Protocol Interview Questions
Protocol Interview Questions
Protocol Interview Questions
NetBIOS (Network Basic Input/Output System) Protocol allows applications on separate computers to communicate over a LAN. It runs over TCP/IP giving each computer in the network a NetBIOS name and IP address. E.g. It can be used for computers running Windows 2000 (or before) to join a computer network running Windows 2000 (or later).
Remote Access VPN:- Also called as Virtual Private dial-up network (VPDN) is mainly used in scenarios where remote access to a network becomes essential. Remote access VPN allows data to be accessed between a companys private network and remote users through a third party s ervice provider; Enterprise service provider. E.g Sales team is usually present over the globe. Using Remote access VPN, the sales updates can be made. Site to Site VPN Intranet based: This type of VPN can be used when multiple Remote locations are present and can be made to join to a single network. Machines present on these remote locations work as if they are working on a single network. Site to Site VPN Extranet based: This type of VPN can be used when several different companies need to work in a shared environment. E.g. Distributors and service companies. This network is more manageable and reliable
EAP authentication method: Extensible authentication protocol authenticates remote access connection. The authentication mechanism is decided between the remote VPN client and authenticator (ISA). The mechanism is typical in which authenticator requests for authentication information and the responses are given by the remote VPN client. MS Chap Authentication method: Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) starts with the authenticator (Remote access server) challenge. The challenge to the remote access client sends a session identifier and challenge string. The client in response sends the nonreversible encryption of the string, the identifier and password. Authenticator checks the credentials and grants access on a successful authentication. Unencrypted passwords (PAP):- Uses plain text passwords. Does not involve encryption. Used for less secure clients.
Shiva Password Authentication Protocol (SPAP):- It is a password authentication protocol. It is less secure as the same user password is always sent in the same reversibly encrypted form
Q23. What is
RTP?
Real-Time Transfer Protocol lays a standard or a way to transfer or manage real time data over a network. It does not guarantee the delivery of data or provide any quality of service. However it helps to manage the data. Which means that RTP can be used deliver the necessary data to the application to make sure it can put the received packets in the correct order Real time data examples could be audio and video.
ROM:- Used to store the routers bootstrap details, operating system software. Flash memory: - holds the operating systems images. The content is retained when the router is restarted. RAM: - Used to store the Routing tables, configuration files, caching and buffering details. Content is lost when lost router is switched off or restarted. NVRAM:- Stores the routers startup config files. Data is non volatile. Network interfaces to connect router to network.
External components:
The OSI reference model gives an overview of the layered communications and computer network protocol design. The layers of the OSI are:
Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer
Closest to the end user Interact directly with the software application.
Presentation Layer:
Translates application to network format, and vice versa Works to transform data into the form that the application layer can accept Formats and encrypts data to be sent across a network
Session Layer
Controls the connections between computers Establishes, manages and terminates the connections between the local and remote application. Provides full-duplex, half-duplex, or simplex operation Establishes checkpointing, adjournment, termination, and restart procedures
Transport Layer:
Provides transparent transfer of data between end users Providing reliable data transfer services to the upper layers Controls the reliability of a given link through flow control, segmentation / desegmentation, and error control.
Network Layer
Provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks Performs networkrouting functions Performs fragmentation and reassembly, and report delivery errors.
Provides the functional and procedural means to transfer data between network entities Detects and corrects errors that occur in the Physical Layer.
Physical Layer: