I have worked on Cisco Nexus 9000 and Brocade 3250 fabric switches.
Parallel communication transmits multiple bits of data simultaneously over multiple channels, while serial communication sends data one bit at a time over a single channel.
In parallel communication data is transfered parallely
ex:1
0
0
1
in parallel communication each bit requires separate path
that means for example when we transfer data from source to
destination in single wire but in parallel communication
each bit require separate wire.so cost is very high
In serial communication data is transfered serialy
ex: 0 1 1 0 1
it requires single wire to transmit all the data.
TO CONIFIGURE STARTUP APPLICATION & BOOTING OPTIONS SUCH AS OS
PRIORITY, TIME FOR BOOTING.
msconfig is used to saw,which drive u havg the os in your system.
just uncheck the proxy box from internet option and check
the automatic detect setting.
When two consecutive ports of a switch are connected using a crossover cable, it creates a loop in the network. This can lead to a broadcast storm, causing the switch to become overwhelmed with traffic, which can ultimately bring down the entire network.
A network is a collection of interconnected devices that can communicate with each other, while networking refers to the process of connecting those devices and managing the communication between them.
Network is only infrastructure and networking is the
functions that help to maintain the infrastructure in a
more effective way with equipments like router, switch, hub
etc...
Active Directory provides centralized management of users, computers, and resources in a network, enabling secure authentication, access control, and efficient organization of network resources.
• Increasing the Productivity of Users
• Reducing the Burden of IT Administration
• Improving Fault Tolerance to Minimize Downtime
• Enhancing Security to Provide Better Peace of Mind
• Leveraging the Capabilities of Active Directory-enabled
Applications
You can use the command `netstat -tuln` to check how many port numbers are running with their specific protocols in a Linux PC.
To set permissions using ACL in numeric mode, you can use the `setfacl` command with the `-m` option followed by the numeric representation of the permissions. For example:
```
setfacl -m u:username:rw- filename
```
In numeric mode, you specify the permissions as a three-digit octal number, where each digit represents the permissions for the owner, group, and others. For example, to give read and write permissions to the user and read permission to the group and others, you would use:
```
setfacl -m u:username:664 filename
```
Note: ACLs typically use symbolic notation, and numeric mode is not standard for ACLs like it is for traditional Unix permissions.
i know by using setfacl -m u:tom:rwx,g:salesgrp:rx fabc.txt
by using setfacl -m u:tom:755 fabc.txt
I have used VERTAS backup software to manage and automate data backups, ensuring data integrity and quick recovery options. My experience includes configuring backup schedules, monitoring backup jobs, and troubleshooting any issues that arise during the backup process.
In OSPF, the process ID is used to identify the OSPF routing process on a router. It is a locally significant identifier that allows multiple OSPF instances to run on the same router. Each OSPF process can have its own configuration and routing table, and the process ID is specified when enabling OSPF with the command `router ospf [process-id]`.
To create dynamic users on a simple Asterisk server for extension-based communication, follow these steps:
1. **Edit `sip.conf`:** Add a section for each dynamic user with the following format:
```
[user1]
type=friend
secret=password1
host=dynamic
context=default
```
2. **Edit `extensions.conf`:** Define the context for the extensions:
```
[default]
exten => _X.,1,Answer()
exten => _X.,n,Playback(hello)
exten => _X.,n,Hangup()
```
3. **Reload Asterisk:** Use the command `asterisk -rx "reload"` to apply the changes.
4. **Register Users:** Have users register with the Asterisk server using their credentials.
This setup allows users to register dynamically and use the defined extensions.
Different topologies in networking refer to the arrangement or layout of devices and connections in a network. Common types include:
1. **Bus Topology**: All devices share a single communication line.
2. **Star Topology**: All devices connect to a central hub or switch.
3. **Ring Topology**: Devices are connected in a circular format, with each device connected to two others.
4. **Mesh Topology**: Devices are interconnected, allowing multiple paths for data.
5. **Tree Topology**: A combination of star and bus topologies, with a hierarchical structure.
Each topology has its own advantages and disadvantages regarding performance, scalability, and fault tolerance.
Topology means arrangement and design the network.
different topology are single mode topology, bus topology,
star topology,ring topology, dual ring topology, tree
topology and mess topology.
topology is the way by which we design a network
usually there are three types of topologies:-
1. ring topology
2. bus topology
3. star topology
4. mesh topology
5. tree topology
IP address for to communicate with any other systems with in
the network or inter networks and to find the systems in large
networks.ip protocol for to enable the ip addressing for to
communicating systems or resources.THE COMPUTERS not
understand any languages only it understands by using only
port numbers.these port numbers allocated for each every
protocol.
internet protocol
Data link layer iz divided mac layer and LLC layer.
This LLC LAYER is form for NOVELL AND IPX protocol.
For ip protocol we ve SRC ADDRESS and DEST ADDR(for
communication),but wen we uses IPX/NOVELL protocol the
frame include 1 more byte named "don know"(through which
communication happens @ 2nd layer)....(inshort to
communicate wid IP and IPX/NOVELL we form LLC layer.)
Initially 802.3 doesn't support multiple upper layer protocol
e.g. IP,IPx,AppleTalk etc. But as need arise to support
multiple upper layer protocol, Ethernets L2(Data Link)
broken into Two Parts....<1> LLC <2> MAC
<1> LLC introduced a additional field in ethernet frame to
distinguished between multiple upper layer protocol
802.3 uses S_SAP and D_SAP to identify multiple upper layer
protocol.
A). INCREASE DATE REDUNDONCY.
B).INTERGRATION OF DATA.
C).IMPROVED IN SECURITY.
D).ACHIEVING DATA INDEPENDENCE,
The Networking category on takluu.com is designed for candidates preparing for technical interviews that focus on the principles, protocols, and technologies behind computer networks. Networking knowledge is crucial for roles such as Network Engineer, System Administrator, Security Analyst, and IT Support.
This category covers fundamental and advanced topics including OSI and TCP/IP models, IP addressing and subnetting, routing and switching, network protocols (HTTP, FTP, DNS, DHCP), wireless technologies, and network security. Interview questions also often address firewalls, VPNs, VLANs, NAT, load balancing, and troubleshooting techniques.
Candidates will gain insights into configuring network devices, understanding communication between hardware components, and securing networks against threats. The section also covers emerging trends such as software-defined networking (SDN), cloud networking, and network automation.
Interviewers evaluate your ability to design, implement, and troubleshoot networks efficiently. Scenario-based questions may include diagnosing connectivity issues, optimizing network performance, or configuring secure remote access.
Whether you’re preparing for entry-level or senior networking roles, this category provides comprehensive study material, practical examples, and real-world interview questions to build your confidence and technical expertise.
At Takluu, we focus on blending theory with hands-on knowledge, helping you master networking concepts and succeed in your career.