DONETED POOR FAIMLY

Friday, July 1, 2016

CCNA ALL INTERVIEW QUESTION

1) What is Routing.

Routing is the process of finding a path on which data can pass from source to destination. Routing is done by a device called routers, which are network layer devices.

2) What is the purpose of the Data Link.

The job of the Data Link layer is to check messages are sent to the right device. Another function of this layer is framing.

3) What is the key advantage of using switches.

When a switch receives a signal, it creates a frame out of the bits that were from that signal. With this process, it gains access and reads the destination address, after which it forwards that frame to the appropriate port. This is a very efficient means of data transmission, instead of broadcasting it on all ports.

4) When does network congestion occur.

Network congestion occurs when too many users are trying to use the same bandwidth. This is especially true in big networks that do not resort to network segmentation.

5) What is a Window in networking terms.

A Window refers to the number of segments that are allowed to be sent from source to destination before an acknowledgment is sent back.

6) Does a bridge divide a network into smaller sections.

Not really. What a bridge actually does is to take the large network and filter it, without changing the size of the network.

7) Which LAN switching method is used in CISCO Catalyst 5000.

CISCO Catalyst 5000  uses the Store-and-forward switching method. It stores the entire frame to its buffers and performs a CRC check before deciding whether or not to forward that data frame.

8 ) What is the role of the LLC sublayer.

The LLC sublayer stands for Logical Link Control. It can provide optional services to an application developer. One option is to provide flow control to the Network layer by using stop/start codes. The LLC can also provide error correction.

9) How does RIP differ from IGRP.
RIP relies on the number of hops in order to determine the best route to a network. On the other hand, IGRP takes consideration many factors before it decides the best route to take, such as bandwidth, reliability, MTU and hop count.
10) What are the different memories used in a CISCO router.
Different memories used  in a CISCO router are:
– NVRAM stores the startup configuration file
– DRAM stores the configuration file that is being executed
– Flash Memory – stores the Cisco IOS.
11) What is BootP.
BootP is a protocol that is used to boot diskless workstations that are connected to the network. It is short for Boot Program. Diskless workstations also use BootP in order to determine its own IP address as well as the IP address of the server PC.
12) What is the function of the Application Layer in networking.
The Application Layer supports the communication components of an application and provides network services to application processes that span beyond the OSI reference model specifications. It also synchronizes applications on the server and client.
13) Differentiate User Mode from Privileged Mode
User Mode is used for regular task when using a CISCO router, such as to view system information, connecting to remote devices, and checking the status of the router. On the other hand, privileged mode includes all options that are available for User Mode, plus more. You can use this mode in order to make configurations on the router, including making tests and debugging.
14) What is 100BaseFX.
This is Ethernet that makes use of fiber optic cable as the main transmission medium. The 100 stands for 100Mbps, which is the data speed.
15) Differentiate full-duplex from half-duplex.
In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot receive while it is transmitting, and vice versa.
16) What is MTU?
MTU stands for Maximum Transmission Unit. It refers to the maximum packet size that can be sent out onto the data line without the need to fragment it.
17) How does cut-through LAN switching work?
In Cut-Through LAN switching, as soon as the router receives the data frame, it will immediately send it out again and forward it to the next network segment after reading the destination address.
18) What is latency?
Latency is the amount of time delay that measures the point from which a network device receives a data frame to the time it sends it out again towards another network segment.
19) Utilizing RIP, what is the limit when it comes to the number of hops?
The maximum limit is 15 hop counts. Anything higher than 15 indicates that the network is considered unreachable.
20) What is a Frame Relay?
Frame Relay is a WAN protocol that provides connection-oriented communication by creating and maintaining virtual circuits. It has a high-performance rating and operates at the Data Link and Physical Layers.
21) How do you configure a Cisco router to route IPX?
The initial thing to do is to enable IPX routing by using the “IPX routing” command. Each interface that is used in the IPX network is then configured with a network number and encapsulation method.
22) What are the different IPX access lists?
There are two types of IPX access lists
1. Standard
2. Extended.
Standard Access List can only filter the source or destination IP address. An Extended Access List uses the source and destination IP addresses, port, socket, and protocol when filtering a network.
23) Explain the benefits of VLANs.
VLANs allow the creation of collision domains by groups other than just physical location. Using VLANs, it is possible to establish networks by different means, such as by function, type of hardware, protocol, among others. This is a big advantage when compared to conventional LANs wherein collision domains are always tied to physical location.
24) What is subnetting?
Subnetting is the process of creating smaller networks from a big parent network. As a  part of a network, each subnet is assigned some additional parameters or identifier to indicate its subnet number.
25) What are the advantages of a layered model in the networking industry?
A layered network offers many advantages. It allows administrators to make changes in one layer without the need to make changes in the other layers. Specialization is encouraged, allowing the network industry to make progress faster. A layered model also lets administrators troubleshoot problems more efficiently.
26) Why is UDP lease favored when compared to TCP?
It’s because UDP is unreliable and unsequenced. It is not capable of establishing virtual circuits and acknowledgments.
27) What are some standards supported by the Presentation layer?
Presentation layer supports many standards, which ensures that data is presented correctly. These include PICT, TIFF, and JPEG for graphics, MIDI, MPEG and QuickTime for Video/Audio.
28) What’s the easiest way to remotely configure a router?
In cases when you need to configure a router remotely, the most convenient is to use the Cisco AutoInstall Procedure. However, the router must be connected to the WAN or LAN through one of the interfaces.
29) What does the show protocol display?
– routed protocols that is configured on the router
– the address assigned on each interface
– the encapsulation method that was configured on each interface
30) How do you depict an IP address?
It can be done in three possible ways:
– using Dotted-decimal. For example: 192.168.0.1
– using Binary. For example: 10000010.00111011.01110010.01110011
– using Hexadecimal. For example: 82 1E 10 A1
31) How do you go to privileged mode? How do you switch back to user mode?
To access privileged mode, you enter the command “enable” on the prompt. In order to get back to user mode, enter the command “disable.”
32) What is HDLC?
HDLC stands for High-Level Data Link Control protocol. It is a propriety protocol of CISCO. It is the default encapsulation operated within CISCO routers.
33) How are internetworks created?
Internetworks are created when networks are connected using routers. Specifically, the network administrator assigns a logical address to every network that connects to the router.
34) What is Bandwidth?
Bandwidth refers to the transmission capacity of a medium. It is a measure of how much volume a transmission channel can handle, and it is measured in Kbps.
35) How does Hold-downs work?
Hold-downs prevent regular update messages from reinstating a downed link by removing that link from update messages. It uses triggered updates to reset the hold-down timer.
36) What are packets?
Packets are the results of data encapsulation. These are data that have been wrapped under the different protocols of the OSI layers. Packets are also referred to as datagrams.
37) What are segments?
Segments are sections of a data stream that comes from the upper OSI layers and ready for transmission towards the network. Segments are the logic units at the Transport Layer.
38) Give some benefits of LAN switching.
– allows full duplex data transmission and reception
– media rate adaption
– easy and efficient migration
39) What is Route Poisoning?
Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable. This technique is used in order to prevent problems caused by inconsistent updates on a route.
40) How do you find valid hosts in a subnet?
The best way to go about this is to use the equation 256 minus the subnet mask. The hosts that are considered valid are those that can be found between the subnets.
41) What is DLCI?
DLCI, or Data Link Connection Identifiers, are normally assigned by a frame relay service provider in order to uniquely identify each virtual circuit that exists on the network.
42) Briefly explain the conversion steps in data encapsulation.
From a data transmitter’s point of reference, data from the end user is converted to segments. Segments are then passed on to the other layers and converted into packets or datagrams. These packets are then converted into frames before passing on to the network interface. Finally, frames are converted to bits prior to actual data transmission.
43) What are the different types of passwords used in securing a CISCO router?
There are actually five types of passwords that can be used. These enable secret, virtual terminal, console, and auxiliary.
44) Why is network segmentation a good idea when managing a large network?
For a network administration, segmenting a network would help ease network traffic and ensures that high bandwidth is made available at all times for all users. This translates to better performance, especially for a growing network.
45) What are the things that can be accessed in a CISCO router’s identifying information?

The hostname and the Interfaces. The hostname is the name of your router. The Interfaces are fixed configurations that refer to the router ports.
46) Differentiate Logical Topology from Physical Topology
Logical Topology refers to the signal path through the physical topology. Physical Topology is the actual layout of the network medium.
47) What causes a triggered update to reset the router hold-down timer?
This may happen when the hold-down timer has already expired, or when the router received a processing task that incidentally was proportional to the number of links in the internetwork.
48) In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?
A. erase running-config
B. erase startup-config
C. erase NVRAM
D. delete NVRAM
Correct Answer: B. erase startup-config
49) Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router?
Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
ISDN switch-type basic ni
username Remote password cisco
interface bri0
IP address 10.1.1.1 255.255.255.0
encapsulation PPP
PPP authentication chap
ISDN spid1 41055512360001
ISDN spid2 41055512360002
dialer map IP 10.1.1.2 name Remote 1238001
dialer-list 1 protocol IP permit
Correct Answer: (config-if)# dialer-group 1
50) When configuring a router utilizing both physical and logical interfaces, what factor must be considered in determining the OSPF router ID?
A. The highest IP address of any physical interface.
B. The lowest IP address of any logical interface.
C. The middle IP address of any logical interface.
D. The lowest IP address of any physical interface.
E. The highest IP address of any interface.
F. The highest IP address of any logical interface.
G. The lowest IP address of any interface.
Correct Answer: A. The highest IP address of any physical interface.

51) What is the difference between the switch, hub, and router?

HubSwitchRouter
Hub has a single broadcast domain and collision domain. Anything comes in one port is sent out to the others. It is a device that filters and forwards packets between LAN segments. Switches have a single broadcast domain and multiple collision domains. It supports any packet protocol, as such it operates at the data link layer 2 and layer 3 Router is a device which transmits data packets along networks.


 52. What is the size of IP address?
Size of IP address is 32 bit for IPv4 and 128 bit for IPv6.

53. Mention what does data packets consist of?
A data packet consists of sender’s information, recipient’s information, and the data contained.  It also has the numeric identification number that defines the packet number and order.  When data is sent across the network, that information is segmented into data packets.  In short, data packets carry the information and routing configuration for your transferred message.

54. What is DHCP stand for?
DHCP stands for Dynamic Host Configuration Protocol.  DHCP assigns an IP address automatically to a given workstation client.  You can also make static IPS for machines like printers, servers, routers, and scanners.

55. Mention what BOOTP is?
BOOTP is a computer networking protocol used to deploy an IP address to network devices from a configuration server.

56. Explain why UDP is lease favored when compared to TCP?
It is because UDP is un-sequenced and unreliable. It is not capable of creating virtual circuits and acknowledgments

57. State the difference between dynamic IP and static IP addressing?
Dynamically IP addresses are provided by DHCP server, and static IP addresses are given manually.

58. Mention the ranges for the private IPS?
Ranges for private IPS are
  • Class A: 10.0.0.0 – 10.0.0.255
  • Class B: 172.16.0.0 – 172.31.0.0
  • Class C: 192.168.0.0 – 192.168.0.255

59. In how many ways you can access the router?
You can access it in three ways
  • Telnet (IP)
  • AUX (Telephone)
  • Console (Cable)
60.  What is EIGRP?
EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing protocol designed by Cisco Systems.  It is availed on a router to share routes with other routers within the same autonomous system. Unlike other routers like RIP, EIGRP only sends incremental updates, decreasing the workload on the router and the amount of data that needs to be transferred.

61. Mention what is the matric of EIGRP protocol?
EIGRP protocol consists of
  • Bandwidth
  • Load
  • Delay
  • Reliability
  • MTU
  • Maximum Transmission Unit

62. Mention what does the clock rate do?
Clockrate enables the routers or DCE equipment to communicate appropriately.

63. Mention what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?
Erase startup- coding is the command you must use if you want to delete the configuration data that is stored in the NVRAM

64. What is the difference between TCP and UDP?

TCP and UDP both are protocols for sending files across computer networks.

           TCP (Transmission Control Protocol)              UDP (User Datagram Protocol)
TCP is connection oriented protocol. When connection lost during transferring files, the server would request the lost part.  While transferring a message, there is no corruption while transferring a message UDP is based on connectionless protocol. When you send data, there is no guarantee whether your transferred message will reach there without any leakage
 The message will deliver in the order it is sent The message you sent may not be in the same order
 Data in TCP is read as a stream, where one packet ends, and another begins Packets are transmitted individually and are guaranteed to be whole if they arrive
 Example of TCP includes World Wide Web, file transfer protocol, e-mail, Example for UDP are VOIP (Voice Over Internet Protocol) TFTP ( Trivial File Transfer Protocol),

 65. Explain the difference between half-duplex and full-duplex?
Full duplex means that the communication can occur in both directions at the same time, while half-duplex means that the communication can happen in one direction at a time.

66. What are the conversion steps of data encapsulation?
Conversion steps of data encapsulation includes

  • Layer one, two and Three ( Application/presentation/session) : Alphanumeric input from the user is converted into Data
  • Layer Four (Transport): Data is converted into small segments
  • Layer Five (Network): Data converted into packets or datagrams and Network header is added
  • Layer Six (Data Link): Datagrams or packets are built into frames
  • Layer Seven (Physical): Frames are converted into bits

 67. What command do we give if router IOS is stuck?
Cntrl+Shift+F6 and X is the command we give if router IOS is stuck.

 68. What is route poisoning?
Route poisoning is a technique of preventing a network from transmitting packets through a route that has become invalid.

 69. What route entry will be assigned to dead or invalid route in case of RIP?
In the case of RIP table entry, 16 hops will be assigned to dead or invalid route making it unreachable.
  • Define Network?
Network in general terms means a group of devices, connected with the help of some media in order to share some resources from a source to a destination and networking is a process of sharing the resources.
  • What is a Link?
Link is a physical or a logical component of a network to interconnect nodes or devices.
  • What is a node?
Node is a connection point on network for data transmission. It can be a computer or printer or any type of device that is capable of sending and receiving the data over the network.
  • What is a gateway?
Gateway is a node of a network which can be used as an entrance for other network. It is a piece of hardware and different from default gateway.
  • What is point-point link?
A connection between two nodes of the network is referred as point to point network and that link which connects both nodes is point to point link.
  • What is Multiple Access?
Multiple Access allows more than one devices to transmit data at the same time span. Star or Mesh topology can be used for this.
  • What’s the benefit of subnetting?
With the help of subnetting we can break a large network into smaller networks and assign IP addresses to those networks without changing our major network. It helps in utilizing our IP addresses more efficiently.
  • What is BGP (Border Gateway Protocol)?
BGP is an exterior gateway protocol used to connect two or more different autonomous systems. It is widely being used to route the traffic of Internet. It can also work for internal AS but we have better protocols for internal connectivity. It has Administrative distance of 20 for external routes and 200 for internal routes.
  • What is Gateway-to-Gateway protocol?
Gateway-to-Gateway protocol is now obsolete. This was being used for routing datagrams between internet gateways. It uses Minimum hop Algorithm.
  • What is a Multi-homed Host?
Multi-homed host is defined as a node connected with more than one networks. Like a PC can be connected with both Home network and a VPN. These kind of hosts can be assigned with multiple addresses, one for each network. 
  • What is OSPF?
OSPF stands for Open Shortest Path First. It is a link state routing protocol that can connect a large number of networks without having any limitation to number of hops. It uses Dijkstra Algorithm and considers Cost as its’ metric. It has AD of 110 and uses the concepts of Areas, Router-id, Process-id and Virtual link for connectivity.
  • What is Routing?
Routing is a process of exchanging route information form one router to another. Without routing it is impossible to connect two or more networks located at different or same geographical areas.
  • What is a Protocol?
Protocol is set of rules on which a sender and a receiver agrees to transmit the data. Protocols are responsible for data communication in between networks.
  • Explain difference between Router,Switch and Hub ?
Following are the differences in Hub, Routers and Switches,
Hubs
Hubs operate at Layer 1 of OSI model.
Hubs cannot process layer-2 or layer-3 traffic. Layer-2 deals with hardware addresses and layer-3 deals with logical (IP) addresses. So, hubs cannot process information based on MAC or IP addresses.
Hubs cannot even process data based on whether it is a unicast, broadcast or multi-cast data.
Hub transfers data to every port excluding the port from where data was generated.
Hubs work only in half duplex mode.
Collisions can happen.
In case of a collision, a hub rejects data from all the devices and signals them to send data again. Usually devices follow a random timer after which data is sent again to hub.
Maximum 2-12 number of ports can be found on Hubs.
Switches
Switches are network devices that operate on layer-2 of OSI model. Some switches operate at higher level too.
Switches are also known as intelligent hubs.
Switches operate on hardware addresses (MAC) to transfer data across devices connected to them.
It performs broadcast at first, after that Unicast.
Major difference between Bridge and Switch being that a switch forwards data at wire speed as it uses special hardware circuits known as ASICs.
Switches support full duplex data transfer communication.
As layer 2 protocols headers have no information about network of data packet so switches cannot forward data based or networks and that is the reason switches cannot be used with large networks that are divided in sub networks.
Switches can avoid loops through the use of spanning tree protocol.
Switches can have 24-48 ports and can be practically unlimited ports because they don’t divide speed unlike Hubs.
Routers
Routers are the network devices that operate at Layer-3 of OSI model.
As layer-3 protocols have access to logical address (IP addresses) so routers have the capability to forward data across networks.
Routers are far more feature rich as compared to switches.
Routers maintain routing table for data forwarding.
Routers have lesser port densities as compared to switches.
Routers are usually used as a forwarding network elements in Wide Area Networks. 
  • What is Checksum?
A checksum is a count of the number of bits in a transmission data that is included with the data so that the receiver can check to see whether the same number of bits arrived. If the counts match, it’s assumed that the complete transmission was received.
  •  What is Redundancy ?
Redundancy is a method of insuring network availability in case of network or path failure. Generally referred as backup paths in a networks.
  • What are the criteria necessary for an effective and efficient network?
For an effective network, there must be alternate paths available, convergence should be fast and whatever happens network should never go down. Network should be cost effective and properly secure.
  • What is the key advantage of using switches?
Switch doesn’t broadcast on all the ports. They can be managed and vlans cab be created. They are fast, can store MAC addresses. They also don’t divide the speed on each ports.
  • When does network congestion occur?
Congestion can occur cause of the over capacity of the media. When a media carries data beyond its limit, congestion can happen.
  • Does a bridge divide a network into smaller segments? 
NO, bridge doesn’t divide a network in smaller segments.
  • What is the difference between OSI and TCP/IP Model ?
Following are the differences in TCP/IP and OSI Model.
OSI(Open System Interconnection)TCP/IP (Transmission Control Protocol / Internet Protocol)
OSI is a generic, protocol independent standard, acting as a communication gateway between the network and end user.TCP/IP model is based on standard protocols around which the Internet has developed. It is a communication protocol, which allows connection of hosts over a network.
OSI model has a separate Presentation layer and Session layer.TCP/IP does not have a separate Presentation layer or Session layer.
OSI is a reference model around which the networks are built. Generally it is used as a guidance tool.TCP/IP model is, in a way implementation of the OSI model.
Network layer of OSI model provides both connection oriented and connectionless service.The Network layer in TCP/IP model provides connectionless service.
Protocols are hidden in OSI model and are easily replaced as the technology changes.In TCP/IP replacing protocol is not easy.
OSI model defines services, interfaces and protocols very clearly and makes clear distinction between them. It is protocol independent.In TCP/IP, services, interfaces and protocols are not clearly separated. It is also protocol dependent.
It has 7 layersIt has 4 layers
  • What is the size of IP Address?
IPv4 is a 32 bits address and IPv6 is 128 bits address.
  • What is the range of class C address?
Class C varies from 192 – 223.
  • What is PoE (Power over Ethernet) ?
PoE allows electrical current to be carried by the cable rather than the power cords. It minimizes the number of wires required to install the network.
  • What are the advantages of Distributed Processing?
Lower cost, reliability, improved performance, reduced processing time, flexibility are the advantages of Distributed processing. 
  • When were OSI model developed and why its standard called 802.XX and so on?
In Feb 1980, OSI model was developed. In 802.xx, 80 represent 1980 and 2 represents February.
  • What is Full form of AD?
Administrative Distance 
  • What is a peer-peer process?
The processes on each machine that communicate at a given layer are called peer to peer process.
  • What is the difference between broadcast domain and collision domain ?
Broadcast domain is a domain where if a broadcast frame is forwarded, every devices pays attention and receives the data. While in Collision domain,chances of data collision is maximum. Like in Hub , if two or more send traffic at the same time, data will collide in between and none of the devices will receive the data.
  • What is ping? Why you use ping?
Ping is a utility used to test the connectivity in the network. It stands for Packet Internet Groper.
  • Explain difference between straight and crossover cable with examples ?
Straight cable is used to connect two different layer devices like router-switch, router-pc, and switch-pc while cross cable is used to connect two same layer devices like router-router, switch-switch, and pc-pc. Color coding for both cable is different. If color coding on both ends of the cable is same, it is a straight cable, while if 1<–>3, 2<–>6 is being used, it is a cross cable for data transfer.
  • What is the difference between tracert and traceroute
Tarcert works on PC while Traceroute works on routers.
  • What is Round Trip Time?
RTT is the propagation time between two nodes. It is the time taken to send a packet out of the interface and receiving the acknowledgement.
  • Define the terms Unicasting, Multiccasting and Broadcasting and Anycasting?
Unicasting means “one on one” communication, Multicasting means “one to many” communication but there must be atleast one devices that is not receiving the traffic while broadcasting means “one to all” communication. Each device receives packets in case of broadcasting. Anycast works in IPv6 and it means to “one to nearest” communication.
  • How many pins do serial ports of routers have?
In computer it’s known as com port and could be available in 9pin or 25 pin. On router it have 60 pins. 
  • What are the differences between static ip addressing and dynamic ip addressing?
In static IP Addressing, IP addresses are assigned by Network Administrator while in Dynamic, IP addresses are assigned with the help of a DHCP server.
  • Difference between CSMA/CD and CSMA/CA ?
CSMA/CD is responsible for detecting collision in wired media mainly, while CSMA/CA works on wireless media to completely avoid collision because detecting collision in wireless media is a bit hard.
  • What is DHCP scope?
DHCP Scope is the range of IP Addresses from which DHCP server will be assigning IP Addresses to the clients.
  • What are the different memories used in a CISCO router?
Flash, RAM, NVRAM and ROM are the memories available in the router.
  • What are the different types of passwords used in securing a CISCO router?
Enable password, Secret Password, Line passwords (VTY, Console and Aux) are the passwords used in Router.
  • What is the use of “Service Password Encryption” ?
Service Password Encryption command encrypts plain text password into type 7 password. These are not very much secure and can be easily decrypted.

  • Briefly explain the conversion steps in data encapsulation.?
Process of adding header and trailer information in data is called Data Encapsulation. Whenever a layer passes the data to next layer it adds some extra information in data. This is called header. Next layer then processes the data and adds its own header. This process continues until data is place on physical media. This process is called Encapsulation. Removing header and trailer information from the data is called Data Decapsulation.
  • In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?
Erase startup-config is the command to delete preconfigured files on the router.
  • IEEE standard for wireless networking?
802.11
  • What is the range of class A address?
From 0 – 127, but we cannot use 0 and 127, so actual range is from 1 to 127
  • What is the range of class B address?
From 128 – 191.
  • Differentiate Logical Topology from Physical Topology?
Physical topology represents the physical structure i.e cabling of the network while logical topology deals with the data flow in the network.
  • what is AS (Autonomous System) ?
A group of devices under a single administration is called an AS.
  • What is the difference between Private IP and Public IP ?

Public IP addresses are for global routing over internet. They are allocated to the websites and companies to access the internet. They are unique worldwide if connected to Internet. Private IP addresses are for local use and are not routable over internet. They can be same in different organization

  • Explain different cable types ?
Straight, Cross, Serial, Console are some cable types used in networking. Serial cable is used to connect a router to another router. Console cable is used to access the router or switches from a PC.
  •  How does RIP differ from EIGRP?
Following are the differences in RIP and EIGRP,
AD value: That is administrative distance which determines the trust worthiness of the routing protocol. For Rip it is 120, EIGRP it is 90 internal / 170 external.
RIP uses Bellmen ford algorithm to calculate the path while EIGRP use Dual method to calculate the routes paths
Maximum hop count for RIP is 15 that is after 15 counts the packet is dropped while that of EIGRP is 100 by default and up to 255 by configuration. By default 100.
There is difference between their refresh timers.
EIGRP uses an Autonomous number to determine which domain it belongs to which is not the case with RIP protocols.
RIP is mostly used for smaller networks which EIGRP is used for larger networks.
RIP is a distance vector routing protocol while EIGRP is a an enhanced distance routing protocol.
RIP is classful protocol whereas EIGRP is classless protocol
In RIP full routing table exchanged, but in EIGRP missing routes are exchanged
For RIP protocol, update timer is 30 seconds but in EIGRP hello timer every 5 seconds
  • Differentiate User Mode from Privileged Mode
Commands applied on user mode cannot effect the router while some commands of privilege mode can change the configurations. In user mode, no configuration can be made. We can only check the reachability and some basic commands in that mode. While in Privilege mode we can save, delete and modify the configuration files.
  • What is 100BaseFX?
100BASE-FX is a version of Fast Ethernet over optical fiber.
  • Differentiate full-duplex from half-duplex ?
In full duplex, user can send and receive data at the same time while in half duplex user can either receive or send the data at a time.
  • What does the show protocol display?
The show protocols command shows the global and interface-specific status of any configured Level 3 protocol.

BING WEBMASTER SINGUP

Masood Azhar to be designated global terrorist at UN meet tomorrow

Masood Azhar to be designated global terrorist at UN meet t Click here for kushingar Adpost China is expected to lift...