1) What is Routing?
Routing is the process of finding a path on which data can pass from source to destination. Routing is done by a device called routers, which are network layer devices.
2) Differentiate User Mode from Privileged Mode
User Mode is used for regular task when using a CISCO router, such as to view system information, connecting to remote devices, and checking the status of the router. On the other hand, privileged mode includes all options that are available for User Mode, plus more. You can use this mode in order to make configurations on the router, including making tests and debugging.
3) What is the key advantage of using switches?
When a switch receives a signal, it creates a frame out of the bits that was extracted from that signal. With this process, it gains access and reads the destination address, after which it forwards that frame to the appropriate port. This is a very efficient means of data transmission, instead of broadcasting it on all ports.
4) When does network congestion occur?
Network congestion occurs when too many users are trying to use the same bandwidth. This is especially true in big networks that do not resort to network segmentation.
5) What is a Window in networking terms?
A Window refers to the number of segments that is allowed to be sent from source to destination before an acknowledgement is sent back.
6) Does a bridge divide a network into smaller segments?
Not really. What a bridge actually does is to take the large network and filter it, without changing the size of the network
7) What is the function of the Application Layer in networking?
The Application Layer supports the communication components of an application and provides network services to application processes that span beyond the OSI reference model specifications. It also synchonizes applications on the server and client.
8 ) What is the role of the LLC sublayer?
The LLC sublayer, short for Logical Link Control, can provide optional services to an application developer. One option is to provide flow control to the Network layer by using stop/start codes. The LLC can also provide error correction.
9) Differentiate full-duplex from half-duplex.
In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot receive while it is transmitting, and vice versa.
10) What are the different memories used in a CISCO router?
- NVRAM stores the startup configuration file
- DRAM stores the configuration file that is being executed
- Flash Memory – stores the Cisco IOS.
In computer it's known as com port and could be available in 9pin or 25 pin.On router it have 60 pins.
What's the benefit of subnetting?
Reduce the size of the routing tables.
Reduce network traffic. Broadcast traffic can be isolated within a single logical network.
Provide a way to secure network traffic by isolating it from the rest of the network.
What are the differences between static ip addressing and dynamic ip addressing?
With static IP addressing, a computer (or other device) is configured to always use the same IP address. With dynamic addressing, the IP address can change periodically and is managed by a centralized network service
What is APIPA?
Automatic private IP addressing (APIPA) is a feature mainly found in Microsoft operating systems. APIPA enables clients to still communicate with other computers on the same network segment until an IP address can be obtained from a DHCP server, allowing the machine to fully participate on the network. The range of these IP address are the 169.254.0.1 to 169.254.255.254 with a default Class B subnet mask of 255.255.0.0
What is DHCP scope?
A scope is a range, or pool, of IP addresses that can be leased to DHCP clients on a given subnet.
What are the criteria necessary for an effective and efficient network?
Performance : It can be measured in many ways, including transmit time and response time.
Reliability : It is measured by frequency of failure, the time it takes a link to recover from a failure, and the network's robustness.
Security : Security issues includes protecting data from unauthorized access and viruses.
Name the factors that affect the performance of the network?
Number of Users
Type of transmission medium
Hardware
Software
Name the factors that affect the reliability of the network?
Frequency of failure
Recovery time of a network after a failure
What is Protocol?
A protocol is a set of rules that govern all aspects of information communication.
Define Bandwidth and Latency?
Network performance is measured in Bandwidth (throughput) and Latency (Delay). Bandwidth of a network is given by the number of bits that can be transmitted over the network in a certain period of time.
Latency corresponds to how long it takes a message to travel from one end off a network to the
other. It is strictly measured in terms of time.
No comments:
Post a Comment