100 network infrastructure literacy, to see the completion of half of Internet experts

1) What is the link?

A link is a connection between two devices. It is possible to include the cable type and the communication protocol for one device to another device.

2) What is the level of the OSI reference model?

Seven OSI layers: the physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer.

3) What are the backbone?

Backbone network is a centralized infrastructure, aims to distribute different routing and data to a variety of networks. It also addresses bandwidth management and a variety of channels.

4) What is a LAN?

LAN LAN is an abbreviation. It is the connection between the computer and other network devices in the small physical location.

5) What is a node?

A node is a connection point occurs. It may be part of a network computer or device. To form the network connections, it requires two or more nodes.

6) What is a router?

Routers can be connected to two or more segments. These are intelligent network device in its routing table storing information, such as the path, and so the number of hops. With this information, they can determine the best path for data transmission. Routers running the OSI network layer.

7) What is the point to point link?

It means a direct connection between two computers on the network. In addition to the two computers to connect cables to the NIC card, point to point connection without any other network device.

8) What is anonymous FTP?

Anonymous FTP is a way to give users access to a common file server. Allow access to these data server users do not need to identify themselves, but anonymous log in as a guest.

9) What is the subnet mask?

IP address and subnet mask combination to identify two parts: a network address and a host address extension. The same as the IP address, subnet mask consists of 32 bits.

10) UTP cable maximum allowable length?

UTP cable has a single segment 90 to 100 m length allowed. This limitation can be overcome by using the relay and the switch

11) What is a data package?

Data is encapsulated before the network to transmit information by dividing the information into smaller blocks manageable process. In this process, additional source and destination addresses together with the header parity.

12) describes the network topology

Network topology refers to the layout of the computer network. It shows the physical layout of the devices and cables, and how they connect to each other.

13) What is a VPN?

VPN means virtual private network, this technology allows the creation of safe passage through the network (such as the Internet).

For example, VPN allows you to establish a dial-up connection to a secure remote server.

14) a brief description of NAT.

NAT is network address translation. This is a protocol that provides a way for multiple computers on a public network to share a single connection to the Internet.

15) What kind of work at the network layer of the OSI reference model?

The network layer is responsible for routing data, packet switching networks, and congestion control. Routers operate at this layer.

How to 16) network topology affect your decision-making when setting up the network?

Network topology determines the interconnect device must use what media. It is also suitable as a base material is provided, and the connector terminal.

17) What is RIP?

RIP, Routing Information Protocol referred to by the router for transmitting data from one network to another.

It its routing table by broadcasting to all the other routers in the network to effectively manage the routing data. It hops determined in units of network distance.

18) What are the different ways to protect your computer network?

There are several ways to do this. Reliable and install the update on all computers antivirus program. Sure that the firewall settings and configured correctly. User authentication will also be of great help. All of these combinations will constitute a highly secure network.

19) What is NIC?

NIC is the abbreviation for the network interface card (NIC) is. This is connected to a PC to connect to the network Shen North. Each NIC has its own MAC address for a PC on the network logo.

20) What is a WAN?

WAN represents the WAN. It is the interconnect geographically dispersed computers and devices. It is located on a network connected to different regions and countries / regions.

21) What is the importance of the OSI physical layer?

The physical layer converts the electrical signal to the data bits, and vice versa. This is the type of network equipment and cables provided and considerations.

How many layers there are under 22) TCP / IP?

There are four layers: a network layer, the Internet layer, a transport layer and application layer.

23) What is a proxy server, how they protect your computer network?

Proxy primarily prevents external subscriber identification IP address of the internal network. Do not know the correct IP address, can not even identify the physical location of the network. Proxy enables external users almost invisible network.

24) What is the function of OSI session layer?

This layer provides a method for the two protocols and devices on the network to communicate with each other through the holding of the session. This includes setting the session, the exchange of information during the session and release management process when the session is terminated.

25) What is the importance of implementing a fault-tolerant system? Limited it?

Fault-tolerant systems to ensure continuous data availability. This is achieved by eliminating single points of failure. However, in some cases, this type of system will not protect data, such as accidental deletion.

26) 10Base-T What does it mean?

10 refers to the data transmission rate, in this case is 10Mbps. "Base" refers to baseband. T represents a twisted pair, which is used for the cable network.

27) What is the private IP address?

Private IP address is allocated for the internal network. These addresses are used in a network, it can not be routed outside public network. These ensure that there is no conflict between the internal network, while private IP address range of the same can be reused for multiple internal networks, because they do not "see" each other.

28) What is NOS?

NOS or the network operating system software is designed, its main task is to provide network connectivity to the computer, so the computer can communicate with other devices and connections.

29) What is DoS?

DoS or Denial of Service attack is an attempt to prevent users from accessing the Internet or any other network services. This attack may have different forms, by a group composed of permanent person. One common way to do this is to make the system server is overloaded, it can not handle legitimate traffic, and will be forced to reset.

30) What is the OSI, the role played by it in the computer network?

OSI (Open Systems Interconnection) reference model for data communication. It consists of seven layers, each defines a particular aspect of network devices connected to each other and how to communicate. It may process the physical layer medium used, and the other layer is an indication of how the actual data transmission network.

What 31) and has shielded twisted pair cable is the purpose?

Its main purpose is to prevent crosstalk. Crosstalk is electromagnetic interference or noise, which may affect the data transmitted through the cable.

32) What is the advantage of a shared address?

By using address translation instead of routing, address shared security provides inherent advantage. This is because the host on the Internet can only see the public IP address of the external interface on a computer to provide address translation, not the private IP addresses on the internal network.

33) What is the MAC address?

Media Access Control or MAC devices on the network can be uniquely identified. It is also known as Ethernet address or physical address. MAC address consists of 6 bytes.

34) In terms of the OSI reference model, equivalent or more layers of TCP / IP application layer what is?

TCP / IP application layer actually has three peer in the OSI model: the session layer, presentation layer and application layer.

35) How to identify a given IP address IP class?

By looking at the first octet of any given IP address, you can identify it is a Class A, Class B, or Class C. If the first octet begins with 0, then the address is a Class A. If the top bit 10, the address is a class B address. If starting from 110, then it is a Class C network.

36) What is the main purpose OSPF is?

Or Open Shortest Path First OSPF, routing tables using a link state routing protocol to determine the best path for data exchange.

37) What is a firewall?

Firewalls are used to protect the internal network from external attacks. These external threats can be hackers who want to steal data or computer viruses, data can be eliminated immediately. It also prevents other users from external network access private network.

38) describes star topology

Star topology by the nodes connected to the central hub of the composition. This is one of the easiest to set up and maintain.

39) What is a gateway?

The gateway provides a connection between two or more segments. It is usually running the gateway software and computers to provide translation services. The translation is the key to allow different systems to communicate over a network.

What are the drawbacks 40) star topology is that?

One major disadvantage of the star topology is that once a central hub or switch is damaged, the entire network becomes unusable.

41) What is SLIP?

SLIP or Serial Line Interface Protocol is in fact an old agreement early development of UNIX. This is one of the protocols used for remote access.

42) gives examples of private network address.

10.0.0.0, subnet mask of 255.0.0.0

172.16.0.0, the subnet mask 255.240.0.0

Certification exchange group 463,904,693 thousand ccie

Receive the latest CCIE Exam

CCIE certification experience sharing one thousand people: 463 904 693

192.168.0.0, the subnet mask 255.255.0.0

43) What is tracert?

Tracert is a Windows utility that can be used to track data from the router to the destination network of collection routes. It also shows the number of hops during the entire transport route used.

44) What is the function of a network administrator?

Network administrators have many responsibilities, it can be summarized in three key functions: maintenance installation network, configure the network settings and network / troubleshooting.

45) Description of a disadvantage peer network.

When you are accessing shared by a workstation on a network resource, the performance of the workstation will be reduced.

46) What is a hybrid network?

Hybrid network using a client - server network architecture and the set of the like.

47) What is DHCP?

DHCP is an acronym for Dynamic Host Configuration Protocol. Its main task is automatically assigns IP addresses to devices on the network. It first checks the address of the next available, unoccupied any device, and assign it to the network device.

What 48) ARP main job is?

ARP or ARP main task is to map known IP address to the MAC layer address.

49) What is TCP / IP?

TCP / IP is an acronym for Transmission Control Protocol / Internet Protocol. This is a set of protocol layers, aimed at different types of computer networks (also referred to as heterogeneous network) for data exchange.

50) How to use the router management network?

Router built-in console enables you to configure different settings, such as security and data logging. You can assign limited to a computer, such as allowing access to resources, or you can view a specific time of the day the Internet.

You can even impose restrictions on the network can not see the whole site.

 

51) When you want between different platforms (such as UNIX and Windows server) to transfer files, you can be applied to any agreement?

Using FTP (File Transfer Protocol) file transfer between these different servers. This is possible because FTP is platform-independent.

52) What use is the default gateway?

The default gateway provided a method of connecting the local network to the external network. The default gateway for connecting an external network addresses are typically external router ports.

53) A method for protecting a network is to use a password. What can be considered a good password?

Good password not only by the letters, also include a combination of letters and numbers. Password combination of uppercase and lowercase letters favorable than password use all capital letters or all lowercase letters. The password must not be easy for a hacker to guess, such as dates, names, favorites, and so on.

54) the right to terminate UTP cable rate is the number?

Unshielded twisted pair cable terminated normally is 100 ohms.

55) What is the netstat?

Netstat is a command line utility. It provides useful information about the connection to the current TCP / IP settings.

Number of network ID 56) Class C network is how much?

For a class C network, the available network ID is 21 bits. The number of possible network ID of 2, up to 21 or 2,097,152. Host ID number ID for each network 2, minus 2 to 8, or 254.

57) Use longer dictate what happens when the cable length?

The cable is too long can result in loss of signal. This means that data transmission and reception will be affected, since the length of the falling signal.

58) What are the common software problems that may cause network defects?

Software-related issues may be any one or combination of the following:

- Client server problems

- application conflicts

- Configuration error

- protocol mismatch

- safe question

- User policy and rights issues

59) What is ICMP?

ICMP is Internet Control Message Protocol. It provides for the messaging and communication protocols within the TCP / IP protocol stack. This is the error message management protocol used by the network tools such as PING.

60) What is Ping?

Ping is a utility that allows you to check the connection between the network devices on the network. You can use its IP address or device name (such as computer name) ping equipment.

61) What is a peer to peer (P2P)?

Peer reply is not on a network server. All PC on the network is a separate workstation.

62) What is DNS?

DNS is the Domain Name System. The main function of the network service for TCP / IP address to resolve host names.

63) fiber and other media What are the advantages?

A major advantage of the optical fiber is less susceptible to electrical interference. It also supports higher bandwidth, which means you can send and receive more data. Long-distance signal degradation is very small.

64) What is the difference hubs and switches?

Hub acts as a multiport repeater. However, as more and more devices connected to it, it will be unable to effectively manage the traffic through it. Switches provide a better alternative that can improve performance, especially when there is high traffic expected on all ports.

65) What different network protocols supported by Windows RRAS service is?

Support for three major networking protocols: NetBEUI, TCP / IP and IPX.

66) What is the biggest network and host A, B and C class network is?

For class A, the network 126 possible hosts and 16,777,214

For Classes B, there are 16,384 possible network and host 65,534

For category C, there are 2,097,152 possible network 254 and the host

What order of 67 standard colors) straight-through cable is?

Orange / white, orange, green / white, blue, blue / white, green, brown / white, brown.

68) What falls under the application layer protocol TCP / IP protocol stack?

The following is a TCP / IP application layer protocols: FTP, TFTP, Telnet and SMTP.

69) You need to connect two computers for file sharing. Can I do this without using a hub or router?

Yes, you can connect two computers together using a single cable. In this case, use can cross cable. In this arrangement, the data transmission cable is connected to a pin and the other cable receiving data pins, and vice versa.

70) What is the ipconfig?

Ipconfig utility is a commonly used address information identifying the computer on the network. It can display the physical address and an IP address.

71) straight-through and crossover cables What is the difference?

Straight-through cable for connecting a computer to a switch, hub or router. Crossover cable used to connect together two similar devices, such as PC to PC or a hub to the hub.

72) What is a client / server?

Client / server is a type of network, wherein the one or more computers acting as servers. Server provides a centralized repository, such as printers and files. Client refers to a workstation to access the server.

73) network is described.

It refers to the interconnection network between computers and peripheral devices for data communication. You may use a wired network connection by cable or wireless link.

74) the NIC card from one PC to another mobile PC, MAC address is also transferred?

Yes, it is because MAC addresses are hardwired to the NIC circuit, rather than PC. This also means that when the NIC card is replaced with another, PC may have a different MAC address.

75) explain the clustering support

Cluster support network operating system is the ability to connect multiple servers in a fault-tolerant group. The main purpose of this is in case one server fails, the next server in the cluster will continue to handle all.

Where is the best place to 76) in the network contains two servers and twenty workstation, install anti-virus program is?

You must install anti-virus program on all servers and workstations, to ensure protection. This is because the individual users can access any workstation, and computer viruses is introduced when inserting the removable hard disk drive or a flash drive.

77) Describe Ethernet.

Ethernet is one of the popular network technology in use today. It was in the early 1970s developed based on the specification of the IEEE. Ethernet in the LAN.

78) What are the disadvantages ring topology to achieve?

If a workstation on the network failure may result in the loss of the entire network. Another disadvantage is that, when adjustment is required in certain parts of the network and to reconfigure the entire network must be temporarily closed.

79) CSMA / CD and CSMA / CA What is the difference?

CSMA / CD or collision detection, each time the collision to resend the data frame. CSMA / CA or collision avoidance, will first send broadcast intent prior to data transmission.

80) What is SMTP?

SMTP is the Simple Mail Transfer Protocol acronym. The protocol handles all internal mail, mail delivery and provide the necessary services on the TCP / IP protocol stack.

81) What is Multicast routing?

Multicast routing is a form of targeted broadcasting, the user sends a message to the selected group, instead of sending it to all users on the subnet.

82) What is the importance of encryption on the network is?

Encryption is to convert information into a code unreadable user process. Then using a secret key or password to decrypt or translate back to its normal readable format. Encryption helps ensure that information is intercepted is still unreadable, because the user must have the correct password or key.

83) how to organize and display IP address?

IP addresses are displayed as a series separated by periods or dots four decimal digits. This arrangement is another term dotted decimal format. One example is 192.168.101.2

84) explain the importance of certification.

Certification is to verify the user's credentials before the user logs on the network process. It is usually a user name and password. This provides restricted access from unwanted intruders on the network security measures.

85) tunnel mode What does it mean?

This is a data exchange mode, wherein the two communicating computers itself does not use IPSec. On the contrary, the LAN connection to the transit network gateway creates a virtual tunnel using the IPSec protocol to protect all of its communication through.

86) the establishment of a WAN link of different technologies involved in what?

Analog connection - using a conventional telephone line; digital connection - using a digital telephone line; switched connection - using a plurality of sets of the link between the sender and receiver to move data.

What is an advantage of 87) mesh topology is that?

In the case of a link failure, there is always another link is available. Mesh topology is actually one of the most fault-tolerant network topology.

88) When troubleshooting a computer network problems, what might a common hardware-related problems?

Most network comprised of hardware. These areas may include hard disk failure, NIC hardware damage and even start. Incorrect hardware configuration is one of the difficult problems.

89) What can be done to fix the signal attenuation problem?

Common way to handle this problem is to use repeaters and hubs, as it will help to regenerate the signal, thereby preventing signal loss. Inspect cables for proper termination is necessary.

90) How Dynamic Host Configuration Protocol network management help?

Network administrators do not have to visit each client computer to configure a static IP address, but can be applied to create a dynamic host configuration protocol called dynamically allocated to a range of client IP address pool.

91) explain the concept of network profiles?

The configuration file is configured settings for each user. For example, you can create a user profile place in the group.

92) What is Sneakernet?

Sneakernet networking is considered the first form, wherein a removable media (such as a disk, tape) physical transmission of data.

93) What is the role IEEE is in the computer network?

IEEE, or Institute of Electrical and Electronics Engineers is organized by the Electrical and electronic equipment standards publishing and management engineers. This includes network devices, network interfaces, cablings and connectors.

94) What agreement under TCP / IP Internet layer?

This layer has four management protocol. These are the ICMP, IGMP, IP and ARP.

95) comes to the network, what is the authority?

Permissions are licensed to perform certain actions on a network. Each user on the network can be assigned individual permissions, depending on whether the user must allow content.

What is a basic requirement of 96) to establish VLAN is?

You need a VLAN, because at the switch level is only one broadcast domain, which means that every time a new user is connected, the information will spread to the entire network. VLAN on the switch helps to create a separate broadcast domain at the switch level. It is used for security purposes.

97) What is IPv6?

Internet Protocol version 6 or IPv6 was developed to replace IPv4. Currently, IPv4 is used to control Internet traffic, but IPv4 is already saturated. IPv6 can overcome this limitation.

98) What is the RSA algorithm?

RSA is an abbreviation Rivest-Shamir-Adleman algorithm. It is the most commonly used public key encryption algorithm.

99) What is a mesh topology?

Mesh topology is an arrangement in which each device directly connected to each of the other devices on the network. Therefore, it requires each device has at least two network connections.

100) The maximum length of 100Base-FX network is how much?

100Base-FX network using the maximum allowed length of 412 m. The maximum length of the entire network is five kilometers.

Source: IT, said large coffee

Guess you like

Origin www.cnblogs.com/ceo-python/p/11729229.html