Copyrights © 2012 Jatin Kotadiya. All Rights Reserved . Powered by Blogger.

Monday, November 12, 2012

Networking Interview Questions



Software Assurance (SA) is a way for Volume Licensing customers to keep up to date with the latest and most innovative Microsoft products. Customers acquire the right to install any new release of a product covered in the agreement during the term of the coverage.
A Windows Server Device CAL permits one device to access or use the server software; whereas, a Windows Server User CAL permits one user irrespective of a device to access or use the server software.
When you acquire licenses from Microsoft and its partners in certain quantities or volumes, they offer discounts from their retail product prices. Volume Licensing programs offer companies of all sizes an economical way to buy and manage multiple software licenses for as few as five desktops.
No, Windows Server 2008 or Windows Server 2003 R2 can be upgraded to Windows Server 2008 R2.
FCI provides a built-in solution to classify and manage files to users and help them to save time and money. Administrators can automatically classify files based on content and location, generate reports, and schedule file management tasks to manage data.
The Windows Server 2008 CAL grants the right to a device or user to access the server software; whereas, the Windows Server 2008 R2 license gives the license holder the right to create, copy, store, and run the server software.
Hyper-V Processor Compatibility Mode allows live migration across different CPU versions within the same processor family, such as Intel Core 2 to Intel Pentium 4 or AMD Opteron to AMD Athlon. It also enables migration across a broader range of server host hardware.
Live migration enables customers to move virtual machines from one host to another with no perceivable downtime. It facilitates hardware maintenance, and upgrades manual failover and the consolidation of workloads on fewer servers.
Netsh is a command-line scripting utility that is used to display or modify the network configuration of a computer that is currently running. Both remote computers and local computers can be configured by using the netsh command. Netsh also provides a scripting feature that allows you to run a group of commands in batch mode against a specified computer.
Multiple active firewall profiles enable the firewall rules most appropriate for each network adapter based on the network to which it is connected.
NDF, Network Tracing, and Netsh Trace integrate the Network Diagnostics Framework with Network Tracing and a new Netsh context, Netsh Trace, to simplify and consolidate network connectivity troubleshooting processes.
Mobile broadband device support provides a driver-based model for devices that are used to access a mobile broadband network.

URL-based QoS enables administrators to assign a priority level to traffic based on the Uniform Resource Locator (URL) from which the traffic originates.


BranchCache enables updated content from file and Web servers on a Wide Area Network (WAN) to be cached on computers at a local branch office, improving application response time and reducing WAN traffic.


VPN Reconnect automatically re-establishes a VPN connection as soon as Internet connectivity is restored, saving users from re-entering their credentials and recreating the VPN connection.

DirectAccess enables users to access an enterprise network without the extra step of initiating a Virtual Private Network (VPN) connection.


Following are the new networking features in Windows 2008 R2:
1. DirectAccess
2. VPN Reconnect
3. BranchCache
4. URL-based Quality of Service (QoS)
5. Mobile broadband device support
6. Multiple active firewall profiles
7. NDF, Network Tracing, and Netsh Trace


For both Windows 2003 and Windows 2008, available service packs are SP1 and SP2.


Client and server are two different machines (physical or virtual) connected in such a manner that whenever a client posts some request to a server, the server provides an appropriate response to the client.

Device driver Is a software component that provides an interface between the hardware of a computer and its operating system. Hardware, such as keyboards, controllers, and graphics cards, requires device drivers so that the operating system can detect the devices and handle them effectively and efficiently.
NetBIOS stands for Network Basic Input / Output System. It is an application interface, which operates at the session layer. It enables communication between applications with NetBIOS compliant protocol. NetBIOS applications can be supported over Transmission Control Protocol/Internet Protocol (TCP/IP) and IPX/SPX.
IPX/SPX stands for Internetwork Packet Exchange/Sequenced Packet Exchange. It is used in the Netware environment. IPX runs at the network layer of the Open Systems Interconnection (OSI) model; whereas, SPX runs at the transport layer of the OSI model.
 NetBEUI is designed for peer-to-peer network and is a high speed protocol used on small networks. It provides a good recovery and error protection.
No, it is not routable.
A network binding binds a protocol to an adapter to carry traffic using that protocol.
 
FDDI is a token-passing dual ring fiber optic LAN specification. It supports higher transmission speeds across larger distances of around 2 km (1.3 miles) between two stations.
 
The maximum network length of 10Base2 is 185 m for each segment and can be extended up to five segments.
The maximum network length of 10Base5 is 500m for each segment and can be extended up to five segments.
 Maximum stations that can be connected to 10Base2 are 30 stations.
Maximum stations that can be connected to lOBaseT are 1024 stations per network.
Maximum stations that can be connected to 10Base5 are 100 nodes per segment and maximum network length of 10Base5 is five segments, that is, approximately 2500 m or 8200 ft.
Transmission failure can be caused by the following reasons:
1.    Bad cabling
2.    Improper termination
3.    Collisions
4.    Improper cable length.
A token is a small frame, which is passed from one node to another in a token ring network. If a node has data to send, it must wait until it receives a token. After the token is received by the node, it seizes the token, marks it as used, and attaches the data. The frame is then addressed to the destination node and the node continues passing the data around the ring until it arrives at the destination node. The destination node copies the data and marks the frame as received. When the sender node receives the frame, it implies that the data is successfully delivered. The sender node then frees the token to be used by another node.
 CSMA/CD is a layer 2 access method in which if a transmitting data station detects another signal while transmitting a frame, it stops transmitting the frame. Instead of the frame, it transmits a jam signal, and then waits for a random time interval before trying to send the frame again.
Carrier Sense Multiple Access / Collision Detection (CSMA/CD) and token passing.
A hub is a device that connects multiple user stations, each through a dedicated cable.
A repeater is a device used to interconnect the media segments of an extended network. It enables a series of cable segments to be treated as a single cable. Repeaters receive signals from one network segment and amplify, retime, and retransmit those signals to another network segment to prevent signal deterioration caused by long cable lengths and large numbers of connected devices.
 
The commonly used devices in a LAN network are repeaters, hubs, LAN extenders, bridges, LAN switches, and routers.
A tree topology is a LAN architecture that is similar to the bus topology but with multiple nodes. It can also be defined as a combination of the bus and star topologies.
 Bus, ring, star, mesh, tree, and cellular topologies are used for LANs; whereas, point-to-point, multipoint, mesh, and cloud topologies are used for WANs.
Normally, USB cables are limited to 5m; however, hubs can be used as an active USB repeater to extend the cable length for up to 5m at a time.
USB hubs can generally extend a USB network to a maximum of 127 ports.
  RJ-11 is used to connect a modem to wall jack.
 USB is an external hardware interface and communications standard that is utilized for connecting varied peripherals to a computer, such as mouse, external drive, digital cameras, memory sticks, and gaming peripherals.
The FU-45 connector is an industry standard for Ethernet and Fast Ethernet networking. It is used to attach short cable (patch cable) to connect the computer to wall jack.
The RJ-11 connector is generally used to connect standard telephone cord.
 
The different types of connectors are DB-9, DB-25, RJ-11, RJ- 45, Bayonet Neill-Concelman (BNC), PS2/MINI-DIN, and Universal Serial Bus (USB).
   Ethernet network cards use the RJ-45 connector; whereas, wireless network cards usually have no external connections other than an antenna jack.
   The different types of network card are as follows:
1.    Ethernet card
2.    Wireless network card
3.    Token Ring network card.
  A network card Is an expansion card installed in a computer that enables the computer to be physically connected to a network.

0 comments:

Post a Comment