Network Operations Center Interview Questions
Network Operations Center Interview Questions
.
17. What is a characteristic of Store and Forward switches?
They read the entire frame and check CRC before forwarding.
18. What is source route
It is a sequence of IP addresses identifying the route a datagram must follow. A source
route may optionally be included in an IP datagram header.
19. What is RIP (Routing Information Protocol)
It is a simple protocol used to exchange information between the routers.
20. What is SLIP (Serial Line Interface Protocol)
It is a very simple protocol used for transmission of IP datagrams across a serial line.
21. What is Proxy ARP
It is using a router to answer ARP requests. This will be done when the originating host
believes that a destination is local, when in fact is lies beyond router.
22. What is OSPF
It is an Internet routing protocol that scales well, can route traffic along multiple paths,
and uses knowledge of an Internet's topology to make accurate routing decisions.
23. What is Kerberos
It is an authentication service developed at the Massachusetts Institute of Technology.
Kerberos uses encryption to prevent intruders from discovering passwords and gaining
unauthorized access to files.
24. What is a Multi-homed Host
It is a host that has a multiple network interfaces and that requires multiple IP addresses
is called as a Multi-homed Host.
25. What is NVT (Network Virtual Terminal)
It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in
the start of a Telnet session.
26. What is Gateway-to-Gateway protocol
It is a protocol formerly used to exchange routing information between Internet core
routers.
27. What is BGP (Border Gateway Protocol)
It is a protocol used to advertise the set of networks that can be reached with in an
autonomous system. BGP enables this information to be shared with the autonomous
system. This is newer than EGP (Exterior Gateway Protocol).
28. What is autonomous system
It is a collection of routers under the control of a single administrative authority and that
48. What is the minimum and maximum length of the header in the TCP segment and IP
datagram
The header should have a minimum length of 20 bytes and can have a maximum length
of 60 bytes.
49. What is difference between ARP and RARP
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the
48 bit physical address, used by a host or a router to find the physical address of
another host on its network by sending a ARP query packet that includes the IP address of
the receiver. The reverse address resolution protocol (RARP) allows a host to discover its
Internet address when it knows only its physical address.
50. What is ICMP
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite
used by hosts and gateways to send notification of datagram problems back to the sender.
It uses the echo test / reply to test whether a destination is reachable and responding. It
also handles both control and error messages.
51. What are the data units at different layers of the TCP / IP protocol suite
The data unit created at the application layer is called a message, at the transport layer the
data unit created is called either a segment or an user datagram, at the network layer the
data unit created is called the datagram, at the data link layer the datagram is
encapsulated in to a frame and finally transmitted as signals along the transmission
media.
52. What is Project 802
It is a project started by IEEE to set standards that enable intercommunication between
equipment from a variety of
manufacturers. It is a way for specifying functions of the physical layer, the data link
layer and to some extent the network layer to allow for interconnectivity of major LAN
protocols.
It consists of the following:
802.1 is an internetworking standard for compatibility of different LANs and MANs
across protocols.
802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is
non-architecture-specific, that is
remains the same for all IEEE-defined LANs.
Media access control (MAC) is the lower sublayer of the data link layer that contains
some distinct modules each
carrying proprietary information specific to the LAN product
being used. The modules are Ethernet LAN (802.3), Token ring LAN (802.4), Token bus
LAN (802.5).
802.6 is distributed queue dual bus (DQDB) designed to be used in MANs.
53. What is Bandwidth
Every line has an upper limit and a lower limit on the frequency of signals it can carry.
This limited range is called the
bandwidth.
54. Difference between bit rate and baud rate.
Bit rate is the number of bits transmitted during one second whereas baud rate refers to
the number of signal units per
second that are required to represent those bits.
baud rate = bit rate / N where N is no-of-bits represented by each signal shift.
55. What is MAC address
The address for a device as it is identified at the Media Access Control (MAC) layer in
the network architecture. MAC
address is usually stored in ROM on the network adapter card and is unique.
56. What is attenuation
The degeneration of a signal over distance on a network cable is called attenuation.
57. What is cladding
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
58. What is RAID
A method for providing fault tolerance by using multiple hard disk drives.
59. What is NETBIOS and NETBEUI
NETBIOS is a programming interface that allows I/O requests to be sent to and received
from a remote computer and it
hides the networking hardware from applications.
NETBEUI is NetBIOS extended user interface. A transport protocol designed by
microsoft and IBM for the use on small
subnets.
60. What is redirector
Redirector is software that intercepts file or prints I/O requests and translates them into
network requests. This comes under presentation layer.
61. What is Beaconing
The process that allows a network to self-repair networks problems. The stations on the
network notify the other stations on the ring when they are not receiving the
transmissions. Beaconing is used in Token ring and FDDI networks.
62. What is terminal emulation, in which layer it comes
Telnet is also called as terminal emulation. It belongs to application layer.
63. What is frame relay, in which layer it comes
Frame relay is a packet switching technology. It will operate in the data link layer.