Professional Documents
Culture Documents
a. Frequency of failure
b. Recovery time of a network after a failure
11.
a. Unauthorized Access
b. Viruses
12.
What is Protocol?
a. Connectivity
Define Routing?
It is possible that a switch receives packets faster than the shared link
can accommodate and stores in its memory, for an extended period of
time, then the switch will eventually run out of buffer space, and some
packets will have to be dropped and in this state is said to congested
state.
19.
What is Multiplexing?
What is FDM?
What is WDM?
WDM is conceptually the same as FDM, except that the multiplexing and
demultiplexing involve light signals transmitted through fiber optics
channel.
26.
What is TDM?
TDM is a digital process that can be applied when the data rate capacity
of the transmission medium is greater than the data rate required by the
sending and receiving devices.
27.
In STDM, the multiplexer allocates exactly the same time slot to each
device at all times, whether or not a device has anything to transmit.
28.
a. Physical Layer
b. Data Link Layer
c. Network Layer
d. Transport Layer
e. Session Layer
f. Presentation Layer
g. Application Layer
29.
a. Physical Layer
b. Data link Layer and
c. Network Layers
30.
a. Session Layer
b. Presentation Layer and
c. Application Layer
31. Which layer links the network support layers and user support
layers?
The Transport layer links the network support layers and user support
layers.
31.
The Data Link Layer transforms the physical layer, a raw transmission
facility, to a reliable link and is responsible for node-node delivery.
a. Framing
b. Physical Addressing
c. Flow Control
d. Error Control
e. Access Control
33.
a. Guided Media
i. Twisted - Pair cable
1. Shielded TP
2. Unshielded TP
ii. Coaxial Cable
iii. Fiber-optic cable
b. Unguided Media
i. Terrestrial microwave
ii. Satellite Communication
42.
a. Single-Bit error
In a single-bit error, only one bit in the data unit has changed
b. Burst Error
A Burst error means that two or more bits in the data have changed.
43.
d. Checksum
44.
What is Redundancy?
What is VRC?
What is LRC?
In LRC, a block of bits is divided into rows and a redundant row of bits is
added to the whole block. It can detect burst errors. If two bits in one
data unit are damaged and bits in exactly the same positions in another
data unit are also damaged, the LRC checker will not detect an error. In
LRC a redundant data unit follows n data units.
47.
What is CRC?
What is Checksum?
Data link protocols are sets of specifications used to implement the data
link layer. The categories of Data Link protocols are 1. Asynchronous
Protocols
2. Synchronous Protocols
a. Character Oriented Protocols
Define Retransmission?
In block coding, we divide our message into blocks, each of k bits, called
datawords. The block coding process is one-to-one. The same dataword
is always encoded as the same codeword.
55.
"r" redundant bits are added to each block to make the length n = k + r.
The resulting n-bit blocks are called codewords. 2n - 2k codewords that
are not used. These codewords are invalid or illegal.
56.
Cyclic codes are special linear block codes with one extra property. In a
cyclic code, if a codeword is cyclically shifted (rotated), the result is
another codeword.
58.
Define Encoder?
Define Decoder?
A device or program that translates encoded data into its original format
(e.g. it decodes the data). The term is often used in reference to MPEG2 video and sound data, which must be decoded before it is output.
60.
What is Framing?
Framing in the data link layer separates a message from one source to a
destination, or from other messages to other destinations, by adding a
sender address and a destination address. The destination address
defines where the packet has to go and the sender address helps the
recipient acknowledge the receipt.
61.
In byte stuffing (or character stuffing), a special byte is added to the data
section of the frame when there is a character with the same pattern as
the flag. The data section is stuffed with an extra byte. This byte is
usually called the escape character (ESC), which has a predefined bit
pattern. Whenever the receiver encounters the ESC character, it
removes it from the data section and treats the next character as data,
not a delimiting flag.
63.
Error control is both error detection and error correction. It allows the
receiver to inform the sender of any frames lost or damaged in
transmission and coordinates the retransmission of those frames by the
sender. In the data link layer, the term error control refers primarily to
methods of error detection and retransmission.
65.
Error control is both error detection and error correction. It allows the
receiver to inform the sender of any frames lost or damaged in
transmission and coordinates the retransmission of those frames by the
sender. In the data link layer, the term error control refers primarily to
methods of error detection and retransmission. Error control in the data
link layer is often implemented simply: Any time an error is detected in
an exchange, specified frames are retransmitted. This process is called
automatic repeat request (ARQ).
66.
In Stop and wait protocol, sender sends one frame, waits until it receives
confirmation from the receiver (okay to go ahead), and then sends the
next frame.
67.
What is Pipelining ?
path.
115. What is packet filter?
Packet filter is a standard router equipped with some extra functionality.
The extra functionality allows every incoming or outgoing packet to be
inspected. Packets meeting some criterion are forwarded normally.
Those that fail the test are dropped.
116. What is traffic shaping?
One of the main causes of congestion is that traffic is often busy. If hosts
could be made to transmit at a uniform rate, congestion would be less
common. Another open loop method to help manage congestion is
forcing the packet to be transmitted at a more predictable rate. This is
called traffic shaping.
117. What is multicast routing?
Sending a message to a group is called multicasting, and its routing
algorithm is called multicast routing.
118. What is region?
When hierarchical routing is used, the routers are divided into what we
will call regions, with each router knowing all the details about how to
route packets to destinations within its own region, but knowing nothing
about the internal structure of other regions.
119. What is silly window syndrome?
It is a problem that can ruin TCP performance. This problem occurs
when data are passed to the sending TCP entity in large blocks, but an
interactive application on the receiving side reads 1 byte at a time.
120. What are Digrams and Trigrams?
The most common two letter combinations are called as digrams. e.g. th,
in, er, re and an. The most common three letter combinations are called
as trigrams. e.g. the, ing, and, and ion.
121. Expand IDEA.
IDEA stands for International Data Encryption Algorithm.
122. What is wide-mouth frog?
When a switch receives a signal, it creates a frame out of the bits that was extracted
from that signal. With this process, it gains access and reads the destination address,
after which it forwards that frame to the appropriate port. This is a very efficient means of
data transmission, instead of broadcasting it on all ports.
140) When does network congestion occur?
Network congestion occurs when too many users are trying to use the same bandwidth.
This is especially true in big networks that do not resort to network segmentation.
141) What is a Window in networking terms?
A Window refers to the number of segments that is allowed to be sent from source to
destination before an acknowledgement is sent back.
142) Does a bridge divide a network into smaller segments?
Not really. What a bridge actually does is to take the large network and filter it, without
changing the size of the network.
143) Which LAN switching method is used in CISCO Catalyst 5000?
This model uses the Store-and-forward switching method. It stores the entire frame to its
buffers and performs a crc check before deciding whether or not to forward that data
frame.
144 ) What is the role of the LLC sublayer?
The LLC sublayer, short for Logical Link Control, can provide optional services to an
application developer. One option is to provide flow control to the Network layer by using
stop/start codes. The LLC can also provide error correction.
145) How does RIP differ from IGRP?
RIP relies on the number of hops in order to determine the best route to a network. On
the other hand, IGRP takes consideration many factors before it decides the best route
to take, such as bandwidth, reliability, MTU and hop count.
146) What are the different memories used in a CISCO router?
- NVRAM stores the startup configuration file
- DRAM stores the configuration file that is being executed
- Flash Memory stores the Cisco IOS.
Latency is the amount of time delay that measures the point from which a network
device receives a data frame to the time it sends it out again towards another network
segment.
155) Utilizing RIP, what is the limit when it comes to number of hops?
The maximum limit is 15 hop counts. Anything higher than 15 indicates that the network
is considered unreachable.
156) What is a Frame Relay?
Frame Relay is a WAN protocol that provides connection-oriented communication by
creating and maintaining virtual circuits. It has a high performance rating and operates at
the Data Link and Physical Layers.
157) How do you configure a Cisco router to route IPX?
The initial thing to do is to enable IPX routing by using the ipx routing command. Each
interface that is used in the IPX network is then configured with a network number and
encapsulation method.
158) What are the different IPX access lists?
There are two access lists: Standard and Extended. Standard Access List can only filter
the source or destination IP address. An Extended Access List uses the source and
destination IP addresses, port, socket and protocol when filtering a network.
159) Explain the benefits of VLANs.
VLANs allow the creation of collision domains by groups other than just physical
location. Using VLANs, it is possible to establish networks by different means, such as
by function, type of hardware, protocol, among others. This is a big advantage when
compared to conventional LANs wherein collision domains are always tied to physical
location.
160) What is subnetting?
Subnetting is the process of creating smaller networks from a big parent network. Being
a part of a network, each subnet is assigned some additional parameters or identifier to
indicate its subnet number.
161) What are the advantages of a layered model in the networking industry?
HDLC is short for High Level Data Link Control protocol, and is a propriety protocol of
CISCO. It is the default encapsulation operated within CISCO routers.
169) How are internetworks created?
Internetworks are created when networks are connected using routers. Specifically, the
network administrator assigns a logical address to every network that connects to the
router.
170) What is Bandwidth?
Bandwidth refers to the transmission capacity of a medium. It is a measure of how much
volume a transmission channel can handle, and is measured in Kbps.
171) How does Hold-downs work?
Hold-downs prevent regular update messages from reinstating a downed link by
removing that link from update messages. It uses triggered updates to reset the holddown timer.
172) What are packets?
Packets are the results of data encapsulation. These are data that has been wrapped
under the different protocols of the OSI layers. Packets are also referred to as
datagrams.
173) What are segments?
Segments are sections of a data stream that comes from the upper OSI layers and
ready for transmission towards the network. Segments are the logic units at the
Transport Layer.
174) Give some benefits of LAN switching.
- allows full duplex data transmission and reception
- media rate adaption
- easy and efficient migration
175) What is Route Poisoning?
Route Poisoning is the process of inserting a table entry of 16 to a route, making it
unreachable. This technique is used in order to prevent problems caused by inconsistent
updates on a route.
The hostname and the Interfaces. The hostname is the name of your router. The
Interfaces are fixed configurations that refer to the router ports.
182) Differentiate Logical Topology from Physical Topology
Logical Topology refers to the signal path through the physical topology. Physical
Topology is the actual layout of the network medium.
183) What causes a triggered update to reset the router hold-down timer?
This may happen when the hold-down timer has already expired, or when the router
received a processing task that incidentally was proportional to the number of links in the
internetwork.
184) In configuring a router, what command must be used if you want to delete the
configuration data that is stored in the NVRAM?
B. erase startup-config
185) Referring to the commands shown, what command must next be used on the branch
router prior to traffic being sent to the router router?
Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit
Correct Answer: (config-if)# dialer-group 1
186) When configuring a router utilizing both physical and logical interfaces, what factor
must be considered in determining the OSPF router ID?
A. The highest IP address of any physical interface.