Digital Router

  Home  Networking  Digital Router


“Digital Router based Frequently Asked Questions by expert members with experience as Digital Router. These questions and answers will help you strengthen your technical skills, prepare for the new job test and quickly revise the concepts”



78 Digital Router Questions And Answers

41⟩ Fresh Digital Router Based Interview Questions

☛ What is a matrix?

☛ What equipment do I need in order to be able to access Broadband?

☛ What is a Broadband modem?

☛ How can I connect several computers to the Internet with Global Telecom Broadband?

☛ What is Broadband?

☛ What is the procedure if I want to upgrade my Broadband account to a faster speed?

☛ Who can I contact if I continue having problems with my Broadband service?

☛ What are the terms and conditions of using Global Telecom Broadband?

☛ Explain how the signal is amplified in fiber optic cable?

☛ What is BTS?

☛ What are its different configurations of BTS and what is the power consumption/peak current for each of these types of BTS?

☛ Write very briefly the underlining functional concept of GSM and CDMA?

☛ What is Bridging?

☛ Difference between Router and Switch.

☛ What are the different Types of polling in RLC A.M mode?

☛ What information is passed between cell FACH and cell DCH states?

☛ Why the main function of BTS is to air interface signaling?

☛ What is TTCN-3?

☛ What is the difference between Rx Lev Sub and Rx Lev Full? What you mean by Link Budget?

☛ Explain different types of digital modulation techniques.

 201 views

42⟩ Basic Digital Router Related Interview Questions

☛ What is ISUP protocol?

☛ Why CPG message is required in ISUP protocol?

☛ If RF power is good then what is the best Rx and Tx power?

☛ What do you mean by TSCM?

☛ Which frequency is used in voice sampling?

☛ What is SS-7 signaling system?

☛ Where memory is allocated for variables in a program?

☛ What are various statuses of kernel?

☛ What is the maximum decimal place which can be accommodated in a byte?

☛ How personal computer can act as terminal?

☛ How connection is established in Datagram?

☛ What is the time for 1 satellite hop in voice communication?

☛ What is the maximum number of satellite hops allowed in voice communication?

☛ How many channels a 2MB PCM (pulse code modulation) has?

☛ What action is taken when the processor under execution is interrupted by a non-mask able interrupt?

☛ How much voltage is required in subscriber loop connected to local exchange?

☛ How many T1 facilities the company needs between its office and the PSTN if it has 47 digital telephones, each operating at 64kbps?

☛ What is the type of signaling used between two exchanges?

☛ Where conditional results after execution of an instruction in a micro processor are stored?

☛ What is line of sight?

☛ Why can I get the 512k service but not the 1Mb or 8Mb Broadband service?

☛ What is Buffering?

 197 views

43⟩ Digital Router Based General Interview Questions

☛ What is the maximum Tx configuration for GSM? How it can be managed?

☛ What is the functionality of search window in CDMA? What is the difference between Ec/Io and Eb/No?

☛ What is Blackberry?

☛ Why Rx power in microwave not considered less then -30dn?

☛ What is FCC and how does it relate to Bluetooth?

☛ How does Bluetooth use frequency hopping for security?

☛ What is a Bluetooth dongle?

☛ Which Bluetooth version uses adaptive frequency hopping?

☛ Which company originally conceived and developed Bluetooth?

☛ What is the total number of masters and slaves in a piconet?

☛ What is the frequency range used for Bluetooth in Europe and United States?

☛ Why is walse code used?

☛ Which technology is used in Bluetooth for avoiding interference?

☛ What is the difference between Internet and ISDN?

☛ What is the frequency range used for Bluetooth in Japan?

☛ How many SCO links are there in a piconet?

☛ What is FEC in Bluetooth?

☛ What is the main difference between GSM & CDMA? Which is the digital modulation used today in telecommunication? (Whatever his question meant the answer was CDMA)?

☛ How do you link a T1 from the 1st BTS to 2nd BTS 4?

☛ Why can Bluetooth equipment integrate easily in TCP or IP network?

☛ What is the difference between Internet and ISDN? Is both are same or is there any specific difference?

☛ What is the different between CDU C and CDU A?

☛ What is the difference between Diplexer and Duplexer and what position?

☛ Explain LTE and GSM internetworking.

 206 views

44⟩ Tell me what are Services?

Services are programs that run in the background based on a particular system status such as startup. Services exist across nearly all modern operating systems, although vary in their naming conventions depending on the OS- for example, services are referred to as daemons in Unix/Linux-type operating systems. Services also have the ability to set up actions to be done if the program stops or is closed down. In this way, they can be configured to remain running at all times.

 185 views

45⟩ Explain what is root?

If you as a Linux admin "What is root", you may very well get the response "root, god, what's the difference?" Essentially root is THE admin, but in a Linux environment it is important to remember that unlike in a Windows environment, you spend very little time in a "privileged" mode. Many Windows programs over the years have required that the user be a local admin in order to function properly and have caused huge security issues as a result. This has changed some over the years, but it can still be difficult to remove all of the programs asking for top level permissions. A Linux user remains as a standard user nearly all the time, and only when necessary do they change their permissions to that of root or the superuser (su). sudo (literally- superuser do …) is the main way used to run one-off commands as root, or it is also possible to temporarily have a root-level bash prompt. UAC (User Account Control) is similar in theme to sudo, and like Windows Firewall can be a pain in the neck but it does do a lot of good. Both programs allow the user to engage higher-level permissions without having to log out of their current user session- a massive time saver.

 192 views

46⟩ Tell me why would you virtualize systems?

Virtual Machines have only recently come into mainstream use, however they have been around under many different names for a long time. With the massive growth of hardware outstripping software requirements, it is now possible to have a server lying dormant 90% of the time while having other older systems at max capacity. Virtualizing those systems would allow the older operating systems to be copied completely and running alongside the server operating system- allowing the use of the newer more reliable hardware without losing any information on the legacy systems. On top of this, it allows for much easier backup solutions as everything is on a single server.

 195 views

47⟩ Explain what are Strong Password Requirements?

☛ Use a minimum password length of 12 to 14 characters if permitted.

☛ Include lowercase and uppercase alphabetic characters, numbers and symbols if permitted.

☛ Generate passwords randomly where feasible.

☛ Avoid using the same password twice (eg. across multiple user accounts and/or software systems).

☛ Avoid character repetition, keyboard patterns, dictionary words, letter or number sequences, usernames, relative or pet names, romantic links (current or past) and biographical information (e.g. ID numbers, ancestors' names or dates).

☛ Avoid using information that is or might become publicly associated with the user or the account.

☛ Avoid using information that the user's colleagues and/or acquaintances might know to be associated with the user.

☛ Do not use passwords which consist wholly of any simple combination of the aforementioned weak components.

 189 views

49⟩ How does VoIP (voice over Internet protocol) work? What makes it different from traditional phone service?

In VoIP, phone conversations are converted to packets that flit all over the Internet or private networks, just like e-mails or Web pages, though voice packets get priority status. The packets get reassembled and converted to sound on the other end of the call but in traditional phone service, a phone conversation is converted into electronic signals that traverse an elaborate network of switches, in a dedicated circuit that lasts the duration of a call.

 234 views

50⟩ Tell me what are the differences between PowerShell, Command Prompt and Bash?

At a very basic level, there really isn't one. As you progress up the chain however, you start to realize that there actually are a lot of differences in the power available to users (and admins) depending on how much you know about the different interfaces. Each of these utilities is a CLI- Command Line Interface- that allows for direct access to some of the most powerful utilities and settings in their respective operating systems. Command Prompt (cmd) is a Windows utility based very heavily on DOS commands, but has been updated over the years with different options such as long filename support. Bash (short for Bourne-Again Shell) on the other hand is the primary means of managing Unix/Linux operating systems and has a great deal more power than many of its GUI counterparts. Any Windows user that is used to cmd will recognize some of the commands due to the fact that DOS was heavily inspired by Unix and thus many commands have versions that exist in Bash. That being said, they may not be the best ones to use; for example while list contents (dir) exists in Bash, the recommended method would be to use list (ls) as it allows for much easier-to-understand formatting. Powershell, a newer Windows Utility, can be considered a hybrid of these two systems- allowing for the legacy tools of the command prompt with some of the much more powerful scripting functions of Bash.

 215 views

51⟩ Explain different types of connector used in LAN?

☛ RJ-11 ( Registered Jack-11) a four- or six-wire connector primarily used to connect telephone equipment.

☛ RJ-45 (Registered Jack-45) connector is an eight-wire connector that is commonly used to connect computers to a local area network (LAN), particularly Ethernet LANs.

☛ AUI( Attachment Unit Interface.) is the part of the Ethernet standard that specifies how a Thicknet cable is to be connected to an Ethernet card. AUI specifies a coaxial cable connected to a transceiver that plugs into a 15-pin socket on the network interface card (NIC).

☛ BNC stand for British Naval Connector (or Bayonet Nut Connector or Bayonet Neill Concelman)a type of connector used with coaxial cables such as RG-58.BNC connectors are used on both Thicknet and Thinnet.

 204 views

52⟩ Explain what is ICMP?

ICMP is the Internet Control Message Protocol. Most users will recognize the name through the use of tools such as ping and traceroute, as this is the protocol that these services run over among other things. Its primary purpose is to tell systems when they are trying to connect remotely if the other end is available. Like TCP and UDP, it is a part of the IP suite and uses IP port number 1. Please note, this is not TCP port 1 or UDP port 1 as this is a different numbering scheme that for reference can be located here (For your reference, TCP uses IP port 6, while UDP uses IP port 17). That being said, different functions of ICMP use specific ports on TCP and UDP. For example, the 'echo' portion of ping (the part where someone else is able to ping you) uses TCP port 7.

 180 views

53⟩ Explain what is the difference between a Workgroup and a Domain?

A workgroup is a collection of systems each with their own rules and local user logins tied to that particular system. A Domain is a collection of systems with a centralized authentication server that tells them what the rules are. While workgroups work effectively in small numbers, once you pass a relatively low threshold (usually anything more than say 5 systems), it becomes increasingly difficult to manage permissions and sharing effectively. To put this another way, a workgroup is very similar to a P2P network- each member is its own island and chooses what it decides to share with the rest of the network. Domains on the other hand are much more like a standard client/server relationship- the individual members of the domain connect to a central server which handles the heavy lifting and standardization of sharing and access permissions.

 229 views

54⟩ Explain what is the difference between Single Mode and Multimode Fiber?

The simple answer is that Multimode is cheaper but can't transmit as far. Single Mode has a smaller core (the part that handles light) than Multimode, but is better at keeping the light intact. This allows it to travel greater distances and at higher bandwidths than Multimode. The problem is that the requirements for Single Mode are very specific and as a result it usually is more expensive than Multimode. Therefore for applications, you will usually see Multimode in the datacenter with Single Mode for long-haul connections.

 209 views

55⟩ Tell me what is SNMP?

SNMP is the "Simple Network Management Protocol". Most systems and devices on a network are able to tell when they are having issues and present them to the user through either prompts or displays directly on the device. For administrators unfortunately, it can be difficult to tell when there is a problem unless the user calls them over. On devices that have SNMP enabled however, this information can be broadcast and picked up by programs that know what to look for. In this way, reports can be run based on the current status of the network, find out what patches are current not installed, if a printer is jammed, etc. In large networks this is a requirement, but in any size network it can serve as a resource to see how the network is fairing and give a baseline of what its current health is.

 204 views

56⟩ Explain what is a Proxy Server?

Similar to how a DNS server caches the addresses of accessed websites, a proxy server caches the contents of those websites and handles the heavy lifting of access and retrieval for users. Proxy servers can also maintain a list of blacklisted and whitelisted websites so as to prevent users from getting easily preventable infections. Depending on the intentions of the company, Proxy servers can also be used for monitoring web activity by users to make sure that sensitive information is not leaving the building. Proxy servers also exist as Web Proxy servers, allowing users to either not reveal their true access point to websites they are accessing and/or getting around region blocking.

 214 views

57⟩ Tell me what does it mean when you receive an NTFS Error 5?

Error 5 is very common when dealing with files and directories that have very specific permissions. When trying to copy elements from areas that have restricted permissions, or when trying to copy files to an area that has restricted permissions, you may get this error which basically means "Access denied". Checking out permissions, making sure that you have the appropriate permissions to both the source and destination locations, and making yourself the owner of those files can help to resolve this issue. Just remember that if you are not intended to be able to view these files to return the permissions back to normal once you are finished.

 207 views

58⟩ Explain what is SSH and what port does it use?

SSH or Secure Shell is most well known by Linux users, but has a great deal that it can be used for. SSH is designed to create a secure tunnel between devices, whether that be systems, switches, thermostats, toasters, etc. SSH also has a unique ability to tunnel other programs through it, similar in concept to a VPN so even insecure programs or programs running across unsecure connections can be used in a secure state if configured correctly. SSH runs over TCP port 22.

 187 views

59⟩ Tell me what are the differences between Local, Global and Universal Groups?

☛ A domain local group is a security or distribution group that can contain universal groups, global groups, other domain local groups from its own domain, and accounts from any domain in the forest. You can give domain local security groups rights and permissions on resources that reside only in the same domain where the domain local group is located.

☛ A global group is a group that can be used in its own domain, in member servers and in workstations of the domain, and in trusting domains. In all those locations, you can give a global group rights and permissions and the global group can become a member of local groups. However, a global group can contain user accounts that are only from its own domain.

☛ A universal group is a security or distribution group that contains users, groups, and computers from any domain in its forest as members. You can give universal security groups rights and permissions on resources in any domain in the forest. Universal groups are not supported.

 179 views

60⟩ Tell me what is a Firewall?

A Firewall put simply keeps stuff from here talking to stuff over there. Firewalls exist in many different possible configurations with both hardware and software options as well as network and host varieties. Most of the general user base had their first introduction to Firewalls when Windows XP SP2 came along with Windows Firewall installed. This came with a lot of headaches, but to Microsoft's credit it did a lot of good things. Over the years it has improved a great deal and while there are still many options that go above and beyond what it does, what Windows Firewall accomplishes it does very well. Enhanced server-grade versions have been released as well, and have a great deal of customization available to the admin.

 205 views