नवीन पोस्ट..

Complete Blender Course for Beginners – Creating a Knife Set.

Image
  Complete Blender Course for Beginners – Creating a Knife Set Complete Blender Course for Beginners – Creating a Knife Set What You will Learn :- Use Blender 3.2 and in general understand it's interface 3D Modeling UV Unwrapping Create materials with free PBR textures Lighting using Easy-HDRI You learn retopoligy for small parts of the models GET ON UDEMY JOIN OUR TELEGRAM CHANNEL 

CCNA Routing basic Interview Question and answers Part 1

 What is a Computer Network? ...

 A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.

 What are the different types of networks?

Considering the size or span of a network, we can classify them as follows:

PAN (Personal Area Network) – PAN is made up of devices used by a single person. It has a range of a few meters.

WPAN (Wireless Personal Area Network) – It is a PAN network that uses wireless technologies as a medium.

LAN (Local Area Network) – LAN is a network whose range is limited to a relatively small area, such as a room, a building, an airplane, etc.

WLAN (Wireless Local Area Network) – WLAN is a LAN network that uses wireless means of communication. It is a widely used configuration due to its scalability and because it does not require the installation of cables.

CAN (Campus Area Network) – A network of high-speed devices that connects LANs in a limited geographical area, such as a university campus, a military base, etc.

MAN (Metropolitan Area Network) or metropolitan area network – It is a high-speed (broadband) network providing coverage in a larger geographic area than a campus, but still limited.

WAN (Wide Area Network) – WAN extends over a large geographical area using unusual means of communication, such as satellites, interoceanic cables, fiber optics, etc. Use public media.

VLAN – It is a type of logical or virtual LAN, mounted on a physical network, in order to increase security and performance. In special cases, thanks to the 802.11Q protocol (also called QinQ), it is possible to mount virtual networks on WAN networks. It is important not to confuse this implementation with VPN technology.

Read more – What is Networking?


 
Q3. What are the different types of LAN cables used?

Ans. There are two types of LAN cables used – ‘Cat 5’ and ‘Cat 6.’ Cat 5 can support 100Mbps of speed while Cat 6 can support 1Gbps of speed.

 
Q4. What is a ‘cross table’?

Ans. This is a type of connection between the same types of devices without using a hub/switch so that they can communicate.

 
Q5. What is a ‘subnet’?

Ans. A ‘subnet’ is a generic term for a section of an extensive network, usually separated by a bridge or a router. It also works for the network’s broadcast domains, manages traffic flow, and helps increasing network performance.

Uses of the subnet in networking:

    Relieving network congestion
    Reallocating IP addresses
    Improving network security

Explore the best Networking Courses on Naukri Learning.

 

CCNA Routing basic interview Question and answers Part  1



Q6. What is DNS?

Ans. The Domain Name System (DNS) is a central part of the internet, providing a way to match names (a website you’re seeking) to numbers (the address for the website). Anything connected to the internet – laptops, tablets, mobile phones, and websites – has an Internet Protocol (IP) address made up of numbers.

Explore – what is network security?

 
Q7. Differentiate between ‘forward lookup’ and ‘reverse lookup’ in DNS?

Ans. Converting names to IP addresses is called forward lookup.

Resolving IP addresses to names is called reverse lookup.

 
Q8. What is Network Topology?

Ans. Network topology is the physical or logical arrangement in which the devices or nodes of a network (e.g. computers, printers, servers, hubs, switches, routers, etc.) are interconnected with each other over a communication medium. It consists of two parts – the physical topology, which is the actual arrangement of the cables (the media), and the logical topology, which defines how the hosts access the media.
Types of network topologies –

Bus – In the bus network topology, each workstation is connected to a main cable called a bus. Therefore, in effect, each workstation is directly connected to every other workstation on the network.
Bus network topology

Bus network topology

Star – In the star network topology, there is a central computer or server to which all workstations are directly connected. Each workstation is indirectly connected to each other through the central computer.
star network topology

Star network topology

Ring – In the ring network topology, the workstations are connected in a closed-loop configuration. Adjacent workstation pairs are directly connected. Other pairs of workstations are indirectly connected, passing data through one or more intermediate nodes.
Ring network topology

Ring network topology

Mesh – Mesh network topology has two forms – full and partial mesh. In the full mesh topology, each workstation is directly connected to each other. In the partial mesh topology, some workstations are connected to all the others, and some are connected only to the other nodes with which they exchange more data.
full mesh topology

Fully Connected Mesh

 
Partial Mesh Network Topology

Partial Mesh Network Topology

Tree – The tree network topology uses two or more star networks connected to each other. The central computers in star networks are connected to the main bus. Thus, a tree network is a bus network of star networks.
Tree Network Topology

Tree Network Topology

Signal – Signal or Logical topology refers to the nature of the paths that signals follow from node to node. In many cases, the logical topology is the same as the physical topology. But it’s not always like this. For example, some networks are physically arranged in a star configuration, but they function logically as bus or ring networks.

Also Explore- Top Network Engineer Interview Questions and Answers

 
Q9. What is a ‘client’ and ‘server’ in a network?

Ans. Clients and servers are separate logical entities that work together over a network to accomplish a task.

A client application is the element of communication that requests or requests a network service, for example, accessing a web page, or downloading a file, or sending an email.

A server application is the element of communication that responds to customer requests, providing the required service, that is, sending the web page or the requested file or email.

The client-server model is used by computer applications such as email, the world wide web, and network printing.

Happy Learning.......


Q10. What is a ‘frame relay’ and in which layer does it operate?

Ans. Frame Relay is a data link layer digital packet-switched network protocol technology designed to connect local area networks (LANs) and transfer data over wide area networks (WANs). Frame Relay shares some of the same underlying technology as X.25.

It is based on the older X.25 packet-switching technology that was designed to transmit analog data as voice conversations. Unlike X.25, which was designed for analog signals, Frame Relay is a fast packet technology, which means that the protocol does not attempt to correct errors. It is often used to connect LANs with main backbones, as well as in public wide area networks and in private network environments with leased T-1 lines. It requires a dedicated connection during the transmission period and is not ideal for voice or video, which require a constant stream of transmissions.

 

Also Read>> Top Network Security Interview Questions
Q11. What are the different features of Frame Relay?

    Frame Relay is a connectionless service, which means that every data packet that passes over the network contains address information
    Frame Relay is a service that is provided with a variety of speeds from 56 Kbs to 25 Mbs. Although the speeds most used for the service are currently 56 Kbs and 1,544 Mbs
    The frames are of variable length and go up to 4,096 bytes
    Frame Relay is considered a broadband ISDN service
    It operates at high speed (1,544 Mbps to 44,376 Mbps).
    It operates only on the physical and data link layers. Therefore, it can be easily used on the Internet.
    It has a large frame size of 9000 bytes. Therefore, it can accommodate all local area network frame sizes.
    Frame Relay can only detect errors (at the data link layer). But there is no flow control or error control.

It operates in the data link layer.

GET CCNP CERTIFIED NOW>>

 
Q12. How does a Frame Relay Work?

Ans. Frame Relay supports the multiplexing of traffic from multiple connections over a shared physical link. It uses hardware components that include router frames, bridges, and switches to pack data into individual frame relay messages. Each connection uses a 10-bit Data Link Connection Identifier (DLCI) for unique channel addressing. There are two types of connections:

    Permanent Virtual Circuits (PVCs) for persistent connections intended to be maintained for long periods even if data is not actively transferred.
    Switched Virtual Circuits (SVCs) for temporary connections that last only one session.

Frame Relay then places the data in a variable-size unit called a frame and leaves any necessary error correction (data retransmission) until the endpoints, speeding up the overall transmission of data.

 
Frame relay

Frame Relay

 
Q13. What is a MAC address?

Ans. A MAC (Media Access Control) address is the unique 48-bit hardware address of a LAN card, usually stored in the ROM of the network adapter card.

The MAC address is a unique identifier that manufacturers assign to a network card or device. It is also known as a physical address represented by hexadecimal digits. Each MAC address is unique worldwide and, in theory, they are fixed for each device.

Each MAC address includes six pairs of numbers. The first three pairs help to identify the manufacturer and the next three to the specific model. It is important to bear in mind that a computer may have a variety of hardware to connect to networks; thus, it is common to have a MAC address for Ethernet, one for Wi-Fi, and another for Bluetooth.

 
Q14. What is ‘beaconing’?

Ans. Beaconing is the process that allows a network to self-repair network problems.

 
Q15. Differentiate between ‘attenuation’, ‘distortion’, and ‘noise’.

Ans. When a signal travels through a medium, it loses some of its energy due to the resistance of the medium. This loss of energy is called attenuation.

When a signal travels through a medium from one point to another, it may change the form or shape of the signal. This is known as distortion.

Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.

 


 
Q16. What is an IP address?

Ans. An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.

 

Also Read – Is CCNA Training the Right Choice for Networking Professionals?

 
Q17. Differentiate between a ‘bit rate’ and ‘baud rate’.

Ans. A bit rate is the number of bits transmitted during one second, whereas, baud rate refers to the number of signal units per second that are required to represent those bits.

Baud rate = bit rate / N, where N is the no. of bits represented by each signal shift.

 
Q18. What is ‘bandwidth’?

Ans. The limited range of frequency of signals that a line can carry is called the bandwidth. Bandwidth is often confused with Internet speed when it is actually the volume of information that can be sent over a connection in a measured amount of time, calculated in megabits per second (Mbps).

Logically the bandwidth of our network will be decisive for the quality and speed of it. The more bandwidth we have, the better, since the faster we can transfer data.

 
Q19. What is Project 802?

Ans. It is a project started by IEEE to set standards to enable intercommunication between equipment from a variety of manufacturers.

 
Q20. What is ICMP?

Ans. ICMP (Internet Control Message Protocol) is a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender.

 
Q21. What are the major types of networks?

Ans. Following are the major types of networks:

    Server-based network
    Peer-to-peer network

 
Also Read>> Cisco Certifications: CCNA Vs. CCNP

 
Q22. What are the important topologies for networks?

Ans. There are three essential topologies – Star, Bus, and Ring.

 
Q23. Differentiate between static IP addressing and dynamic IP addressing.

Ans. In a static IP address, a computer (or another device) is always configured to use the same IP address, whereas, in a dynamic IP address, the IP address can change periodically and is managed by a centralized network service.

 
Q21.  What are the different ways to exchange data?

Ans. Following are the different ways to exchange data:

    Simplex
    Half-duplex
    Full-duplex

Learn – what is Networking?

 
Q24. What are routers?

Ans. Routers connect two or more network segments. These intelligent network devices store information in their routing tables such as paths, hops, and bottlenecks. They determine the most accurate data transfer paths and operate in Open Systems Interconnection (OSI) Network Layer.

The roles of a router are –

    inter-network communication
    Best path selection
    Packet forwarding
    Packet filtering

 
Q25. What are the criteria for the best path selection of a router?

Ans. The following parameters define the path selection:

    Longest prefix match
    Minimum AD (administrative distance)
    Lowest metric value

 
Part 2 Click Here....

Comments

Popular posts from this blog

Fortinet Internet Threat Perspectives Quiz Answers Fortinet NSE 1 Information Security Awareness Fortinet - Everything Trending

Ethical Hacking: SQL Injection for Beginners

CCNA Interview Basic Questions And Answers