Вы находитесь на странице: 1из 16

Back to Questions Page

what is the subnet for the host ip Answer Posted


Question address 172.16.210.0/22 Rank
By
Question Submitted By :: Guest
This Interview Question Asked @ IBM , Microland
I also faced this Question!! © ALL Interview .com
Answer the given ip address is 0 Jitendera
172.16.210.0/22
Kumar Sinah
scince it is class b address the it
orignal mask should be 26 but given mask
it 22 that is there is 6 bit of sunating
128+64+32+16+8+4=252
block size=256-252=4
now
210/4= 52
and remnder is 2(no matter)
that is
52*4=208
thus
subnet for the given host ip adress
must be
172.16.208.0/22
thanks

Answer the given ip address is 0 Jitendera


172.16.210.0/22
Kumar Sinah
scince it is class b address the it
orignal mask should be 16 but given mask
it 22 that is there is 6 bit of sunating
128+64+32+16+8+4=252
block size=256-252=4
now
210/4= 52
and remnder is 2(no matter)
that is
52*4=208
thus
subnet for the given host ip adress
must be
172.16.208.0/22
thanks
Answer i have done little typo mistake .in 0 Jitendera Sinha
place of 16 i have written 26 in first
answer.so i think on that basic i am
wrong

which of the following address represent


unicast address

A 224.1.5.2

B ffff.ffff.ffff.ffff

C 192.168.24.59/30 Answer Posted


Question Rank
By
D 255.255.255.255

E 172.138.128.255

plz tell what should be answer plz tell


with explanation

Question Submitted By :: Guest


This Interview Question Asked @ IPsoft , Jetking
I also faced this Question!! © ALL Interview .com
Answer answer should be e 0 Jitendera
Kuamr Sinha
224.1.5.2 it is a multicast address

opton b is broad cast adress

opton c look like unicast but if we do


suntaing then it has find thhat it is
not unicast

optod d is also a broad cast address

hence option e should be unicast

Answer Option A is unicast address. 0 Shahin


Answer hi sachin how do you say that option A 5 Jitendera
is correct because if i am not mistaking
Kumar Sinha
ip address starting with 224 network id
is reserved for multi casting so i think
you are wrong.

224.0.0.0 224.0.0.255(special “well-


known” multicast addresses)

224.0.1.0 238.255.255.255 (Globally-


scoped (Internet-wide) multicast
addresses).

239.0.0.0 239.255.255.255
(Administratively-scoped (local)
multicast addresses.)

so what do you think.are you wrong or


wright.so as far as my knowledge is
concern option A is not going to be
answers.

thanks
mail me your thinking about that
discussions.
on
jitenderasinha.it@gmail.com

what are the port numbers for Answer Posted


Question DNS,FTP,TELNET,SMTP,NNTP Rank
By
Question Submitted By :: Hithesh
This Interview Question Asked @ Airtel
I also faced this Question!! © ALL Interview .com
Answer protocol port number 5 Jitendera
Kumar Sinha
ftp data 20

ftp program 21

telnet 23

dns 53

nntp 119

smtp 25
Answer dns =53 0 Rakesh Kumar
ftp= 20
Agrawal
telnet=23
smtp=25
nntp=119

Hi,can anyone explain me in brief about


Answer Posted
Question ccna security. Rank
waiting for your answer By
Question Submitted By :: Hithesh
I also faced this Question!! © ALL Interview .com
Answer HI 0 Jitendera Sinha
this is jitendera here. i am a ccna and
planing for ccna secur.to being a ccna
secur u should have completed ccna.after
that u can go through ccna secur.this is
a important part of network admin and
security.if you want that book?
then go to esnips.com
type three
cspfa

and download the pdf whose size is 24 mb


this is the complete book covreing ccan
secur,cspa,csvpn and csi

Answer ccsp_complete_study_guide.pdf this is 0 Jitu


the link in esnips.com

what is difference between


1 pap and chap(quite easy but need on
line answer)
2 chap and ms-chap(plz describe briefly) Answer Posted
Question Rank
By
now i have posted the question is there
any one to help me?
Question Submitted By :: Jitendera Kumar Sinha
I also faced this Question!! © ALL Interview .com
Answer is there any guy who can help me.i 0 Jitendea Sinha
searched it on the net but i cannot
understand plz place the answer looking
toward you.
jitendera sinha

friends i have 3ree prob which is asked


in ibm india in
technical round
1 what is ftp(this was easy i had
answered)
2 why we use ftp(i think it is a tough
one)
3 how can we enable ftp in the widows
xp.
friend i need these question answer as Answer Posted
Question soon as possible Rank
By
if it is possible to reply within the
eveing then i always
obeyliged to you
i am espacily looking towards the
jitendera sinha who make
most of the valuable answer

loking toward you


nidhi mall
Question Submitted By :: Nidhi
This Interview Question Asked @ IBM , Ibm
I also faced this Question!! © ALL Interview .com
Answer thanks nidhi,for that question 5 Jitendera Sinha
ok i am going to explain question 2 and
3rd if you needed first answer too then
plz intimate me through that.
ok your second question why we use ftp
at firstely tell me what do you do if
you want to send
24 mb file by internet what would you do
i know what are u thinking
u r thinking that u will zip it,but as
you know that most of the site doesnot
allow to send the file whose size is
more then 5 mb
then what do u do?

think think
think.........
think.........
no answer?
your 2nd question nawer is residing in
that question.to solving the above prob
that is to send the large file across
the network ftp is used

now urs 3rd question


i am writing the step
1 go to control panell
2 go to add remove program
3 go to add remove windows component
4 click on iis
5 click on ftp
click ok
close the winow
after closing that window u get another
window
insert urs xp cd in cd rom
specify the location
now ftp is enabled
thanks
by jitendera sinha

Answer amazing.thanks jitendera do u know u 0 Nidhi


help me lot i canot explain my fillng.
really u r best,thanks a lot,wow.one day
we ever meet,thanks a very very thanks
to you
thanks a lot and i didn't need first
question answer
once again thanks
thanks thanks thanks

Answer thanks is not needed,and i am not best,i 0 Jitendera Sinha


just tried to explain.if that is going
to help then its my pleasure.by the way
thanks does not needed becoz it might be
possible that it make me proudy,once
again i am not the best,thanks
take care

Question What does a router change in a packet Rank Answer Posted


when it forwards a
By
packet to the next hop?
* A: Destination physical address
* B: Destination network address
* C: Destination network address and
the destination
physical address
Question Submitted By :: Nidhi Mall
This Interview Question Asked @ Microland
I also faced this Question!! © ALL Interview .com
Answer A: Destination physical address 0 Sudeep_mib

Answer destination network address 0 Jawad

Answer sudeep mall is coreect 0 Purbi Sinha

Answer sudeep is correct option is A 5 Jitendera


here is the explanation
Kumar Sinha
Let's say that we have Host A and Host
D. Host A sends a
packet to Host D, which Host D is on a
different network.
Host A applies both the logical address
and logical device
address before sending the packet. The
source network layer
address is also added to the packet, so
the receiving device
can reply if it needs to. Then Host A
adds it's own device
address (which in this example is 10.)
Instead of adding the
device address of Host D, it uses the
next router in the
path (which it's address is 20.) Now the
packet is sent and
is received by the next router. Router B
examines the
destination address and recognizes the
address is addressed
to it. The router strips off the data
link addresses and
examines the destination device of the
network layer. It
recognizes the address to be on a
different network. Since
Router C is the next router in the path,
Router B sends the
packet to it. So Router B applies it's
own device address
(20) and uses Router C device address as
the destination
address (30) Router B sends the packet
to Router C. Router C
sees that it's addressed to it. Router C
strips off the data
link addresses and examines the
destination device of the
network. It recognizes that the packet
is sent to Host D.
Router C applies it's own device address
and applies the
destination address of Host D (40)
Router C sends the packet
to Host D. The data link addresses are
removed. The original
source and destination addresses are
contained in the packet
at the network layer.
hope this article help those people who
marked it wrong

Answer (10.0.0.1) (10.0.0.2) 5 Mr.shahin07


S0 S0
(R1)------------------------(R2)
!E0/1 (0ACF:AAA1:000A) ! E0/1
(1ACF:BBA1:010A)
!IP - 172.16.1.100 ! IP -
172.17.1.100
! !
! !
! !
(Host A) (Host B)
E0 (ABC0:ABB1:00A0) E0
(CAA0:ABE1:110A)
IP - 172.16.1.1 IP -
172.17.1.1

Just assume this is a network & all


interfaces having their
Layer 2 & Layer 3 addresses.

Now Host A want to send some data to


Host B.
Now wat wud be the Layer 2 & 3 source &
Destination address.

a) Packet leaving Host A.

Layer 3 Source add - 172.16.1.1


Layer 3 Destination add - 172.17.1.1

Layer 2 Source add - ABC0:ABB1:00A0 (E0


of Host A)
Layer 2 Destination add - 0ACF:AAA1:000A
(E0/1 of R1)

b) Packet leaving Router R1 -

Layer 3 Source add - 172.16.1.1


Layer 3 Destination add - 172.17.1.1

Layer 2 Source add - 0ACF:AAA1:000A


(E0/1 of R1)
Layer 2 Destination add - 1ACF:BBA1:010A
(E0/1 of R2)

c) Packet leaving Router R2 -

Layer 3 Source add - 172.16.1.1


Layer 3 Destination add - 172.17.1.1

Layer 2 Source add - 1ACF:BBA1:010A


(E0/1 of R2)
Layer 2 Destination add - CAA0:ABE1:110A
(E0/1 of R2)

So every time DESTINATION PHYSICAL


ADDRESS is changed.

Hi guys, i just share wat i know. Let me


if i m wrong. Your
feedback is important for me.

With Thanx & Regards


Shahin Ahmed

Answer ha ha thanks shain for supporting me and 0 Jitendera


providing the scenario based explanation
Kumar Sinha
people don't like to read theory so this
article help them more.i mark it as
excellent
Answer but sahin if u make your answer with 0 Jitendera
three router (R1 R2 and R3)and host off
Kumar Sinha
R1 want to send the data to R3 through
R2 then it will easy to
understandble.meanwhile it is excellent

HI friends.
i need a suggestion and looking towards
you foryours
valuable suggestion
friends i have completed ccna now i want
to done red het
Answer Posted
Question linux system admnistration and Rank
networking i am liitle bit By
confuse betwwen them which one is better
for me for job
point of view
reply soon
waiting for your reply
Question Submitted By :: Jitendera Sinha
I also faced this Question!! © ALL Interview .com
Answer friends i am little bit confude between 0 Jitendera Sinha
ccnp and red hat
Linux system admin and networking.
what i have to do
plz tell
looking towards you
jitendera sinha

Request any body to explain the


parameters of Ipsec vpn Answer Posted
Question tunnel while creating a tunnel in Cisco Rank
By
ASA.
Question Submitted By :: Prasad.giri
This Interview Question Asked @ HCL
I also faced this Question!! © ALL Interview .com
Answer In tunnel mode, the entire IP packet 0 Jitendera Sinha
(data and IP header) is
encrypted and/or authenticated. It is
then encapsulated into
a new IP packet with a new IP header.
Tunnel mode is used to
create Virtual Private Networks for
network-to-network
communications (e.g. between routers to
link sites),
host-to-network communications (e.g.
remote user access),
and host-to-host communications (e.g.
private chat).

and the parameter are

Parameter Value
Name <Descriptive name for
the tunnel>
VPN Policy <VPN policy that the
tunnel should use>

This must match the policy on the other


gateway
Local Endpoint <Local network
entity that the tunnel
connects> This is usually a
subnet entity.
Remote Endpoint <Remote network
entity that the
tunnel connects> This is usually a
subnet entity
Local Gateway <Local security gateway
network entity>
Remote Gateway <Remote security gateway
network entity>

i donot know more than that how ever plz


tell me that.. is
that topic in the ccna course

Answer is the answer given by jitendera kumar 0 Sohaan


sinha is correct?.plz
[HCL
answer it.jitendera sinha provided lots
of answer and i Infosystems Ltd]
think all are correct but rigt now he
seems to confused

Answer is there any one who can say that those 0 Jitendera Sinha
answer is write or
[HCL
not.
plz if not then provide the wright Infosystems Ltd]
answer
by
nidhi mall

what the exact definition of


Answer Posted
Question Ethernet.plz reply as soon Rank
soon as possible By
Question Submitted By :: Jitenderas Sinha
I also faced this Question!! © ALL Interview .com
Answer Ethernet is A technology where all 0 Maaun
devices share same
bandwidth.

Answer Ethernet is a phisical media tat 0 Shridh


provides bandwidth of 10 mbps.

Answer thsnks to all you for providing the 0 Jitendera Sinha


answers
thanks again
jitendera sinha

Answer A type of high-speed network for 0 Sudeep_mib


interconnecting computing
devices. Ethernet can be either 10 or
100 Mbps (Fast
Ethernet). Ethernet is a trademark of
Xerox Corporation, Inc.

Answer actually ethernet is a connectivity of 0 Pradeep Yadav


lan family

Answer Ethernet is a standard communication 0 Shahin


protocol embedded in
software & hardware, intended for
building local area
networking.

Ethernet is a popular Data link layer &


physical layer
technology for Local Area Network. It is
less expensive &
widely used LAN technology.

First Ethernet was created in 1960's at


UNIVERSITY OF HAWAII
for its ALOHA network.

First experimental Ethernet was created


1970's by BOB
METCALFE & DAVID BOGGS of PALO ALTO
RESEARCH CENTER (PARC) &
speed was 2.94 Mbps.

In 1980's DIGITAL, INTEL & XEROX (DIX)


jointly created
Ethernet, which is known as ETHERNET
Version 1.0

In 1983, IEEE introduce Ethernet along


with some
modification on DIX Ethernet. which is
known as IEEE's Ethernet.

what are loops in switches


Answer Posted
Question excactly...and how does it gets Rank
created??? By
Question Submitted By :: Shridh
I also faced this Question!! © ALL Interview .com
Answer what is loop it is difficult to explain 5 Jitendera Sinha
without any diagram.
but i am trying my best to explain it
without any diagram
ok
firstly understand that what is loop
loop is a cycle.
it is difficult to understand from that
explanation.

now let there 3ree switch a , b ,c.which


are connected with
each other.now for back up for that
connection we provide
alternate path that is called
redundancy(suppose that you
know)ok
as if a user want to communicate with
another user in to the
network then multiple packet is
generated.and these packet
travel through each path within the
network.due to this a
loop is formed
diagarm
a---------b--------c
<----------------->
lower one is alternate path between a to
c.now if a want to
communicate with c then packet travel
through both path and
crated loop

now in some cases stp is enabled but


loop also formed it is
due to

An STP loop is created when an STP


blocking port in a
redundant topology erroneously
transitions to the forwarding
state. This usually happens because one
of the ports of a
physically redundant topology (not
necessarily the STP
blocking port) no longer receives STP
BPDUs. In its
operation, STP relies on continuous
reception or
transmission of BPDUs based on the port
role. The designated
port transmits BPDUs, and the non-
designated port receives
BPDUs.

thanks i think this article may help you


with best regards
jitendera sinha

Answer Posted
Question what is flow control,. Rank
By
Question Submitted By :: Purbi
I also faced this Question!! © ALL Interview .com
Answer In computer networking, flow control is 0 Ajaz Ahmad
the process of Wani
managing the rate of data transmission
between two nodes to
prevent a fast sender from over running
a slow receiver.
This should be distinguished from
congestion control, which
is used for controlling the flow of data
when congestion
has actually occurred
Posted By
Ajaz Ahmad Wani
Network Engineer
E-mail-baba.ajaz@gmail.com

Answer flow control is the process in which it 0 Jitendera Sinha


prevent the sender
to overflow the buffer of receiver

jitendera sinha

Answer Jeetendra just want to correct you with 0 Nikhil Maggu


your last step i.e
3rd step after receiving ACK(reply for
request) the
sender(or 1st node) sendsback ACK again
that as confirmation
for starting the session

Answer Flow control ensure that one device 0 Mr.shahin07


doesn't overflow another
device with too much data in one
connection.

Commonly used flow control technique are


- Buffer, Ready/Not
Ready signal & windowing.

Question what is secure hand shake protocol Rank Answer Posted


By
Question Submitted By :: Purbi Sinha
I also faced this Question!! © ALL Interview .com
Answer it is also know as ssh protocol 0 Jitender Sinha
it work on 3ree step
let supoose that machine 1 want to
comunicate withe machine 2
then what process take place.
step 1 node one send the request to the
node to and wiat for ack
step 2.node 2 accept the request and
send the ack
step 3 node 1 acccept the request and
send the request again
and communucation get stared

Answer Jeetu just want to correct you with your 0 Nikhil Maggu
3rd step
i.e after receiving ACK back the
sender(or 1st node) sends
back ACK/confirmation[Not request] as to
confirm start of
the session

Answer Posted
Question please name some routed protocol. Rank
By
Question Submitted By :: Purbi Sinha
I also faced this Question!! © ALL Interview .com
Answer ip ,ipx and appletalk is nae of some
riuted protocol

Вам также может понравиться