Back to Questions Page what is the subnet for the host ip
Question address 172.16.210.0/22
Rank
Answer Posted By
Question Submitted By :: Guest This Interview Question Asked @ IBM , Microland I also faced this Question!!
© ALL Interview .com
Answer
the given ip address is 172.16.210.0/22 scince it is class b address the it orignal mask should be 26 but given mask it 22 that is there is 6 bit of sunating 128+64+32+16+8+4=252 block size=256-252=4 now 210/4= 52 and remnder is 2(no matter) that is 52*4=208 thus subnet for the given host ip adress must be 172.16.208.0/22 thanks
0
Jitendera Kumar Sinah
Answer
the given ip address is 172.16.210.0/22 scince it is class b address the it orignal mask should be 16 but given mask it 22 that is there is 6 bit of sunating 128+64+32+16+8+4=252 block size=256-252=4 now 210/4= 52 and remnder is 2(no matter) that is 52*4=208 thus subnet for the given host ip adress must be 172.16.208.0/22 thanks
0
Jitendera Kumar Sinah
Answer
i have done little typo mistake .in place of 16 i have written 26 in first answer.so i think on that basic i am wrong
0
Jitendera Sinha
which of the following address represent unicast address A 224.1.5.2 B ffff.ffff.ffff.ffff
Question
C 192.168.24.59/30
Rank
D 255.255.255.255
Answer Posted By
E 172.138.128.255 plz tell what should be answer plz tell with explanation
Question Submitted By :: Guest This Interview Question Asked @ IPsoft , Jetking I also faced this Question!! Answer
answer should be e
© ALL Interview .com
0
Jitendera Kuamr Sinha
0
Shahin
224.1.5.2 it is a multicast address opton b is broad cast adress opton c look like unicast but if we do suntaing then it has find thhat it is not unicast optod d is also a broad cast address hence option e should be unicast
Answer
Option A is unicast address.
Answer
hi sachin how do you say that option A is correct because if i am not mistaking ip address starting with 224 network id is reserved for multi casting so i think you are wrong.
5
Jitendera Kumar Sinha
224.0.0.0 224.0.0.255(special “wellknown” multicast addresses) 224.0.1.0 238.255.255.255 (Globallyscoped (Internet-wide) multicast addresses). 239.0.0.0 239.255.255.255 (Administratively-scoped (local) multicast addresses.) so what do you think.are you wrong or wright.so as far as my knowledge is concern option A is not going to be answers. thanks mail me your thinking about that discussions. on
[email protected]
what are the port numbers for
Question DNS,FTP,TELNET,SMTP,NNTP
Rank
Answer Posted By
Question Submitted By :: Hithesh This Interview Question Asked @ Airtel I also faced this Question!! Answer
protocol
port number
ftp data
20
ftp program
21
telnet
23
dns
53
nntp
119
smtp
25
© ALL Interview .com
5
Jitendera Kumar Sinha
Answer
Question
dns =53 ftp= 20 telnet=23 smtp=25 nntp=119
0
Hi,can anyone explain me in brief about ccna security. waiting for your answer
Rakesh Kumar Agrawal
Rank
Answer Posted By
Question Submitted By :: Hithesh I also faced this Question!! Answer
HI this is jitendera here. i am a ccna and planing for ccna secur.to being a ccna secur u should have completed ccna.after that u can go through ccna secur.this is a important part of network admin and security.if you want that book? then go to esnips.com type three cspfa
© ALL Interview .com
0
Jitendera Sinha
0
Jitu
and download the pdf whose size is 24 mb this is the complete book covreing ccan secur,cspa,csvpn and csi
Answer
Question
ccsp_complete_study_guide.pdf this is the link in esnips.com
what is difference between 1 pap and chap(quite easy but need on line answer) 2 chap and ms-chap(plz describe briefly) now i have posted the question is there any one to help me?
Rank
Answer Posted By
Question Submitted By :: Jitendera Kumar Sinha I also faced this Question!! Answer
Question
is there any guy who can help me.i searched it on the net but i cannot understand plz place the answer looking toward you. jitendera sinha
friends i have 3ree prob which is asked in ibm india in technical round 1 what is ftp(this was easy i had answered) 2 why we use ftp(i think it is a tough one) 3 how can we enable ftp in the widows xp. friend i need these question answer as soon as possible if it is possible to reply within the eveing then i always obeyliged to you i am espacily looking towards the jitendera sinha who make most of the valuable answer
© ALL Interview .com
0
Jitendea Sinha
Rank
Answer Posted By
loking toward you nidhi mall
Question Submitted By :: Nidhi This Interview Question Asked @ IBM , Ibm I also faced this Question!! Answer
thanks nidhi,for that question ok i am going to explain question 2 and 3rd if you needed first answer too then plz intimate me through that. ok your second question why we use ftp at firstely tell me what do you do if you want to send 24 mb file by internet what would you do i know what are u thinking u r thinking that u will zip it,but as you know that most of the site doesnot allow to send the file whose size is more then 5 mb then what do u do? think think think......... think.........
© ALL Interview .com
5
Jitendera Sinha
no answer? your 2nd question nawer is residing in that question.to solving the above prob that is to send the large file across the network ftp is used now urs 3rd question i am writing the step 1 go to control panell 2 go to add remove program 3 go to add remove windows component 4 click on iis 5 click on ftp click ok close the winow after closing that window u get another window insert urs xp cd in cd rom specify the location now ftp is enabled thanks by jitendera sinha
Answer
amazing.thanks jitendera do u know u help me lot i canot explain my fillng. really u r best,thanks a lot,wow.one day we ever meet,thanks a very very thanks to you thanks a lot and i didn't need first question answer once again thanks thanks thanks thanks
0
Nidhi
Answer
thanks is not needed,and i am not best,i just tried to explain.if that is going to help then its my pleasure.by the way thanks does not needed becoz it might be possible that it make me proudy,once again i am not the best,thanks take care
0
Jitendera Sinha
Question What does a router change in a packet when it forwards a packet to the next hop?
Rank
Answer Posted By
* A: Destination physical address * B: Destination network address * C: Destination network address and the destination physical address
Question Submitted By :: Nidhi Mall This Interview Question Asked @ Microland I also faced this Question!!
© ALL Interview .com
Answer
A: Destination physical address
0
Sudeep_mib
Answer
destination network address
0
Jawad
Answer
sudeep mall is coreect
0
Purbi Sinha
Answer
sudeep is correct option is A here is the explanation Let's say that we have Host A and Host D. Host A sends a packet to Host D, which Host D is on a different network. Host A applies both the logical address and logical device address before sending the packet. The source network layer address is also added to the packet, so the receiving device can reply if it needs to. Then Host A adds it's own device address (which in this example is 10.) Instead of adding the device address of Host D, it uses the next router in the path (which it's address is 20.) Now the packet is sent and is received by the next router. Router B examines the destination address and recognizes the address is addressed to it. The router strips off the data link addresses and examines the destination device of the
5
Jitendera Kumar Sinha
network layer. It recognizes the address to be on a different network. Since Router C is the next router in the path, Router B sends the packet to it. So Router B applies it's own device address (20) and uses Router C device address as the destination address (30) Router B sends the packet to Router C. Router C sees that it's addressed to it. Router C strips off the data link addresses and examines the destination device of the network. It recognizes that the packet is sent to Host D. Router C applies it's own device address and applies the destination address of Host D (40) Router C sends the packet to Host D. The data link addresses are removed. The original source and destination addresses are contained in the packet at the network layer. hope this article help those people who marked it wrong
Answer
(10.0.0.1) (10.0.0.2) S0 S0 (R1)------------------------(R2) !E0/1 (0ACF:AAA1:000A) ! E0/1 (1ACF:BBA1:010A) !IP - 172.16.1.100 ! IP 172.17.1.100 ! ! ! ! ! ! (Host A) (Host B) E0 (ABC0:ABB1:00A0) E0 (CAA0:ABE1:110A) IP - 172.16.1.1 IP 172.17.1.1 Just assume this is a network & all interfaces having their Layer 2 & Layer 3 addresses. Now Host A want to send some data to Host B.
5
Mr.shahin07
Now wat wud be the Layer 2 & Destination address.
3 source &
a) Packet leaving Host A. Layer 3 Source add - 172.16.1.1 Layer 3 Destination add - 172.17.1.1 Layer 2 Source add - ABC0:ABB1:00A0 (E0 of Host A) Layer 2 Destination add - 0ACF:AAA1:000A (E0/1 of R1) b) Packet leaving Router R1 Layer 3 Source add - 172.16.1.1 Layer 3 Destination add - 172.17.1.1 Layer (E0/1 Layer (E0/1
2 Source add - 0ACF:AAA1:000A of R1) 2 Destination add - 1ACF:BBA1:010A of R2)
c) Packet leaving Router R2 Layer 3 Source add - 172.16.1.1 Layer 3 Destination add - 172.17.1.1 Layer (E0/1 Layer (E0/1
2 Source add - 1ACF:BBA1:010A of R2) 2 Destination add - CAA0:ABE1:110A of R2)
So every time DESTINATION PHYSICAL ADDRESS is changed. Hi guys, i just share wat i know. Let me if i m wrong. Your feedback is important for me. With Thanx & Regards Shahin Ahmed
Answer
ha ha thanks shain for supporting me and providing the scenario based explanation people don't like to read theory so this article help them more.i mark it as excellent
0
Jitendera Kumar Sinha
Answer
Question
but sahin if u make your answer with three router (R1 R2 and R3)and host off R1 want to send the data to R3 through R2 then it will easy to understandble.meanwhile it is excellent
HI friends. i need a suggestion and looking towards you foryours valuable suggestion friends i have completed ccna now i want to done red het linux system admnistration and networking i am liitle bit confuse betwwen them which one is better for me for job point of view reply soon waiting for your reply
0
Jitendera Kumar Sinha
Rank
Answer Posted By
Question Submitted By :: Jitendera Sinha I also faced this Question!! Answer
Question
friends i am little bit confude between ccnp and red hat Linux system admin and networking. what i have to do plz tell looking towards you jitendera sinha
Request any body to explain the parameters of Ipsec vpn tunnel while creating a tunnel in Cisco ASA.
© ALL Interview .com
0
Jitendera Sinha
Rank
Answer Posted By
Question Submitted By :: Prasad.giri This Interview Question Asked @ HCL I also faced this Question!! Answer
In tunnel mode, the entire IP packet (data and IP header) is encrypted and/or authenticated. It is then encapsulated into a new IP packet with a new IP header. Tunnel mode is used to create Virtual Private Networks for
© ALL Interview .com
0
Jitendera Sinha
network-to-network communications (e.g. between routers to link sites), host-to-network communications (e.g. remote user access), and host-to-host communications (e.g. private chat). and the parameter are Parameter Value Name
VPN Policy This must match the policy on the other gateway Local Endpoint This is usually a subnet entity. Remote Endpoint This is usually a subnet entity Local Gateway Remote Gateway i donot know more than that how ever plz tell me that.. is that topic in the ccna course
Answer
is the answer given by jitendera kumar sinha is correct?.plz answer it.jitendera sinha provided lots of answer and i think all are correct but rigt now he seems to confused
0
Sohaan [HCL Infosystems Ltd]
Answer
is there any one who can say that those answer is write or not. plz if not then provide the wright answer by
0
Jitendera Sinha [HCL Infosystems Ltd]
nidhi mall
Question
what the exact definition of Ethernet.plz reply as soon soon as possible
Rank
Answer Posted By
Question Submitted By :: Jitenderas Sinha I also faced this Question!!
© ALL Interview .com
Answer
Ethernet is A technology where all devices share same bandwidth.
0
Maaun
Answer
Ethernet is a phisical media tat provides bandwidth of 10 mbps.
0
Shridh
Answer
thsnks to all you for providing the answers thanks again jitendera sinha
0
Jitendera Sinha
Answer
A type of high-speed network for interconnecting computing devices. Ethernet can be either 10 or 100 Mbps (Fast Ethernet). Ethernet is a trademark of Xerox Corporation, Inc.
0
Sudeep_mib
Answer
actually ethernet is a connectivity of lan family
0
Pradeep Yadav
Answer
Ethernet is a standard communication
0
Shahin
protocol embedded in software & hardware, intended for building local area networking. Ethernet is a popular Data link layer & physical layer technology for Local Area Network. It is less expensive & widely used LAN technology. First Ethernet was created in 1960's at UNIVERSITY OF HAWAII for its ALOHA network. First experimental Ethernet was created 1970's by BOB METCALFE & DAVID BOGGS of PALO ALTO RESEARCH CENTER (PARC) & speed was 2.94 Mbps. In 1980's DIGITAL, INTEL & XEROX (DIX) jointly created Ethernet, which is known as ETHERNET Version 1.0 In 1983, IEEE introduce Ethernet along with some modification on DIX Ethernet. which is known as IEEE's Ethernet.
what are loops in switches
Question excactly...and how does it gets created???
Rank
Answer Posted By
Question Submitted By :: Shridh I also faced this Question!! Answer
what is loop it is difficult to explain without any diagram. but i am trying my best to explain it without any diagram ok firstly understand that what is loop loop is a cycle. it is difficult to understand from that explanation. now let there 3ree switch a , b ,c.which are connected with each other.now for back up for that connection we provide
© ALL Interview .com
5
Jitendera Sinha
alternate path that is called redundancy(suppose that you know)ok as if a user want to communicate with another user in to the network then multiple packet is generated.and these packet travel through each path within the network.due to this a loop is formed diagarm a---------b--------c <-----------------> lower one is alternate path between a to c.now if a want to communicate with c then packet travel through both path and crated loop now in some cases stp is enabled but loop also formed it is due to An STP loop is created when an STP blocking port in a redundant topology erroneously transitions to the forwarding state. This usually happens because one of the ports of a physically redundant topology (not necessarily the STP blocking port) no longer receives STP BPDUs. In its operation, STP relies on continuous reception or transmission of BPDUs based on the port role. The designated port transmits BPDUs, and the nondesignated port receives BPDUs. thanks i think this article may help you with best regards jitendera sinha
Question what is flow control,.
Rank
Answer Posted By
Question Submitted By :: Purbi I also faced this Question!! Answer
In computer networking, flow control is
© ALL Interview .com
0
Ajaz Ahmad
the process of managing the rate of data transmission between two nodes to prevent a fast sender from over running a slow receiver. This should be distinguished from congestion control, which is used for controlling the flow of data when congestion has actually occurred Posted By Ajaz Ahmad Wani Network Engineer [email protected]
Answer
flow control is the process in which it prevent the sender to overflow the buffer of receiver
Wani
0
Jitendera Sinha
jitendera sinha
Answer
Jeetendra just want to correct you with your last step i.e 3rd step after receiving ACK(reply for request) the sender(or 1st node) sendsback ACK again that as confirmation for starting the session
0
Nikhil Maggu
Answer
Flow control ensure that one device doesn't overflow another device with too much data in one connection.
0
Mr.shahin07
Rank
Answer Posted
Commonly used flow control technique are - Buffer, Ready/Not Ready signal & windowing.
Question what is secure hand shake protocol
By Question Submitted By :: Purbi Sinha I also faced this Question!!
© ALL Interview .com
Answer
it is also know as ssh protocol it work on 3ree step let supoose that machine 1 want to comunicate withe machine 2 then what process take place. step 1 node one send the request to the node to and wiat for ack step 2.node 2 accept the request and send the ack step 3 node 1 acccept the request and send the request again and communucation get stared
0
Jitender Sinha
Answer
Jeetu just want to correct you with your 3rd step i.e after receiving ACK back the sender(or 1st node) sends back ACK/confirmation[Not request] as to confirm start of the session
0
Nikhil Maggu
Rank
Answer Posted By
Question please name some routed protocol. Question Submitted By :: Purbi Sinha I also faced this Question!! Answer
ip ,ipx and appletalk is nae of some riuted protocol
© ALL Interview .com