Windows & Network Administrator Portal Headline Animator

Wednesday, July 2, 2014

Networking Protocols Interview Questions & Answers



Q: - Explain the functionality of PING.
Ping Is particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip address. The output returns the data packets information. The number of packets sent, received and lost is returned by PING.

Q: - What is multicasting?
Multicasting allows a single message to be sent to a group of recipients. Emailing, teleconferencing, are examples of multicasting. It uses the network infrastructure and standards to send message.

Q: - What is Telnet?
Telnet is the main Internet protocol for creating a connection to a remote server.

Q: - Explain token ring technology.
In this technology, all the devices are arranged in a circle. A token moves around the circular network. A device waits for the token before it sends its frame. Once it receives token, it initiates transmission of its frame.

Q: - What is NetBIOS protocol?
NetBIOS (Network Basic Input/output System) Protocol allows applications on separate computers to communicate over a LAN. It runs over TCP/IP giving each computer in the network a NetBIOS name and IP address. E.g. It can be used for computers running Windows 2000 (or before) to join a computer network running Windows 2000 (or later).

Q: - What is TCP / IP protocol?
Transmission Control Protocol / Internet Protocol: - It is a family of protocols used for communication and connection between hosts on the internet. It is the most widely used standard for transmitting data over the internet. The four layers in the protocol are (from bottom to top):- Physical layer, Data link layer, Network layer, transport layer and application layer, also called as the OSI model. In TCP/IP , IP is responsible for forwarding packets while TCP ensures the correct delivery of data from client to server. TCP detects loss of data as well.

Q: - What is NNTP (Network News Transfer Protocol)?
NNTP or Network News Transfer Protocol is used to manage the notes posted on Unset newsgroup (a collection of posted notes on a subject posted by different users). NNTP servers are responsible for managing Usenet newsgroup collected globally. A NTTP client is a part of the web browser also called as a news reader. It uses a reserver port no 119.

Q: - What is Routing table?
A routing table stores the routes of the various nodes in a network. Nodes can be any electronic device connected to the network. The table is usually stored in a router or the network computer as a database or file. This information helps to fond the best possible path. The routing table has at least 3 fields: the destination network id, cost of the path, next hop or address to send the packet.

Q: - What is SNMP (Simple Network Management Protocol)?
SNMP or Simple Network Management Protocol is typically used for managing the network. Managing the network includes managing the nodes present in the network. These nodes may be server, routers, bridges and hubs. SNMP agents are used to achieve this. Managing the network is essential because it helps to monitor network performance, detect network faults or failures, audit network usage etc. the SNMP messages like TRAP, GET or SET may be invoked by network elements or network management system.

Q: - What is NNTP (Network News Transfer Protocol)?
NNTP or Network News Transfer Protocol is used to manage the notes posted on Unset newsgroup (a collection of posted notes on a subject posted by different users). NNTP servers are responsible for managing Usenet newsgroup collected globally. A NTTP client is a part of the web browser also called as a news reader. It uses a reserver port no 119.

Q: - What is SNMP (Simple Network Management Protocol)?
SNMP or Simple Network Management Protocol is typically used for managing the network. Managing the network includes managing the nodes present in the network. These nodes may be server, routers, bridges and hubs. SNMP agents are used to achieve this. Managing the network is essential because it helps to monitor network performance, detect network faults or failures, audit network usage etc. the SNMP messages like TRAP, GET or SET may be invoked by network elements or network management system.

Q: - What is Routing table?
A routing table stores the routes of the various nodes in a network. Nodes can be any electronic device connected to the network. The table is usually stored in a router or the network computer as a database or file. This information helps to fond the best possible path. The routing table has at least 3 fields: the destination network id, cost of the path, next hop or address to send the packet.

Saturday, June 21, 2014

What is classful and classless network?



In classful networks you can only use the full address range of any of the private IP address classes (A, B, or C). For example, For the class C private address range you can only use 192.168.0.0 255.255.0.0, you will not be able to subnet this address when the network is a classful network.

The classless network is just the oposite. This type of network you are able to subnet. so using the class C network again you can subnet this into 192.168.1.64 255.255.255.192.

That goes not only for private networks. All IP addresses are split into 5 classes: A, B, C, D and E. A, B and C are the unicast addresses. Class D is a multicast. Class E is reserved.
Class A - address range 1.0.0.0 - 127.255.255.255 mask 255.0.0.0
Class B - address range 128.0.0.0 - 191.255.255.255 mask 255.255.0.0
Class C - address range 192.0.0.0 - 223.255.255.255 mask 255.255.255.0
Class D - address range 224.0.0.0 - 239.255.255.255 multicast
Class E - the rest



Wednesday, November 20, 2013

How to Recover Virus Infected Hidden Files from Pen Drive or Flash Drive Step by Step

This process is applicable not only for Pen Drive or Flash dives like External Hard Disc, but also applicable for your system drives also.

When we scan Flash Drive with updated antivirus we found that Flash Drive is completely empty with no data at all.

But used disc space is showing a lot of data.



Also tried ‘Show Hidden files’ option in ‘Folder Options’ but No use




Open Run (Win+R) and type cmd and press Enter.



A command Prompt will appear, type cd\ and hit enter.. This command will let the command applicable to Root directories and sub folders also.


Type I: and Enter {Note: Type your driver letter in the place of I. (ex G , H.. etc}


Type dir/ah and Enter. This Command useful to identify the directories effected by the viruses.




Now type attrib –h –s /s /d and hit Enter [attrib –h{space}-s{space}/s{space}/d]

After a few seconds you can see your driver letter again this means the process is completed.


Now your all data is back.


After applying this command, some of the strange folders you have never seen may appear but don't worry, they are system related files, just hide them if you don't want or try delete if possible.

Popular Posts

Please don’t copy any content!