1. How is it different than BOOTP or RARP?

Bootp protocol normally use it in dhcp protocol, it is
configured manully in order to give ip add or there relvent
host.

Rarp is a work just oppostie of Arp. Rarp stand for reverse
address resolution protocol. baiscaly rarp used to find out
your own ip add or mac add of computer so that you can
communicate appropritely with other computer knowing u r
mac or ip address.

2. IN ALLEN BREADLY PLC FAMILY RS LOGIX 5000 USING WHICH PROTOCOL?

DF1 protocol is an Allen-Bradley data-link layer protocol
that combines .... Softlogix 5800 provides virtual PLC
control using a PC and RSLogix 5000. ...

The DF-1 protocol is an asynchronous byte-oriented protocol
that is used to communicate with most Allen-Bradley RS-232
interface modules. More specifically, the DF-1 serial frame
composition is that of a conventional RS-232 serial frame,
where DF-1 forces some of the serial parameters such as 8
data bits, no parity, and a maximum baud rate of 19200.
Further, the DF-1 protocol specifies how to send data
through a conventional RS-232 serial port, in order to
communicate with the corresponding Allen-Bradley products.

4. What is the networking control unit?

The Network Control Unit (NCU) is a field panel housing
electronic modules, terminal blocks, and signal conditioners
(pneumatic, linevoltageand electronic) all inside a single
enclosure.

The NCU contains the user-programmable main processor-the
Network Control Module (NCM)-for supervisory functions over
all devices on the local bus, and a combination of the
optional Digital Control Module and Point Multiplex Modules
to directly control field devices that wire to the NCU
termination blocks. This application installs all models of
the NCM(101, 102, 401, 200) into standard 1-Slot, 2-Slot, or
5-Slot base frames.

5. What is the difference between network based bug tracking system and bug tracking system?

A bug tracking system is a software application that is
designed to help quality assurance and programmers keep
track of reported software bugs in their work. It may be
regarded as a sort of issue tracking system.
Many bug-tracking systems, such as those used by most open
source software projects, allow users to enter bug reports
directly. Other systems are used only internally in a
company or organization doing software development.
Typically bug tracking systems are integrated with other
software project management applications.
Having a bug tracking system is extremely valuable in
software development, and they are used extensively by
companies developing software products.

6. Can SSL support UDP, as SSL support TCP?

No SSL can not support in UDP beacuse in UDP is a
connectionless protocol it is focused on the speed than the
security.

7. WHAT IS IPDSLAM AND WHAT IS FUNCTION OF IT?

A Digital Subscriber Line Access Multiplexer (DSLAM, often
pronounced dee-slam) allows telephone lines to make faster
connections to the Internet. ...

8. What is the mean of networking? What is the difference between this from programming language?

networking is device in which it act as a communication
path between two or more computers.we can easily
communicate hardware and software with security,but incase
of programming languages we can only use codings to solve a
problem ,in programming languages security doesn't provided.

9. What is IMAP?

IMAP: Internet Mail Access Protocol..
It is used for incoming mail in client/remote users of a
mail server. A user do not download e- mail in her pc from
server.just to read or access from server. email saves in a
server...

10. Explain SMTP?

Simple Mail transfor Protocol mainly used for Outgoing Mails i.y it is also known as Outgoing mail server.

Download Interview PDF

11. How to instal two operating system in one pc?

Using different drive while installing any operating system

12. While configuring ppp at that time routing protocol is need or not?

no, routing protocol is not need while configuring pp.

13. IPv6 uses ________ bit address, whereas IPv4 uses ________ bit address?

An IPv6 address consists of 128 bits, while an IPv4 address
consists of only 32

14. How to hide control panel in my pc?

It can be done by using userpolicies for individual system.

15. Hoe often does updates happen in a routing table?

It depends on the routing algorithm used: RIP, RIP2, OSPF...

16. Why DNS use both TCP and UDP ports. And for which purpose it uses TCP and UDP?

DNS uses TCP for Zone Transfer over Port: 53
DNS uses UDP for DNS Queries over Port: 53
A client computer will always send a DNS Query using UDP
Protocol over Port 53. If a client computer does not get
response from a DNS Server, it must re-transmit the DNS
Query using the TCP after 3-5 seconds of interval.

18. Which network mask should you place on a class c address to accommodate a user requirement for two sub networks with a maximum of 35 hosts on each network?

255.255.255.128
As it is asked to accommodate 35 hosts on both networks and it comes around 70 in total... so 2^7 is the minimum and dat comes in the last octet we need to leave 7bits for host and 1 bit for network.

19. What is ESTMP?

pronounced as separate letters) Short for Simple Mail
Transfer Protocol, a protocol for sending e-mail messages
between servers. Most e-mail systems that send mail over the
Internet use SMTP to send messages from one server to
another; the messages can then be retrieved with an e-mail
client using either POP or IMAP. In addition, SMTP is
generally used to send messages from a mail client to a mail
server. This is why you need to specify both the POP or IMAP
server and the SMTP server when you configure your e-mail
application.

20. How can Jim Herr, a client on an NT TCP/IP network see which remote hosts are currently connected using NBT?

Display protocol statistics and current TCP/IP connections
using NBT (NetBIOS over TCP/IP).

Syntax
By Name
NBTSTAT -a Remote_host_Name [options] [interval]

By IP address
NBTSTAT -A IP_address [options] [interval]

Key
-a (adapter status) List the remote machine's name table
given its name
-A (Adapter status) List the remote machine's name table
given its IP address
-c (cache) List NBT's cache of remote [machine]
names
and their IP addresses
-n (names) List local NetBIOS names.
-r (resolved) List names resolved by broadcast and
via WINS
-R (Reload) Purge and reloads the remote cache
name table
-S (Sessions) List sessions table with the
destination IP addresses
-s (sessions) List sessions table converting
destination IP
addresses to computer NETBIOS names.
-RR (ReleaseRefresh) Send Name Release packets to WINS
and then, starts Refresh

interval Redisplay selected statistics,
pausing interval seconds
between each display. Press Ctrl+C
to stop redisplaying
statistics.

Syntax to see
which remote hosts are currently connected using NBT

c:/>nbtstat -n

21. What is the private address 192.168.1.1 assigned by the dhcp?

192.168.1.100 is the beginning of the default dynamic IP
address range for Linksys home network routers. This means
the first computer (or other device) you attach to a Linksys
router will typically be assigned the address 192.168.1.100
by DHCP. You can change the DHCP range of a router through
its configuration utility to either use or not use
192.168.1.100.