In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
This article is about 100 network basic knowledge popularization, look at the completion of half a network master! Next, let's take a look.
1) what is a link?
A link is a connection between two devices. It includes cable types and protocols for one device to communicate with another device.
2) what is the hierarchy of the OSI reference model?
There are seven OSI layers: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer.
3) what is the backbone network?
A backbone network is a centralized infrastructure designed to distribute different routes and data to a variety of networks. It also handles bandwidth management and various channels.
4) what is LAN?
LAN is the abbreviation of local area network. It refers to the connection between a computer and other network devices located in a small physical location.
5) what is a node?
A node is the point where the connection occurs. It can be a computer or device that is part of a network. To form a network connection, two or more nodes are needed.
6) what is a router?
A router can connect two or more network segments. These are intelligent network devices that store information in their routing tables, such as paths, hops, and so on. With this information, they can determine the best path for data transmission. The router operates at the OSI network layer.
7) what is a peer-to-peer link?
It refers to the direct connection between two computers on the network. A point-to-point connection does not require any network equipment other than the NIC card that connects the cable to the two computers.
8) what is anonymous FTP?
Anonymous FTP is a way to grant users access to files on a public server. Users who are allowed to access the data on these servers do not need to identify themselves, but log in as anonymous visitors.
9) what is the subnet mask?
The subnet mask is combined with the IP address to identify two parts: the extended network address and the host address. Like IP addresses, the subnet mask consists of 32 bits.
10) what is the maximum length allowed for UTP cables?
A single segment of a UTP cable has an allowable length of 90 to 100 meters. This limitation can be overcome by using repeaters and switches
11) what is data encapsulation?
Data encapsulation is the process of decomposing information into smaller manageable blocks before it is transmitted over the network. During this process, the source and destination addresses are appended to the title along with the parity.
12) describe the network topology
Network topology refers to the layout of computer networks. It shows the physical layout of devices and cables and how they are connected to each other.
13) what is VN?
VP means virtual private network, a technology that allows secure channels to be created over a network, such as Internet.
For example, PN allows you to establish a secure dial-up connection to a remote server.
14) briefly describe NAT.
NAT is a network address translation. This is a protocol that provides a way for multiple computers on a public network to share a single connection to Internet.
15) what is the work of the network layer under the OSI reference model?
The network layer is responsible for data routing, packet switching and network congestion control. The router runs under this layer.
16) how does the network topology affect your decision to build the network?
The network topology determines what medium the interconnecting devices must use. It also serves as the basis for setting materials, connectors and terminals.
17) what is RIP?
RIP, short for routing Information Protocol, is used by routers to send data from one network to another.
It effectively manages routing data by broadcasting its routing table to all other routers in the network. It determines the network distance in terms of hops.
18) what are different ways to protect computer networks?
There are several ways to do this. Install reliable and updated antivirus programs on all computers. Ensure that the firewall is set up and configured correctly. User authentication will also be of great help. All of these combinations will form a highly secure network.
19) what is NIC?
NIC is the abbreviation of network interface card (Nic). This is connected to PC to connect to the network Shenbei. Each NIC has its own MAC address that identifies the PC on the network.
20) what is WAN?
WAN stands for wide area network. It is the interconnection of geographically dispersed computers and devices. It connects networks located in different regions and countries.
21) what is the importance of the OSI physical layer?
The physical layer converts data bits to electrical signals, and vice versa. This is the consideration and setting of network devices and cable types.
22) how many floors are there under TCP/IP?
There are four layers: network layer, Internet layer, transport layer and application layer.
23) what are proxy servers and how do they protect computer networks?
The proxy server mainly prevents external users from identifying the IP address of the internal network. Do not know the correct IP address or even recognize the physical location of the network. The proxy server can make the network almost invisible to external users.
24) what is the function of the OSI session layer?
This layer provides protocols and methods for two devices on the network to communicate with each other by holding sessions. This includes setting up the session, managing the exchange of information during the session, and the release process when the session is terminated.
25) what is the importance of implementing fault-tolerant systems? Is it limited?
Fault-tolerant systems ensure continuous data availability. This is achieved by eliminating a single point of failure. However, in some cases, this type of system will not be able to protect data, such as accidental deletion.
26) what does 10Base-T mean?
10 refers to the data transfer rate, in this case 10Mbps. "Base" refers to baseband. T stands for twisted pair, which is the cable used for the network.
27) what is a private IP address?
A private IP address is assigned for the intranet. These addresses are used for internal networks and cannot be routed on external public networks. These ensure that there are no conflicts between internal networks, and that the range of private IP addresses can also be reused in multiple internal networks because they do not "see" each other.
28) what is NOS?
NOS or network operating system is specialized software whose main task is to provide network connections to computers so that they can communicate with other computers and connected devices.
29) what is DoS?
A DoS or denial of service attack is an attempt to prevent users from accessing the Internet or any other network service. This strike may take different forms and is made up of a group of permanent people. A common way to do this is to overload the system server so that it can no longer handle legitimate traffic and will be forced to reset.
30) what is OSI and what role does it play in computer networks?
OSI (Open Systems Interconnection) is used as a reference model for data communication. It consists of seven layers, each of which defines specific aspects of how network devices connect and communicate with each other. One layer can handle the physical media used, while the other layer indicates how to actually transmit data over the network.
31) what is the purpose of shielded cables with twisted pair?
Its main purpose is to prevent crosstalk. Crosstalk is electromagnetic interference or noise that may affect data transmitted over a cable.
32) what are the advantages of address sharing?
Address sharing provides inherent security advantages by using address translation instead of routing. This is because hosts on the Internet can only see the public IP address of the external interface on the computer that provides address translation, not the private IP address on the internal network.
33) what is MAC address?
MAC or media access control can uniquely identify devices on the network. It is also known as a physical address or Ethernet address. The MAC address consists of 6 bytes.
34) in terms of the OSI reference model, what is the equivalent layer or multiple layers of the TCP/IP application layer?
The TCP/IP application layer actually has three peers on the OSI model: the session layer, the presentation layer and the application layer.
35) how do I identify the IP class for a given IP address?
By looking at the first octet of any given IP address, you can tell whether it is class A, class B, or class C. If the first octet begins with a 0 bit, the address is Class A. If it starts with bit 10, the address is a Class B address. If it starts at 110, then it is a Class C network.
36) what is the main purpose of OSPF?
OSPF, or Open shortest path first, is a link-state routing protocol that uses routing tables to determine the best path for data exchange.
37) what is a firewall?
Firewalls are used to protect the internal network from external attacks. These external threats may be those who want to steal data or computer viruses that can be eliminated immediately. It also prevents other users from external networks from accessing the private network.
38) describe the star topology
A star topology consists of a central hub connected to a node. This is one of the easiest to set up and maintain.
39) what is a gateway?
The gateway provides a connection between two or more network segments. It is usually a computer that runs gateway software and provides translation services. This translation is the key to allowing different systems to communicate on the network.
40) what are the disadvantages of a star topology?
One of the main disadvantages of a star topology is that once a central hub or switch is damaged, the entire network becomes unavailable.
41) what is SLIP?
The SLIP or serial line interface protocol is actually an old protocol developed in the early days of UNIX. This is one of the protocols used for remote access.
42) give some examples of private network addresses.
10.0.0.0 with a subnet mask of 255.0.0.0
172.16.0.0 with a subnet mask of 255.240.0.0
192.168.0.0 with a subnet mask of 255.255.0.0
43) what is tracert?
Tracert is a Windows utility that can be used to track the route of data collection from the router to the target network. It also shows the number of hops used throughout the transport routing.
44) what is the function of a network administrator?
Network administrators have many responsibilities, which can be summarized into three key functions: installing the network, configuring network settings, and maintaining / troubleshooting the network.
45) describe a disadvantage of peer-to-peer networks.
When you are accessing a resource that is shared by a workstation on the network, the performance of that workstation degrades.
46) what is a hybrid network?
A hybrid network is a network setup that utilizes client-server and peer-to-peer architectures.
47) what is DHCP?
DHCP is an abbreviation for dynamic host configuration protocol. Its main task is to automatically assign IP addresses to devices on the network. It first checks the next available address that is not already occupied by any device, and then assigns it to the network device.
48) what is the main job of ARP?
The main task of ARP or address resolution protocol is to map known IP addresses to MAC layer addresses.
49) what is TCP/IP?
TCP/IP is the abbreviation of Transmission Control Protocol / Internet Protocol. This is a set of protocol layers designed to exchange data over different types of computer networks (also known as heterogeneous networks).
50) how can a router be used to manage a network?
The router has a built-in console that allows you to configure different settings, such as security and data logging. You can assign restrictions to your computer, such as the resources you are allowed to access, or you can browse the Internet at a specific time of day. You can even impose restrictions on sites that are not visible throughout the network.
51) what protocol can be applied when you want to transfer files between different platforms, such as UNIX systems and Windows servers?
Use FTP (File transfer Protocol) to transfer files between these different servers. This is possible because FTP is platform independent.
52) what is the use of the default gateway?
The default gateway provides a way for the local network to connect to the external network. The default gateway used to connect to an external network is usually the address of the port of the external router.
53) one way to protect the network is to use a password. What can be considered a good password?
A good password consists not only of letters, but also of letters and numbers. Passwords that combine uppercase and lowercase letters are better than passwords that use all uppercase letters or all lowercase letters. Passwords must not be easily guessed, such as dates, names, favorites, etc.
54) what is the correct termination rate for UTP cables?
The normal termination of an unshielded twisted pair cable is 100 ohms.
55) what is netstat?
Netstat is a command line utility. It provides useful information about the connection's current TCP/IP settings.
56) what is the number of network ID in a Class C network?
For Class C networks, the number of network ID bits available is 21. The number of possible network ID is 2, increasing to 21 or 2097152. The number of host ID per network ID is 2, increasing to 8 minus 2, or 254.
57) what happens when a cable longer than the specified length is used?
Too long cable can lead to signal loss. This means that data transmission and reception will be affected because of the decrease in signal length.
58) what common software problems can lead to network defects?
Software-related issues can be any of the following or a combination of them:
-client server issu
-Application conflicts
-configuration error
-Protocol mismatch
-Security issues
-user policies and rights issues
59) what is ICMP?
ICMP is the Internet control message protocol. It provides messaging and communication for protocols in the TCP/IP protocol stack. This is also a protocol for managing error messages used by network tools such as PING.
60) what is Ping?
Ping is a utility that allows you to check connections between network devices on a network. You can use its IP address or device name, such as the computer name, to ping the device.
61) what is peer-to-peer (P2P)?
A peer is a network that does not reply on the server. All PC on this network are separate workstations.
62) what is DNS?
DNS is the domain name system. The main function of this network service is to provide hostname for TCP/IP address resolution.
63) what are the advantages of optical fiber over other media?
One of the main advantages of optical fiber is that it is less vulnerable to electrical interference. It also supports higher bandwidth, which means that more data can be sent and received. The degradation of long-distance signals is also very small.
64) what is the difference between a hub and a switch?
The hub acts as a multi-port repeater. However, as more and more devices are connected to it, it will not be able to effectively manage the traffic through it. The switch provides a better alternative to improve performance, especially when high traffic is expected on all ports.
65) what are the different network protocols supported by Windows RRAS services?
Three main network protocols are supported: NetBEUI,TCP/IP and IPX.
66) what are the largest networks and hosts in Class B and C networks?
For Class A, there are 126 possible networks and 16777214 hosts
For category B, there are 16384 possible networks and 65534 hosts
For Class C, there are 2097152 possible networks and 254hosts
67) what is the standard color sequence for straight-through cables?
Orange / white, green / white, blue, blue / white, green, brown / white, brown.
68) what protocol falls below the application layer of the TCP/IP stack?
The following are TCP/IP application layer protocols: FTP,TFTP,Telnet and SMTP.
69) you need to connect two computers for file sharing. Is it possible to do this without using a hub or router?
Yes, you can use a cable to connect two computers together. A crossover cable can be used in this case. In this setting, the data transmission pin of one cable is connected to the data receiving pin of another cable, and vice versa.
Https://article.pchome.net/content-2101735.html
Http://www.pcpop.com/article/6067769.shtml
70) what is ipconfig?
Ipconfig is a utility commonly used to identify the address information of computers on a network. It can display physical addresses as well as IP addresses.
71) what is the difference between straight-through and crossover cables?
A straight-through cable is used to connect a computer to a switch, hub, or router. Crossover cables are used to connect two similar devices, such as PC to PC or hub to hub.
72) what is a client / server?
A client / server is a type of network in which one or more computers act as servers. The server provides a centralized repository of resources, such as printers and files. A client is a workstation that accesses the server.
73) describe the network.
Network refers to the interconnection between computers and peripherals used for data communication. A network connection can be made using a wired cable or a wireless link.
74) when a NIC card is moved from one PC to another PC, is the MAC address also transferred?
Yes, that's because the MAC address is hardwired to the NIC circuit, not PC. This also means that the PC can have a different MAC address when the NIC card is replaced by another.
75) explain clustering support
Cluster support refers to the ability of a network operating system to connect multiple servers in a fault-tolerant group. The main purpose of this is that in the event of a server failure, the next server in the cluster will continue with all processing.
76) where is the best place to install antivirus programs in a network of two servers and twenty workstations?
Antivirus programs must be installed on all servers and workstations to ensure protection. This is because individual users can access any workstation and introduce computer viruses when inserting removable hard drives or flash drives.
77) describe Ethernet.
Ethernet is one of the popular network technologies used today. It was developed in the early 1970s and is based on the specifications specified in IEEE. Ethernet is used in the local area network.
78) what are the disadvantages of implementing a ring topology?
If a workstation on the network fails, it may result in the loss of the entire network. Another disadvantage is that when adjustments and reconfigurations are required in specific parts of the network, the entire network must also be temporarily shut down.
79) what's the difference between CSMA/CD and CSMA/CA?
CSMA/CD or collision detection, which retransmits data frames whenever a collision occurs. CSMA/CA or collision avoidance will first broadcast the intended transmission before the data is transmitted.
80) what is SMTP?
SMTP is an abbreviation for simple Mail transfer Protocol. The protocol handles all internal mail and provides the necessary mail delivery services on the TCP/IP protocol stack.
81) what is multicast routing?
Multicast routing is a targeted form of broadcast that sends messages to selected user groups rather than to all users on the subnet.
82) what is the importance of encryption on the network?
Encryption is the process of converting information into unreadable code. It is then translated or decrypted back to its normal readable format using a secret key or password. Encryption helps ensure that the information intercepted along the way is still unreadable because the user must have the correct password or key.
83) how do I arrange and display IP addresses?
The IP address is displayed as a series of four decimal digits separated by periods or dots. Another term for this arrangement is the dotted decimal format. One example is 192.168.101.2
84) explain the importance of certification.
Authentication is the process of verifying user credentials before they log on to the network. It is usually done with a user name and password. This provides a security means to restrict access from harmful intruders on the network.
85) what does tunnel mode mean?
This is a data exchange mode in which two communication computers themselves do not use IPSec. Instead, the gateway that connects LAN to the transit network creates a virtual tunnel that uses the IPSec protocol to protect all traffic through it.
86) what are the different technologies involved in establishing WAN links?
Analog connections-use regular telephone lines; digital connections-use digital phone lines; switched connections-use multiple sets of links between sender and receiver to move data.
87) what is one of the advantages of grid topology?
When one link fails, there is always another link available. Mesh topology is actually one of the most fault-tolerant network topologies.
88) what common hardware-related problems may occur when troubleshooting computer network problems?
Most networks are made up of hardware. Problems in these areas may include hard drive failures, NIC damage or even hardware startup. Incorrect hardware configuration is also one of the difficult problems.
89) what can be done to fix the signal attenuation problem?
A common way to deal with this problem is to use repeaters and hubs, as it will help to regenerate the signal, thereby preventing signal loss. It is also necessary to check that the cable is terminated correctly.
90) how does the dynamic host configuration protocol assist network management?
Instead of accessing each client computer to configure static IP addresses, network administrators can apply dynamic host configuration protocols to create a pool of IP addresses called ranges that can be dynamically assigned to clients.
91) explain the overview of the concept of network?
Profiles are configuration settings set for each user. For example, you can create a profile that places users in a group.
92) what is Sneakernet?
Sneakernet is considered to be the earliest form of networking, in which removable media (such as magnetic disks, tapes) are used to physically transmit data.
93) what is the role of IEEE in computer networks?
IEEE or the Institute of Electrical and Electronic Engineers is an organization of engineers who issue and manage electrical and electronic equipment standards. This includes network devices, network interfaces, cablings and connectors.
94) what are the protocols under the TCP/IP Internet layer?
There are four protocols managed at this layer. These are ICMP,IGMP,IP and ARP.
95) when it comes to the network, what is permission?
Permissions are authorizations to perform specific operations on the network. Each user on the network can assign personal permissions, depending on what the user must allow.
96) what is a basic requirement for establishing a VLAN?
A VLAN is required because there is only one broadcast domain at the switch level, which means that this information is propagated throughout the network every time a new user connects. VLAN on the switch helps create separate broadcast domains at the switch level. It is used for security purposes.
97) what is IPv6?
IPv6 or Internet protocol version 6 was developed to replace IPv4. Currently, IPv4 is being used to control Internet traffic, but IPv4 is saturated. IPv6 can overcome this limitation.
98) what is RSA algorithm?
RSA is the abbreviation of Rivest-Shamir-Adleman algorithm. It is the most commonly used public key encryption algorithm at present.
99) what is a grid topology?
A grid topology is a setting in which each device is directly connected to every other device on the network. Therefore, it requires each device to have at least two network connections.
What is the maximum segment length of the 100Base-FX network?
The maximum allowable length of a network segment using 100Base-FX is 412m. The maximum length of the whole network is 5 kilometers.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.