You are on page 1of 23

NETWORKING INTERVIEW QUESTIONS AND ANSWERS Networking Interview Questions and Answers : 1. What is an Object server?

With an object server, the Client/Server application is written as a set of communicating objects. Client object communicate with server objects using an Object Request Broker (ORB). The client invokes a method on a remote object. The ORB locates an instance of that object server class, invokes the requested method and returns the results to the client object. Server objects must provide support for concurrency and sharing. The ORB brings it all together. 2. What is a Transaction server? With a transaction server, the client invokes remote procedures that reside on the server with an SQL database engine. These remote procedures on the server execute a group of SQL statements. The network exchange consists of a single request/reply message. The SQL statements either all succeed or fail as a unit. 3. What is a Database Server? With a database server, the client passes SQL requests as messages to the database server. The results of each SQL command are returned over the network. The server uses its own processing power to find the request data instead of passing all the records back to the client and then getting it find its own data. The result is a much more efficient use of distributed processing power. It is also known as SQL engine. 4. What are the most typical functional units of the

Client/Server applications?

User interface Business Logic and Shared data.

5. What are all the Extended services provided by the OS?


Ubiquitous communications Network OS extension Binary large objects (BLOBs) Global directories and Network yellow pages Authentication and Authorization services System management Network time Database and transaction services Internet services Object- oriented services

6. What are Triggers and Rules? Triggers are special user defined actions usually in the form of stored procedures, that are automatically invoked by the server based on data related events. It can perform complex actions and can use the full power of procedural data. 7. What is meant by Transparency? Transparency really means hiding the network and its servers from the users and even the application programmers. 8. What are TP-Lite and TP-Heavy Monitors? languages. A rule is a special type of trigger that is used to perform simple checks on

TP-Lite is simply the integration of TP Monitor functions in the database engines. TP-Heavy are TP Monitors which supports the Client/Server architecture and allow PC to initiate some very complex multiserver transaction from the desktop. 9. What are the two types of OLTP? TP lite, based on stored procedures. TP heavy, based on the TP monitors. 10. What is a Web server? This new model of Client/Server consists of thin, protable, "universal" clients that talk to superfat servers. In the simplet form, a web server returns documents when clients ask for them by name. The clients and server communicate using an RPC-like protocol called HTTP. 11. What are Super servers? These are fully-loaded machines which includes multiprocessors, high-speed disk arrays for intervive I/O and fault tolerant features. 12. What is a TP Monitor? There is no commonly accepted definition for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing". 13. TP Monitor does mainly two things extremely well. They are Process management and Transaction management.? They were originally introduced to run classes of applications that could service hundreds and sometimes thousands of clients. TP Monitors provide an OS - on top of existing OS - that connects in real time these thousands of humans with a pool of shared server processes.

14. What is meant by Asymmetrical protocols? There is a many-to-one relationship between clients and server. Clients always initiate the dialog by requesting a service. Servers are passively awaiting for requests from clients. 15. What are the types of Transparencies? The types of transparencies the NOS middleware is expected to provide are:

Location transparency Namespace transparency Logon transparency Replication transparency Local/Remote access transparency Distributed time transparency Failure transparency and Administration transparency.

16. What is the difference between trigger and rule? The triggers are called implicitly by database generated events, while stored procedures are called explicitly by client applications. 17. What are called Transactions? The grouped SQL statements are called Transactions (or) A transaction is a collection of actions embused with ACID properties. 18. What are the building blocks of Client/Server?

The client The server and

Middleware.

19. Explain the building blocks of Client/Server? The client side building block runs the client side of the application. The server side building block runs the server side of the application. 20. The middleware buliding block runs on both the client and server sides of an application. It is broken into three categories:

Transport stack Network OS Service-specific middleware.

21. What are all the Base services provided by the OS?

Task preemption Task priority Semaphores Interprocess communications (IPC) Local/Remote Interprocess communication Threads Intertask protection Multiuser High performance file system Efficient memory management and Dynamically linked Run-time extensions.

22. What are the roles of SQL?


SQL is an interactive query language for ad hoc database queries. SQL is a database programming language. SQL is a data definition and data administration language. SQL is the language of networked database servers

SQL helps protect the data in a multi-user networked environment. Because of these multifacted roles it plays, physicists might call SQL as "The grand unified theory of database".

23. What is Structured Query Langauge (SQL)? SQL is a powerful set-oriented language which was developed by IBM research for the databases that adhere to the relational model. It consists of a short list of powerful, yet highly flexible, commands that can be used to manipulate information collected in tables. Through SQL, we can manipulate and control sets of records at a time. 24. What are the characteristics of Client/Server?

Service Shared resources Asymmentrical protocols Transparency of location Mix-and-match Message based exchanges Encapsulation of services Scalability Integrity

Client/Server computing is the ultimate "Open platform". It gives the freedom to mix-and-match components of almost any level. Clients and servers are loosely coupled systems that interact through a message-passing mechanism. 25. What is Remote Procedure Call (RPC)? RPC hides the intricacies of the network by using the ordinary procedure call mechanism familiar to every programmer. A client process calls a function on

a remote server and suspends itself until it gets back the results. Parameters are passed like in any ordinary procedure. The RPC, like an ordinary procedure, is synchoronous. The process that issues the call waits until it gets the results. Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends it to the remote server. The server receives the request, unpack the parameters, calls the procedures, and sends the reply back to the client. It is a telephone-like metaphor. 26. What are the main components of Transaction-based Systems?

Resource Manager Transaction Manager and Application Program.

27. What are the three types of SQL database server architecture?

Process-per-client Architecture. (Example: Oracle 6, Informix ) Multithreaded Architecture. (Example: Sybase, SQL server) Hybrid Architecture (Example: Oracle 7)

28. What are the Classification of clients? Non-GUI clients - Two types are:1. Non-GUI 2. Non-GUI (Example: GUI OOUI clients 29. What are called Non-GUI clients, GUI Clients and OOUI Clients? clients clients that do that not need need multi-tasking multi-tasking ROBOTs) clients

(Example: Automatic Teller Machines (ATM), Cell phone)

Non-GUI Client: These are applications, generate server requests with a minimal server (Example: result amount from a of human human interacting 3.x, with NT interaction. a GUI 3.5) GUI Clients: These are applicatoins, where occassional requests to the Windows

OOUI clients : These are applications, which are highly-iconic, objectoriented user interface that provides seamless access to information in very visual (Example: MAC OS, Windows 95, NT 4.0) 30. What is Message Oriented Middleware (MOM)? MOM allows general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate over networks by simply putting messages in the queues and getting messages from queues. It typically provides a very simple high level APIs to its services. MOM's messaging and queuing allow clients and servers to communicate across a network without being linked by a private, dedicated, logical connection. The clients and server can run at different times. It is a postoffice like metaphor. 31. What is meant by Middleware? Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it acts as a bridge between the clients and servers. It starts with the API set on the client side that is used to invoke a service and it covers the transmission of the request over the network and the resulting response. It neither includes the software that provides the actual service - that is in the servers domain nor the user interface or the application login - that's in clients domain. formats.

32. What are the functions of the typical server program? It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiates and runs background task activity. Keeps running. Grown bigger and faster. 33. What is meant by Symmentric Multiprocessing (SMP)? It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided into threads that can run concurrently on any available processor. Any processor in the pool can run the OS kernel and execute user-written threads. 34. What are Service-specific middleware? It is needed to accomplish a particular Client/Server type of services which includes:

Database specific middleware OLTP specific middleware Groupware specific middleware Object specific middleware Internet specific middleware and System management specific middleware.

35. What are General Middleware? It includes the communication stacks, distributed directories, authentication services, network time, RPC, Queuing services along with the network OS extensions such as the distributed file and print services. 36. What is meant by Asymmetric Multiprocessing (AMP)?

It imposses hierarchy and a division of labour among processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated to specific functions. 37. What is OLTP? In the transaction server, the client component usually includes GUI and the server components usually consists of SQL transactions against a database. These applications are called OLTP (Online Transaction Processing) OLTP Applications typically, Receive a fixed set of inputs from remote clients. Perform multiple precompiled SQL comments against a local database. Commit the work and Return a fixed set of results. 38. What is meant by 3-Tier architecture? In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is separated from the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and flexible. Example: TP monitor, Web. 39. What is meant by 2-Tier architecture? In 2-tier Client/Server systems, the application logic is either burried inside the user interface on the client or within the database on the server. Example: File servers and Database servers with stored procedures. 40. What is Load balancing? If the number of incoming clients requests exceeds the number of processes in a server class, the TP Monitor may dynamically start new ones and this is called Load balancing.

41. What are called Fat clients and Fat servers? If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal software. If the bulk of the application runs on the Server side, then it is Fat servers. It tries to minimize network interchanges by creating more abstract levels of services. 42. What is meant by Horizontal scaling and Vertical scaling? Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers. 43. What is Groupware server? Groupware addresses the management of semi-structured information such as text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct contact with other people. 44. What are the two broad classes of middleware?

General middleware Service-specific middleware.

45. What are the types of Servers?


File servers Database servers Transaction servers Groupware servers Object servers Web servers.

46. What is a File server?

File servers are useful for sharing files across a network. With a file server, the client passes requests for file records over nerwork to file server. 47. What are the five major technologies that can be used to create Client/Server applications?

Database Servers TP Monitors Groupware Distributed Objects Intranets.

48. What is Client/Server? Clients and Servers are separate logical entities that work together over a network to accomplish a task. Many systems with very different architectures that are connected together are also called Client/Server. 49. List out the benefits obtained by using the Client/Server oriented TP Monitors?

Client/Server applications development framework. Firewalls of protection. High availability. Load balancing. MOM integration. Scalability of functions. Reduced system cost.

50. What are the services provided by the Operating System? Extended services - These are add-on modular software components that are layered on top of base service.

BANDWIDTH EXPLAINED BandWidth Explained Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet. Network Connectivity : The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet. If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54). Traffic :

A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up. Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB). If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the

time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment). Hosting Bandwidth : In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file). A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB. How Much Bandwidth Is Enough? It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward: Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor

If you intend to allow people to download files from your site, your bandwidth calculation should be: [(Average Daily Visitors x Average Page Views x Average Page Size) + (Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

Let

us

examine

each

item

in

the

formula:

Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000. Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit. Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly. Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day. Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly. Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.

Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31. Summary : Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan. SETTING UP A VPN IN WINDOWS IS A TWO STEP PROCESS. Setting up a VPN in Windows is a two step process:

Set up one computer to share files (server). Set up another computer to access them (client). by setting up the server:

Begin

Open Internet Explorer and go to www.whatismyip.com. Write down the IP address. You will need it to configure the client. 1. Click the Start button and click Run. 2. Type control and hit Enter. 3. Click Network and Internet Connections. 4. Click Network Connections . 5. Click Create a New Connection, which is the first option on the left toolbar. 6. The New Connection Wizard will open. Click Next. 7. Choose Set up an advanced connection, the last element on the list. Click Next . 8. Choose Accept incoming connections. Click Next.

9. You will see the Devices for Incoming Connections screen. 10. 11. 12. Do not select anything on this screen. Click Next. Select Allow virtual private connections. Click Next. Select to whom you want to give access. Click Next. If a user is not listed, you will have to add an account. See "Related Wikihows" for more information. 13. Do not change anything on the Networking Software screen. Click Next. That's it! Your computer is now set up to allow for VPNs. Click Finish to complete the wizard. Now proceed to connect the client: 1. Click the Start button and click Run. 2. Type control and hit Enter. 3. Click Network and Internet Connections. 4. Click Network Connections. 5. Click Create a New Connection, which is the first option on the left toolbar. 6. The New Connection Wizard will open. Click Next. 7. Select Connect to the network at my workplace and click Next. 8. Select Virtual Private Network connection and click Next. 9. Type the name of your network in the blank box. Click Next. 10. 11. Finish. Tips : 1. Both computers must be connected to the internet. 2. The user name and password must be entered exactly as you saved them. 3. The IP address must be written exactly as listed on the screen. Enter the IP address you wrote down earlier and click Next. Select Add a shortcut to this connection to my desktop and click

4. If the VPN doesn't work, turn off your firewall. Warnings : Do not give access to the "guest" account. It does not require a password, allowing anyone to access the VPN.

MCSE Sample Questions : General MCSE Sample Questions

General MCSE Sample Questions


Following are some MCSE sample questions:

1. What is the GUI tool used to build the UNATTEND.TXT file


included with the Windows 2000 Resource Kit? A. B. C. D. E. SETUPMGR.EXE UNATTEND.EXE PREBUILD.EXE SYSLOAD.SYS SETUP.EXE

Answer: A

2. Which component of the Windows 2000 Executive is


responsible for handling input and output from installed devices? A. The Device Manager B. The Cache Manager C. The I/O Manager D. The Device Manager E. none of the above Answer: C

3. Which of the following IRQs are used for LPT1?


A. B. C. D. E. 1 3 5 7 9

Answer: D

4. Which layer(s) of the OSI model is/are included in the NDIS


specification? A. 1 B. 2 C. 3 D. 4 E. 5 Answer: B

5. Windows 2000 Professional can access drives compressed with


DriveSpace. A. TRUE B. FALSE Answer: B

6. What should the impedance on RG-58 cable be?


A. B. C. D. E. 50 75 90 93 98

Answer: A

7. What is another name for 10BaseT?


A. B. C. D. E. Baseband Broadband Thicknet Thinnet Twisted Pair

Answer: E

8. Which of the following categories for UTP has the least


expensive cable? A. 1 B. 2 C. 3

D. 4 E. 5 Answer: C

9. Which of the following modules manages bindings in NDIS?


A. Protocol manager B. Binding manager C. Redirector D. The registry E. None of the above Answer: A

10. If a network has a Windows NT domain controller, what kind of


network is it? A. WAN B. High-speed C. Peer-to-peer D. Server-based E. Server-to-server Answer: D

You might also like