Saturday, 23 July 2016

100 Interview Question Answers For Computer Networking-Part2



<Back to Part1<

22. What is OSPF?
It is an Internet routing protocol that scales well, can route traffic along multiple paths, and
uses knowledge of an Internet's topology to make accurate routing decisions.
23. What is Kerberos?
It is an authentication service developed at the Massachusetts Institute of Technology.
Kerberos uses encryption to prevent intruders from discovering passwords and gaining
unauthorized access to files.
24. What is a Multi-homed Host?
It is a host that has a multiple network interfaces and that requires multiple IP addresses is
called as a Multi-homed Host.
25. What is NVT (Network Virtual Terminal)?
It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the
start of a Telnet session.
26. What is Gateway-to-Gateway protocol?
It is a protocol formerly used to exchange routing information between Internet core routers.
27. What is BGP (Border Gateway Protocol)?
It is a protocol used to advertise the set of networks that can be reached with in an
autonomous system. BGP enables this information to be shared with the autonomous system.
This is newer than EGP (Exterior Gateway Protocol).
28. What is autonomous system?
It is a collection of routers under the control of a single administrative authority and that uses
a common Interior Gateway Protocol.
29. What is EGP (Exterior Gateway Protocol)?
It is the protocol the routers in neighboring autonomous systems use to identify the set of
networks that can be reached within or via each autonomous system.
30. What is IGP (Interior Gateway Protocol)?
It is any routing protocol used within an autonomous system.
31. What is Mail Gateway?
It is a system that performs a protocol translation between different electronic mail delivery
protocols.
32. What is wide-mouth frog?
Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.
33. What are Diagrams and Trigrams?
The most common two letter combinations are called as diagrams. e.g. th, in, er, re and an. The
most common three letter combinations are called as trigrams. e.g. the, ing,
and, and ion.
34. What is silly window syndrome?
It is a problem that can ruin TCP performance. This problem occurs when data are passed to
the sending TCP entity in large blocks, but an interactive application on the
receiving side reads 1 byte at a time.
35. What is region?
when hierarchical routing is used, the routers are divided into what we call regions, with each
router knowing all the details about how to route packets to destinations
within its own region, but knowing nothing about the internal structure of other regions.
36. What is multicast routing?Sending a message to a group is called multicasting, and its routing algorithm is called
multicast routing.
37. What is traffic shaping?
One of the main causes of congestion is that traffic is often busy. If hosts could be made to
transmit at a uniform rate,congestion would be less common. Another open loop
method to help manage congestion is forcing the packet to be transmitted at a more
predictable rate. This is called traffic shaping.
38. What is packet filter?
Packet filter is a standard router equipped with some extra functionality. The extra
functionality allows every incoming or outgoing packet to be inspected. Packets meeting
some criterion are forwarded normally. Those that fail the test are dropped.
39. What is virtual path?
Along any transmission path from a given source to a given destination, a group of virtual
circuits can be grouped together into what is called path.
40. What is virtual channel?
Virtual channel is normally a connection from one source to one destination, although
multicast connections are also permitted. The other name for virtual channel is virtual circuit.

>Read More>

SHARE THIS

Author:

0 comments: