What is DNS?
Domain name system/server is used to translate the IP address into the hostname and hostname into the IP address. DNS is mostly used on the internet and the networks.
What is Firewall?
A firewall is usually a software program that is installed on the network server or gateway. The purpose of the firewall is to protect the network resources from the intruders and unauthorized persons.
What is Gateway?
A gateway is software or a hardware that is used to connect the local area network with the internet. A gateway is a network entrance point and a router usually works as a gateway
What is DHCP?
Dynamic host configuration protocol is used to dynamically assign the IP address to the networked computers and devices. DHCP is a network protocol that automatically assigns static and dynamic IP addresses from its own range.
What is a Router?
Router is the most important network device that is used to connect two logically and physically different networks. Router defines the short possible route for the data to reach its destination. A router works with built-in intelligent software known as routing table, which helps to determine the route between the two networks.
What is WLAN?
WLAN or Wireless local area network is simply a type of network that doesn’t use wired Ethernet connections for networking. WLAN uses wireless network devices such as wireless routers etc.
What is Subnet Mask?
A subnet mask is used to determine the number of networks and the number of host computers. Every class of the IP address uses the different range of the subnet mask. Subnet masks allow the IP based networks to be divided into the sub networks for performance and security purposes.
What is a MAC Address?
MAC address or Media Access control is a unique identifier of a computer device. The MAC address is provided by the manufacturer of the device. MAC addresses are 12 digital hexadecimal numbers.
What is an IP Address?
An IP address is a unique identifier of a computer or network device on the local area network, WAN or on internet. Every host computer on the internet must have a unique IP address. IP addresses on the internet are usually assigned by the local ISPs to which users are connected.
VOIP or voice over internet protocol is a technology that uses IP based networks such as internet or private networks to transmit the voice communication.
Define Bluetooth Technology
Bluetooth is a short range wireless technology that uses radio waves for communication. Many mobile phones, laptops, MP3 players have built in features of the Bluetooth.
What is a RAS server?
RAS or remote access server allows you to remote dial in through the desktop computers, laptops and GSM mobile phones.
What’s a Frame Relay?
Frame relay is high speed data communication technology that operates at the physical and data link layers of the OSI model. Frame relay uses frames for data transmission in a network.
What is Wifi?
Wi Fi or wireless fidelity is a base band network technology that is used for the wireless data communication.
What is WiMax?
Wi Fi is a next form of the Wi fi. Wi max is a very high speed broadband network technology that is designed for the corporate offices, roaming and home users.
Name the Seven Layers of OSI Model
The seven layers of the OSI are Application, Presentation, Sessions, Transport, Network, Data Link and Physical layer.
What is LDAP?
Lightweight Directory Access Protocol is used to access the directory services from the Active directory in Windows operation systems.
What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP, and FTP?
SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP, FTP-21, HTTP-80
What is IPv6?
IP V6 is a next generation protocol that is used as an expansion of DNS.
What is UDP?
UDP or user datagram protocol is a connectionless protocol that is used to transfer the data without any error handling.
What is Virtual Private Network (VPN) and how does it work?
VPN or virtual private network is used to connect two networks by means internet. VPN uses PPTP (point to point tunneling protocol) and other security procedures to make a secure tunnel on internet.