Sunteți pe pagina 1din 4

Q : Explain the distance vector routing algorithm?

A : Distance Vector Routing Algorithms is calculate a best route to reach a destination based solely on
distance.

Q : What is FTP & UDP? What’s the different version of IP?


A : FTP or File Transfer Protocol is used to transfer data from one computer to another over the Internet,
or through a network
User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP,
programs on the networked computers can send short messages sometimes known as datagrams(using
Datagram Sockets) to one another.
IP versions IPv6,IPv4

Q : Why we use cross the cable to connect same devices?


A : Same devices like PC-2-PC, it uses(NIC for PC) 1,2 for transmission & 3,6 for reception. If we do not
use cross cable then we can't transfer data.

While in the case of switch/hub they receive (NIC of SWITCH/HUB)data on 1,2 & transmit on 3,6.

So we use straight cable for de-similar host & cross cable for similar hosts.

Q : what’s the difference between ATM and ISDN?


A :ATM is Packet Switching or Cell switching. ISDN is a Circuite switching .

Q : What is the TCP/IP ? what is the use of TCP/IP?


A :Integrated Services refers to ISDN's ability to deliver at minimumof two simultaneous connections, in
any combination of data, voice, video, and fax, over a single line. Multiple devices can be attached to the
line, and used as needed. That means an ISDN line can get care of most people's complete
communications needs at a much higher transmission rate, without forcing the purchase of multiple
analog phone lines.
Asynchronous Transfer Mode (ATM) is a cell relay, packet switching network and data link layer protocol
which encodes data traffic into small (53 bytes; 48 bytes of data and 5 bytes of header information) fixed-
sized cells. ATM provides data link layer services that run over Layer 1 links. This differs from other
technologies based on packet-switched networks (such as the Internet Protocol or Ethernet), in which
variable sized packets (known as frames when referencing layer 2) are used. ATM is a connection-
oriented technology, in which a logical connection is established between the two endpoints before the
actual data exchange begins.

Q : What do you mean by Twisted-pair Cabling ?


A : A type of cable that consists of two independently insulated wires twisted around one another. The
use of two wires twisted together helps to reduce the crosstalk and electromagnetic induction.

Q :What is the seven layers in Open System Interconnection model.


A : The seven layers are Application, Presentation, Session, Transport, Network, Data link, and Physical.

Q : what is a Transaction server?


A : A transaction server is the client invokes remote procedures that reside on the server with an SQL
database engine. These remote procedures on the server execute a group of SQL statements. The
network exchange consists of a single request/reply message. The SQL statements either all succeed or
fail as a unit.
Q : What is mean by Transparency?
A : Transparency really means hiding the network and its servers from users and even the application
programmers.

Q :What are the two types of OLTP?


A : TP lite, based on the stored procedures. TP heavy, based on the TP monitors.

Q : Difference between trigger and rule?


A : The triggers are called implicitly by database generated events, while stored procedures are called the
explicitly by client applications.

Q : Explain building blocks of Client/Server?


A : The client side building block runs the client side of the application.
The server side building block runs the server side of the application.

Q : What is the Structured Query Langauge (SQL)?


A : SQL is a powerful set-oriented language which was developed by IBM research for the databases that
adhere to the relational model. It consists of a short list of powerful, yet highly flexible, commands that can
be used to manipulate information collected in tables. Through the SQL, we can manipulate and control
sets of records at a time.

Q : What are the main components of Transaction-based Systems?


A : The main components of trasaction based systems are Transaction Manager, and Resource
Manager Application Program.

Q : What is a File server?


A : A File servers are useful for sharing files across a network. With a file server, the client passes
requests for file records over network to the file server

Q : What’s the differences between a domain and a workgroup?


A : A domain, one or more computer can be a server to manage the network. On the other hand in a
workgroup in all computers are peers having no control on each other. In a domain, user doesn’t need an
account to logon on a specific computer if an account is available on the domain. In a work group user
needs to have an account for every computer.
In a domain, Computers can be on different local networks. In a work group all computers needs to be a
part of the same local network.

Q : Explain the term Protocol?


A : The term Protocol is a standard way of communicating across a network. A protocol is the "language"
of the network. It is a method by which two dissimilar systems can communicate. TCP is a protocol which
runs over a network.

Q : What is Telnet?
A : Telnet is the main part of Internet protocol for creating a connection to a remote server.

Q : What is a MIB?
A : A MIB (Management Information Base) is part of every SNMP-managed device. Each SNMP agent
has the MIB database that contains information about the device's status, its performance, connections,
and configuration. The MIB is queried by SNMP.

Q :What is a NVT (Network Virtual Terminal)?


A : NVT is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of
a Telnet session.
Q : What are the possible ways of data exchange?
A : The possible ways of data exchange are Simplex and Half-duplex Full-duplex.

Q : What are the main important topologies for networks?


A : STAR topology:
In this all computers are connected using a central hub.
Advantages:
Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.

BUS topology:
In this each computer is directly connected to primary network cable in a single line.
Advantages:
In expensive, easy to install, simple to understand, easy to extend.

RING topology:
In this all computers are connected in loop.
Advantages:
All computers have equal access to network media, installation can be simple, and signal does not
degrade as much as
in other topologies because each computer regenerates it.

Q : What is a mesh network


A : A mesh network in which there are multiple network links between computers to provide multiple
paths for data to travel.

Q : What is ACID property?


A : The ACID is a term coined by Andrew Reuter in 1983, which stands for Atomicity, Consistence,
Isolation and Durability.

Q : What is a point-to-point protocol?


A : Point to point protocol is a communications protocol used to connect computers to remote networking
services including Internet service providers.

Q : What are the most typical functional units of the Client/Server applications?
A : There are User interface Business Logic and Shared data.

Q : What are Triggers and Rules?


A : Triggers are special user defined actions usually in the form of stored procedures, that are
automatically invoked by the server based on the data related events. It can perform complex actions and
can use the full power of procedural languages.
A rule is a special type of trigger that is used to the perform simple checks on data.

Q : What is RPC?
A : The Remote Procedure Call (RPC) hides the intricacies of the network by using the ordinary
procedure call mechanism familiar to every programmer. A client process calls a function on a remote
server and suspends itself until it gets back the results. Parameters are passed like in any ordinary
procedure. The RPC, like an ordinary procedure, is synchronous. The process that issues the call waits
until it gets the results.
Under the covers, the RPC run-time software collects values for the parameters, forms a message, and
sends it to the remote server. The server receives the request, unpack the parameters, calls the
procedures, and sends the reply back to the client. It is a telephone-like metaphor.
Q : What is the difference between the transmission and communication?
A : Transmission is a physical movement of information and concern issues like bit polarity,
synchronization, clock etc..Communication means the meaning full exchange of information between two
communication media.

Q : What is Beaconing?
A : The process that allows a network to self-repair networks problems. The stations on the network
notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in
Token ring and FDDI networks

Q : What’s the difference between ARP and RARP?


A : The address resolution protocol (ARP) is used to the associate the 32 bit IP address with the 48 bit
physical address, used by a host or a router to find the physical address of another host on its network by
sending a ARP query packet that includes the IP address of the receiver.

The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it is
know only its physical address.

S-ar putea să vă placă și