OTHERS

                                                   SOFTWARE ENGINEERING:

1. What is Acceptance Testing?
Testing conducted to enable a user/customer to determine whether to accept a software product. Normally performed to validate the software meets a set of agreed acceptance criteria.
2. What is Accessibility Testing?
Verifying a product is accessible to the people having disabilities (deaf, blind, mentally disabled etc.).
3. What is Ad Hoc Testing?
A testing phase where the tester tries to 'break' the system by randomly trying the system's functionality. Can include negative testing as well. See also Monkey Testing.
4. What is Agile Testing?
Testing practice for projects using agile methodologies, treating development as the customer of testing and emphasizing a test-first design paradigm. See also Test Driven Development.
5. What is Application Binary Interface (ABI)?
A specification defining requirements for portability of applications in binary forms across different system platforms and environments.
6. What is Application Programming Interface (API)?
A formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services.
7. What is Automated Software Quality (ASQ)?
The use of software tools, such as automated testing tools, to improve software quality.
8. What is Automated Testing?
Testing employing software tools which execute tests without manual intervention. Can be applied in GUI, performance, API, etc. testing. The use of software to control the execution of tests, the comparison of actual outcomes to predicted outcomes, the setting up of test preconditions, and other test control and test reporting functions.
9. What is Backus-Naur Form?
A metalanguage used to formally describe the syntax of a language.
10. What is Basic Block?
A sequence of one or more consecutive, executable statements containing no branches.
11. What is Basis Path Testing?
A white box test case design technique that uses the algorithmic flow of the program to design tests.
12. What is Basis Set?
The set of tests derived using basis path testing.
13. What is Baseline?
The point at which some deliverable produced during the software engineering process is put under formal change control.
14. What you will do during the first day of job?
What would you like to do five years from now?
15. What is Beta Testing?
Testing of a rerelease of a software product conducted by customers.
16. What is Binary Portability Testing?
Testing an executable application for portability across system platforms and environments, usually for conformation to an ABI specification.
17. What is Black Box Testing?
Testing based on an analysis of the specification of a piece of software without reference to its internal workings. The goal is to test how well the component conforms to the published requirements for the component.
18. What is Bottom Up Testing?
An approach to integration testing where the lowest level components are tested first, then used to facilitate the testing of higher level components. The process is repeated until the component at the top of the hierarchy is tested.
19. What is Boundary Testing?
Test which focus on the boundary or limit conditions of the software being tested. (Some of these tests are stress tests).
20. What is Bug?
A fault in a program which causes the program to perform in an unintended or unanticipated manner.
20. What is Defect?
If software misses some feature or function from what is there in requirement it is called as defect.
21. What is Boundary Value Analysis?
BVA is similar to Equivalence Partitioning but focuses on "corner cases" or values that are usually out of range as defined by the specification. his means that if a function expects all values in range of negative 100 to positive 1000, test inputs would include negative 101 and positive 1001.
22. What is Branch Testing?
Testing in which all branches in the program source code are tested at least once.
23. What is Breadth Testing?
A test suite that exercises the full functionality of a product but does not test features in detail.
24. What is CAST?
Computer Aided Software Testing.
25. What is Capture/Replay Tool?
A test tool that records test input as it is sent to the software under test. The input cases stored can then be used to reproduce the test at a later time. Most commonly applied to GUI test tools.
26. What is CMM?
The Capability Maturity Model for Software (CMM or SW-CMM) is a model for judging the maturity of the software processes of an organization and for identifying the key practices that are required to increase the maturity of these processes.
27. What is Cause Effect Graph?
A graphical representation of inputs and the associated outputs effects which can be used to design test cases.
28. What is Code Complete?
Phase of development where functionality is implemented in entirety; bug fixes are all that are left. All functions found in the Functional Specifications have been implemented.
Top     
29. What is Code Coverage?
An analysis method that determines which parts of the software have been executed (covered) by the test case suite and which parts have not been executed and therefore may require additional attention.
30. What is Code Inspection?
A formal testing technique where the programmer reviews source code with a group who ask questions analyzing the program logic, analyzing the code with respect to a checklist of historically common programming errors, and analyzing its compliance with coding standards.
31. What is Code Walkthrough?
A formal testing technique where source code is traced by a group with a small set of test cases, while the state of program variables is manually monitored, to analyze the programmer's logic and assumptions.
32. What is Coding?
The generation of source code.
33. What is Compatibility Testing?
Testing whether software is compatible with other elements of a system with which it should operate, e.g. browsers, Operating Systems, or hardware.
34. What is Component?
A minimal software item for which a separate specification is available.
35. What is Component Testing?
Testing of individual software components (Unit Testing).
36. What is Concurrency Testing?
Multi-user testing geared towards determining the effects of accessing the same application code, module or database records. Identifies and measures the level of locking, deadlocking and use of single-threaded code and locking semaphores.
37. What is Conformance Testing?
The process of testing that an implementation conforms to the specification on which it is based. Usually applied to testing conformance to a formal standard.
38. What is Context Driven Testing?
The context-driven school of software testing is flavor of Agile Testing that advocates continuous and creative evaluation of testing opportunities in light of the potential information revealed and the value of that information to the organization right now.
39. What is Conversion Testing?
Testing of programs or procedures used to convert data from existing systems for use in replacement systems.
40. What is Cyclomatic Complexity?
A measure of the logical complexity of an algorithm, used in white-box testing.
41. What is Data Dictionary?
A database that contains definitions of all data items defined during analysis.
42. What is Data Flow Diagram?
A modeling notation that represents a functional decomposition of a system.
43. What is Data Driven Testing?
Testing in which the action of a test case is parameterized by externally defined data values, maintained as a file or spreadsheet. A common technique in Automated Testing.
44. What is Debugging?
The process of finding and removing the causes of software failures.
45. What is Defect?
Nonconformance to requirements or functional / program specification
46. What is Dependency Testing?
Examines an application's requirements for pre-existing software, initial states and configuration in order to maintain proper functionality.
47. What is Depth Testing?
A test that exercises a feature of a product in full detail.
48. What is Dynamic Testing?
Testing software through executing it. See also Static Testing.
49. What is Emulator?
A device, computer program, or system that accepts the same inputs and produces the same outputs as a given system.
50. What is Endurance Testing?
Checks for memory leaks or other problems that may occur with prolonged execution.
Top     
51. What is End-to-End testing?
Testing a complete application environment in a situation that mimics real-world use, such as interacting with a database, using network communications, or interacting with other hardware, applications, or systems if appropriate.
52. What is Equivalence Class?
A portion of a component's input or output domains for which the component's behaviour is assumed to be the same from the component's specification.
53. What is Equivalence Partitioning?
A test case design technique for a component in which test cases are designed to execute representatives from equivalence classes.
54. What is Exhaustive Testing?
Testing which covers all combinations of input values and preconditions for an element of the software under test.
55. What is Functional Decomposition?
A technique used during planning, analysis and design; creates a functional hierarchy for the software.
54. What is Functional Specification?
A document that describes in detail the characteristics of the product with regard to its intended features.
55. What is Functional Testing?
Testing the features and operational behavior of a product to ensure they correspond to its specifications. Testing that ignores the internal mechanism of a system or component and focuses solely on the outputs generated in response to selected inputs and execution conditions. or Black Box Testing.
56. What is Glass Box Testing?
A synonym for White Box Testing.
57. What is Gorilla Testing?
Testing one particular module, functionality heavily.
58. What is Gray Box Testing?
A combination of Black Box and White Box testing methodologies? testing a piece of software against its specification but using some knowledge of its internal workings.
59. What is High Order Tests?
Black-box tests conducted once the software has been integrated.
60. What is Independent Test Group (ITG)?
A group of people whose primary responsibility is software testing,
61. What is Inspection?
A group review quality improvement process for written material. It consists of two aspects; product (document itself) improvement and process improvement (of both document production and inspection).
62. What is Integration Testing?
Testing of combined parts of an application to determine if they function together correctly. Usually performed after unit and functional testing. This type of testing is especially relevant to client/server and distributed systems.
63. What is Installation Testing?
Confirms that the application under test recovers from expected or unexpected events without loss of data or functionality. Events can include shortage of disk space, unexpected loss of communication, or power out conditions.
64. What is Load Testing?
See Performance Testing.
65. What is Localization Testing?
This term refers to making software specifically designed for a specific locality.
66. What is Loop Testing?
A white box testing technique that exercises program loops.
67. What is Metric?
A standard of measurement. Software metrics are the statistics describing the structure or content of a program. A metric should be a real objective measurement of something such as number of bugs per lines of code.
68. What is Monkey Testing?
Testing a system or an Application on the fly, i.e just few tests here and there to ensure the system or an application does not crash out.
69. What is Negative Testing?
Testing aimed at showing software does not work. Also known as "test to fail". See also Positive Testing.
70. What is Path Testing?
Testing in which all paths in the program source code are tested at least once.
Top     
71. What is Performance Testing?
Testing conducted to evaluate the compliance of a system or component with specified performance requirements. Often this is performed using an automated test tool to simulate large number of users. Also know as "Load Testing".
72. What is Positive Testing?
Testing aimed at showing software works. Also known as "test to pass". See also Negative Testing.
73. What is Quality Assurance?
All those planned or systematic actions necessary to provide adequate confidence that a product or service is of the type and quality needed and expected by the customer.
74. What is Quality Audit?
A systematic and independent examination to determine whether quality activities and related results comply with planned arrangements and whether these arrangements are implemented effectively and are suitable to achieve objectives.
75. What is Quality Circle?
A group of individuals with related interests that meet at regular intervals to consider problems or other matters related to the quality of outputs of a process and to the correction of problems or to the improvement of quality.
76. What is Quality Control?
The operational techniques and the activities used to fulfill and verify requirements of quality.
77. What is Quality Management?
That aspect of the overall management function that determines and implements the quality policy.
78. What is Quality Policy?
The overall intentions and direction of an organization as regards quality as formally expressed by top management.
79. What is Quality System?
The organizational structure, responsibilities, procedures, processes, and resources for implementing quality management.
80. What is Race Condition?
A cause of concurrency problems. Multiple accesses to a shared resource, at least one of which is a write, with no mechanism used by either to moderate simultaneous access.
81. What is Ramp Testing?
Continuously raising an input signal until the system breaks down.
82. What is Recovery Testing?
Confirms that the program recovers from expected or unexpected events without loss of data or functionality. Events can include shortage of disk space, unexpected loss of communication, or power out conditions.
83. What is Regression Testing?
Retesting a previously tested program following modification to ensure that faults have not been introduced or uncovered as a result of the changes made.
84. What is Release Candidate?
A pre-release version, which contains the desired functionality of the final version, but which needs to be tested for bugs (which ideally should be removed before the final version is released).
85. What is Sanity Testing?
Brief test of major functional elements of a piece of software to determine if its basically operational. See also Smoke Testing.
86. What is Scalability Testing?
Performance testing focused on ensuring the application under test gracefully handles increases in work load.
87. What is Security Testing?
Testing which confirms that the program can restrict access to authorized personnel and that the authorized personnel can access the functions available to their security level.
88. What is Smoke Testing?
A quick-and-dirty test that the major functions of a piece of software work. Originated in the hardware testing practice of turning on a new piece of hardware for the first time and considering it a success if it does not catch on fire.
89. What is Soak Testing?
Running a system at high load for a prolonged period of time. For example, running several times more transactions in an entire day (or night) than would be expected in a busy day, to identify and performance problems that appear after a large number of transactions have been executed.
90. What is Software Requirements Specification?
A deliverable that describes all data, functional and behavioral requirements, all constraints, and all validation requirements for software/
91. What is Software Testing?
A set of activities conducted with the intent of finding errors in software.
92. What is Static Analysis?
Analysis of a program carried out without executing the program.
Top     
93. What is Static Analyzer?
A tool that carries out static analysis.
94. What is Static Testing?
Analysis of a program carried out without executing the program.
95. What is Storage Testing?
Testing that verifies the program under test stores data files in the correct directories and that it reserves sufficient space to prevent unexpected termination resulting from lack of space. This is external storage as opposed to internal storage.
96. What is Stress Testing?
Testing conducted to evaluate a system or component at or beyond the limits of its specified requirements to determine the load under which it fails and how. Often this is performance testing using a very high level of simulated load.
97. What is Structural Testing?
Testing based on an analysis of internal workings and structure of a piece of software. See also White Box Testing.
98. What is System Testing?
Testing that attempts to discover defects that are properties of the entire system rather than of its individual components.
99. What is Testability?
The degree to which a system or component facilitates the establishment of test criteria and the performance of tests to determine whether those criteria have been met.
100. What is Testing?
The process of exercising software to verify that it satisfies specified requirements and to detect errors. The process of analyzing a software item to detect the differences between existing and required conditions (that is, bugs), and to evaluate the features of the software item (Ref. IEEE Std 829). The process of operating a system or component under specified conditions, observing or recording the results, and making an evaluation of some aspect of the system or component. What is Test Automation? It is the same as Automated Testing.
101. What is Test Bed?
An execution environment configured for testing. May consist of specific hardware, OS, network topology, configuration of the product under test, other application or system software, etc. The Test Plan for a project should enumerated the test beds(s) to be used.
102. What is Test Case?
Test Case is a commonly used term for a specific test. This is usually the smallest unit of testing. A Test Case will consist of information such as requirements testing, test steps, verification steps, prerequisites, outputs, test environment, etc. A set of inputs, execution preconditions, and expected outcomes developed for a particular objective, such as to exercise a particular program path or to verify compliance with a specific requirement. Test Driven Development? Testing methodology associated with Agile Programming in which every chunk of code is covered by unit tests, which must all pass all the time, in an effort to eliminate unit-level and regression bugs during development. Practitioners of TDD write a lot of tests, i.e. an equal number of lines of test code to the size of the production code.
103. What is Test Driver?
A program or test tool used to execute a tests. Also known as a Test Harness.
104. What is Test Environment?
The hardware and software environment in which tests will be run, and any other software with which the software under test interacts when under test including stubs and test drivers.
105. What is Test First Design?
Test-first design is one of the mandatory practices of Extreme Programming (XP).It requires that programmers do not write any production code until they have first written a unit test.
106. What is Test Harness?
A program or test tool used to execute a tests. Also known as a Test Driver.
107. What is Test Plan?
A document describing the scope, approach, resources, and schedule of intended testing activities. It identifies test items, the features to be tested, the testing tasks, who will do each task, and any risks requiring contingency planning.
Top     
108. What is Test Procedure?
A document providing detailed instructions for the execution of one or more test cases.
109. What is Test Script?
Commonly used to refer to the instructions for a particular test that will be carried out by an automated test tool.
110. What is Test Specification?
A document specifying the test approach for a software feature or combination or features and the inputs, predicted results and execution conditions for the associated tests.
111. What is Test Suite?
A collection of tests used to validate the behavior of a product. The scope of a Test Suite varies from organization to organization. There may be several Test Suites for a particular product for example. In most cases however a Test Suite is a high level concept, grouping together hundreds or thousands of tests related by what they are intended to test.
112. What is Test Tools?
Computer programs used in the testing of a system, a component of the system, or its documentation.
113. What is Thread Testing?
A variation of top-down testing where the progressive integration of components follows the implementation of subsets of the requirements, as opposed to the integration of components by successively lower levels.
114. What is Top Down Testing?
An approach to integration testing where the component at the top of the component hierarchy is tested first, with lower level components being simulated by stubs. Tested components are then used to test lower level components. The process is repeated until the lowest level components have been tested.
115. What is Total Quality Management?
A company commitment to develop a process that achieves high quality product and customer satisfaction.
116. What is Traceability Matrix?
A document showing the relationship between Test Requirements and Test Cases.
117. What is Usability Testing?
Testing the ease with which users can learn and use a product.
118. What is Use Case?
The specification of tests that are conducted from the end-user perspective. Use cases tend to focus on operating software as an end-user would conduct their day-to-day activities.
119. What is Unit Testing?
Testing of individual software components.
120. What is Validation?
The process of evaluating software at the end of the software development process to ensure compliance with software requirements. The techniques for validation is testing, inspection and reviewing.
121. What is Verification?
The process of determining whether of not the products of a given phase of the software development cycle meet the implementation steps and can be traced to the incoming objectives established during the previous phase. The techniques for verification are testing, inspection and reviewing.
122. What is White Box Testing?
Testing based on an analysis of internal workings and structure of a piece of software. Includes techniques such as Branch Testing and Path Testing. Also known as Structural Testing and Glass Box Testing. Contrast with Black Box Testing.
White box testing is used to test the internal logic of the code.for ex checking whether the path has been executed once, checking whether the branches has been executed at least once .....Used to check the structure of the code.
123. What is Workflow Testing?
Scripted end-to-end testing which duplicates specific workflows which are expected to be utilized by the end-user.

                                              COMPUTER NETWORKS:



 1.      What are the two types of transmission technology available?

            (i) Broadcast and     (ii) point-to-point


2.      What is subnet?

            A generic term for section of a large networks usually separated by a bridge or router.


3.      Difference between the communication and transmission.

            Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc.
            Communication means the meaning full exchange of information between two communication media.


4.      What are the possible ways of data exchange?

            (i) Simplex     (ii) Half-duplex        (iii) Full-duplex.


5.      What is SAP?

            Series of interface points that allow other computers to communicate with the other layers of network protocol stack.


6.      What do you meant by "triple X" in Networks?     

The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X"


7.      What is frame relay, in which layer it comes?

Frame relay is a packet switching technology. It will operate in the data link layer.

           
8.      What is terminal emulation, in which layer it comes?

            Telnet is also called as terminal emulation. It belongs to application layer.


9.      What is Beaconing?

            The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.


10.  What is redirector?

            Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer.


11.  What is NETBIOS and NETBEUI?

            NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.
            NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.


12.  What is RAID?

            A method for providing fault tolerance by using multiple hard disk drives.


13.  What is passive topology?

            When the computers on the network simply listen and receive the signal, they are referred to as passive because they don’t amplify the signal in any way. Example for passive topology - linear bus.

14.  What is Brouter?

            Hybrid devices that combine the features of both bridges and routers.


15.  What is cladding?

            A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.


16.  What is point-to-point protocol

            A communications protocol used to connect computers to remote networking services including Internet service providers.


17.  How Gateway is different from Routers?

            A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats


18.  What is attenuation?

            The degeneration of a signal over distance on a network cable is called attenuation.


19.  What is MAC address?

            The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.


20.  Difference between bit rate and baud rate.

            Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.
baud rate  = bit rate / N
where N is no-of-bits represented by each signal shift.

21.  What is Bandwidth?

            Every line has an upper limit and a lower limit  on the frequency of signals it can carry. This limited range is called the bandwidth.


22.  What are the types of Transmission media?

Signals are usually transmitted over some transmission media that are broadly classified in to two categories.

a)      Guided Media:
These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light.

           b) Unguided Media:
This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony.


23.  What is Project 802?

It is a project started by IEEE to set standards to enable intercommunication between equipment from a variety of manufacturers. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LAN
protocols.
It consists of the following:
Ø  802.1 is an internetworking standard for compatibility of different LANs and MANs across protocols.
Ø  802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is non-architecture-specific, that is remains the same for all IEEE-defined LANs.
Ø  Media access control (MAC) is the lower sublayer of the data link layer that contains some distinct modules each carrying proprietary information specific to the LAN product being used. The modules are Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5).

Ø  802.6 is distributed queue dual bus (DQDB) designed to be used in MANs.


24.  What is Protocol Data Unit?

The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame).


25.  What are the different type of networking / internetworking devices?

Repeater:
Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.

Bridges:
These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion.

Routers:
They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission.

Gateways:
They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.

    
26.  What is ICMP?

ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.


27.  What are the data units at different layers of the TCP / IP protocol suite?

The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media.


28.  What is difference between ARP and RARP?

The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.

29.  What is the minimum and maximum length of the header in the TCP segment and IP datagram?

            The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.  
                    

30.  What is the range of addresses in the classes of internet addresses?

Class A           0.0.0.0             -           127.255.255.255
Class B           128.0.0.0         -           191.255.255.255
Class C           192.0.0.0         -           223.255.255.255
Class D           224.0.0.0         -           239.255.255.255
Class E           240.0.0.0         -           247.255.255.255        
31.  What is the difference between TFTP and FTP application layer protocols?

            The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.

            The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offer by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.


32.  What are major types of networks and explain?

Ø  Server-based network
Ø  Peer-to-peer network

Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources.

Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration


33.  What are the important topologies for networks?

Ø  BUS topology:
In this each computer is directly connected to primary network cable in a single line.

Advantages:
                        Inexpensive, easy to install, simple to understand, easy to extend.

Ø  STAR topology:
                        In this all computers are connected using a central hub.
Advantages:
            Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.

Ø  RING topology:
                        In this all computers are connected in loop.
Advantages:
                        All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.

34.  What is mesh network?

A network in which there are multiple network links between computers to provide multiple paths for data to travel.


35.  What is difference between baseband and broadband transmission?

In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.


36.  Explain 5-4-3 rule?

In a Ethernet network, between any two points on the network ,there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated.


37.  What MAU?

In token Ring , hub is called Multistation Access Unit(MAU).


38.  What is the difference between routable and non- routable protocols?

Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router


39.  Why should you care about the OSI Reference Model?

It provides a framework for discussing network operations and design.


40.  What is logical link control?

One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.

41.  What is virtual channel?

Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.


42.  What is virtual path?

Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.


43.  What is packet filter?

Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.


44.  What is traffic shaping?

One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.


45.  What is multicast routing?

Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.


46.  What is region?

When hierarchical routing is used, the routers are divided into what we will call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.

47.  What is silly window syndrome?

It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.


48.  What are Digrams and Trigrams?

The most common two letter combinations are called as digrams. e.g. th, in, er, re and an. The most common three letter combinations are called as trigrams. e.g. the, ing, and, and ion.


49.  Expand IDEA.

IDEA stands for International Data Encryption Algorithm.


50.  What is wide-mouth frog?

Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.


51.  What is Mail Gateway?

It is a system that performs a protocol translation between different electronic mail delivery protocols.


52.  What is IGP (Interior Gateway Protocol)?

It is any routing protocol used within an autonomous system.


53.  What is EGP (Exterior Gateway Protocol)?

It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system.



54.  What is autonomous system?

It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.


55.  What is BGP (Border Gateway Protocol)?

It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol).


56.  What is Gateway-to-Gateway protocol?

It is a protocol formerly used to exchange routing information between Internet core routers.


57.  What is NVT (Network Virtual Terminal)?

It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.


58.  What is a Multi-homed Host?

It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host.


59.  What is Kerberos?

It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.


60.  What is OSPF?

It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions.

61.  What is Proxy ARP?

It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router.


62.  What is SLIP (Serial Line Interface Protocol)?

It is a very simple protocol used for transmission of IP datagrams across a serial line.


63.  What is RIP (Routing Information Protocol)?

It is a simple protocol used to exchange information between the routers.


64.  What is source route?

It is a sequence of IP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header.

                                              UNIX COMMANDS

UNIX Command Cheat Sheets

Command
Description (short)
Example
Explanation
date
Writes the current date to the screen
date
Mon Nov 20 18:25:37 EST 2000




sort infile
Sorts the contents of the input file in alphabetical order
sort names
Sorts the contents of names in alphabetical order




who
Tells you who is logged onto your server
who
None






who am I
Tells you your user information
who am i
whoami
None






clear
Clears the window and the line buffer
clear
None






echo whatever I type
Writes whatever I type to the screen.
echo hey you!
Writes hey you! to the screen




banner big words
Does the same thing as echo only in BIG words
banner hey!
Writes hey! in large letters on the screen




cat file1 file2 file3
Shows the three files in consecutive order as one document (can be used to combine files)
cat cheese milk
This prints the cheese file to the screen first and immediately follows it with the milk file.




df system
Reports the number of free disk blocks
df ~
df $HOME
Both commands will print the total kb space, kb used, kb available, and %used on the home system (your system).




head file
Prints the first 10 lines of the file to the screen
head addresses
Prints the first 10 lines of addresses to the screen

Number of lines can be modified
head -25 addresses
Prints the first 25 lines of addresses to the screen




tail file
Prints the last 10 lines of the file to the screen
tail test.txt
Prints the last 10 lines of test.txt to the screen

Number of lines can be modified here, too
tail -32 test.txt
Prints the last 32 lines of test.txt to the screen




more input
This prints to screen whatever is input—useful because it only shows one screen at a time.
more groceries
This will list the groceries file to the screen.

scroll bar continues to the next screen



return moves one line forward



Q quits



G goes to the end



1G goes to the beginning



Ctrl u moves up ½  screen



Ctrl d moves down ½ screen




Command
Description (short)
Example
Explanation
ls   (-option-optional)
Lists all the nonhidden files and directories
ls
Lists all nonhidden files and directories in the current directory


ls bin
Lists all nonhidden files and directories in the bin directory
ls -l     or      ll
Lists all nonhidden files and directories in long format
ls -l
ll
Lists all nonhidden files and directories in the current directory in long format


ls -l work
ll work
Lists all nonhidden files and directories in the work directory in long format
ls -a
Lists all files and directories including hidden ones
ls -a
Lists all files and directories, including hidden, in the current directory


ls -a temp
Lists all files and directories in the temp directory.
ls -r
Lists all files and directories in reverse alphabetical order
ls -r
Lists all nonhidden files and directories in the current directory in reverse alphabetical order


ls -r abc
Lists all nonhidden files and directories in the abc directory in reverse alphabetical order
ls -t
Lists all nonhidden files in the order they were last modified
ls -t

Lists all the nonhidden files in the current directory in the order they were last modified from most recent to last


ls -t work
Lists all the nonhidden files in the work directory in the order they were last modified from most recent to last
NOTE: Options can be combined using ls
ls -al
Lists all files (including hidden (-a)) in long format (-l)




Important Characters
|

> 

>> 

&

~

< 

“pipe” directs the output of the first command to the input of another.
Sends the output of a command to a designated file
Appends the output of a command to a designated file
Runs command in the background; you can still work in the window
Designates the home directory ($HOME)
Designates input from somewhere other than terminal

ls -l | more

ls -l > myfiles

ls -l >> allfiles

xclock &

echo ~

progA < input1

Lists your files in long format one screen at a time
Prints your listing to a file named myfiles
Appends your filenames to the end of the allfiles file
Runs xclock (a clock) allowing you to keep working
Writes your home directory to the screen
progA program gets its input from a file named input1

Wildcards

*

?

[  ]
UNIX has a set of wildcards that it accepts.

Any string of characters

Any one character

Match any character in the brackets (a hyphen is used for ranges of characters)


ls *.c

ls file?

ls v[6-9]file


Lists any file or directory (nonhidden) ending with c
Lists any file/directory with file and 1 character at the end
Lists v6file, v7file, v8file, and v9file


Command
Description (short)
Example
Explanation
cd directory
Changes your current directory to the directory specified
cd bin
Changes directory to the bin directory


cd ..
cd ../..

Moves you to the directory that contains the directory you are currently in
Ex. Current directory=/home/users/bob/bin
execute cd ..
New directory= /home/users/bob
or  executing cd ../..
New directory= /home/users.


cd -
Moves you to the directory you just came from


cd ~
cd
Both move you to your home directory (the directory you start from initially)




mkdir dirname
Creates a directory
mkdir junk
Makes a directory named junk in your current directory

You can also designate where the directory is to reside.
mkdir ~/left
Makes a directory in your home directory named left




rm file1 file2 file3
Removes (deletes) file(s)
rm xyz
Deletes a file named xyz


rm xyz abc
Deletes the files named xyz and abc


rm *
Deletes everything nonhidden
rm -i file1 file2
Prompts before deletion of files
*******USE -i AT FIRST*******
rm -i *
Prompts at each nonhidden file and lets you decide whether or not to delete it
rm -f file1 file2
Forces deletion without prompt regardless of permissions
rm -f program
Removes the file program without regard to permissions, status, etc.
rm -r directory
rm -R directory
Remove a directory along with anything inside of it
rm -r bin
rm -R bin
Each of these will remove the bin directory and everything inside of it.
rmdir directory
Removes a directory like rm -r does if the directory is empty
rmdir bin
Removes the bin directory if it is empty
****dangerous****
rm -fR name
rm -Rf name
This combination will force the removal of any file and any directory including anything inside of it
rm -Rf c_ya
Forces removal without prompts of the c_ya directory and anything inside of it
rm -Ri directory
Deletes the contents of a directory and the directory if it is empty by prompting the user before each deletion
rm -Ri rusure
Deletes anything in the directory called rusure that you verify at the prompt, and if you remove everything in the directory, you will be prompted whether you want to remove the directory itself or not
NOTE: Options can be combined using rm


rmdir -p directory
Removes a directory and any empty parent directories above it (-pi does the same thing but it prompts before each removal)
rmdir -p /home/bin/dir1

Deletes the dir1 directory; if bin directory is empty, it is deleted, and if home directory is empty it is also deleted


Command
Description (short)
Example
Explanation
cp file1 newname
Copies a file (file1) and names the copy the new name (newname)
cp old new
Makes a copy of the file/directory named old and names the copy new, all within the current directory
NOTE: If you copy a file to a newfile name and newfile already exists, the newfile contents will be overwritten.


cp file dir2/
Places a copy of file in dir2/ and it retains its original name


cp ../dir1/* .
Copies everything from the dir1 directory located just below where you currently are and places the copy “here” ( . ) in your current directory
cp -p name target
Preserves all permissions in the original to the target
cp -p execut1 execut2
Copies execut1 executable file and calls the copy execut2, which also has executable permissions
cp -R directory target
Copies a directory and names the copy the new name (target)
cp -R old/ junk/
Makes a copy of the directory named old and names the directory copy junk
cp -f name target
Forces existing pathnames to be destroyed before copying the file
none
No example or description needed
mv initial final
Renames files and directories
mv temp script_1
Renames the file (or directory) temp to the name script_1 in the current directory

Also moves files to other directories
mv script.exe ~/bin
Moves the script.exe file to the bin directory that is in the home (~) parent directory and it keeps its initial name

You can do multiple moves.
mv script_1 script.exe ~/bin
Moves both script_1 and script.exe to the bin directory




pwd
Prints the current directory to the screen
pwd
May print something like “/home/bob”




pr (option) filename
Prints the specified file to the default printer (options are not required but can be combined in any order)
pr userlist
Prints the contents of userlist to the default printer
pr +k filename
Starts printing with page k
pr +5 userlist
Prints the contents of userlist starting with page 5
pr -k filename
Prints in k columns
pr -2 userlist
Prints the contents of userlist in 2 columns
pr -a filename
Prints in multicolumns across the page (use with -k)
pr -3a userlist1
Prints userlist in three columns across the page
pr -d filename
Prints in double space format
pr -d userlist
Prints userlist with double space format
pr  -h “header” filename
Prints the file with a specified header rather than the filename
pr -h “users” userlist
Prints userlist with users as the header
NOTE: Options can be combined using pr




Command
Description (short)
Example
Explanation
lpconfig printer_id queue
Configures remote printers to a local print queue
lpconfig prntr1 bobprt
Configures a printer named prntr1 to accept print requests from a local queue named bobprt
lpconfig -r queue
Removes the said queue from the local system
lpconfig -r bobprt
Removes bobprt queue from the local system if the person removing the queue is the owner or “root”
lpconfig -d queue
Makes the said queue the default queue
lpconfig -d vpprnt
Makes vpprnt the default print queue




lpstat (-options)
Prints printer status information to screen (options not required)
lpstat
Prints status of all requests made to the default printer by the current server
lpstat -u“user1, user2
Prints the status of requests made by the specified users
lpstat -u“bob
Prints status of all requests made by the user with the id bob
lpstat s
Prints the queues and the printers they print to
none
None
lpstat -t
Shows all print status information
none
None
lpstat -d
Shows the default printer for the lp command
none
None
lpstat -r
Lets you know if the line printer scheduler is running
none
None
lp (-option) file(s)
Like pr, this prints designated files on the connected printer(s) (options not required and options may be combined).
lp junkfile
Prints the file junkfile to the default printer in default one-sided, single-sided, single-spaced format
lp -ddest file(s)
Prints the file(s) to a specific destination
lp -dbobsq zoom
Sends the file zoom to the bobsq print queue to print
lp -nnumber file(s)
Allows user to designate the number of copies to be printed
lp -n5 crash
Prints five copies of crash in default settings
lp -ttitle file(s)
Places title on the banner page
lp -tBobs cash
Prints Bobs on the banner page of the file printout named cash
lp -ooption file(s)
Allows printer-specific options to be used (i.e., double-sided or two pages per side, etc.)
lp -od output
Prints the output file double-sided on the printout


lp -obold output
Prints output in bold print


lp -ohalf output
Divides the paper into two halves for printing output


lp -oquarter output
Prints four pages of output per side of paper


lp -olandscape output
Prints output in landscape orientation


lp -oportrait output
Prints output in portrait orientation
NOTE: Options can be combined using lp






cancel request_id
Stops print jobs or removes them from the queue (request_ids are obtained using lpstat)
cancel 5438
Stops the print job with the id 5438 whether it is printing or if it is sitting in the queue
cancel -a printer
Removes all print requests from the current user on the specified printer
cancel -a bobsprt
Removes all the requests from the current user to the printer named bobsprt
cancel -u login_id
Removes any print requests queued belonging to the user
cancel -u bob
Cancels all queued print requests for user bob


Command
Description (short)
Example
Explanation
ps
Shows certain information about active processes associated with the current terminal
ps
Shows a listing of process IDs, terminal identifier, cumulative execution time, and command name
ps -e
Shows information about all processes
ps -e
Shows a listing of process IDs, terminal identifiers, cumulative execution time, and command names for all processes
ps -f
Shows a full listing of information about the processes listed
ps -f
Shows UID (user or owner of the process), PID (process ID--use this number to kill it), PPID (process ID of the parent source), C (processor utilization for scheduling), STIME (start time of the process), TTY (controlling terminal for the process), TIME (cumulative time the process has run), and COMMAND (the command that started the process)
ps -u user_id
Shows all processes that are owned by the person with the pertinent user_id
ps -u bob
Shows all the processes that belong to the person with the userid bob
ps -ef
Shows all processes in a full listing
ps -ef
Shows all current processes in full listing




kill process_id
Stops the process with the said id
kill 6969
Kills the process with PID 6969
kill -9 process_id
Destroys the process with the said id
kill -9 6969
PID # 6969 doesn’t have a chance here.




grep string file
Searches input file(s) for specified string and prints the line with matches
grep mike letter
Searches for the string mike in the file named letter and prints any line with mike in it to the screen
grep -c string file
Searches and prints only the number of matches to the screen
grep -c hayes bankletter
Searches the file bankletter for the string hayes and prints the number of matches to the screen
grep -i string file
Searches without regard to letter case
grep -i hi file1
Searches file1 for hi, Hi, hI, and HI and prints all matches to the screen
grep -n string file
Prints to the screen preceded by the line number
grep -n abc alpha
Searches alpha for abc and prints the matches’ lines and line numbers to the screen
grep -v string file
All lines that do not match are printed
grep -v lead pencils
Prints all lines in pencils that do not contain the string lead
grep -x string file
Only exact matches are printed
grep -x time meetings
Prints only lines in meetings that match time exactly

grep is useful when you use it in a | “pipe”
ps -ef | grep bob
Finds all processes in full listing and then prints only the ones that match the string bob to the screen

You can also redirect its output to a file.
grep -i jan b_days>mymonth
Searches the file b_days for case-insensitive matches to jan and places the matching lines into a file called mymonth


Command
Description (short)
Example
Explanation
vuepad filename
Opens filename for editing/viewing in the vuepad editor
none
None




vi filename
Text editor that exists on every UNIX system in the world
none
None




emacs filename
Another text editor
none
None




compress filename
Compresses the file to save disk space.
none
None
uncompress filename
Expands a compressed file
none
None




awk
UNIX programming language
none
None




eval `resize`
Tells the target computer that you’ve resized the window during telnet
none
None




chexp # filename
Keeps the file(s) from expiring (being erased) on the target computer for # days
chexp 365 nr*
Keeps the target computer from deleting all files starting with nr for 1 year (365 days)


chexp 4095 nr*
Makes all files whose name starts with nr never expire or be deleted (infinite)




qstat
Displays the status of a process that has been submitted the Network Queuing System (basically a batch job)
qstat
Shows the status of the requests submitted by the invoker of the command—this will print request-name, request-id, the owner, relative request priority, and request state (is it running yet?)


qstat -a
Shows all requests


qstat -l
Shows requests in long format


qstat -m
Shows requests in medium-length format


qstat -u bob
Shows only requests belonging to the user bob


qstat -x
Queue header is shown in an extended format
Passwd
Password change

Enter passwd and the system will then prompt you. The system can automatically generate a new password for you or you can select your own.
xterm
xterm -option
xterm +option
Opens a new window (x-terminal) for you to work
-option sets the option
+option resets the option to default
xterm
This opens another window like the one you are currently working in.
USING XTERM WILL ELIMINATE A LOT OF DESKTOP CLUTTER. I STRONGLY SUGGEST YOU LEARN TO USE IT IN YOUR SCRIPTS.
xterm -help
Displays the xterm options
xterm -help
Shows the options available


Command
Description (short)
Example
(Explanation)
xterm -e program
Executes the listed program in the new xterm window—when the program is finished, the new xterm window goes away
xterm -e myprog.exe
This opens an xterm window and executes the program myprog.exe from that window so that you may still work in your present window.
xterm -sb
Opens an xterm that saves a set number of lines when they go off the top of the page and makes them accessible with a scroll bar
xterm -sb
Puts a scroll bar on the right side of the page for reviewing past lines in the window
NOTE: When clicking in the scroll bar, the left button scrolls down, the right scrolls up, and the middle snaps the scroll bar to the mouse position for dragging up and down.
xterm -sl number
Specifies the number of lines to be saved once they go off the top of the screen (default is 64)
xterm -sl 1000
The xterm will save 1,000 lines of work once it has moved off the immediate viewing area; it can be accessed using the scroll bar.
xterm -geom xxy+px+py
This option allows you to specify the size x pixels by y pixels and placement position x by position y of the new window when it opens.
Position +0+0 is the top left-hand corner of the screen, and the bottom right is approx. +1200+1000 depending on your resolution.
Note: The size of the window takes precedence over position, so if you position it too close to the side of the screen, it will position at the edge with the correct size.
xterm -geom 80x80+0+50



















xterm -geom 10x35+300+500




xterm -geom 5x5+0+0
The first command will open a window 80 pixels wide by 80 pixels tall and position its top left-hand corner at 0 pixels to the right of the left edge and 50 pixels down from the top of the screen.













The second command will open a window 10 pixs wide by 35 pixs tall and position its top left-hand corner 300 pixs from the left edge and 500 pixs down from the top.
The third command will make a 5 by 5 window and position its top left-hand corner at the top left-hand corner of the screen.
xterm will not compromise size when positioning.
xterm -title label
Allows you to label your window’s top title bar
xterm -title SCRIPTS
Opens an xterm window with the title SCRIPTS (default is whatever follows the -e option)
xterm -(areas) color
Allows you to modify different colors in your xterm window
xterm -bg white
xterm -bd huntergreen

xterm -fg red
The first command sets the background color to white.
The second command sets the window border color to huntergreen.
The third command window sets the text color to red.
xterm -fn font
Sets the font in the new xterm window
xterm -fn courr18
Sets the font to courr18 (default is fixed)
xterm -iconic
Starts the new xterm as an icon (double-click to maximize)
xterm -iconic -title xyz
Opens an xterm in iconic form with the title xyz
NOTE: Options can be combined using xterm





No comments:

Post a Comment