces queuing delay and can be switched quickly. ATM fits into layer 2 of the OSI model and provides functions for framing and error correction. At the port interface, ATM switches convert cells into frames, and vice versa. ATM provides Quality of Service and traffic shaping. 92)- What are the Classification of clients? Ans- Non-GUI clients - Two types are:1. Non-GUI clients that do not need multi-tasking (Example: Automatic Teller Machines (ATM), Cell phone) 2. Non-GUI clients that need multi-tasking (Example: ROBOTs) GUI clients OOUI clients 93)- What are called Fat clients and Fat servers? Ans- If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal software.

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

If the bulk of the application runs on the Server side, then it is Fat servers. It tries to minimize network interchanges by creating more abstract levels of services. 94)- What is a Multi-homed Host? Ans- It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host.

95)- What are major types of networks and explain? Ans- Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources. Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration. 96)- What is fragmentation of a packet ? Ans- Frames Packet data unit(PDU)is called ---------------segment at transport layer packet at a network layer frame at data link and bit/bytes at physical layer 97)- What is Recovery Console? Ans- Recovery Console:That helps you restore your operating system when you cannot start your system. 98)- What is the difference between interior and exterior neighbor gateways? Ans- Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.

TECHNICAL QUESTION BANK

COMPUTER SCIENCE
COMPUTER NETWORKS

99)- What is a DNS resource record? Ans- A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files. 100)- What is the difference between POP3 and IMAP Mail Server? Ans- POP3 is Email clients download your emails onto your computer. Using a specialized email program such as Outlook Express or Apple Mail has the advantage of giving you complete control over your email; every email you receive is placed on your computer and you can keep as many large file attachments as you want. IMAP is protocol that is being used in webmail. Checking your email through our webmail is similar to using Hotmail or YAHOO! Mail. You never actually copy your messages to your computer; in fact, you are looking at them through your web browser on somebody else's computer. When you are not online, you are not able to see your email.

Vous aimerez peut-être aussi