NETWORKING Interview Question ANSWERS 4
111. Why
should you care about the OSI Reference Model?
It
provides a framework for discussing network operations and design.
112. What
is logical link control?
One of
two sublayers of the data link layer of OSI reference model, as defined by the
IEEE 802
standard.
This sublayer is responsible for maintaining the link between computers when
they are
sending
data across the physical network connection.
113. What
is virtual channel?
Virtual
channel is normally a connection from one source to one destination, although
multicast
connections
are also permitted. The other name for virtual channel is virtual circuit.
114. What
is virtual path?
Along any
transmission path from a given source to a given destination, a group of
virtual circuits can
be
grouped together into what is called path.
115. What
is packet filter?
Packet
filter is a standard router equipped with some extra functionality. The extra
functionality allows
every
incoming or outgoing packet to be inspected. Packets meeting some criterion are
forwarded
normally.
Those that fail the test are dropped.
116. What
is traffic shaping?
One of
the main causes of congestion is that traffic is often busy. If hosts could be
made to transmit
at a
uniform rate, congestion would be less common. Another open loop method to help
manage
congestion
is forcing the packet to be transmitted at a more predictable rate. This is
called traffic
shaping.
117. What
is multicast routing?
Sending a
message to a group is called multicasting, and its routing algorithm is called
multicast
routing.
118. What
is region?
When
hierarchical routing is used, the routers are divided into what we will call
regions, with each
router
knowing all the details about how to route packets to destinations within its
own region, but
knowing
nothing about the internal structure of other regions.
119. What
is silly window syndrome?
It is a
problem that can ruin TCP performance. This problem occurs when data are passed
to the
sending TCP
entity in large blocks, but an interactive application on the receiving side
reads 1 byte at
a time.
120. What
are Digrams and Trigrams?
The most
common two letter combinations are called as digrams. e.g. th, in, er, re and
an. The most
common
three letter combinations are called as trigrams. e.g. the, ing, and, and ion.
121.
Expand IDEA.
IDEA
stands for International Data Encryption Algorithm.
122. What
is wide-mouth frog?
Wide-mouth
frog is the simplest known key distribution center (KDC) authentication
protocol.
123. What
is Mail Gateway?
It is a
system that performs a protocol translation between different electronic mail
delivery protocols.
124. What
is IGP (Interior Gateway Protocol)?
It is any
routing protocol used within an autonomous system.
125. What
is EGP (Exterior Gateway Protocol)?
It is the
protocol the routers in neighboring autonomous systems use to identify the set
of networks
that can
be reached within or via each autonomous system.
126. What
is autonomous system?
It is a
collection of routers under the control of a single administrative authority
and that uses a
common
Interior Gateway Protocol.
127. What
is BGP (Border Gateway Protocol)?
It is a
protocol used to advertise the set of networks that can be reached with in an
autonomous
system.
BGP enables this information to be shared with the autonomous system. This is
newer than
EGP
(Exterior Gateway Protocol).
128. What
is Gateway-to-Gateway protocol?
It is a
protocol formerly used to exchange routing information between Internet core
routers.
129. What
is NVT (Network Virtual Terminal)?
It is a
set of rules defining a very simple virtual terminal interaction. The NVT is
used in the start of a
Telnet
session.
130. What
is a Multi-homed Host?
It is a
host that has a multiple network interfaces and that requires multiple IP
addresses is called as a
Multi-homed
Host.
131. What
is Kerberos?
It is an
authentication service developed at the Massachusetts Institute of Technology.
Kerberos uses
encryption
to prevent intruders from discovering passwords and gaining unauthorized access
to files.
132. What
is OSPF?
It is an
Internet routing protocol that scales well, can route traffic along multiple
paths, and uses
knowledge
of an Internet's topology to make accurate routing decisions.
133. What
is Proxy ARP?
It is
using a router to answer ARP requests. This will be done when the originating
host believes that a
destination
is local, when in fact is lies beyond router.
134. What
is SLIP (Serial Line Interface Protocol)?
It is a very
simple protocol used for transmission of IP datagrams across a serial line.
135. What
is RIP (Routing Information Protocol)?
It is a
simple protocol used to exchange information between the routers.
136. What
is source route?
It is a
sequence of IP addresses identifying the route a datagram must follow. A source
route may
optionally
be included in an IP datagram header.
No comments:
Post a Comment