Latest MCSE Interview Questions Part – 3
1.What is multicasting?
Multicasting allows a single message to be sent to a group of recipients. Emailing,teleconferencing,are examples of multicasting. It uses the network infrastructure and standards to send messages.
2.Explain the functionality of PING.
Ping Is particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address. The output returns the data packets information. The number of packets sent,received and lost is returned by PING.
3.Explain the core naming mechanism,Domain Name System (DNS).
A Domain Name system is used to convert the names of the website on the internet to IP addresses. The domain names for each IP addresses are stored in a database that is distributed across different servers. A domain name space consists of a tree of domain names.
The tree has zones. Zones consist of a collection of connected nodes. These nodes are served by a name server. A domain name is usually in the form of my domain. com. Here,.com is the top level domain. Whereas my domain is the sub domain or subdivision. A host name is a domain name that has one or more IP addresses associated with it.
4.Define DNS.
The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites. DNS implements a distributed database to store this name and address information for all public hosts on the Internet.
5.Define Telnet.
Telnet is the main Internet protocol for creating a connection to a remote server.
6.Define Spanning-Tree Protocol (STP).
Spanning-
Tree Protocol (STP) as defined in the IEEE 80
2.1D is a link management protocol that provides path redundancy while preventing undesirable loops in the network. For an Ethernet network to function properly,only one active path can exist between two stations. Loops occur in networks for a variety of reasons.
The most common reason you find loops in network is the result of a deliberate attempt to provide redundancy- in case one link or switch fails,another link or switch can take over.
7.What is the difference between bit rate and baud rate?
Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits. Baud rate= bitrate/N where N is no of bits represented by each signal shift.
8.What is Tunneling?
Tunneling is a mechanism provided to transfer data securely between two networks. The data is split into smaller packets and passed through the tunnel. The data passing through the tunnel has 3 layers of encryption. The data is encapsulated. Tunneling can be approached by Point to Point tunneling protocol.
9.What are voluntary and compulsory tunnels?
Voluntary Tunneling: Users computer is an end point of the tunnel and acts as tunnel client. Here the client or user issues a request to configure and create a voluntary tunnel. They require a dial up or LAN connection.
Example of dial up connection is internet at home where a call is made to the ISP and connection is obtained. Compulsory tunneling: In compulsory tunneling,instead of the user a vpn remote access server configures and creates a tunnel. Hence,the end point is the Remote sever not the user.
10.Explain static and dynamic tunnels.
Tunnels that are created manually are static tunnels. Tunnels that are auto discovered are dynamic tunnels. In dynamic tunneling,tcp connections can be checked dynamically. If no connections exist that are routed through the tunnel,a check for more suitable gateway can be done. Static tunneling may at times require dedicated equipment’s.
11.Describe the concept of Subneting.
Subneting is a process of breaking the network into smaller units. These units care called as subnets. Here a subnet could be several machines in a single LAN. Networks using IP can create sub networks of logical addresses.
With every IP address there some of the bits in the machine can be used to identify a specific subnet. The IP address then contains three parts: the network number,the subnet number,and the machine number.
12.Explain the advantages of using Subneting.
Advantages of using Subneting:-
1. Easier network management and trouble shooting
2. Routing table’s size is reduced which means faster network transfers
3. Solves network congestion problems:- Since the complete network is divided into smaller networks
4. Network addresses can be decentralized e.g. the administrator of the network can monitor the subnet .
13.What is custom Subneting?
Subnets that can be customized; i.e. modifying the dividing point between subnet ID and host ID to suit the needs of our network. The subnet mask that we use when creating a customized subnet is,called a custom subnet mask. This custom subnet mask is used to find the customization.
14.Explain the importance of increasing and decreasing subnet bits.
Adding 1 ‘s as a bit means increasing the subnets and decreasing the hosts. Removing or decreasing l’ s means decreasing subnets and increasing hosts. Hence by increasing or decreasing the subnet architecture can be decided as per needs.
15.Why do we need a subnet mask?
A subnet mask allows identification of host part and network part of an IP address. Subnet mask can be used to find if an IP address is present on a subnet or not.
16.What is RTP?
Real-Time Transfer Protocol lays a standard or a way to transfer or manage real time data over a network. It does not guarantee the delivery of data or provide any quality of service. However it helps to manage the data.
Which means that RTP can be used deliver the necessary data to the application to make sure it can put the received packets in the correct order Real time data examples could be audio and video.
17.What is RTP Multiplexing?
RTP multiplexing allows multiple media flows within a single RTP data payload between two points. This means that it can be used to carry multiple streams of data in one RTP packet. RTP multiplexing will reduce the bandwidth used. RTP multiplexing will also increase scalability.
18.Explain the use of RTP and RTCP protocols.
Use of RTP and RTCP:-
1. RTP can be used to transfer Real time data like voice packets.
2. RTP can be used with RTCP which makes it possible to monitor data.
3. Packet loss can be detected by RTP using Sequence number RTCP provides Qos feedback :- Packets lost,round trip time.
19.Define IP multicast.
IP multicast technology reduces traffic by sending stream of information to many recipients at one go. Video conferencing,stock quotas are the examples based on IP multicast.
20.Describe how the multicast protocol works.
Multicast protocol or Internet protocol delivers a singles message to multiple machines. One packet from the source is replicated and sent to the destination. Every multicast message requires a multi case group. The group defines the addresses which will receive the message.
The group is defined by the class D address. Different routing protocols are used to find the multicast groups and build routes for them. Distance Vector Multicast protocol is one of them.
The receiver,to whom the multicast packet is sent to,needs to ‘join’ the group. Joining the group is enabled and managed by IGMP. Multicast routers are used to transmit the messages from one network to another.
21.Explain why use Multicasting.
1. When the same message or packet needs to be sent to multiple destinations,multicasting is used.
2. Within campus and offices,using multicasting file distribution can be done.
3. System messages,news and videos can be sent at the same time.
4. More commonly used for audio and video streaming.
22.What is the difference between public and private IP?
A public IP address allows equipment accessible to everyone on the internet. A private IP address is for private use within the network and allows many more PCs to be connected. If you are using a private IP and wants VOIP,you need to change to a public IP address.
23.What is Address Resolution Protocol(ARP)?
Address Resolution Protocol ARP,is responsible for mapping an IP address to its corresponding physical network address.
24.What is Routing Protocol?
Routing Protocol is the way to send routing information between any routers in an autonomous system.
25.Explain how names are translated (resolved ) into IP address?
Domain Name Server or DNS is used to resolve names into IP address. When a web address is entered into the browser,the DNS client sends a request to the DNS server to find the corresponding IP address for the name. The DNS server receives this request and searches for the corresponding IP address in the database.
If at this point the resolution fails,this server sends this request to the parent server. The request keeps going up the hierarchy to the parent servers or the closest authoritive of the DNS server to resolve the address. If the request times out an error is returned to the client.
if the server is able to resolve the name requested,it passes the information back to client. The next request sent by the client is to request for a web page for the IP address.
26.What is the difference between L3 Switch and Router,if they perform the same function why do we need both of them?
Layer 3 switches do routing with ASIC chips. Routers do it with a microprocessor and its associated software. Therefore,the Layer 3 switches are much faster than traditional but cost more. We need them both because in many situations a slow router is sufficient and cheaper than a gigabit layer 3-switch router.
27.What are the features of BGP Protocol? How it is different to other protocol?
Border Gateway Protocol is the core routing protocol .It works by maintaining a table of IP networks,which designate network reach ability among autonomous systems (AS).
It is described as a path vector protocol BGP does not use traditional IGP metrics,but makes routing decisions based on path,network policies,and/or rule sets. BGP replace the EGP routing protocol to allow fully decentralized routing in order to allow the removal of the NSFN et internet backbone network.
28.What is HPOV? How does it work? What are its monitoring tools?
HP Open View is a suite of business computer management or “e-services” programs from Hewlett-Packard,which states that the suite is “among the world’s 20 largest software businesses”. The Open View programs HP 9000 and e3000 business server customers.
An HP customer’s IT professionals can use Open View to manage applications,device availability,network conditions and status,system performance,service and program maintenance,and storage resources.
29.Can we have two DHCP servers within one network? if not,why? if yes,will the IP address conflict?
NO,we cannot have two DHCP servers in one network,because it provide IP address to the clients. If two servers are supposed to distribute at a time there will be a conflict of the given and reserved IP address between two distribution points.
30.What is intra-VLAN how does it work. Where do we create a VLAN if we enable one trucking on each side of switch. What is supernating?
Virtual LAN’s divide one physical network into multiple broadcast domains. However,VLAN-enabled switches cannot by themselves,forward traffic across VLAN boundaries. Therefore,you need to have routing between these VLANs,which is inter-VLAN routing.
You can achieve this by using either a Layer 3 switch or a router. Host Portion Borrowed From Network Portion is called SUPERNATING.