Saturday 27 August 2016

Data link layer

Data link layer:
This layer will convert data packets into data frame and also this layer works with it two sub layer
1)      MAC (media access control ){ Bus, Ring, Star }


2)      LLC (logical link control ) { EX- Ethernet, fast Ethernet, GBE }

Five steps of data encapsulation – TCP/IP


Image result for Five steps of data encapsulation – TCP/IP
Five steps of data encapsulation – TCP/IP


Data
Application layer

TCP
Data
Transport layer

IP
TCP
Data
Internet layer

LH
IP
TCP
Data
LT
Network interface

Transmit bits

TCP/IP Architecture model and example protocols


Image result for tcp/ip

TCP/IP Architecture model and example prot ocols                              
TCP/IP (DOD)
OSI MODEL
Example protocols

Application
Application
telnet,  HTTP, FTP, WWW, Gateway(Eudora, cc:mail), SNMP

Presentation
JPEG, ASCII, EBCDIC, TIFF, GIF, Encryption, MIDI, All Extension

Session
RPC, SQL, NFS, NetBIOS names, AppleTalk, ASP, DEC net, SCP

host to host  
Transport
TCP, UDP, SPX

Internetwork
Network
IP, IPX, Apple Talk DDP

Network interface
Data link
IEEE 802.3/2, HDLC. Frame Relay, PPP,FDDI, ATM,IEEE
Physical
EIA/TIA-232, V.35, RJ-45,Ethernet,802.3, 802.5

Monday 22 August 2016

Cisco Revs CCNA R&S Cert (V3.0)

Cisco Revs CCNA R&S Cert (V3.0); Leans Forward

Ann-2016-logo-w300
Yep, it’s official. Cisco just announced (May 17, 2016) big changes to the #CCENT and #CCNA, that is, the Cisco Certified Entry Network Technician (CCENT) and Cisco Certified Network Associate (CCNA) Routing and Switching certifications. As with any big change, there are new exams, exam numbers, and changes to the exam topics. This post gives the overview, some links, and a promise of more posts in the next few days.

Exam Structure Unchanged, But Exam Numbers and Cert Names Change

First off, when Cisco makes a big announcement about one of their certifications, many aspects of the certification can change. Cisco always changes the exam numbers, and they always change the exam blueprint (the document that lists all the exam topics). They could also change details like the number of exams you must take, or even remove an old certification or replace it with a new certification.
For these May 2016 announcements for the CCENT certification and the CCNA Routing and Switching certifications, Cisco changed only the exam numbers and the exam blueprint details for those exams. No program details were changed. Simple enough.
To briefly review you have two options: pass both the ICND1 and ICND2 exams, or pass the CCNA Routing and Switching exam. With the new exam transition, you can pass a combination of old and new. (For CCENT certification, you just have to pass the ICND1 exam.) Figures 1 and 2 list those paths, along with the new exam numbers introduced in 2016.

Figure 1: Exam Path to CCENT (New Exam, May 2016)


Configure Inter-VLAN Routing

Configure Inter-VLAN Routing on Cisco Routers and Switches

AUGUST 21, 2016 AT 12:17 PM
Here is an additional resource from Chapter 8 – Routing Fundamentals – Inter-VLAN Routing chapter of my upcoming ICND1 Exam Cram!

Monday 8 August 2016

TCP/IP Architecture model and examples of protocols

TCP/IP Architecture model and example protocols                              

                           
TCP/IP (DOD)
OSI MODEL
Example protocols

Application
Application
telnet,  HTTP, FTP, WWW, Gateway(Eudora, cc:mail), SNMP

Presentation
JPEG, ASCII, EBCDIC, TIFF, GIF, Encryption, MIDI, All Extension

Session
RPC, SQL, NFS, NetBIOS names, AppleTalk, ASP, DEC net, SCP

host to host  
Transport
TCP, UDP, SPX

Internetwork
Network
IP, IPX, Apple Talk DDP

Network interface
Data link
IEEE 802.3/2, HDLC. Frame Relay, PPP,FDDI, ATM,IEEE
Physical
EIA/TIA-232, V.35, RJ-45,Ethernet,802.3, 802.5

Difference Between TCP and UDP Protocols

Transport layer:
This layer is responsible to deliver the data from one host to another host computers and there for good be perform in first will be deliver two different ways. (Fragment is called segment)
1)      TCP
2)      UDP

TCP

·         It is reliable and Connection  oriented 
·         It create Virtual circuit between the host
·         Its provide sec Vance number for each Segment of the data
·         It support Retransmission and always get acknowledgement  for each segment
·         It support Flow control over the data 
·         It support Windowing 
·         Its Slow

UDP
·         Connection less and non-reliable
·         No virtual circuit
·         No segment
·         No retransmission
·         No flow control
·         No windowing
      Fast 

Saturday 6 August 2016

Career In Computer Networking

Be a Computer Network Engineer: Step-by-Step Career Guide
Research the requirements to become a computer network engineer. Learn about the job description and duties, and read the step-by-step process to start a career as a computer network engineer.
Should I Become a Computer Network Engineer?
Computer network engineers, also known as network architects, plan and construct data communication networks, such as local area network (LAN) and wide area network (WAN) systems. This can involve selecting the hardware and software, determining the layout of cables, and overseeing other IT professionals to create networks.
The majority of computer network architects work full-time, although overtime is common. Few physical demands and risks are associated with this career. Such computer architects spend long periods of time in front of computers.
Career Requirements
Degree Level
Bachelor's degree required, though some employers prefer Master of Business Administration (MBA) degrees
Degree Fields
Computer science, information systems or computer engineering
Certification
Voluntary certification is available through software companies like Microsoft and Cisco
Experience
5-10 years working in network administration usually required
Key Skills
Analytical and problem-solving skills, aptitude for creativity and design, customer-service skills, the ability to lead a team, knowledge of mathematics, telecommunications and electronics, ability to use analytical, network security, network monitoring and administration software programs, familiarity with network analyzers, network switches and wireless LAN servers
Salary (2016)
$120,800 yearly (mean for computer network architects)

  • Complete an internship. Experience is essential to entering this career, and so aspiring computer network engineers may benefit from completing internships to gain practical experience in the industry. In fact, some bachelor's programs offer internships to network engineering students. Some individuals may find that their schools instead offer cooperative learning experiences, which similarly allow the opportunity to gain hands-on experience while earning college credit.
  • Earn industry-standard certifications. Software vendors such as Microsoft, Cisco and Red Hat offer certifications to network administrators who use their products after passage of an exam. Possessing one of these certifications may enable individuals to advance in their careers faster, and some employers even require administrators to be certified in specific programs.

.
Step 1: Earn a Bachelor's Degree
While a bachelor's degree in general computer science will suffice, many schools offer 4-year degree programs specifically in network or computer engineering. These programs provide an overview of standard industry networking tools and procedures for resolving problems within computer networks. Classes cover topics like operating systems, programming essentials, network administration and information security. Students may also gain instruction in specific networking systems, like Cisco.
Success Tip:
Step 2: Work as a Network Administrator
The U.S. Bureau of Labor Statistics (BLS) reports that many network engineers are promoted from network administration or other similar IT positions. Network administrators mostly focus on installing, maintaining and monitoring the performance of networks, as well as overseeing IT support specialists, and they may assist engineers in the network design process. After earning at least five years of experience and demonstrating proficiency in networking, these workers may advance to network engineer status.
Success Tip:
Step 3: Consider Earning a Graduate Degree
The BLS notes that some employers favor network engineers who possess graduate degrees, such as an MBA with a focus on information systems. These MBA programs typically last two years and combine instruction in business topics with instruction in IT concepts. Master of Science in Computer Networking degree programs are also available. These programs include classes in wireless networking, telecommunications design and Internet protocols.

10 Question and Answer

.
How the Data Link Layer process the data ?
From the sending host it receives each packet on the network layer. After wraps up the packet in a data frame along with local routing data it finaly sends the data frame to the physical layer to code as a signal.
On the receiving host side it unwraps the received data frame and extracts the data packet from the data frame and finally sends the packet up to the network layer.
.
Tell me how the switch is functioning .
Initially it learns a MAC addressess of all the devices that are connected to the switch. and forward the frames to destination host after deciding whether that frames it received from the host devices or other switches, also it avoids creating any layer 2 loops.
.
Functions of a switch.
Address learning, Flooding, Forwarding, Filtering, and avoiding loops.
.
Tell me the Use of Boot command cisco devices.
Boot command that allows you to configure the cisco switches boot process.
  • which control the loaded cisco ios image file.
  • Control the loaded the startup configuration file.
  • It enables the ctrl + break during booting.
  • Also enabling the manual booting.
.
How do you recover the password of a switch ?
These are the steps involved with the password-recovery mechanism enabled,
  • Step 1 : Interrupt the boot process with ctrl+ Break
  • Step 2 : Initialize the flash file system manually
  • Step 3 : Prevent the ios loading of startup configuration file by hiding
  • Step 4 : Manually boot the switch and wait till the ios to finish loading in RAM.
  • Step 5 : unhide the startup config file and manually load it from NVRAM to RAM
  • Step 6 : Reset the password
  • Step 7 : Save the running config as startup config
  • Step 8 : Revert the boot process and reboot the switch
.
How do you recover the switch password if the password-recovery mechanism is disabled ?
These are the steps :
  • Step 1 : Interrupt the normal boot by pressing ctrl+Break
  • Step 2 : On the default config mode accept to reset the switch.
  • Step 3 : Manually boot the switch and wait for the ios to finish loading in RAM.
  • Step 4 : Now Reset the password
  • Step 5 : Save the running config as a startup config
  • Step 6 : Revert the Boot process to its default options and reboot the switch
.
How the VTP Transparent mode works in a switch ?
A VTP transparentswitch maintains its own local VLAN database, and does not directly participate in the VTP domain. A transparent switch will never accept VLAN database information from anotherswitch, even a server. Also, a transparent switch will never advertise its local VLAN database to another switch.
.
What are the VTP message advertisement types ?
Three message types exist for VTP advertisements:
  • Summary Advertisement
  • Subset Advertisement
  • Advertisement Request
.
Tell me the important rules of access lists ?
1. If a bit is set to 0in a wild-card mask, the corresponding bit in the address must be matched exactly.
2. If a bit is set to 1 in a wild-card mask, the corresponding bit in the address can match any number.
.
What is HDLC ?
High-Level Data-link Control (HDLC)is a WAN encapsulation protocol used on dedicated point-to-point serial lines.

10 Question and Answer


1.
What is the purpose of subnetting ?
Used in IP Networks to break up larger networks into multiple smaller subnetworks. It is used to reduce network traffic, Optimized network performance.It helps to identify and isolate network problems easily.

2.
What is cider?
CIDR (Classless Interdomain Routing) pronounced as cider for short. It was created for solving the problems introduced by Class A -E addressing scheme.
And it is used to prevent the ip address space depletion.
CIDR uses a masking technique to determine the target network and eleminating the limitations of classful configuration and preventing the waste of ip address in the classful addressing scheme.
3.
Tell me what is VLSM and its purpose.
VLSM means Variable length subnet mask.
It is an advanced form of subnetting that allows subnets of variable lengths to all coexist under one network.
The purpose of VLSM is to adjust your simple, same size subnets to better accommodate the size requirements of your physical networks.
4.
Benefits of IP v6 ?
  • IPv6 has larger address space
  • It supports stateless autoconfiguration.
  • It has more efficient packet headers than IPv4.
  • It supports multicasting
  • More secure than ipv4
  • It has additional mobility features and it has integrated qos.
5.
What is stateless autoconfiguration in IPv6 ?
This feature is used to generate an ip address without the need of dhcp server.
Here Routers send the RAs (Router advertisements) to the network hosts containing first 64 bits of the 128 bit network address.
The second half of the address is generated by the host. this allows the host to keep hardware addresses hidden for the security reasons.

6.
Tell me the advantages of IP SEC ?
It gives the following advantages :-
  • Performance
  • Network Layer security
  • Scalability
  • Versatile
  • Universal acceptance
  • Application independance
7.
Disadvantages of IP sec ?
Here is a list of IP sec disadvantages:-
  • Performace
  • Security
  • Complexity
  • Firewall Restriction
  • Management
8.
What are the advantages of ssl ?
The advantages are as follows :--
  • Interoperability: It supports different vendors softwares and applications.
  • Management: SSL makes deployment and management and administration tasks simple and effective. No need to install additional client softwares.
  • Cost: Its very cheap and no special licenses are required.
  • Granular structure : It provides finely detailed client access policies based on user identity and profile.
  • Firewall and NAT operation : SSL uses TCP port 443 (HTTPS), which is open on most networks, allowing SSL VPNs to operate without extra administrative overhead.
  • Security :By only allowing access to certain applications, security mitigation is increased, and the threat of attack is minimized
  • Application layer functionality: SSL eliminates IP-based address management problems by operating at the transport layer and provides services to the upper layers.
9.
What is SLIP ?
Serial Line Internet Protocol (SLIP) is a very simplistic, nonstandard protocol used to frame and transmit IP datagrams over serial connections. Due to its inflexible design, SLIP does not provide additional features such as encryption, authentication, or error detection .
10.
What are the security problems we face if we use PAP ?
PAP does not use any type of encryption to send usernames and passwords over the link. All authentication data is sent in clear text over the wan link, which is huge security risk.
PAP is extremely vulnarable to various forms of malicious attack, such as password guessing or other brute force attacks.
The PAP remote client controls the amount of authentication attempts to the authentication server or other brute force attacks. This means an attack could continure indefinitely against a PPP authentication server.

What is PDU ?

What is PDU ?
PDU means Protocol Data Units. Basically it is a data container used by each protocol to exchange data between the hosts in a network. Each and every PDU contains data payload and control information that helps the protocol to find out what to do with the data payload.
Usually the control information is stored in the header of the PDU and also sometimes stores in the trailer.

Friday 5 August 2016

Network segment

Network segment

network segment is a portion of a computer network. The nature and extent of a segment depends on the nature of the network and the device or devices used to interconnect end stations.

Question And Answer

1. What is Routing?
Routing is the process of finding a path on which data can pass from source to destination. Routing is done by a device called routers, which are network layer devices.
 2. What is the purpose of the Data Link?
The job of the Data Link layer is to check messages are sent to the right device. Another function of this layer is framing.
 3. What is the key advantage of using switches?
When a switch receives a signal, it creates a frame out of the bits that was extracted from that signal. With this process, it gains access and reads the destination address, after which it forwards that frame to the appropriate port. This is a very efficient means of data transmission, instead of broadcasting it on all ports.
4) When does network congestion occur?
Network congestion occurs when too many users are trying to use the same bandwidth. This is especially true in big networks that do not resort to network segmentation.
5) What is a Window in networking terms?
A Window refers to the number of segments that is allowed to be sent from source to destination before an acknowledgement is sent back.
6) Does a bridge divide a network into smaller segments?
Not really. What a bridge actually does is to take the large network and filter it, without changing the size of the network.
7) Which LAN switching method is used in CISCO Catalyst 5000?
This model uses the Store-and-forward switching method. It stores the entire frame to its buffers and performs a crc check before deciding whether or not to forward that data frame.
8 ) What is the role of the LLC sublayer?
The LLC sublayer, short for Logical Link Control, can provide optional services to an application developer. One option is to provide flow control to the Network layer by using stop/start codes. The LLC can also provide error correction.
9) How does RIP differ from IGRP?
RIP relies on the number of hops in order to determine the best route to a network. On the other hand, IGRP takes consideration many factors before it decides the best route to take, such as bandwidth, reliability, MTU and hop count.
10) What are the different memories used in a CISCO router?
– NVRAM stores the startup configuration file
– DRAM stores the configuration file that is being executed
– Flash Memory – stores the Cisco IOS.
11) What is BootP?
BootP is a protocol that is used to boot diskless workstations that are connected to the network. It is short for Boot Program. Diskless workstations also use BootP in order to determine its own IP address as well as the IP address of theserver PC.
12) What is the function of the Application Layer in networking?
The Application Layer supports the communication components of an application and provides network services to application processes that span beyond the OSI reference model specifications. It also synchonizes applications on the server and client.
13) Differentiate User Mode from Privileged Mode
User Mode is used for regular task when using a CISCO router, such as to view system information, connecting to remote devices, and checking the status of the router. On the other hand, privileged mode includes all options that are available for User Mode, plus more. You can use this mode in order to make configurations on the router, including making tests and debugging.
14) What is 100BaseFX?
This is Ethernet that makes use of fiber optic cable as the main transmission medium. The 100 stands for 100Mbps, which is the data speed.
15) Differentiate full-duplex from half-duplex.
In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot receive while it is transmitting, and vice versa.
16) What is MTU?
MTU stands for Maximum Transmission Unit. It refers to the maximum packet size that can be sent out onto the data line without the need to fragment it.
17) How does cut-through LAN switching work?
In Cut-Through LAN switching, as soon as the router receives the data frame, it will immediately send it out again and forward it to the next network segment after reading the destination address.
18) What is latency?
Latency is the amount of time delay that measures the point from which a network device receives a data frame to the time it sends it out again towards another network segment.
19) Utilizing RIP, what is the limit when it comes to number of hops?
The maximum limit is 15 hop counts. Anything higher than 15 indicates that the network is considered unreachable.
20) What is a Frame Relay?
Frame Relay is a WAN protocol that provides connection-oriented communication by creating and maintaining virtual circuits. It has a high performance rating and operates at the Data Link and Physical Layers.
21) How do you configure a Cisco router to route IPX?
The initial thing to do is to enable IPX routing by using the “ipx routing” command. Each interface that is used in the IPX network is then configured with a network number and encapsulation method.
22) What are the different IPX access lists?
There are two access lists: Standard and Extended. Standard Access List can only filter the source or destination IP address. An Extended Access List uses the source and destination IP addresses, port, socket and protocol when filtering a network.
23) Explain the benefits of VLANs.
VLANs allow the creation of collision domains by groups other than just physical location. Using VLANs, it is possible to establish networks by different means, such as by function, type of hardware, protocol, among others. This is a big advantage when compared to conventional LANs wherein collision domains are always tied to physical location.
24) What is subnetting?
Subnetting is the process of creating smaller networks from a big parent network. Being a part of a network, each subnet is assigned some additional parameters or identifier to indicate its subnet number.
25) What are the advantages of a layered model in the networking industry?
A layered network offers many advantages. It allows administrators to make changes in one layer without the need to make changes in the other layers. Specialization is encouraged, allowing the network industry to make progress faster. A layered model also lets administrators troubleshoot problems more efficiently.
26) Why is UDP lease favored when compared to TCP?
It’s because UDP is unreliable and unsequenced. It is not capable of establishing virtual circuits and acknowledgements.
27) What are some standards supported by the Presentation layer?
Presentation layer supports many standards, which ensures that data is presented correctly. These include PICT, TIFF and JPEG for graphics, MIDI, MPEG and QuickTime for Video/Audio.
28) What’s the simplest way to remotely configure a router?
In cases when you need to configure a router remotely, the most convenient is to use the Cisco AutoInstall Procedure. However, the router must be connected to the WAN or LAN through one of the interfaces.
29) What does the show protocol display?
– routed protocols that is configured on the router
– the address assigned on each interface
– the encapsulation method that was configured on each interface
30) How do you depict an IP address?
It can be done in three possible ways:
– using Dotted-decimal. For example: 192.168.0.1
– using Binary. For example: 10000010.00111011.01110010.01110011
– using Hexadecimal. For example: 82 1E 10 A1
31) How do you go to privileged mode? How do you switch back to user mode?
To access privileged mode, you enter the command “enable” on the prompt. In order to get back to user mode, enter the command “disable”
32) What is HDLC?
HDLC is short for High Level Data Link Control protocol, and is a propriety protocol of CISCO. It is the default encapsulation operated within CISCO routers.
33) How are internetworks created?
Internetworks are created when networks are connected using routers. Specifically, the network administrator assigns a logical address to every network that connects to the router.
34) What is Bandwidth?
Bandwidth refers to the transmission capacity of a medium. It is a measure of how much volume a transmission channel can handle, and is measured in Kbps.
35) How does Hold-downs work?
Hold-downs prevent regular update messages from reinstating a downed link by removing that link from update messages. It uses triggered updates to reset the hold-down timer.
36) What are packets?
Packets are the results of data encapsulation. These are data that has been wrapped under the different protocols of the OSI layers. Packets are also referred to as datagrams.
37) What are segments?
Segments are sections of a data stream that comes from the upper OSI layers and ready for transmission towards the network. Segments are the logic units at the Transport Layer.
38) Give some benefits of LAN switching.
– allows full duplex data transmission and reception
– media rate adaption
– easy and efficient migration
39) What is Route Poisoning?
Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable. This technique is used in order to prevent problems caused by inconsistent updates on a route.
40) How do you find valid hosts in a subnet?
The best way to go about this is to use the equation 256 minus the subnet mask. The hosts that are considered valid are those that can be found between the subnets.
41) What is DLCI?
DLCI, or Data Link Connection Identifiers, are normally assigned by a frame relay service provider in order to uniquely identify each virtual circuit that exists on the network.
42) Brielfly explain the conversion steps in data encapsulation.
From a data transmitter’s point of reference, data from the end user is converted to segments. Segments are then passed on to the other layers and converted into packets or datagrams. These packets are then converted into frames before passing on to the network interface. Finally, frames are converted to bits prior to actual data transmission.
43) What are the different types of passwords used in securing a CISCO router?
There are actually five types of passwords that can be used. These are enable secret, enable, virtual terminal, console, and auxiliary.
44) Why is network segmentation a good idea when managing a large network?
For a network administration, segmenting a network would help ease network traffic and ensures that high bandwidth is made available at all times for all users. This translates to better performance especially for a growing network.
45) What are the things that can be accessed in a CISCO router’s identifying information?
Cisco CCNA
The hostname and the Interfaces. The hostname is the name of your router. The Interfaces are fixed configurations that refer to the router ports.
46) Differentiate Logical Topology from Physical Topology
Logical Topology refers to the signal path through the physical topology. Physical Topology is the actual layout of the network medium.
47) What causes a triggered update to reset the router hold-down timer?
This may happen when the hold-down timer has already expired, or when the router received a processing task that incidentally was proportional to the number of links in the internetwork.
48) In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?
A. erase running-config
B. erase startup-config
C. erase nvram
D. delete nvram
Correct Answer: B. erase startup-config
49) Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router router?
Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit
Correct Answer: (config-if)# dialer-group 1
50) When configuring a router utilizing both physical and logical interfaces, what factor must be considered in determining the OSPF router ID?
A. The highest IP address of any physical interface.
B. The lowest IP address of any logical interface.
C. The middle IP address of any logical interface..
D. The lowest IP address of any physical interface.
E. The highest IP address of any interface.
F. The highest IP address of any logical interface.
G. The lowest IP address of any interface.
Correct Answer: A. The highest IP address of any physical interface.

51) Mention what is the difference between the switch, hub, and router?

HubSwitchRouter
Hub has single broadcast domain and collision domain. Anything comes in one port is sent out to the others. It is a device that filters and forwards packets between LAN segments. Switches have single broadcast domain and multiple collision domains. It supports any packet protocol, as such it operates at the data link layer 2 and layer 3 Router is a device which transmits data packets along networks.


 52. Mention what is the size of IP address?
Size of IP address is 32 bit for IPv4 and 128 bit for IPv6.

53. Mention what does data packets consist of?
A data packet consists of sender’s information, recipient’s information, and the data contained.  It also has the numeric identification number that defines the packet number and order.  When data is send across the network, that information is segmented into data packets.  In short, data packets carry the information and routing configuration for your transferred message.

54. Mention what is DHCP?
DHCP stands for Dynamic Host Configuration Protocol.  DHCP assigns an IP address automatically to a given workstation client.  You can also make static IPS for machines like printers, servers, routers and scanners.

55. Mention what is BOOTP?
BOOTP is a computer networking protocol used to deploy an IP address to network devices from a configuration server.

56. Explain why is UDP lease favored when compared to TCP?
It is because UDP is un-sequenced and unreliable. It is not capable of creating virtual circuits and acknowledgments

57. Mention what is the difference between dynamic IP and static IP addressing?
Dynamically IP addresses are provided by DHCP server and static IP address are given manually.

58. Mention what are the ranges for the private IPS?
Ranges for private IPS are
  • Class A: 10.0.0.0 – 10.0.0.255
  • Class B: 172.16.0.0 – 172.31.0.0
  • Class C: 192.168.0.0 – 192.168.0.255

59. In how many ways you can access router?
You can access it in three ways
  • Telnet (IP)
  • AUX (Telephone)
  • Console (Cable)
60. Explain what is EIGRP?
EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing protocol designed by Cisco Systems.  It is availed on a router to share routes with other routers within the same autonomous system. Unlike other routers like RIP, EIGRP only sends incremental updates, decreasing the workload on the router and the amount of data that needs to be transferred.

61. Mention what is the matric of EIGRP protocol?
EIGRP protocol consists of
  • Bandwidth
  • Load
  • Delay
  • Reliability
  • MTU (Maximum Transmission Unit)

62. Mention what does the clock rate do?
Clockrate enables the routers or DCE equipment to communicate properly.

63. Mention what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?
Erase startup- coding is the command you must use if you want to delete the configuration data that is stored in the NVRAM

64. Mention what is the difference between TCP and UDP?

TCP and UDP both are protocols for sending files across computer network

           TCP (Transmission Control Protocol)              UDP (User Datagram Protocol)
TCP is connection oriented protocol. When connection lost during transferring files, the server would request the lost part.  While transferring a message, there is no corruption while transferring a message UDP is based on connectionless protocol. When you send data, there is no guarantee whether your transferred message will reach there without any leakage
 The message will deliver in the order it is sent The message you sent may not be in the same order
 Data in TCP is read as a stream, where one packet ends, and another begins Packets are transmitted individually and are guaranteed to be whole if they arrive
 Example of TCP includes World Wide Web, file transfer protocol, e-mail, Example for UDP are VOIP (Voice Over Internet Protocol) TFTP ( Trivial File Transfer Protocol),

 65. Explain the difference between half-duplex and full-duplex?
Full duplex means that the communication can occur in both directions at the same time, while half duplex means that the communication can occur in one direction at time.

66.Mention the conversion steps of data encapsulation?
Conversion steps of data encapsulation includes

  • Layer one, two and Three ( Application/presentation/session) : Alphanumeric input from the user is converted into Data
  • Layer Four (Transport): Data is converted into small segments
  • Layer Five (Network): Data converted into packets or datagrams and Network header is added
  • Layer Six (Data Link): Datagrams or packets are built into frames
  • Layer Seven (Physical): Frames are converted into bits

 67. What command do we give if router IOS is stucked?
Cntrl+Shift+F6 and X is the command we give if router IOS is stucked.

 68.Explain what is route poisoning?
Route poisoning is a technique of preventing a network from transmitting packets through a route that has become invalid.

 69. What route entry will be assigned to dead or invalid route in case of RIP?
In the case of RIP table entry 16 hops will be assigned to dead or invalid route making it unreachable.

BE AWARE OF FaKe Call

Phishing is defined as any attempt to obtain your personal and financial information. Mostly, phishing is carried out via emails. These ...