Ans: Domain-A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures. Within the Internet, domains are defined by the IP address. All devices sharing a common part of the IP address are said to be in the same domain.
In a Domain:
• One or more computers are servers. Network Administrators use servers to control the security and permissions for all computers on the domain. This makes it easy to make changes because the changes are automatically made to all computers.
• If you have a user account on the domain, you can log on to any computers on the domain without needing an account on that computer.
• There can be 100s or 1000s of computers.
• The computers can be on different local networks.
A domain usually costs more money to setup because there is more hardware and software required
Domain:
1) Centralized Administration.
2) Security of Data, User & Groups
3) Server & Clients Based
4) Windows 2000 & 2003 Server or Advance Support For Server Configuration
5) File, Folder & User & Group Permission we can assign.
Workgroup: Workgroup computing occurs when all the individuals have computers connected to a network (a group of two or more computer systems linked together) that allows them to send e-mail to one another, share data files, and other resources such as printers. Normally, a workgroup is limited to 10 network devices/computers. Also, both Windows XP Pro and Home can function in a workgroup environment
In a Workgroup:
• All computers are pears; no computer has control over another computer.
• Each computer has a set of user accounts. To use any computer in the workgroup, you must have an account on that computer.
• There are typically no more than ten to twenty computers.
• All computers must be on the same local network or subnet.
WORKGROUP:
1) No Centralized Administration.
2) Not much security for Data, User & Groups. (Depends on Configuration)
3) No Server & Client Matter. Each pc reacts like a Client as well as Server.
4) Basically Windows 98 & XP is going to used in Clients side.
5) We can assign permission to drives & folder & files but much security than Domain
Q2. What are the main advantages of working in a domain model?
Ans:1 Centralized administration because all user information is stored in the Active Directory database. This centralization allows users to manage only a single user name and password, and enables domain administrators to control which users can access resources on any computer that is a member of the domain.
2)Security of Data, User & Groups
3)Server & Clients Based
4)Windows 2000 & 2003 Server or Advance Support For Server Configuration
5)File, Folder & User & Group Permission we can assign.
Q3. How to join or create a workgroup?
Ans: When you set up a network, Windows automatically creates a workgroup and gives it a name. You can join an existing workgroup on a network or create a new one.
1. Open system by clicking the start button, clicking control panel, clicking system and maintenance, and then clicking system.
2. Under computer name, domain, and workgroup setting, click the computer name tab, and then click change.
3. Under member of, click workgroup, and then do one of the following:
• To join an existing workgroup, type the name of the workgroup that you want to join, and then click Ok.
• To create a new workgroup, type the name of the workgroup that you want to create, and then click Ok.
If you change the name of the existing workgroup, a new workgroup will be created with that name.
If your computer was a member of a domain before you join the workgroup, it will be removed from the domain and your computer account on that domain will be disabled.
Q4. How to connect your computer to a Domain?
Ans: Steps:
1. Open system by clicking the start button, clicking control panel, clicking system and maintenance, and then clicking system.
2. Under computer name, domain, and workgroup setting, click change setting.
3. Click the computer name tab, and then click change.
4. Under member of, click domain.
5. type the name of the domain that you want to join, and then click Ok.
You will be asked to type your user name and password for the domain.
Once you are successfully joined to the domain, you will be prompted to restart the computer. You must restart your computer before the change take effect.
Note: If your computer was a member of a workgroup before you joined the domain, it will be removed from the workgroup.
Q5. How to find the domain your computer is on?
Ans: If your organization uses Active Directory domains to manage its network, you might need to know which domain a computer belongs to so that you can access other computers and resources on the network.
1. Open system by clicking the start button, clicking control panel, clicking system and maintenance, and then clicking system.
2. If your computer is connected to a domain, under computer name, domain, and workgroup settings, you will see the name of the domain your computer belongs to. If your computer is connected to a workgroup you will see the name of the workgroup your computer belongs to.
Q6. What types of operating system installation methods do you know?
Q7. What is an answer file?
Ans: Answer file is a text file that supplies Windows XP Professional Setup with information necessary during the installation process. In addition, an answer file tells Setup how to interact with the distribution shares and files that you have created (or the installation files on the operating system CD, if that is what you are using to install the product). It is a unattended installation technique.
An answer file contains multiple sections — some mandatory and some optional — that you can modify. Section names are delineated by brackets (for example, [Unattended]). Every section has one or more entries that contain installation and configuration information. Entries are delineated by an entry name, an equal sign, and a value (for example, ComputerName = Computer1). The entry name represents a specific computer setting or action; the value represents the unique way you want the setting configured or the action performed.
Q8. How would you create an answer file for Windows XP?
Windows Setup Manager provides a wizard-based interface that allows you to quickly create an answer file for an unattended installation of Windows XP Professional. You can create or modify an answer file, typically named unattend.txt, by using Windows Setup Manager. You can also create answer files with a simple text editor, such as Notepad, but using the Windows Setup Manager reduces errors in syntax.
To create an answer file for a fully automated installation by using Windows Setup Manager, use these steps:
1. In Windows Explorer, locate the folder where you extracted Windows Setup Manager (setupmgr.exe). Double-click setupmgr.exe.
Windows XP Professional starts the Windows Setup Manager Wizard.
2. Click Next.
The New Or Existing Answer File page appears.
3. Ensure that the Create A New Answer File is selected, and then click Next.
The Windows Setup Manager Wizard displays the Product To Install page, which provides the following three options:
❑ Windows Unattended Installation
❑ Sysprep Install
❑ Remote Installation Services
4. Ensure that Windows Unattended Installation is selected, and then click Next.
The Windows Setup Manager Wizard displays the Platform page.
5. Ensure that Windows XP Professional is selected, and then click Next.
The Windows Setup Manager Wizard displays the User Interaction Level page, shown in Figure 1, which has the following five options:
❑ Provide Defaults. The answers you provide in the answer file are the default answers that the user sees. The user can accept the default answers or change any of the answers supplied by the script.
❑ Fully Automated. The installation is fully automated. The user does not have the chance to review or change the answers supplied by the script.
❑ Hide Pages. The answers provided by the script are supplied during the installation. Any page for which the script supplies all answers is hidden from the user, so the user cannot review or change the answers supplied by the script.
❑ Read Only. The script provides the answers, and the user can view the answers on any page that is not hidden, but the user cannot change the answers.
❑ GUI Attended. The text-mode portion of the installation is automated, but the user must supply the answers for the graphical user interface (GUI) mode portion of the installation.
Figure 1 Select the level of user interaction you want.
6. Select Fully Automated, and then click Next.
The Windows Setup Manager Wizard displays the Distribution Folder page. The Setup Manager Wizard can create a distribution folder on your computer or network containing the required source files. You can add files to this distribution folder to further customize your installation.
7. Select No, This Answer File Will Be Used To Install From A CD, and then click Next.
The Windows Setup Manager Wizard displays the License Agreement page.
8. Select I Accept The Terms Of The License Agreement, and then click Next.
The Windows Setup Manager Wizard displays the Customize The Software page, shown in Figure 2.
Figure 2 Use the Customize The Software Page to provide details for the answer file that will be used during installation.
9. Type your name in the Name box and your organization in the Organization box, and then click Next.
The Windows Setup Manager Wizard displays the Display Settings page.
10. Leave the default settings on the Display Settings page, and then click Next.
The Windows Setup Manager displays the Time Zone page.
11. Select the appropriate time zone, and then click Next.
The Windows Setup Manager Wizard displays the Providing The Product Key page.
12. Type in the appropriate product key.
13. Click Next.
The Windows Setup Manager Wizard displays the Computer Names page, shown in Figure 3. Notice that you have three choices:
❑ Enter a series of names to be used during the various iterations of the script.
❑ Click Import and provide the name of a text file that has one computer name per line listed. Setup imports and uses these names as the computer names in the various iterations of the script.
❑ Select Automatically Generate Computer Names Based On Organization Name to allow the system to automatically generate the computer names to be used.
Figure 3 Add the names of the computers that will use the installation.
14. In the Computer Name text box, type a name for the computer, and then click Add. Repeat this step to add additional computers to the installation.
15. Click Next.
The Windows Setup Manager Wizard displays the Administrator Password page, which appears with the following two options:
❑ Prompt The User For An Administrative Password
❑ Use The Following Administrative Password (127 Characters Maximum)
Notice that you have the option to encrypt the Administrator’s password in the answer file. You also have the option to have the Administrator log on automatically, and you can set the number of times you want the Administrator to log on automatically when the computer is restarted.
16. Ensure that Use The Following Administrative Password (127 Characters Maximum) is selected, and then type a password in the Password text box and the Confirm Password box.
17. Select Encrypt Administrator Password In Answer File, and then click Next.
The Windows Setup Manager Wizard displays the Networking Components page, shown in Figure 4, with the following two options:
❑ Typical Settings. Installs Transmission Control Protocol/Internet Protocol (TCP/IP), enables Dynamic Host Configuration Protocol (DHCP), installs the Client For Microsoft Networks protocol, and installs File And Printer Sharing For Microsoft Networks for each destination computer
❑ Customize Settings. Allows you to select and configure the networking components to be installed
Figure 4 Choose network settings for the installation.
18. Configure network settings as appropriate for your network, and then click Next.
The Windows Setup Manager Wizard displays the Workgroup Or Domain page.
19. If the computer will join a workgroup, type the workgroup name. If the computer will join a domain, click Windows Server Domain, and then type the name of the domain. If a computer that will join a domain does not already have a computer account in that domain, you can have Windows Setup create such an account during installation. Click Create A Computer Account In The Domain, and then enter the credentials for an account that has permission to create new computer accounts in the domain. Click Next to continue.
The Windows Setup Manager Wizard displays the Telephony page.
20. Select the appropriate setting for What Country/Region Are You In.
21. Type the appropriate setting for What Area (Or City) Code Are You In.
22. If necessary, type the appropriate setting for If You Dial A Number To Access An Outside Line, What Is It.
23. Select the appropriate setting for The Phone System At This Location Uses, and then click Next.
The Windows Setup Manager Wizard displays the Regional Settings page. The default selection is Use The Default Regional Settings For The Windows Version You Are Installing, but you can also specify different regional settings.
24. Configure the regional settings, and then click Next.
The Windows Setup Manager Wizard displays the Languages page, which allows you to add support for additional languages.
25. Select additional languages if they are required for the computers on which you will install Windows XP Professional, and then click Next.
The Windows Setup Manager Wizard displays the Browser And Shell Settings page with the following three options:
❑ Use Default Internet Explorer Settings
❑ Use An Auto-configuration Script Created By The Internet Explorer Administration Kit To Configure Your Browser
❑ Individually Specify Proxy And Default Home Page Settings
26. Make your selection, and then click Next.
The Windows Setup Manager Wizard displays the Installation Folder page with the following three options:
❑ A Folder Named Windows. This is the default selection.
❑ A Uniquely Named Folder Generated By Setup. Setup generates a unique folder name so that the installation folder will be less obvious. This folder name is recorded in the Registry, so programs and program installations can easily access the Windows XP Professional system files and folders.
❑ This Folder. If you select this option, you must specify a path and folder name.
27. Make your selection, and then click Next.
The Windows Setup Manager Wizard displays the Install Printers page, shown in Figure 5, which allows you to specify a network printer to be installed the first time a user logs on after Setup.
Figure 5 Specify printers to be installed during setup.
28. Add any printers that you want to configure during installation, and then click Next.
The Windows Setup Manager Wizard displays the Run Once page. This page allows you to configure Windows to run one or more commands the first time a user logs on.
29. To add a command, type the command in the Command To Run text box, and then click Add. Click Next when you are finished adding commands.
The Windows Setup Manager Wizard displays the Additional Commands page. This page allows you to specify additional commands to be run at the end of the unattended setup before any user logs on to the computer.
30. To add a command, type the command in the Command To Run text box, and then click Add. Click Finish when you are finished adding commands.
The Windows Setup Manager Wizard displays a dialog box indicating that the Windows Setup Manager has successfully created an answer file. It also prompts you for a location and a name for the script. The default is a file named unattend.txt in the folder from which you launched Windows Setup Manager.
Note If multiple computer names were specified, the wizard also creates a .udb file.
31. Accept the default name and location, or type an alternate name and location.
Click OK to continue.
The Windows Setup Manager Wizard displays the Setup Manager Complete page, indicating that new files were created:
❑ unattend.txt is the answer file.
❑ unattend.udb is the uniqueness database file created if you supply multiple computer names.
❑ unattend.bat is a batch script that will launch the Windows installation using the answer file and uniqueness database file.
32. On the File menu, click Exit.
Q 9. How do you perform an unattended installation on Windows XP?
Ans:To perform an installation, you can use the unattend.bat file created by the Windows Setup Manager. This batch file simply uses the winnt32.exe command to start the installation, supplying parameters based on the location you saved the files to when you ran Windows Setup Manager. You can modify this batch file to suit your needs or simply
start Setup from the command line yourself (the most common way to start an unattended installation). To start Setup from the command line (or modify the batch file), you must use a specific parameter and indicate the location of the answer file.
To use the winnt.exe command from a Microsoft MS-DOS or Windows 3.x command prompt to perform a clean installation of Windows XP, you must use the following syntax:
winnt [/s:SourcePath] [/u:answer file] [/udf:ID [,UDB_file]]
To use the winnt32.exe command from a Windows 95, Windows 98, Windows Me, or
Windows 2000 command prompt to perform a clean installation of Windows XP, you
must use the following syntax:
winnt32 [/unattend[num]:[answer_file] [/udf:ID [,UDB_file]]
Q.10 What is Sysprep?
Ans: The SYSPREP tool is used to prepare an image of a hard disk of a computer running a Windows operating system, so that it can be deployed to multiple destination computers. It prepares the computer by cleaning various user and machine settings and log files
The Sysprep utility can be used in three different contexts:
Disk duplication. Using Sysprep to prepare images for disk duplication allows you to copy fully installed systems onto similar hardware. Sysprep modifies the local computer Security ID (SID) so that it is unique to each computer.
1. Auditing. When you use Sysprep after auditing the computer (using the –nosidgen command–line option), Sysprep will be ready for the end user to run Windows.
2. Automating Mini–Setup. Sysprep creates a shortened GUI–mode Setup that takes five or six minutes instead of the usual 45 to 60 minutes, and it prompts the end user only for required user–specific information, such as accepting the EULA, entering the Product Key, and entering the user name and company name. To use Sysprep in this mode, preinstall Windows XP on the local computer, and then run Sysprep with the –nosidgen parameter, using the steps below.
Q 11. What is Registry?
Ans: The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.
The registry contains two basic elements: keys and values.
Registry Keys are similar to folders - in addition to values, each key can contain subkeys, which may contain further subkeys, and so on. Registry Values are name/data pairs stored within keys. Values are referenced separately from keys. Value names can contain backslashes but doing so makes them difficult to distinguish from their key paths.
There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:
• HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
• HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
• HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
• HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
• HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
• HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dynamic and will change as devices are added and removed from the system.
Q 12. How can you edit the Registry? Name at least 3 ways of doing that.
Ans:
Q 13. What is a pagefile?
Ans: In storage, a pagefile is a reserved portion of a hard disk that is used as an extension of random access memory (RAM) for data in RAM that hasn't been used recently. A pagefile can be read from the hard disk as one contiguous chunk of data and thus faster than re-reading data from many different original locations. Windows NT administrators or users can reset the system-provided default size value of the pagefile to meet their particular needs.
Q 14. What is the major function of the pagefile.sys file?
Ans:
Q 15. What is hiberfil.sys file?
Ans: HIBERFIL.SYS is a file the system creates when the computer goes into hibernation mode. Windows uses the file when it is turned back on. If you don't need hibernation mode and want to delete the file you need to turn the hibernation option off before Windows will allow you to delete the file. The procedure for turning hibernation off differs markedly between Windows XP and Vista. The file size depends largely on the size of active RAM in the computer as the contents of the file are basically a RAM image.
1. Procedure for Windows XP. This procedure makes use of the graphical user interface.
• Start Control Panel Power Options
• Go to the Hibernate Tab.
• Uncheck the Enable Hibernation box if you don't need the hibernation function.
• The file should now be able to be deleted.
Q16. What is the function of hiberfil.sys file?
Ans:
Q 17. What is a NIC (Network Interface Card)?
Ans: A network interface card is used to connect a computer to an Ethernet network. The card (shown in the figure below) provides an interface to the media. Networked computers communicate with each other using a given protocol or agreed-upon language for transmitting data packets between the different machines, known as nodes. Network interface cards provide a dedicated, full-time connection to a network.
The most common language or protocol for LANs is Ethernet, sometimes referred to as IEEE 802.3. A lesser-used protocol is Token Ring. When building a LAN, a network interface card must be installed in each computer on the network and all NICs in the network must be of the same architecture. For example, all must either be Ethernet cards, Token Ring cards, or an alternate technology.
An Ethernet network interface card is installed in an available slot inside the computer. The NIC assigns a unique address called a MAC (media access control) to the machine. The MACs on the network are used to direct traffic between the computers. The back plate of the network interface card features a port that looks similar to a phone jack, but is slightly larger. This port accommodates an Ethernet cable, which resembles a thicker version of a standard telephone line. Ethernet cable must run from each network interface card to a central hub or switch. The hub or switch acts like a relay, passing information between computers using the MAC addresses and allowing resources like printers and scanners to be shared along with data.
Q 18. What is a MAC Address?
Ans: MAC Address:
The MAC Address is a unique number associated with a network adapter. Mac Addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter on a LAN.
MAC addresses are 12-digit hexadecimal numbers (48-bits in length) . By convention, MAC addresses are written in one of the following form:
MM: MM: MM: SS: SS: SS
MM-MM-MM-SS-SS-SS
The first half of the MAC addresses are contains the ID number of the adapter manufacturer. These IDs are regulated by an Internet Standard body’s. The second half of the MAC addresses are represents the serial number assigned to the adapter by adapter manufacturer. In the example:
00: A0:C9:14:C8:29
The prefix
00A0C9
indicates the manufacturer in Intel corporation.
The MAC address is used by the Media Access Control sub-layer of the Data-Link Layer (DLC) of telecommunication protocols.
A MAC address is an address which exists on Layer 2 of the OSI Model.
Q 19. How to find MAC Address?
Ans: Run ipconfig/all from a Command Prompt window.
(click Start, then Run, then type cmd in the text box.)
Type in ipconfig/all in the Command Prompt Windows.
The 12-digit Physical Address is the same as MAC address
Q 20. What is a cross cable? When would you use a crosslink cable?
Ans: Cross Cable: An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly where they would normally be connected via a network switch, hub or router, such as directly connecting two personal computers via their network adapters.
The pinouts for an Ethernet crossover cable are as follows:
Connector 1Pinout
Connector 2Pinout
1
3
2
6
3
1
4
OPEN
5
OPEN
6
2
7
OPEN
8
OPEN
So pin 1 -> pin 3, pin 2 -> pin 6, pin 3 -> pin 1, and pin 6 -> pin 2. All of the other pins are left open.
You would use a straight through cable for most applications, for instance at a work area and to connect components to switches. Crossover cables are typically used to connect uplink ports.
Computer to computer ==> cross Switch/hub to switch/hub ==>cross Computer to switch/hub ==>standard
Q 21. What is a coaxial cable?
Ans: A coaxial cable consist of a stiff copper wire as core surrounded by an insulating material. The insulator is encased by a cylindrical conductor. The outer conductor is covered by a protective plastic sheath. The signal is transmitted by the inner copper wire and is eclectically shielded by the outer metal sleeve. It can be used both analog and digital transmission. It is expensive as compare to fiber optic cable and easy to handle.
Coaxial cables are mainly used for carrying television signals (for example, CATV), but some older computer networks based on the 10Base2 standard also utilized these cables for connecting workstations and other network devices. Usually the coaxial cables used for different purposes have different characteristics; cables for one purpose cannot be used for another. For example, the cable used for CATV cannot be used for computer networks.
Q 22. What is the advantage of coaxial cable?
Ans: Advantages of Coaxial Cable:
(i) It has better shielded against electromagnetic interference than twisted-pair cable, so it can span longer distance at higher data bps.
(ii) It can be used for both analog and digital data transmissions.
(iii) Coaxial cable has higher bandwidth and excellent noise immunity.
(iv) It is inexpensive as compared to fiber optic cable and easy to handle.
Q 23. What is a fiber optic cable?
Ans: Fiber optic (also called Optical Fiber) cable is made up of very thin glass or plastic stretched out and put inside a sheath. The transmission in fiber optic cables is based on the transport of light signals. An optical transmitter is located at one side of the cable and a receiver is at the other side. Fiber optic cables are immune to EMI and RF disturbances because they depend on optical signals unlike electrical signals in UTP/STP cables. They can also carry data signals longer distances than do UTP or STP cables due to minimal attenuation. It is also considered the most secure of all cable types.
Fiber optic cables are very expensive in terms of the cost involved in installation and maintenance. It needs expensive hardware, skilled technicians, and special tools for installation. This is the reason that fiber optic cable is used only in data centers for providing high-end connections to critical servers and other network devices where high-speed data transfers are required.
Q 24. What are the main advantages and disadvantages of Fiber-Optic-based networks?
Ans:
High data rate and wide bandwidth
Immunity to EMI/RFI and lightning damage
No ground loops
Low attenuation (data loss)
Longer distance - 2 and 5 km with Multimode fiber or over 25 km with Single Mode fiber
Small cable diameter fits anywhere
Light weight
No sparks if cut
No shock hazard
Secure communications
Low system cost
Longer life expectancy than copper or coaxial cable
Cabling of the future
SPEED: Fiber optic networks operate at high speeds - up into the gigabitsBANDWIDTH: large carrying capacityDISTANCE: Signals can be transmitted further without needing to be "refreshed" or strengthened.RESISTANCE: Greater resistance to electromagnetic noise such as radios, motors or other nearby cables.MAINTENANCE: Fiber optic cables costs much less to maintain.
Q 25. What are the most common uses of fiber optic cables?
Ans: In addition to communications, optical fibers are beginning to be used in medical procedures, automobiles, and aircraft and are expected to have many other applications.
Q 26. What is the difference between a Hub and a Switch?
Ans: HUB works on Physical layer where as SWITCH works on data link layer, HUB based networks are on one collision domain where as in Switch based network switch divides networks into multiple collision domains. Switch also maintains MAC address tables.
Adhura hai
Q 27. On which OSI layer can a router be found?
Ans: physical layer
Q 28. What is CSMA/CD?
Ans: CSMA/CD (Carrier Sense Multiple Access / Collision Detection) is the protocol used in Ethernet networks to ensure that only one network node is transmitting on the network wire at any one time.
CSMA/CD is specified in the IEEE 802.3 standard
Q 29. What is collision detection?
Ans: Collision Detection means that when multiple Ethernet devices accidentally transmit at the same time, they are able to detect this error.
Q 30. How Collisions Occur under CSMA/CD
Imagine a very simple Ethernet network with only two nodes.
Each node, independently, decides to send an Ethernet frame to the other node.
Both nodes listen to the Ethernet wire and sense that no carrier is present.
Both nodes transmit simultaneously, causing a collision.
Both nodes detect the collision and each node waits a random amount of time before transmitting again.
Collisions are normal on an Ethernet network. A small amount of collisions are expected in the protocol design.
If too many nodes are transmitting on an Ethernet network the number of collisions can rise to an unacceptable level. This can reduce the amount of available bandwidth on an Ethernet network because so much bandwidth is lost in retransmission.
Ethernet switches greatly reduce the already minor difficulties experienced with the CSMA/CD protocol.
Q 31. What is multicast?
Ans: Multicast is communication between a single sender and multiple receivers on a network. Multicast is supported through wireless data networks as part of the Cellular Digital Packet Data (CDPD) technology.
Multicast is also used for programming on the MBone, a system that allows users at high-bandwidth points on the Internet to receive live video and sound programming. Together with anycast and unicast, multicast is one of the packet types in the Internet Protocol Version 6 (IPv6).
Q 32. What is a Broadcast?
Ans:
Q33. What is a Broadcast Address?
Ans: In computer networking, a broadcast address is a network address that allows information to be sent to all nodes on a network, rather than to a specific network host. In other word’s A special type of networking address that is reserved for sending messages to all machines on a given network segment. Generally, a broadcast address is a MAC destination address of all F's.
Q 34. What is the difference between TCP and UDP
Ans:
Q 35. What are TCP Ports? Name a few.
Ans:
Q 36. What is a TCP Session?
Ans: The layer that establishes ,manages and terminates the session between two communticating devices
Q 37. What is ICMP?
Ans: ICMP works at the Network layer to provide error checking and reporting functions. It is a connection-less protocol and uses IP for providing best-effort delivery. It is used in network management and maintenance systems. For example, ping is a troubleshooting utility that uses the ICMP protocol.
Q 38. What is ping command?
Ans: The ping utility is used to test connectivity between two TCP/IP hosts. Like the tracert utility, it also uses ICMP echo requests to the destination host. This utility is a part of the TCP/IP protocol suite and is installed by default on all TCP/IP devices. Ping can quickly determine whether the host is connected or not and how long it takes for the request to take the roundtrip. Aside from testing connectivity, the ping command can also be used to test whether the name resolution is working.
Q 39. When would you use the ping command with the “-t” switch?
Ans: This parameter forces the ping command to continue sending echo messages until manually stopped.
Q 40. What command-line tool would help you discover for which port numbers your computer is listening?
Ans: Running netstat -a display all ports that are listening on a machine at the time the command is run.
Q 41. What is APIPA? How would you recognize it?
Ans: In case DHCP server not ip addressing provide so this situation by APIPA ip address provide from clients side It range the IP address 169.254.0.1 to 169.255.254 in this case the client which broadcast mass anger at first time will take specific IP from APIPA after this it always connect every five minutes to any Dynamic host configuration protocol server
Q 42. What is 255.255.255.255 used for?
Ans: This is the special network of 255.255.255.255, and is used for broadcasting messages to the entire network that your computer resides on.
Q 43. What is CRC?
Ans: Cyclic redundancy checking is a method of checking for errors in data that has been transmitted on a communications link. A sending device applies a 16- or 32-bit polynomial to a block of data that is to be transmitted and appends the resulting cyclic redundancy code (CRC) to the block. The receiving end applies the same polynomial to the data and compares its result with the result appended by the sender. If they agree, the data has been received successfully. If not, the sender can be notified to resend the block of data.
Q 44. What is an IP Address?
Ans: A 32-bit address used to identify a node on an Internet Protocol (IP) inter-network. Each node on the IP inter-network must be assigned a unique IP address, which is made up of the network ID plus a unique host ID. This address is typically represented with the decimal value of each octet separated by a period (for example, 192.168.7.23). In Windows XP Professional, the IP addresses can be configured manually, or if you have a computer running Windows 2000 Server and DHCP, the IP addresses can be configured dynamically. See also Dynamic Host Configuration Protocol (DHCP).
Q 45. What is the use of IP Address?
Ans: IP address is used to uniquely identify each host in a network. IP address is needed in order to communicate with other hosts in the network using the TCP/IP suite of protocols.
Q 46. What is the difference between a host name and an IP address?
Ans: A host name is used to identify a host by human beings and higher level user applications. But IP protocol uses only IP addresses to identify a host in the network. A host-name is provided just as a convenience for users of the network and higher level applications.
Q 47. How a host name is resolved to the corresponding IP address?
Ans: A host name is resolved to the corresponding IP address either from a configuration file stored in the local machine or using a network protocol like DNS or WINS from a server in the network.
Q 48. What is the size of an IP address?
Ans: The size of an IP address is 32 bits (4 bytes).
Q 49. What are the components of an IP address?
Ans: A IP address consists of the following components: Network ID and Host ID. For example, in the IP address 192.9.205.21, the network ID is 192.9.205 and the host ID is 21.
Q 50. What is a network ID?
Ans: A network ID uniquely identifies a network. All the hosts in a single network will have the same network ID. For example, in the IP address 192.9.205.21, the network ID is 192.9.205. A router analyses only the network ID portion of an IP address for datagram forwarding.
Q 51. What is a host ID?
Ans: A host ID uniquely identifies a host in a network. Two hosts in two different networks can have the same host ID. For example, in the IP address 192.9.205.21, the host ID is 21.
Q 52. What is a unicast IP address?
Ans: A unicast IP address is an IP address uniquely identifying a host in a network. The datagram with a unicast IP address is received and processed by only a single host. For example, the IP address 192.9.205.21 is a unicast IP address.
Q 53. What is a multicast IP address?
Ans: A multicast address is an IP address identifying a particular group of hosts in network. This group of hosts is called a multicast group. For example, the IP address 225.2.100.1 is a multicast IP address.
Q 54. What is a broadcast IP address?
Ans: The datagram with a broadcast IP address is received and processed by all the hosts in the local network. For example, the IP addresses 255.255.255.255, 192.9.205.255, 180.10.255.255, 10.255.255.255 are broadcast IP addresses.
Q 55. How IP addresses are classified?
Ans: IP addresses are classified based on the number of bytes allocated to the Network ID and the Host ID in an IP address
Q 56. What is the use of classifying IP addresses?
Ans: IP addresses are classified so that networks and hosts can be easily managed.
Q57. What are the different classes of IP addresses?
Ans: IP addresses are classified into the following classes:
Class A
Class B
Class C
Class D
Class E
Q 58. How to determine the class of an IP address?
Ans: The class of an IP address can be determined from the first four bits of the first byte of the IP address.