Monday, 23 January 2017

 


Windows Server 2008 R2 Hyper-V

Public FAQ







Contents






New Functionality in Windows Server 2008 R2 Hyper-V Release Candidate (RC) Build

Q:  What is new in the Windows Server 2008 R2 Hyper-V RC build compared to the R2 Beta?
A:  The Windows Server 2008 R2 Hyper-V Release Candidate build includes the following improved and new functionality over beta.
·         Support for up to 64 Logical Processors –increasing the logical processors support from 24 to 64 enables customers to achieve higher consolidation ratios and more scalable virtualization scenarios on Windows Server than ever before.
·         Processor Compatibility Mode for live migration– allows live migration across different CPU versions within the same processor family, (e.g.”Intel Core 2-to-Intel Pentium 4” or “AMD Opteron-to-AMD Athlon”) enabling migration across a broader range of Hyper-V host hardware.
·         VM Chimney (TCP Offload) and VMQ support are disabled by default

The following are new Windows Server 2008 R2 Hyper-V features that were also in the R2 beta.
·         Live Migration
·         Jumbo Frame Support
·         Hot Add/Remove of storage (VHDs and Pass Through Disks)
·         Second Level Address Translation (SLAT) processor support for both Intel (EPT) and AMD (RVI)
·         Core Parking
·         Improved network performance via support for TCP Chimney and VMQ (specific hardware NICs required)
·         Improved VHD performance for dynamic and difference disks
Q:  When will the Windows Server 2008 R2 Hyper-V RC build be released?
A:  Windows Server 2008 R2 Hyper-V RC is currently available from www.microsoft.com/hyper-v.

Windows Server 2008 R2 Hyper-V RC Production Support

Q:  Are production deployments of Windows Server 2008 R2 Hyper-V RC supported?
A:  Windows Server 2008 R2 Hyper-V is still in the pre-release phase and production deployments are not recommended / supported.

Windows Server 2008 R2 Hyper-V Questions           

Q: What does WS08 R2 Hyper-V contain?
A: With WS08 R2 Hyper-V, customers will get a compelling solution for core virtualization scenarios – Production server consolidation, dynamic datacenter, test & development and business continuity. With the initial version of Hyper-V, we have seen massive customer interest and adoption for Hyper-V with over 300K downloads of the RTM and the latest IDC report showing that Microsoft has 23% market share in virtualization. Windows Server 2008 R2 provides customers better flexibility with features like live migration and cluster shared volumes for storage flexibility; greater scalability with support for up to 64 logical processors and improved performance with support for enhanced networking support (TCP offload support for virtual machines) and support for hardware page tables.
Q: What’s new in R2?
A: The major technology investment areas for WS08R2 are Virtualization, Web, and Management these along with several features that improve Scalability & Reliability and deliver a strong value proposition along with WIN7 Clients.  These features include:
·         Live Migration - Allows customers to move virtual machines from one host to another in seconds with no loss of performance. This facilitates hardware maintenance and upgrades, manual failover, and the consolidation of workloads on fewer servers. Automation in the datacenter also helps trim IT spending on labor and maintenance.
·         DirectAccess– Allows remote workers to securely connect to their work environment as if they were on the corporate network and it also lets IT administrators manage those PCs as if they were on premise, without the use of a VPN. Resulting in greater flexibility for remote workers and reduced office costs. 
·         Branch Cache – Customers can greatly reduce Wide Area Network (WAN) bandwidth consumption between the datacenter and branch offices. The result is a significant reduction in networking costs because most organizations pay for bandwidth by the byte.

Q: What is the number of logical processors that will be supported by Hyper-V in Windows Server 2008 R2?
A: Hyper-V in Windows Server 2008 R2 will support up to 64 logical processors in the physical machine.
Q: Why is there a difference between the number of logical processors supported in Windows Server 2008 R2 and the number of logical processors supported by Hyper-V?
A: The Windows Server OS is designed to run on the widest range of HW from single processor servers to the largest scale-up servers.  Hyper-V is designed for the most common hardware configurations that customers will deploy for virtualization.  The vast majority of servers that will be deployed for virtualization will be 2 and 4 socket servers.  Hyper-V will support up to 64 logical processors in Windows Server 2008 R2 and we will continue to work with our partners to provide solutions to help customers take advantage of future hardware innovations to meet their current and future business needs.

Q: When will Microsoft Windows Server 2008 R2 Hyper-V RTM?
A: Server 2008 R2 will RTM in the second half of 2009.
Q:  How many guest OSes can I run?
A:  The actual number of guest OSes will depend on the physical hardware and the characteristics of the different virtualized workloads. Windows Server 2008 R2 Hyper-V will support upto 64 logical processors and 1 TB of memory for the host system. We will announce the maximum number of guest instances than can run on Microsoft Windows Server 2008 R2 Hyper-V closer to RTM.  Additionally, each guest OS must have a valid license.

Clustering and Live Migration

Q:  Up to how many nodes on a cluster does Live Migration support?
A:   Live Migration is supported on up to 16 node failover clusters.
Q:  What is the maximum number of supported VMs per node?
A:  For production deployment, up to 32 VMs per node for server workloads and up to 64 VMs per node for VDI workloads are supported.  Customers must plan for adequate capacity when a failover occurs and VMs from the failed host are brought online on different nodes of the cluster.    
Q:  Will Live Migration work on with a cluster of mixed AMD and Intel host nodes?
A:   For Live Migration or Quick Migration to work, all cluster nodes must have processors from the same processor vendor, for example Intel or AMD.
Q:  Assuming host nodes have a virtualization capable processor from the same manufacturer, can I migrate a VM from a host using an older processor to a host with a newer processor?
A:  It is highly recommended to use identical processors on all nodes of a cluster using Quick or Live Migration. 
A new functionality introduced in RC is the “Processor Compatibility Mode” option. This functionality can be enabled for VMs to allow both Live Migration and Quick Migration from newer to older processors from the same manufacturer.
The setting is under VM settings > Processor > “Migrate to a physical computer with a different processor version”.
You can live migrate or quick migrate a running VM from an older processor to new processor and back without the “Processor Compatibility Mode” option as long as the VM is running all the time.
Q:  Are there any new tools included with Windows Server R2 Server Core to help manage the Hyper-V?
A:  A new server configuration script is available in the Windows Server 2008 R2 Hyper-V RC.  Type sconfig at the command line to start the server configuration utility.

Supported Guests

Q:  What operating systems are supported as guests on Windows Server 2008 R2 Hyper-V RC?
A:  The following operating systems are supported as guests with integration services with Windows Server 2008 R2 Hyper-V RC:
·         Windows Server 2000 Server and Advanced Server with SP4 (uniprocessor)
·         Windows XP SP3 32 bit (uniprocessor)
·         Windows Vista SP1 32 & 64 bit (uniprocessor)
·         Windows 7 client 32 & 64 bit (uniprocessor)
·         Windows 7 client 32 & 64 bit (multiprocessor, two virtual processors)
·         Windows Server 2003 SP2 32 & 64 bit (uniprocessor)
·         Windows Server 2003 SP2 32 & 64 bit (multiprocessor, two virtual processors)
·         Windows Server 2003 R2 SP2 32 & 64 bit (uniprocessor)
·         Windows Server 2003 R2 SP2 32 & 64 bit (multiprocessor, two virtual processors)
·         Windows Server 2008 32 & 64 bit (uniprocessor)
·         Windows Server 2008 32 & 64 bit (multiprocessor, four virtual processors)
·         Windows Server 2008 R2 32 & 64 bit (uniprocessor)
·         Windows Server 2008 R2 32 & 64 bit (multiprocessor, four virtual processors)
·         SUSE Linux Enterprise Server 10 (x86/x64) (uniprocessor, no integration components)
Q:  What Linux guests are supported in Windows Server 2008 R2 Hyper-V RC?
A:  Windows Server 2008 R2 Hyper-V is still in the pre-release phase and production deployments are not recommended / supported. Single processor VMs of SUSE Linux Enterprise Server 10 without integration components are currently the only recommended Linux distribution during RC.  

Hyper-V Upgrade Guidance

Windows Server 2008 Hyper-V à Windows Server 2008 R2 Hyper-V (RC)

Q:  Can I upgrade my existing Windows Server 2008 Hyper-V host to Windows Server 2008 R2 Hyper-V RC?
A:  Yes.  Upgrade of Hyper-V installations from WS2008 Hyper-V to WS2008 R2 Hyper-V RC is supported. You can perform an in-place upgrade of your machine from Windows Server 2008 to Windows Server 2008 R2 and still have the Hyper-V role enabled on the system.
Q:  I have a number of virtual machines that I created using Windows Server 2008 Hyper-V.  Can I move these virtual machines to Windows Server 2008 R2 Hyper-V RC?
A: The following methods of moving a VM from WS2008 Hyper-V to WS2008 R2 Hyper-V RC will be supported:
1.      In-place upgrade of the host from WS2008 Hyper-V to WS2008 R2 Hyper-V RC.
2.      Exporting a VM from a machine running WS2008 Hyper-V and importing to a machine running WS2008 R2 Hyper-V RC.
3.      Backing up a VM from WS2008 Hyper-V and restoring it on WS2008 R2 Hyper-V RC
At the end of each operation above, the VM configurations that were created in WS2008 Hyper-V will still be registered in WS2008 R2 Hyper-V RC.
Although all guest synthetic devices with continue to function with the older drivers on RC, updating the guest integration services to the latest R2 version is highly recommended to access the optimal performance of the R2 drivers and integration services of RC. 

Windows Server 2008 R2 Hyper-V (Beta) à Windows Server 2008 R2 Hyper-V (RC)

Q:  Will I be able to upgrade my Windows Server 2008 R2 Hyper-V (Beta) host to the R2 RC?
A:   Yes. Upgrade of installations from Windows Server 2008 R2 Hyper-V Beta to Windows Server 2008 R2 Hyper-V RC is supported. You can perform an in-place upgrade of your machine from Windows Server 2008 R2 Hyper-V Beta to Windows Server 2008 R2 Hyper-V RC and still have all the virtual machines available.
Q:  Will I be able to reuse my virtual machines that were created with the R2 beta release with Windows Server 2008 R2 Hyper-V RC?
A:  The following methods of moving a VM from R2 Beta to R2 RC will be supported:
1.      In-place upgrade of the host from Windows Server 2008 R2 Hyper-V Beta to Windows Server 2008 R2 Hyper-V RC.
2.      Exporting a VM from a machine running HVS2008 R2 Beta and importing to a machine running Windows Server 2008 R2 Hyper-V RC.
3.      Backing up a VM from Windows Server 2008 R2 Hyper-V Beta and restoring it on Windows Server 2008 R2 Hyper-V RC
Save states and snapshots will upgrade normally with beta to RC upgrades.
Although all guest synthetic devices with continue to function with the beta drivers on RC, updating the guest integration services to the latest R2 version is highly recommended to access the optimal performance of the R2 drivers and integration services for RC.

Future release upgrade path:   Windows Server 2008 R2 Hyper-V (RC) à Windows Server 2008 R2 Hyper-V (RTM)

Q:  Will I be able to do an in-place upgrade of my Windows Server 2008 R2 Hyper-V RC host to the RTM release of R2?
A:   Upgrade of Hyper-V installations from RC versions to RTM of R2 will be supported. You can perform an upgrade of Windows Server 2008 R2 Hyper-V from RC to RTM.  
Q:  Will I be able to reuse my virtual machines that were created with the R2 RC release with Windows Server 2008 R2 Hyper-V RTM?
A:  Yes. VM’s that were running with the RC version of Windows Server 2008 R2 Hyper-V will automatically be upgraded to run on RTM version. Note this upgrade will not update the integration services inside the virtual machine.  Users will need to install the latest integration services for optimal stability and performance.

Networking Guidance


Q:  What are the VMQ and TCP Chimney offload features?
A:  Windows Server 2008 R2 is being delivered with new optional optimizations to enhance the networking performance of virtual machines.   The networking optimization features are Chimney for Virtual Machines (VM-Chimney) and Virtual Machine Queues (VMQ).   Depending on the NICs available to you and the traffic types you encounter, one or both of these technologies may produce substantial improvements in your networking performance, either through greater bandwidth utilization or, in slower NICs, lower CPU utilization to process the same load.
Both VM-Chimney and VMQ require hardware support. These features are only available when using specific hardware NICs (please refer to the section below for supported NICs).  

NICs: 
For Windows Server 2008 R2 RC,
·         VM-Chimney capable drivers are available on the RC media for the following NICs:
o   Broadcom Net-Xtreme II 1 Gb/s NICs (Models 5706, 5708, and 5709)
o   Broadcom 10Gb/s NICs (Models 57710, 57711)

·         VMQ capable drivers are available on the RC media:
o    Intel Kawela (E1Q) 1 Gb/s NICs (also known as Pro/1000 ET NICs)
o   Intel Oplin NICs (IXE) 10Gb/s NICs (also known as 82598)
To determine which NIC(s) your system has, go to the Windows Device Manager and expand the Network Adapters entry.  If one of the above mentioned Network Adapters is listed, then your host should be capable of using the associated networking optimization feature. 
Drivers for additional NICs that support these features are expected to be available in the RTM timeframe.  Some vendors may produce VMQ-capable or Chimney-capable drivers for their NICs and release them through other channels such as their own support web sites.
Feature interactions:
·         A connection will not be offloaded if it is part of an IPSec rule.
·         Connections may not be available if the Windows Firewall or any other filter driver that requires packet inspection for that particular connection.
·         Currently available NIC teaming drivers do not support the use of either of these features.
·         There are known issues with the in-box 10Gb/s Broadcom NICs with Chimney turned on.
·         VMQ and Chimney may be independently available on separate NICs in the same host machine. 
·         If both Chimney and VMQ are available on the same NIC at the same time, Windows Server 2008 R2 will use VMQ (for Windows Server 2008 R2 RC there are no NICs we are aware of that support both).


System Center Virtual Machine Manager (SCVMM) Support

Q:  Can I manage Windows Server 2008 R2 Hyper-V hosts with SCVMM?
A:  The SCVMM 2008 R2 release will enable management of Windows Server 2008 R2 Hyper-V hosts from SCVMM.   A beta version of SCVMM 2008 R2 is currently available for customers from www.microsoft.com/scvmm.
Q:  Can I manage Windows Server 2008 R2 Hyper-V RC hosts with SCVMM R2 Beta?

A:  No, The current beta of System Center Virtual Machine Manager 2008 R2 will not support managing Windows Server 2008 R2 Hyper-V RC. The RC for SCVMM 2008 R2 will be available by June 2009. A beta version of SCVMM 2008 R2 is currently available for customers from www.microsoft.com/scvmm.  

Thursday, 25 December 2014

Basic Interview Question and Answer

1. Why do you want to work in this industry?
Bad answer:
“I love to shop. Even as a kid, I spent hours flipping through catalogues.”

Don’t just say you like it. Anyone can do that. Focus instead on your history with that
particular industry, and if you can, tell a success story.
Good answer:
“I’ve always loved shopping, but my interest in retail marketing really started when I worked at a neighborhood
boutique. I knew our clothes were amazing, but that we weren’t marketing them properly. So I worked with
management to come up with a marketing strategy that increased our sales by 25% in a year. It was great to be able
to contribute positively to an industry I feel so passionate about, and to help promote a product I really believed in.”

2. Tell us about yourself.
Bad answer:
“I graduated four years ago from the University of Michigan, with a Bachelor’s in Biology – but I decided that
wasn’t the right path for me. So I switched gears and got my first job, working in sales for a startup. Then I went on
to work in marketing for a law firm. After that, I took a few months off to travel. Finally, I came back and worked in
marketing again. And now, here I am, looking for a more challenging marketing role.”
Instead of giving a chronological work history, focus on your strengths and how they
pertain to the role. If possible, illustrate with examples.

Good answer:
“I’m really energetic, and a great communicator. Working in sales for two years helped me build confidence, and
taught me the importance of customer loyalty. I’ve also got a track record of success. In my last role, I launched a
company newsletter, which helped us build on our existing relationships and create new ones. Because of this, we
ended up seeing a revenue increase of 10% over two years. I’m also really interested in how companies can use web
tools to better market themselves, and would be committed to building on your existing platform.”

3. What do you think of your previous boss?
Bad answer:

“He was completely incompetent, and a nightmare to work with, which is why I’ve moved on”
Remember: if you get the job, the person interviewing you will some day be your previous
boss. The last thing they want is to hire someone who they know is going to badmouth them
some day. Instead of trashing your former employer, stay positive, and focus on what you
learned from him (no matter how awful he really was)

Good answer:
“My last boss taught me the importance of time management – he didn’t pull any punches, and was extremely
deadline-driven. His no-nonsense attitude pushed me to work harder, and to meet deadlines I never even thought
were possible.”

4. Why are you leaving your current role?

Bad answer:
“I can’t stand my boss, or the work I’m doing.”
Again, stay away from badmouthing your job or employer. Focus on the positive.
Good answer:
“I’ve learned a lot from my current role, but now I’m looking for a new challenge, to broaden my horizons and to
gain a new skill-set – all of which, I see the potential for in this job.”
5. Where do you see yourself in five years?

Bad answer:
“Relaxing on a beach in Maui,” or “Doing your job.”
There’s really no right answer to this question, but the interviewer wants to know that
you’re ambitious, career-oriented, and committed to a future with the company. So instead
of sharing your dream for early retirement, or trying to be funny, give them an answer that
illustrates your drive and commitment.

Good answer:
“In five years I’d like to have an even better understanding of this industry. Also, I really love working with people.
Ultimately, I’d like to be in some type of managerial role at this company, where I can use my people skills and
industry knowledge to benefit the people working for me, and the company as a whole."

6. What’s your greatest weakness?
Bad answer:
“I work too hard,” or for the comedian, “Blondes.”
This question is a great opportunity to put a positive spin on something negative, but you
don’t want your answer to be cliché – joking or not. Instead, try to use a real example of a
weakness you have learned to overcome.
Good answer:
“I’ve never been very comfortable with public speaking – which as you know, can be a hindrance in the workplace.
Realizing this was a problem, I asked my previous employer if I could enroll in a speech workshop. He said “yes.” I
took the class, and was able to overcome my lifelong fear. Since then, I’ve given lots of presentations to audiences
of over a 100 high level executives – I still don’t love it, but no one else can tell!”

7. What salary are you looking for?
Bad answer:
“In my last job I earned $35,000 – so, now I’m looking for $40,000”
If you can avoid it, don’t give an exact number. The first person to name a price in a salary
negotiation loses. Instead, re-iterate your commitment to the job itself. If you have to, give
a broad range based on research you’ve conducted on that particular role, in your
particular city.

Good answer:
“I’m more interested in the role itself than the pay. That said, I’d expect to be paid the appropriate range for this
role, based on my five years of experience. I also think a fair salary would bear in mind the high cost of living here
in New York City.”

8. Why should I hire you?
Bad answer:
“I’m the best candidate for the role.”
A good answer will reiterate your qualifications, and will highlight what makes you unique.
Good answer:
“I’ve been an Executive Assistant for the past ten years – my boss has said time and time again that without me, the
organization would fall apart. I’ve also taken the time to educate myself on some of the software I regularly use (but
didn’t really understand the ins and outs of). I’m an Excel wiz now, which means I can work faster, and take over
some of what my boss would traditionally have had to do himself. What’s good enough for most people is never
really good enough for me.”

9. What is your greatest failure, and what did you learn
from it?
Bad answer:
I never finished law school – and everything that’s happened since has taught me that giving up, just because the
going gets tough, is a huge mistake.”
You don’t want to actually highlight a major regret – especially one that exposes an overall
dissatisfaction with your life. Instead, focus on a smaller, but significant, mishap, and how
it has made you a better professional.

Good answer:
“When I was in college, I took an art class to supplement my curriculum. I didn’t take it very seriously, and assumed
that, compared to my Engineering classes, it would be a walk in the park. My failing grades at midterm showed me
otherwise. I’d even jeopardized my scholarship status. I knew I had to get my act together. I spent the rest of the
semester making up for it, ended up getting a decent grade in the class. I learned that no matter what I’m doing, I
should strive to do it to the best of my ability. Otherwise, it’s not worth doing at all.”

10. How do you explain your gap in employment?
Bad answer:
"I was so tired of working, and I needed a break,” or “I just can’t find a job.”
Employment gaps are always tough to explain. You don’t want to come across as lazy or
unhireable. Find a way to make your extended unemployment seem like a choice you made,
based on the right reasons.

Good answer:
“My work is important to me, so I won’t be satisfied with any old job. Instead of rushing to accept the first thing that
comes my way, I’m taking my time and being selective to make sure my next role is the right one."

11. When were you most satisfied in your job?
Bad answer:
"I was most satisfied when I did well, and got praised for my work.”
Don’t give vague answers. Instead, think about something you did well – and enjoyed –that
will be relevant at this new job. This is an opportunity for you to share your interests,
prove that you’re a great fit for the job and showcase your enthusiasm.

Good answer:
“I’m a people person. I was always happiest – and most satisfied – when I was interacting with customers, making
sure I was able to meet their needs and giving them the best possible customer experience. It was my favorite part of
the job, and it showed – I was rated as “Good or Excellent” 95% of the time. Part of the reason I’m interested in this
job is that I know I’d have even more interaction with customers, on an even more critical level."

12. What did you like least about your last job?
Bad answer:
"A lack of stability. I felt like the place could collapse around me at any time.”
Try and stay away from anything that draws on the politics, culture or financial health of
your previous employer. No matter how true it might be, comments like these will be
construed as too negative. Also, you don’t want to focus on a function that might be your
responsibility in the next role. So think of something you disliked in your last job, but that
you know for sure won’t be part of this new role.

Good answer:
“There was nothing about my last job that I hated, but I guess there were some things I liked less than others. My
previous role involved traveling at least twice a month. While I do love to travel, twice a month was a little
exhausting – I didn’t like spending quite so much time out of the office. I’m happy to see that this role involves a lot
less travel.”
13. Describe a time when you did not get along with a coworker.

Bad answer:
"I’m easy to get along with, so I’ve never had any kind of discord with another coworker.”
Interviewers don’t like these types of “easy out” answers. And besides, they know you are
probably not telling the truth. Think of a relatively benign (but significant) instance, and
spin it to be a positive learning experience.

Good answer:
“I used to lock heads with a fellow nurse in the INCU ward. We disagreed over a lot of things – from the care of
patients to who got what shifts to how to speak with a child’s family. Our personalities just didn’t mesh. After three
months of arguing, I pulled her aside and asked her to lunch. At lunch, we talked about our differences and why we
weren’t getting along. It turns out, it was all about communication. We communicated differently and once we knew
that, we began to work well together. I really believe that talking a problem through with someone can help solve
any issue.”

14. What motivates you?
Bad answer:
"Doing a good job and being rewarded for it.”
It’s not that this answer is wrong – it’s just that it wastes an opportunity. This question is
practically begging you to highlight your positive attributes. So don’t give a vague, generic
response – it tells them very little about you. Instead, try and use this question as an
opportunity to give the interviewer some insight into your character, and use examples
where possible.

Good answer:
“I’ve always been motivated by the challenge of meeting a tough deadline – in my last role, I was responsible for a
100% success rate in terms of delivering our products on time and within budget. I know that this job is very fastpaced,
and deadline-driven – I’m more than up for the challenge. In fact, I thrive on it.”

15. How would your friends describe you?
Bad answer:
"I’m a really good listener.”
While being a good listener is a great personality trait, your employer probably doesn’t
care all that much. It’s unlikely that they’re hiring you to be a shoulder to cry on. You’ll
want to keep your answer relevant to the job you’re interviewing for – and as specific as
possible. If you can, insert an example.

Good answer:
“My friends would probably say that I’m extremely persistent – I’ve never been afraid to keep going back until I get
what I want. When I worked as a program developer, recruiting keynote speakers for a major tech conference, I got
one rejection after another – this was just the nature of the job. But I really wanted the big players – so I wouldn’t
take no for an answer. I kept going back to them every time there was a new company on board, or some new value
proposition. Eventually, many of them actually said “yes” – the program turned out to be so great that we doubled
our attendees from the year before. A lot of people might have given up after the first rejection, but it’s just not in
my nature. If I know something is possible, I have to keep trying until I get it.”


Hardware and Networking Interview Questions with Answers...
---------------------------------------------------------------------------------
Explain hidden shares. How do they work?
idden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list.
Name of seven layers in Open System Interconnection model.
They are Application, Presentation, Session, Transport, Network, Data link, and Physical.
What is the difference between ARP and RARP?
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP uery packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.
What is Client/Server?
Clients and Servers are separate logical entities that work together over a network to accomplish a task. Many systems with very different architectures that are connected together are also called Client/Server.
What is MAC address?
It is the 48 bit hardware address of LAN card. MAC address is usually stored in ROM on the network adapter card and it is unique.
What are the perquisites to configure server?
  • LAN card should be connected:
  • Root (partition on which window is installed) should in NTFS
  • Server should be configured with a static IP address
How we will configure ADS?
Start ==> RUN ==> DCPROMO
How will you test LAN card?
Ping 127.0.0.1
If getting reply its fine

What are the difference between DOMAIN and WORKGROUP?

Workgroup:- 
(i)Every PC is responsible for its security own. 
(ii)No centralize administration 
(iii)Main aim to save hardware recourse 
(iv)Best suite in school, training institute, cyber café 
Domain: - 
(i)Server is responsible for data safety. 
(ii)Centralize administration 
(iii)Main aim is to secure data 
(iv)Best suite in company environments


Which command is used to check the IP address of your system?

ipconfig

Which set wizard will run to do peer to peer networking in XP?

Small home and office setup wizard

Which command is used to check the physical connectivity between two computers?

Ping

What is map drive?

A special feature that will map network resource to my computer.

What is Proxy Server?

Most large businesses, organizations, and universities these days use a proxy server. This is a server that all computers on the local network have to go through before accessing information on the Internet. By using a proxy server, an organization can improve the network performance and filter what users connected to the network can access.

Which folder contains ADS installed on server?

NTDS

What is the full form of Internet?

International Networking

Which are the bootable files of 98 and XP ?

In windows98 it is command.com 
In XP it is NTLDR

In which partition Linux is installed ?.

Linux doesn’t support windows file system that contain partition scheme. It (Linux) has its own file system known as ext2, and ext3. it will install only on it.In linux file system it will install on / (root) partition.

What is size of SWAP ?

It’s the hard disk space that is used as RAM for fast processing. In window it’s known as virtual memory and could be set as per retirement via this path 
My Computer ==> properties ==> advance 
In Linux it’s known as SWAP space and generally taken the double size of physical RAM For example if you have 256 (MB) DDR physical ram then swap space would be 512 MB.

What is full form of C.M.O.S ?

Complementary metal oxide semiconductor

How will you check ip address without using network place ?

Start ==> Run ==> Command ==>ipconfig

What is IP?

Internet Protocol (IP) is an unreliable, best effort delivery, connection-less protocol used for transmitting and receiving data between hosts in a TCP/IP network
What are the difference between hub and switch?
Hub is a layer 1 device. It will out the signal from all of its port except the one from where its insert. It is unable to detect the collision. It works on single collision and single broadcast domain.
Switch is layer 2 device. It maintains a CAM table that store the MAC address of devices attached on its port. CAM table is used to make the forwarding decision. It works on per port collision and single broadcast domain.
What is layer?
Layer is a completely logical partition of PDU (protocol data unit) process. That define how the information is travel form one computer to other over the network.
What is TCP/IP?
It is combination of two protocols TCP and IP. It is used for reliable data transfer.
What is operating system?
An operating system (sometimes abbreviated as "OS") is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. It provides a platform to application software.
What is package software?
The collection of mostly used software released in package Form Company. For Example Ms-Office that contain word, power point, Excel, etc.
Full form of .co.in, .com
  • COM - ".com" stands for "commercial".
  • NET - ".net" stands for "network"
  • ORG - ".org" stands for "organization"
  • INFO - ".info" stands for "information"
  • BIZ - ".biz" stands for "business".
  • IN - 'IN' stands for India. The 'IN' is a 2-letter country code for India.

What is ring topology?

In a ring topology, device one connects to device two, device two connects to device three, and so on to the last device, which connects back to device one.

Which cable is used in LAN?

Generally coaxial and TP media is used in LAN networking.

What are Difference between STP and UTP?

STP cable is mostly used by IBM; it has an extra cover over each pair. 
UTP cable is used in star topology. It has a single cover over all pair.
  

Full form of ping.

PING stand for Packet Internet Grouper 

What are the minimum requirements for xp installation?

64MB RAM
1.5GB free HDD space
233MHz minimum processor.

What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?

10Base2— An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments. 
10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. 
10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.

What is the difference between an unspecified passive open and a fully specified passive open?

An unspecified passive open has the server waiting for a connection request from a client. 
A fully specified passive open has the server waiting for a connection from a specific client.

Explain the function of Transmission Control Block

A TCB is a complex data structure that contains a considerable amount of information about each connection.

What is a Management Information Base (MIB)?

A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device's status, its performance, connections, and configuration. The MIB is queried by SNMP.

What is anonymous FTP and why would you use it?

Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.

What is a pseudo tty?

A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no connection can take place.

What does the Mount protocol do?

The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request

What is External Data Representation?

External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent.

When were OSI model developed and why its standard called 802.XX and so on?

OSI model was developed in February1980 that why these also known as 802.XX Standard (Notice 80 means ==> 1980, 2means ==> February)

What is Full form of ADS?

Active Directory Structure

How will you register and activate windows?

If you have not activated windows XP, you can do so at any time by clicking the windows Activation icon in the system tray to initiate activation. Once you have activated windows XP, this icon disappears from the system tray. 
For registration 
Start ==> Run ==> regwiz /r

Where do we use cross and standard cable?

Computer to computer ==> cross 
Switch/hub to switch/hub ==>cross 
Computer to switch/hub ==>standard

How many pins do serial ports have?

In computer it's known as com port and could be available in 9pin or 25 pin. On router it have 60 pins.

How will check ip address on 98?

Start ==> Run ==> command ==> winipcfg

How will you make partition after installing windows?

My computer ==> right click ==> manage ==> disk management ==> 
select free space ==> right click ==> New partition

What is IP?

It's a unique 32 bits software address of a node in a network.

What is private IP?

Three ranges of IP addresses have been reserved for private address and they are not valid for use on the Internet. If you want to access internet with these address you must have to use proxy server or NAT server (on normal cases the role of proxy server is played by your ISP.).If you do decide to implement a private IP address range, you can use IP addresses from any of the following classes: 
Class A 10.0.0.0 10.255.255.255 
Class B 172.16.0.0 172.31.255.255 
Class C 192.168.0.0 192.168.255.255

What is public IP address?

A public IP address is an address leased from an ISP that allows or enables direct Internet communication.

What's the benefit of subnetting?

Reduce the size of the routing tables. 
Reduce network traffic. Broadcast traffic can be isolated within a single logical network. 
Provide a way to secure network traffic by isolating it from the rest of the network.

What are the differences between static ip addressing and dynamic ip addressing?

With static IP addressing, a computer (or other device) is configured to always use the same IP address. With dynamic addressing, the IP address can change periodically and is managed by a centralized network service

What is APIPA?

Automatic private IP addressing (APIPA) is a feature mainly found in Microsoft operating systems. APIPA enables clients to still communicate with other computers on the same network segment until an IP address can be obtained from a DHCP server, allowing the machine to fully participate on the network. The range of these IP address are the 169.254.0.1 to 169.254.255.254 with a default Class B subnet mask of 255.255.0.0.

What are the LMHOSTS files?

The LMHOSTS file is a static method of resolving NetBIOS names to IP addresses in the same way that the HOSTS file is a static method of resolving domain names into IP addresses. An LMHOSTS file is a text file that maps NetBIOS names to IP addresses; it must be manually configured and updated.

What is DHCP scope?

A scope is a range, or pool, of IP addresses that can be leased to DHCP clients on a given subnet.

What is FQDN?

An FQDN contains (fully qualified domain name) both the hostname and a domain name. It uniquely identifies a host within a DNS hierarchy

What is the DNS forwarder?

DNS servers often must communicate with DNS servers outside of the local network. A forwarder is an entry that is used when a DNS server receives DNS queries that it cannot resolve locally. It then forwards those requests to external DNS servers for resolution.

Which command will you use to find out the name of the pc in networks?

NSLOOKUP [192.168.0.1] 
[Ip of target computer]

How will enable sound service in 2003?

By default this service remain disable to enable this service
Start ==> administrative tools ==> service ==> windows audio ==> start up type ==> automatic

How will enable CD burning service in 2003?

By default this service remain disable to enable this service
Start ==> administrative tools ==> service ==> IMAPI CD burning com service ==> start up type ==> automatic

What do you need to do that your browser will point URL www.example.com to the internal IP address 127.99.11.01?

Make changes in the hosts file in C:\WINDOWS\system32\drivers\etc 
The Hosts file is looked at first before going out to the DNS (Domain Name Service) servers. you have to put the following on new lines at the end of hosts file: 
127.99.11.01 example.com 
127.99.11.01 www.example.com

What can you suggest to enhance testing process on windows OS?

Put shortcut to notepad.exe in SendTo folder. It is speed up work with different files like hosts, configuration files. Location of this folder is 
C:\Documents and Settings\Default User\sendto. 
Open it and create shortcut of notpad.exe

What is FTP?

FTP is short for File Transfer Protocol. This is the protocol used for file transfer over the Internet.

How will you make XP home the client of server 2003?

XP home edition is made only for home purpose so we can’t use it as the client. And same rule apply on windows vista editions also.

Where do you take back up from?

Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Backup.
Bedside's it? 
If OS support then Select Drive ==> properties ==> back up now

What is router?

Router is a device that is used to connect two different networks.

How will you configure ADS?

Start ==> Run ==> DCPROMO
Or
Start==> Configure your server ==> add/Remove a Role

What is ADS?

A central component of the Windows platform, Active Directory service provides the means to manage the identities and relationships that make up network environments.

What if this wizard (ADS) is not running?

Check the network cable it should be plugged 
Check root partition it should be in NTFS 
Check IP of server it should be configured statically

How will you add a client to server? /
How’s the client join a domain?
What are the client configurations?

On Server
Configure ADS (for example it’s configured with xyz.com)
On Client
Log in form local administrator account
My Computer ==> Properties ==> Computer Name ==> Change
==>Domain ==>xyz.com ==> username Administrator (of xyz.com) 
Password xxxxxxxxxxx (of admin of xyz.com)
Welcome to xyz.com ==> Restart the computer

Does it necessary to use administrator account to configure the client?

Not every time but you are required a properly configured user account in domain controller security policy.

ISO stand for?

International standard organization

OSI stand for?

Open System Interconnection

What is full form DHCP and how will you configure it?

Dynamic host configuration protocol

To configure it on Server 
Configure your server ==>Add/Remove a role ==>DHCP server ==>complete the wizard 
Start ==> Administrative tools ==> DHCP ==>New scope ==> Wizard 
Now authorized this server and do activate it 
On client 
Local area network ==> tcp/ip ==> obtain ip automatically 
Obtain DNS automatically

What is difference between physical and logical topology?

A physical topology describes how devices are physically cabled together. 
A logical topology describes how devices communicate across the physical topology

How many types of topology are available?

point-to-point topology has a single connection between two devices. 
In a star topology, a central device has many point-to-point connections to other devices. 
bus topology uses a single connection or wire to connect all devices. 
In a ring topology, device one connects to device two, device two connects to device three, and so on to the last device, which connects back to device one.

How many times computer reboot when server 2000 install?

2 times.

How will you remove this error “ ntldr missing press any key to reboot the system” ?

Reboot the system with XP, ( apply also on server2003,) cd 
On setup screen press to R to repair the window 
Now provide the administrator password 
C:\>cd f:( your cd drive latter, f is taken as the example ) 
f:\>cd i386 
f:\>copy ntldr c:\ 
f:\>exit 
reboot the system

Why do we do networking?

For data sharing 
To accumulate hardware resource

What are the benefits of networking?

There are lots of advantages from build up a network, but the three big facts are- 
File Sharing 
From sharing files you can view, modify, and copy files stored on a different computer on the network just as easily as if they were stored on your computer. 
Resource Sharing 
Resources such as printers, fax machines, Storage Devices (HDD, FDD and CD Drives), Webcam, Scanners, Modem and many more devices can be shared. 
Program Sharing 
Just as you can share files on a network, you can often also share program on a network. For example, if you have the right type of software license, you can have a shared copy of Microsoft Office, or some other program, and keep it on the network server, from where it is also run

What is network?

A network is basically all of the components (hardware and software) involved in connecting computers across small and large distances.

What is networking?

A process that is describes how the network will connect.

What is topology?

A topology defines how the devices are connected. Further it is divided in physical and logical topology.

What are the differences between FAT and NTFS ?

FAT 
Doesn't provide local security Provide local security 
Doesn't provide disk quota Provide disk quota 
Doesn't provide file compression Provide file compression 
Doesn't provide other security feature Provide other security feature

Difference between XP home and XP professional ?

Feature that is not available in XP home edition 
Remote Desktop 
Off line file and folder 
Encrypting file system 
Group policy 
Roaming profile 
Remote installation 
Joining Domain 
The features listed above are only available in XP professional

Which OSI layer does IP belong?

P belongs to the Network Layer (layer 3) in the OSI model.

What is a subnet mask?

Subnet mask is a 4 byte (32 bit) number used to identify the sub-network ID and the host ID from an IP address. All the hosts in a sub-network will have the same subnet mask. E.g. 255.255.255.0, 255.255.127.0, 255.255.0.0
Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003?
The scheme of PDC and BDC is replaced by The Active Directory in server 2000 and further. Now all domain controllers share a multi master peer-to-peer read and write relationship that hosts copies of the Active Directory.
How can group policy be refreshed?
  1. Restart the server
  2. Leave the server ideal for 90 minute
  3. Run ==> gpupdate (server 2003 only)
What is LILO?
LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory, and tell the system which partition and hard drive to boot from.
I can't seem to access the Internet, don't have any access to the corporate network and on IP configuration on my address is 169.254.*.*. What happened?
The 169.254.*.* net mask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing).

We've installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it.

The server must be authorized first with the Active Directory.

What's the difference between local, global and universal groups?

Domain local groups assign access permissions to domain groups for local domain resources. Global groups provide access to resources in entire domains.

What's the major difference between FAT and NTFS on a local machine?

FAT and FAT32 provide no security over locally logged-on users. Only native NTFS provides extensive permission control on both remote and local files.

What is presentation layer and how it is responsible for in the OSI model?

The presentation layer establishes the data format prior to passing it along to the network application's interface. TCP/IP networks perform this task at the application layer

When were OSI model developed and why its standard called 802.XX and so on?

OSI model was developed in February1980 that why these also known as 802.XX Standard (Notice 80 means ==> 1980, 2means ==> February)

What is Full form of ADS?

Active Directory Structure

How will you register and activate windows?

If you have not activated windows XP, you can do so at any time by clicking the windows Activation icon in the system tray to initiate activation. Once you have activated windows XP, this icon disappears from the system tray. 
For registration 
Start ==> Run ==> regwiz /r

Where do we use cross and standard cable?

Computer to computer ==> cross 
Switch/hub to switch/hub ==>cross 
Computer to switch/hub ==>standard

How many pins do serial ports have?

In computer it's known as com port and could be available in 9pin or 25 pin. On router it have 60 pins.

How will check ip address on 98?

Start ==> Run ==> command ==> winipcfg

What is source route?

It is a sequence of IP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header.

What is RIP (Routing Information Protocol)?

It is a simple protocol used to exchange information between the routers.

What is SLIP (Serial Line Interface Protocol)?

It is a simple protocol used for transmission of IP datagrams across a serial line.

What is Proxy ARP?

It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router.

What is OSPF?

It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions.

What is Kerberos?

It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.

What is a Multi-homed Host?

It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multihomed Host.

What is NVT (Network Virtual Terminal)?

It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.

What is Gateway-to-Gateway protocol?

It is a protocol formerly used to exchange routing information between Internet core routers.

What is BGP (Border Gateway Protocol)?

It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol).

What is autonomous system?

It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.

What is EGP (Exterior Gateway Protocol)?

t is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system.

What is IGP (Interior Gateway Protocol)?

It is any routing protocol used within an autonomous system.

What is Mail Gateway?

It is a system that performs a protocol translation between different electronic mail delivery protocols.

What is wide-mouth frog?

Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.

What is silly window syndrome?

It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.

What is region?

When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.

What is multicast routing?

Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.

What is traffic shaping?

One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.

What is packet filter?

Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.

BOOTP helps a diskless workstation boot. How does it get a message to the network looking for its IP address and the location of its operating system boot files?

BOOTP sends a UDP message with a subnet work broadcast address and waits for a reply from a server that gives it the IP address. The same message might contain the name of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server.

What is a DNS resource record?

resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.

What protocol is used by DNS name servers?

DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.

What is the difference between interior and exterior neighbor gateways?

Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.

What is the HELLO protocol used for?

The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol.

What are the three type of routing tables and What are the advantages and disadvantages of these?

The three types of routing tables are fixed, dynamic, and fixed central. 
A fixed table must be manually modified every time there is a change. 
A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. 
A fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine's table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the table's contents can change without the administrator being aware of the change.

What is MAC address ?

The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.

What is attenuation?

The degeneration of a signal over distance on a network cable is called attenuation.

What is cladding?

A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

What is RAID?

A method for providing fault tolerance by using multiple hard disk drives.

What is NETBIOS and NETBEUI?

NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. 
NETBEUI is NetBIOS extended user interface. A transport protocol designed by Microsoft and IBM for the use on small subnets.

What is redirector?

Redirector is software that intercept

What is Beaconing?

The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.

What is terminal emulation, in which layer it comes?

Telnet is also called as terminal emulation. It belongs to application layer.

What is frame relay, in which layer it comes?

Frame relay is a packet switching technology. It will operate in the data link layer.

What do you meant by "triple X" in Networks?

The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X".

What is SAP?

Series of interface points that allow other computers to communicate with the other layers of network protocol stack.

What is subnet?

A generic term for section of a large networks usually separated by a bridge or router.

What is subnet mask?

It is a term that makes distinguish between network address and host address in IP address. Subnet mask value 0 defines host partition in IP address and value 1 – 255 defines Network address.

Describe Various Network Type

Local Area Networks Local area networks (LANs) are used to connect networking devices that are in a very close geographic area, such as a floor of a building, a building itself, or a campus environment.
Wide Area Networks Wide area networks (WANs) are used to connect LANs together. Typically, WANs are used when the LANs that must be connected are separated by a large distance.
Metropolitan Area Networks A metropolitan area network (MAN) is a hybrid between a LAN and a WAN.
Content Networks Content networks (CNs) were developed to ease users’ access to Internet resources. Companies deploy basically two types of CNs: 
1.Caching downloaded Internet information 
2.Distributing Internet traffic loads across multiple servers
Storage Area Networks Storage area networks (SANs) provide a high-speed infrastructure to move data between storage devices and file servers. 
Advantage 
Performance is fast. 
Availability is high because of the redundancy features available. 
Distances can span up to 10 kilometers. 
Management is easy because of the centralization of data resources. 
Overhead is low (uses a thin protocol). 
Disadvantage of SANs is their cost.
Intranet An intranet is basically a network that is local to a company. In other words, users from within this company can find all of their resources without having to go outside of the company. An intranet can include LANs, private WANs and MANs,
Extranet An extranet is an extended intranet, where certain internal services are made available to known external users or external business partners at remote locations.
Internet An internet is used when unknown external users need to access internal resources in your network. In other words, your company might have a web site that sells various products, and you want any external user to be able to access this service.
VPN A virtual private network (VPN) is a special type of secured network. A VPN is used to provide a secure connection across a public network, such as an internet. Extranets typically use a VPN to provide a secure connection between a company and its known external users or offices. Authentication is provided to validate the identities of the two peers. Confidentiality provides encryption of the data to keep it private from prying eyes. Integrity is used to ensure that the data sent between the two devices or sites has not been tampered with.

Q.1 Describe Domain Name System


There are two types of client/server programs.
First is used directly by the user, such as e-mail, Second supports other application programs. The Domain Name System (DNS) is a supporting program that is used by other programs such as to find the IP address of an e-mail recipient.

Q.2 Describe Hierarchical Namespace.

In a hierarchical name space, each name is combination of several parts as:
Type of the organization.
Name of an organization.
Departments in the organization.
A central authority can assign the part of the name that defines the nature and name of the organization. The other things of the name the organization provides itself. The organization can add suffixes (or prefixes) to the name to define its host.
The company need not worry about the prefix if it is same as that of another organization because, even if part of an address is the same, the whole address is different.
Example:
Suppose central authority has given names ABC.com and XYZ.com to two separate organization but these organization can add prefix as career so the name becomes career.XYZ.com and career.ABC.com. The names are unique without the need for assignment by a central authority. The central authority controls only part of the name, not the whole.

Q.3 Define Fully Qualified Domain Name and Partially Qualified Domain Name.

In hierarchical name space, names are defined in an inverted-tree structure with the root at the top. The tree can have only 128 levels: level 0 (root) to level 127.
Each node in the tree has a label, which is a string with a maximum of 63 characters.
The root label is a null string (empty string). In this tree, all the labels have different name, which guarantee the uniqueness of the domain names.
A full domain name is a sequence of labels separated by dots (.). The domain names are always read from the node up to the root.
Fully Qualified Domain Name
If a label is terminated by a null string or empty string, it is called a fully qualified domain name (FQDN).
Partially Qualified Domain Name
If a label is not terminated by a null string, it is called a partially qualified domain name (PQDN). A PQDN starts from a node, but it does not end with the root.

What is transmission impairment?

Signals need transmission media for travel from one point to another. Transmission media are not perfect because it provides resistance. The imperfection causes signal impairment. This means that the signal at the beginning of the medium is not the same as the signal at the end of the medium. What is sent is not what is received. There are three causes of impairment are attenuation, distortion, and noise.

Q.5 Describe attenuation, distortion, and noise in brief.

Attenuation: When a signal travels through a medium, it loses some of its energy due to resistance of the medium. This loss of energy is called Attenuation. This is the reason why a wire carrying electric signals gets warm. Some of the electrical energy in the signal is converted to heat. To overcome for this problem, amplifiers are used to amplify the signal.
Unit of the decibel is used to find out if a signal has lost or gained strength. The decibel (dB) measures the relative strengths of two signals or one signal at two different points. If decibel is negative then a signal is attenuated and if positive signal is amplified.
Formula:
Where PI and P2 are the variable and the powers of a signal at points 1 and 2, respectively.
Distortion
When the signal travels through the medium from one point to another it may chance to change the form or shape of signal. It is called distortion.
Distortion can occur in a composite signal, made up of different frequencies. Each signal component has its own propagation speed through a travelling medium and, therefore, its own delay in reaching at the final destination. Means signal components at the receiver have phases different from what they had at the sender.
Noise
The third cause of impairment is Noise. Following types of noise are possible.
-Thermal noise.
-Induced noise.
-Crosstalk noise.
-Impulse noise.
These noise may corrupt the signal.
Thermal noise is produced due to the random motion of electrons in a wire which creates an extra signal not originally sent by the transmitter.
Induced noise comes from sources such as motors and other electronic appliances.
These devices act as a sending antenna, and the transmission medium acts as the receiving antenna.
Crosstalk is the effect of one wire on the other.
Impulse noise comes from power lines, lightning etc.

Q.6 Describe composite single.

Composite Signals are the combination of more than one sine waves. Simple sine waves can be used to carry electric energy from one place to another or we can use a single sine wave to send an alarm to a security center when a thief opens a door or window in the house.
A single frequency sine wave is not useful in data communications we need to send a composite signal. A composite signal can be periodic or non-periodic.
The figure of composite periodic signal is given below.

Q.7 Describe MIME

Electronic mail has a simple structure. It can send messages only in NVT 7-bit ASCII format. It cannot be used for those languages that are not supported by 7-bit ASCII characters so languages such as French, German, Hebrew, Russian, Chinese etc cannot use this format. Also, it cannot be used to send binary files or video or audio data.
We need a protocol that allows non-ASCII data to be sent through e-mail. So Multipurpose Internet Mail Extensions (MIME) is the answer. MIME transforms non-ASCII data at the sender site to NVT (Network Virtual Terminal) ASCII data and delivers them to the client MTA to be sent through the Internet. The message at the receiving side is transformed back to the original data. Main task of MIME is to transform non-ASCII data to ASCII data and vice versa.
MIME header
Multipurpose Internet Mail Extensions defines five types of header.

Q.8 SMTP is push protocol Justify your answer.

SMTP is a push protocol; it pushes the message from the client to the server. For sending email SMTP is used two times, between the sender and the sender's mail server and between the two mail servers. To send mail, a system must have the client MTA (Message transfer agents), and to receive mail, a system must have a server MTA. SMTP uses commands and responses to transfer messages between an MTA client and an MTA server. Commands are sent from the client to the server and Responses are sent from the server to the client. SMTP is not used in pulling the message.

Q.9 Describe the POP3 protocol.

Post Office Protocol, version 3 is used for accessing the message. POP3 is very simple protocol and has limited functionality. POP has different version but currently version 3 is used. A POP3 server listens on well-known port 110. POP3 supports two types of mode.
Delete Mode: In this mode, the mail is deleted from the mailbox after each retrieval.
Keep Mode. The mail remains in the mailbox after retrieval.

Q.10 Describe IMAP4 (Internet Mail Access Protocol) in detail.

This protocol is also used in Internet for accessing the mail. IMAP4 has more feature than POP3 and is more powerful.
Main difference in POP3 and IMAP4 are as follows.

Q.11 What is Anonymous FTP?

Some sites provide the functionality that user can access the file with limited access. To access these files, a user does not need to have an account or password. For using FTP, the user enters "anonymous" as a user ID and guest as password. Usually, you can enter anything as a password.

Q.12 What is User Agent?

User agent is a software that provides the service to the user to make the process of sending and receiving a message easier. The following are User Agent services.

Networking interview questions - posted on Feb 04, 2014 at 12:45 PM by Nihal Singh

Q.1 Describe Classful Addressing

Ans. IPv4 addressing uses the concept of classes. In classful addressing, the address space is divided into five classes:A, B, C, D, and E. We can find the class of an address when the given address is in binary notation or dotted-decimal notation.
Example
 

Q.2 Find the error, if any, in the following IPv4 addresses.

a. 200.56.045.78
b. 22.34.7.8.20
c. 75.45.279.14
d. 11100010.23.24.66
Solution
a. There must be no leading zero (045).
b. There can be no more than four numbers in an IPv4 address.
c. Each number needs to be less than or equal to 255 (279 is outside this range).
d. A mixture of binary notation and dotted-decimal notation is not allowed.

Q3.Describe how many types are wireless transmission?

In general we can divide five types of wireless transmission
1. The Electromagnetic Transmission
2. Radio Transmission
3. Microwave Transmission
4. Infrared Transmission
5. Light Transmission
1. The Electromagnetic Transmission
When electrons move, they create electromagnetic waves that can propagate through space and in a vacuum. The electromagnetic waves can be broadcast efficiently and received by a receiver some distance away.
2. Radio Transmission
Radio waves are easy to generate, can travel long distances, and can penetrate buildings easily, so they are widely used for communication. These waves can travel in all directions.
3. Microwave Transmission
Microwaves travel in a straight line, so if the towers are too far apart, the earth will get in the way. Thus, repeaters are needed periodically. The higher the towers are, the farther apart they can be. Unlike radio waves at lower frequencies, microwaves do not pass through buildings well.
4. Infrared Transmission
It is used for short-range communication. The remote controls used for televisions, VCRs, and stereos, use infrared communication. They are relatively directional and can not pass through solid objects.
5. Light Transmission
These types of wave can easily effected by wind and temperature changes. They normally work well on sunny days.

Q.4 Explain Random Excess Method.

In Random Excess Method, any station can send the data at any time without the permission of other station. At any time, if a station has information to send to other station, it uses a specific method defined by the protocol to make a decision on whether or not to send.
There is no scheduled time for a station to transmit the data that is why it is called Random Excess Protocol. Random protocol has the following types.

 

Q5.Explain Channelization in networks.

Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. There are three basic approaches to achieve channelization.
 

Q.6 Describe FDMA and TDMA in short.

In frequency-division multiple access (FDMA), the available bandwidth is divided into frequency bands. Each station is allocated a band to send its data. Different frequency bands are used by different stations.
In time-division multiple access (TDMA), the stations share the bandwidth of the channel in time. Each station is allocated a time slot during which it can send data. Each station transmits its data in is assigned time slot.

FIG: TDMA

Q.7 Explain CDMA in wireless networks.

CDMA differs from FDMA and TDMA because only one channel occupies the entire bandwidth of the link and also there is no timesharing. In CDMA a code is available for every station wanting to send the data. In this protocol the assigned codes have two properties.
1. If we multiply each code by another, we get zero.
2. If we multiply each code by itself, we get the number of stations.
So suppose there are three stations and code and data are (c1, d1), (c2, d2), (c3, d3) respectively. The data that go on the channel are the sum of all these terms. Any station wanting to receive data from one of the other two, multiplies the data on the channel by the code of the sender. For example, suppose stations 1 and 2 are talking to each other. Station 2 wants to hear what station I is saying. It multiplies the data on the channel by cl the code of station 1.
Because (cl . cl) is 3, but (c2 . cI) and (c3 . cI) are all Zero, station 2 divides the result by 3 to get the data from station 1.

Q.8 Describe the functionality of data link layer.

Data Link Layer is the second layer from the bottom in OSI model. This layer has two main functions
• Data link control
• Media access control.
Data link control provides the functionality of include framing, flow and error control that provide smooth and reliable transmission of frames between nodes. Media Access Control (MAC) handles the sharing of link.

Q.9 Explain Stop-and-Wait Automatic Repeat Request for noisy channel.

In this protocol the sending device keeps a copy of the last frame transmitted until it receives an acknowledgment for that frame. A data frames uses a sequence number; an ACK frame uses an acknowledgment number. The sender has a control variable, which we call Sn (sender, next frame to send), that holds the sequence number for the next frame to be sent (0 or 1).

Q.10 what is the difference between Pure ALOHA and Slotted Aloha protocol?

In Pure Aloha, station can send data in a continuous time manner whereas in Slotted Aloha, time is divided in slots. Pure ALOHA doesn't check whether the channel is busy before transmission. In slotted ALOHA, a frame can be sent only at fixed times, whereas in pure ALOHA, you can send any time. Pure ALOHA has a vulnerable time of 2 x Tfr. Whereas in Slotted ALOHA vulnerable time = Tfr {Tfr: Average transmission time for a frame} .
Download Networking interview questions and answers
Comment on Data Encryption Standard (DES) weakness and strength.
The Data Encryption Standard (DES) is a symmetric key block cipher which takes 64-bit plaintext and 56-bit key as an input and produces 64-bit cipher text.............
Read Answer
Describe the Packet Format of ARP (Address Resolution Protocol)
What are the advantages of IPv6 over IPv4?
What are the different design goals of ATM?
If you are a victim of Denial of Service (Dos) then what you do?
The function of a denial of service attack is to flood its target machine with too much traffic and prevents it from being accessible to any other requests or providing services..............
Read Answer
Networking interview questions - posted on June 27, 2013 at 16:45 PM by Kshipra Singh

1. Differentiate between hub and switch.

a.) Hub is a layer 1 device while Switch is layer 2 device.
b.) Hub works on single collision and single broadcast domain while switch works on per port collision and single broadcast domain.

2. What is FQDN?

- FQDN is the abbreviation for Fully Qualified Domain Name.
- It contains both the hostname and a domain name.
- It uniquely identifies a host within a DNS hierarchy

3. Tell us something about LMHOSTS files.

- It is a text file that resolves NetBIOS names to IP addresses.
- It can be compared with the HOSTS file which is a static method of resolving domain names into IP addresses.
- LMHOSTS files must be manually configured and updated.

4. What are the main qualities of an effective and efficient network?

a. Performance
b. Reliability
c. Security

5. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?

10Base2 -
- It is an Ethernet term which means a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments.

10Base5
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment.

10BaseT
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.

6. What is anonymous FTP? What is its use?

- It is an FTP that enables the users to connect to a host without a valid login and password.
- The login used is anonymous or guest, with the password usually requesting the user's ID.
- It enables a large number of users to access the files on the host without needing to set up a login for all of them.
- It exercises a strict control over the areas an anonymous user can access.

7. Which factors mark the reliability of the network?

a. Frequency of failure
b. Downtime / Time taken for recovery.

8. Name the factors that tell us about the security of the network.

a. Virus attacks on the system.
b. Unauthorized access to the system.

9. Define Bandwidth and Latency?

- Bandwidth/ Throughput – It means the number of bits which can be transmitted over the network in a specified time.
- Latency – It is the time taken by a message to travel from one side to another.

Bandwidth and latency describe the performance of a network.

10. What is point to point link?

- Direct connection between two computers on a network is called as point to point link.
- No other network devices other than a connecting cable are required for point to point connection.
- The cable connects the NIC card of both the devices.

11. When is a switch said to be congested?

- Sometimes a switch receives the packets faster than they can be accommodated in the shared link. These packets are stored in the memory for sometime.
- However, after sometime the buffer space will exhaust and some packets will start getting dropped off.
- The switch is called as congested in this state.

12. Explain a.) Uni-casting, b.) Multicasting and c.) Broadcasting

a.) Uni-casting - Message is sent from a source to a single destination node.
b.) Multicasting - Message is sent from a source to some subsets of other nodes.
c.) Broadcasting - Message is sent from a source to all the nodes in the network.

13. What are the various types of Multiplexing?

The various types of multiplexing are:
a. Frequency Division Multiplexing (FDM)
b. Time Division Multiplexing (TDM)
i. Synchronous TDM
ii. Asynchronous TDM
c. Wave Division Multiplexing (WDM)

14. Which layers of OSI are referred to as network support layers?

The following 3 layers of OSI are referred to as network support layers:
a. Physical Layer
b. Data link Layer and
c. Network Layers

15. Which layers of OSI are referred to as user support layers?

The block of user support layers consists of:
a. Session Layer
b. Presentation Layer and
c. Application Layer

16. What does the Data Link Layer do?

- The Data Link Layer transforms the physical layer to a reliable link.
It takes care of:

a. Node to node delivery.
b. Framing
c. Physical Addressing
d. Flow Control
e. Error Control
f. Access Control

17. What is NIC?

- NIC stands for Network Interface Card.
- It is a peripheral card attached to a PC to helps it connect to a network.
- The MAC address of the card helps the network in identifying the PC.

18. What are the responsibilities of Network Layer?

- The Network Layer aids in source-to-destination delivery of packet across multiple networks.
- It performs:
a. Logical Addressing
b. Routing

19. Name the various error detection methods.

The various error detection methods are:
a. Vertical Redundancy Check (VRC)
b. Longitudinal Redundancy Check (VRC)
c. Cyclic Redundancy Check (VRC)
d. Checksum

20. . What is Bit Stuffing?

- Bit stuffing means adding one extra 0 whenever five consecutive 1s follow a 0.
- This is done so that the pattern 0111110 is not mistaken for a flag.

21. How does dynamic host configuration protocol aid in network administration?

- In a large set up where it is difficult to manually configure the IP address of each system, dynamic host configuration protocol comes very helpful.
- Using this protocol, the administrator can create a pool of IP addresses which are called scopes. These can be then dynamically assigned to the systems.


Routing and Switching
What are Brute Force Attacks?
Brute forcing is a mechanism which is used by an attacker to break the encryption of data by applying a set of various key.............
Read Answer
How do you use RSA for both authentication and secrecy?
RSA is a public key encryption algorithm. The RSA algorithms are...........
Read Answer
Can you differentiate among encoding, encryption and hashing?
Encoding: Basically encoding is used to protect the integrity of data as it crosses through communication network to keep its original message.............
Read Answer
If you have to generate a hash function then what characteristics are needed in a secure hash function?
A secure hash function should have the following characteristics:................
Read Answer
What is digital signature? Differentiate between Physical and Digital Signature
A digital signature is an electronic analogue of a written signature; the digital signature can be used to provide assurance...........
Read Answer
What is Authentication Header and how it provides the protection to IP header?
Basically Authentication Header protects IP header and provides the complete authenticity to the IP packets.............
Read Answer
Explain SSL Protocol. How does it protect internet users from various threats?
The SSL protocol (Secure Socket Layer protocol) was originally developed by Netscape, to ensure security of data transported.............
Read Answer
What is PIX firewall security? How does it differ from a firewall?
PIX (Private Internet Exchange)...........
Read Answer
What are Malware? Explain different types of Malware
Malware is a software program which is developed to destroy a computer system..............
Read Answer
What are replay attacks? Give an example of replay attack
Replay attacks are the network attacks in which an attacker spies the conversation between the sender and receiver..........
Read Answer
If you have to ‘encrypt’ as well as ‘compress’ data during transmission then which would you do first and why?
Data should be transmitted over any communication network in such a way that the data integrity and authenticity.............
Read Answer
What is the goal of Information Security in an organization?
Mainly there are three Information security goals in an organization: Confidentiality, Integrity and Availability..............
Read Answer
What is Symmetric-Key cryptography and Asymmetric-Key cryptography?
Symmetric-Key Cryptography: Symmetric-key cryptography uses a single key for both encryption and decryption. Encryption and decryption algorithm are inverse of each other.............
Read Answer
Explain the services provided by IP (Internet Protocol) - Addressing, Fragmentation, Packet timeouts and options
Latest answer: Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP. As IP operates in an internet, its systems are designed to accept the addressing of devices which are unique.............
Read answer
Explain the classes of IP address
Latest answer: IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format. Every number in each class is represented as binary to computers..................
Read answer
Define Broadcast, Unicast and Multicast.
Latest answer: Unicast: A term used in communication to describe a piece of information to send from one point to another. There are only sender and receiver................
Read answer
What is Network Mask?
Latest answer: A network mask is used for determination of what subnet an IP address belongs to. An IP address has network address and the host address.................
Read answer
Define Subnetting.
Latest answer: A subnet describes a set of networked computers which have common IP address routing prefix..................
Read answer
What is the User Datagram Protocol (UDP)?
Latest answer: User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol,..................
Read answer
Explain TCP Windowing concept.
Latest answer: TCP Windowing is a concept that is used for avoiding congestion in the network traffic..................
Read answer
What is the Domain Name System (DNS)? What are the advantages of it?
Latest answer: A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet...................
Read answer
What is the TTL (Time to Live)? Why is it required?
Latest answer: TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded.................
Read answer
Explain the use of Internet Control Message Protocol (ICMP)
Latest answer: Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers..................
Read answer
What is the use of IGMP protocol?
Latest answer: Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups..............
Read answer
What are Ping and Tracert?
Latest answer: Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets..............
Read answer
Explain RSVP. How does it work?
Latest answer: Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network...............
Read answer
Explain the concept of DHCP.
Latest answer: Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The IP addresses are assigned dynamically...............
Read answer
What are the differences between a domain and a workgroup?
Latest answer: In a domain, one or more computer can be a server to manage the network. On the other hand in a workgroup all computers are peers having no control on each other.............
Read answer
Explain how NAT works.
Latest answer: Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is maintained for global to local and local to mapping of IP’s................
Read answer
What is PPP protocol? Explain PPP packet format.
Latest answer: Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host................
Read answer
What is IP Spoofing and how can it be prevented?
Latest answer: IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host...............
Read answer
Explain IP datagram, Fragmentation and MTU.
Latest answer: IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged in an order. The order is specific which helps to decode and read the stream easily..............
Read answer
What is an application gateway?
Latest answer: An application gateway is an application program that runs on a firewall between two networks. An application gateway is used for establishing connection between client program and destination service..................
Read answer
Explain Circuit Level Gateway.
Latest answer: A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be considered as a layer between application layer and transport layer..................
Read answer
What is 'Gateway Of Last Resort'?
A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to transmit the IP packet. Known routes are present in the routing table.................
Read answer
What are switches? Explain the concepts of Layer-3 switches.
Latest answer: It is a device that connects multiple network segments.
A switch analyzes the MAC address and then determines where to send the data..............
Read answer
What is Router? Explain components of Routers.
Latest answer: The way switches connect multiple computers, a router connects multiple networks. Routers comprise of data consisting of large tables of networks and addresses..................
Read answer
Overview of OSI layer.
Latest answer: OSI stands for Open Systems Interconnection
The OSI reference model gives an overview of the layered communications and computer network protocol design...................
Read answer
Explain different layers in the OSI model.
Latest answer: Application Layer: Closest to the end user, Interact directly with the software application.
Presentation Layer: Translates application to network format, and vice versa, Works to transform data into the form that the application layer can accept, Formats and encrypts data to be sent across a network.........................
Read answer
Explain the concept and capabilities of Unicast IP Addresses.
Latest answer: It is an IP address that uniquely identifies a host in a network.
The datagram with a unicast IP address is received and processed by only a single host.
Read answer
What is IP Multicasting?
Latest answer: It is an IP address that identifies a particular group of hosts in network.
This group of hosts is called a multicast group..............
Read answer
Explain the classes of IP addresses. Why do we need them?
Latest answer: Class A:
Range: from 0.0.0.0 to 127.255.255.255.
Leftmost bit: 0.
First 8 bits: netid.
Remaining 24 bits: hostid..............
Read answer
What is Subneting? Explain the advantages of using Subneting.
Latest answer: Subneting is dividing a network into several subnets.
This is usually done for the following purposes:..................
Read answer
What is Superneting? Explain the concept of custom Subneting.
Latest answer: Supernetting or Classless Inter-Domain Routing (CIDR) : It is a way to aggregate multiple Internet addresses of the same class..............
Read answer
What is VLSM, Variable length subnet masking?
Latest answer: VLSM is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule................
Read answer
What is Data Fragmentaion? Explain how Data Fragmentaion works.
Latest answer: Fragmentation occurs when storage space is used inefficiently due to which storage capacity and performance is reduced................
Read answer
Explain the concepts and capabilities of IP Datagram.
Latest answer: Data transmitted over an internet using IP is carried in messages called IP datagrams. Like all network protocol messages, IP uses a specific format for its datagrams...................
Read answer
What is MAC address?
Media Access Control address is an identifier for assigned to most network adapters or Network Interface Cards by the manufacturer for the purpose of identification...............
Read answer 

Describe the Packet Format of ARP (Address Resolution Protocol)?

The fields of the packet format of ARP are as follows:
-Hardware type: It is a 16-bit field . Each LAN has been assigned an integer based on its type. For example, Ethernet is given the type 1.
-Protocol type: This is a 16-bit field defining the protocol. For example, the value of this field for IPv4 protocol is 0800.
-Hardware length: This is an 8-bit field defining the length of the physical address in bytes. For example, for Ethernet the value is 6.
-Protocol length: This is an 8-bit field defining the length of the logical address in bytes. For example, for IPv4 protocol the value is 4.
-Operation: This is a 16-bitfield defining the type of packet. Two packet types are defined: ARP request (1), ARP reply (2).
-Sender hardware address: This is a variable-length field defining the physical address of the sender. For example, for Ethernet this field is 6 bytes long.
-Sender protocol address: This is a variable-length field defining the logical (for example, IP) address of the sender. For the IP protocol, this field is 4 bytes long.
-Target hardware address: This is a variable-length field defining the physical address of the target. For example, for Ethernet this field is 6 bytes long.
-Target protocol address: This is a variable-length field defining the logical (for example, IP) address of the target. For IPv4 protocol, this field is 4 bytes long.

What are the advantages of IPv6 over IPv4?

the next generation IP, or IPv6 has some advantages over IPv4 that can be summarized as follows:
- Larger Address Space: An IPv6 address is 128 bytes long where IPv4 has 32-bit address only, this is a huge increase in the address space.
- Better Header Format: IPv6 uses a new header format which simplifies and speeds up the routing process because most of the options do not need to be checked by routers.
- New Options: IPv6 has new options to allow for additional functionalities.
- Allowance for extension: In IPv6 new technologies can easily embedded.
-Support For Resource Allocation: In IPv6, flow label has been added to enable the source to request special handling of the packet. This mechanism can be used to support traffic such as real-time audio and video.
-Support For More Security: The encryption and authentication options in IPv6 provide confidentiality and integrity of the packet.

What are the different design goals of ATM?

Asynchronous Transfer Mode (ATM) is the cell relay protocol.
The Design Goals of ATM are as follows:
- A technology is needed to take advantage of high rate transmission media and less susceptible to noise degradation for maximizing the data rates.
-The system must interface with existing systems and provide wide-area inter-connectivity between.
-The implementation of design must be cheaper enough so that everyone can afford it. If ATM is to become the backbone of international communications, as indeed, it must be available at low cost to every user who wants it.
-The new system must be able to work with and support the existing telecommunication hierarchies.
- The new system must be connection-oriented to ensure accurate and predictable delivery.
- One objective is to move as many of the functions to hardware as possible (for speed) an eliminate as many software functions as possible (again for speed).