Popular Posts

Saturday, 13 February 2016

interview question for network administrator 7

What is the role of Pseudo tty?
Pseudo tty -false terminal - it enables external machines to connect through Telnet or rlogin. No connection can be made without a pseudo tty. 

Explain External Data Representation. 
It is a method of encoding data within an RPC message. It is used to ensure that the data is not system-dependent.

Differentiate between interior and exterior neighbour gateways.
- Interior gateway - connects LANs within an organization 
- Exterior gateway - connects the organization to the outside world.
Honey 12-7-2011
Networking interview questions and answers.
Explain SLIP.
SLIP - Serial Line Interface Protocol, is a protocol used for transmission of IP datagrams across a serial line.

What do you mean by Multi-homed Host?
- It is a multiple network interface that requires multiple IP addresses.

What is multicast routing?
Multicasting - Sending a message to a group. 
Multicast routing- Routing algorithm of sending message to a group.

What is the role of OSI Reference Model?
It provides a framework for discussing network operations and design.
Arun 12-7-2011
Networking interview questions and answers.
In which layer does the frame relay operate? 
Frame relay - packet switching technology, operates in the data link layer.

Explain Gateway. 
Gateway - operates at the upper levels of the OSI model. It translates information between two absolutely different network architectures or data formats.

What are the different ways of data exchange?
a. Simplex
b. Half-duplex 
c. Full-duplex.
Magan 12-7-2011

What is the difference between Pure ALOHA and Slotted Aloha protocol?

In Pure Aloha, station can send data in a continuous time manner whereas in Slotted Aloha, time is divided in slots. Pure ALOHA doesn't check whether the channel is busy before transmission. In slotted ALOHA, a frame can be sent only at fixed times, whereas in pure ALOHA, you can send any time. Pure ALOHA has a vulnerable time of 2 x Tfr. Whereas in Slotted ALOHA vulnerable time = Tfr {Tfr: Average transmission time for a frame}.

Differentiate between hub and switch.

a.) Hub is a layer 1 device while Switch is layer 2 device.
b.) Hub works on single collision and single broadcast domain while switch works on per port collision and single broadcast domain.

What is FQDN?

- FQDN is the abbreviation for Fully Qualified Domain Name. 
- It contains both the hostname and a domain name. 
- It uniquely identifies a host within a DNS hierarchy

Tell us something about LMHOSTS files.

- It is a text file that resolves NetBIOS names to IP addresses. 
- It can be compared with the HOSTS file which is a static method of resolving domain names into IP addresses. 
- LMHOSTS files must be manually configured and updated.

What are the main qualities of an effective and efficient network?

a. Performance
b. Reliability
c. Security

What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?

10Base2 - 
- It is an Ethernet term which means a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments. 

10Base5 
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. 

10BaseT
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.

What is anonymous FTP? What is its use?

- It is an FTP that enables the users to connect to a host without a valid login and password.
- The login used is anonymous or guest, with the password usually requesting the user's ID. 
- It enables a large number of users to access the files on the host without needing to set up a login for all of them. 
- It exercises a strict control over the areas an anonymous user can access.

Which factors mark the reliability of the network?

a. Frequency of failure
b. Downtime / Time taken for recovery.

Name the factors that tell us about the security of the network.

a. Virus attacks on the system. 
b. Unauthorized access to the system.

Define Bandwidth and Latency?

- Bandwidth/ Throughput – It means the number of bits which can be transmitted over the network in a specified time. 
- Latency – It is the time taken by a message to travel from one side to another. 

Bandwidth and latency describe the performance of a network.

No comments: