Contents of Book - The Power of IT Jobs
Contents of Book - The Power of IT Jobs
Contents of Book - The Power of IT Jobs
Network------------------------------------------------------------- 11-142
i
Modem,Multiplexer,NIC,Network Operating System,Peer-to-Peer,
Point-to-Point,ping,RAID,Repeater,RJ-45---------------------------------------------------- 18
Router,SCSI,Segment,Sneaker-Net,Star Topology,Terminator,
Thicknet ,Thinnet,Token------------------------------------------------------------------------ 19
USB,WAN,IPv4, IPv6----------------------------------------------------------------------------- 20
Wireless Networks--------------------------------------------------------------------------- 21-22
IEEE 802.15 ,IEEE 802.16,GSM,802.11a,802.11b,802.11g,
Wireless Access Point,Wireless NIC,VSAT--------------------------------------------------- 21
Types of threats, attacks--------------------------------------------------------------------- 22-23
White hat,Hacker,Black hat,Cracker,Phreaker,Spammer,Phisher---------------------- 22
Computer Crime,Threats to Physical Infrastructure,Network Attacks--------------- 23
Encryption algorithms----------------------------------------------------------------------- 23-24
DES,3DES,AES,RSA------------------------------------------------------------------------------- 23-24
Subnetting--------------------------------------------------------------------------------------- 25
Variable Length Subnet Masking-------------------------------------------------------------- 27
Questions and Answers----------------------------------------------------------- 28-64
Network, Link------------------------------------------------------------------------------------ 28
Node,gateway,point-point,Multiple Access, Distributed,Processing,effective
and efficient network,performance,reliability---------------------------------------------- 29
Protocol, key design,Routing,Dynamic Routing,routing Protocols-------------------- 30
Routing Protocols Classification, peer-peer, switch congested----------------------- 30
Semantic gap,Round Trip Time,Multiccasting and Broadcasting,
OSI layers,OSI Vs TCP/IP----------------------------------------------------------------------- 31
Responsibilities OSI layer----------------------------------------------------------------------- 32-33
Link types,types of errors,Error Detection,Redundancy,VRC,LRC---------------------- 33
CRC,Checksum,Error Detection and Error Correction,Data Words,
Code Words,Cyclic Codes,Encoder------------------------------------------------------------ 34
Decoder,Framing, Stuffing,Error Control,ARQ,Stop-and-Wait-------------------------- 35
Relaible Transmission,Sliding Window,Piggy Backing,SAP,triple X,
Beaconing,redirector,passive topology------------------------------------------------------ 36
Brouter,point-to-point,MAC,Project 802,Protocol Data Unit---------------------------- 37
ICMP,TCP/IP protocol,classes of internet addresses------------------------------------- 38
TFTP and FTP,types of networks,important topologies,5-4-3 rule,
MAU,routable and non- routable protocols------------------------------------------------- 39
logical link,virtual channel,virtual path,packet filter, traffic shaping,
multicast routing,multicast protocol--------------------------------------------------------- 40
Multicasting,region,syndrome,Digrams and Trigrams,IDEA,
Wide-mouth frog,Mail Gateway,EGP,autonomous system,BGP------------------------ 41
Gateway-to-Gateway,NVT,Multi-homed Host,Kerberos,OSPF,Proxy ARP,
SLIP,RIP,source route,MAC Address---------------------------------------------------------- 42
MAC vs. IP,IP address,Private,Public Address,Static and Dynamic IP,
Network Address Translation,subnet-------------------------------------------------------- 43
Subneting,PING,Data encryption,Public Key Encryption,Digital
Signatures,Ethernet technology,IGMP protocol-------------------------------------------- 44
TCP / IP protocol,UDP protocol,TCP windowing,HTTP,NNTP-------------------------- 45
CSMA and CD,NetBIOS,Application layer,different kinds of network,
Ring, Bus and Star topology------------------------------------------------------------------- 46-47
ii
7 Layers of OSI------------------------------------------------------------------------------------ 47
Router,routing,route a packet,Static Routing,
Default and Dynamic Routing----------------------------------------------------------------- 48
Routing Protocol,classes of routing protocols,internet routing,
Routing Loops------------------------------------------------------------------------------------- 49
OSPF features,RIPv1 and RIPv2, IGRP and RIP,neighbourship EIGRP----------------- 50
Switching,Spanning Tree------------------------------------------------------------------------ 51
RIP and IGRP same network,MAC address not table-------------------------------------- 52
Denial of Service,Brute Force Attacks,RSA authentication,encoding,
encryption and hashing------------------------------------------------------------------------- 53
Hash function,Physical and Digital Signature,Authentication Header,
SSL Protocol,TFTP and FTP--------------------------------------------------------------------- 54
Bit and baud rate,NETBIOS and NETBEUI,ARP and RARP,POP3,SNMP--------------- 55
Transaction server,Message Oriented Middleware,TP-Lite and
TP-Heavy,Intranet and the Internet,FTP,DNS--------------------------------------------- 56
DNS,Telnet,SMTP,Spanning-Tree,VPN,types of VPN------------------------------------ 57
Address Resolution Protocol,structure and use of internet addresses,
APN,VPN and APN------------------------------------------------------------------------------- 58-59
Names translated IP,broadcast domain------------------------------------------------------ 59
Bridge vs switch,gateway,firewall,Distance Vector Routing----------------------------- 60
Trusted and Untrusted Networks,Tunneling,voluntary and
Compulsory tunnels,static and dynamic tunnel, RTP,RTP------------------------------- 61
RTP and RTCP,RTP and RTCP packets,RTCP header,socket----------------------------- 62
Datagram vs. stream,stream socket,SSL,TCP Socket classes,race
Condition,Symmentric Multiprocessing----------------------------------------------------- 63
Objective Questions-------------------------------------------------------------------------- 64-83
iii
CDMA in wireless,Bandwidth and Latency,types of Multiplexing,Physical
And Digital Signature,Symmetric and Asymmetric-Key cryptography--------------- 95
Design goals of ATM,data communication,data exchange,Simplex,half-duplex 96
Duplex,analog and digital signals,Nyquist Theorem,Aliasing effect------------------- 97
Pulse amplitude,sampling,multiplexing,Classify of multiplexing----------------------- 98
FDM,WDM,TDM,Synchronous TDM----------------------------------------------------------- 99
Asynchronous,Synchronous,Transmission media,categories Of Transmission
media,attenuation------------------------------------------------------------------------------- 100
Retransmission,communication and transmission,hamming code,CSMA,bit rate
and baud rate,Bandwidth,baseband,And broadband transmission,Bluetooth---- 101
Fiber Optics,Optical fibers types,Single and Multi-mode fibers------------------------ 102
Fiber Optics------------------------------------------------------------------------------------- 102
Optical fiber,multimode fiber,singlemode,AV signal transmitted,light-emitting
diode,Laser diode,VCSEL,photodetector,wavelengths single & multimode fiber--- 103
Pure ALOHA and Slotted Aloha---------------------------------------------------------------- 104
iv
Decapsulation, interfaces GSM,standards 3G, 4G mean,4G services,4G vs 3G------
4G voice calls,Wi-Fi router and 4G,HSPA+ or 3.5G--------------------------------------- 127
Objective Questions--------------------------------------------------------------------------- 127-129
Software------------------------------------------------------------- 143-284
v
String concatenation without using strcat-------------------------------------------------- 156
Sum of series 1 + 2 + . + n,sum of series 1^3 + 2^3 + . + n^3----------------------- 157
Find largest and smallest number------------------------------------------------------------ 158
Bubble sort,concatenation two string using pointer-------------------------------------- 159
Linear search,binary search------------------------------------------------------------------- 160
Takes password from user,Palindrome without using string function--------------- 161
Programming Test----------------------------------------------------------------------------- 162-193
vi
Linear search,Inserting & Delete into a Linear Array------------------------------------ 236
Algorithm defination,problem types,Efficiency classes,algorithm
Design,time complexity------------------------------------------------------------------------- 237
Recursive call,efficiency,characteristics----------------------------------------------------- 238
Pseudocode, flow chart,iterative function to fine sum------------------------------------ 239
Divide and conquer,Quick sort,Iterative binary search---------------------------------- 240
Knapsack---------------------------------------------------------------------------------------- 240
Live node,E node,dead node,8Queens,chromatic number,planar graph,NP-
hard and Np-Complete,Knapsack problem,traveling salesperson---------------------- 241
Class P and NP,NP-Hard and NP-Complete-------------------------------------------------- 242
vii
Questions and Answers---------------------------------------------------------------------- 278-282
Basic functions OS,paging used,virtual memory,Throughput,Turnaround,
Waiting and Response time,multi tasking, multi programming,Multithreading----- 278
Physical Vs logical address,swapping,DRAM----------------------------------------------- 279
Dispatcher,CPU Scheduler,cache memory,Safe State and deadlock avoidance,
Semaphore,Coffman's conditions----------------------------------------------------------- 280
Short-long and medium-term scheduling, turnaround & response time,TLB
System in safe,busy waiting,rendezvous,latency, transfer and seek time------------- 281
Demand- and pre-paging,mutant------------------------------------------------------------- 282
Redhat Important Directories and Commands------------------------------------- 282-284
Hardware----------------------------------------------------------- 285-348
viii
Configuring FPGA,Uses of reconfigurable--------------------------------------------------- 311
Why reconfigure relevant these days, technology overview---------------------------- 312
Hardware programming languages (Verilog)--------------------------------------------- 313
Board----------------------------------------------------------------------------------------------- 313
High-level synthesis languages,Algorithm acceleration-------------------------------- 314
(SoC)/ASIC,HDL,C and Verilog---------------------------------------------------------------- 315
Advantage of HDL over Schematic based Design,Examples of HDL------------------- 316
ix
Epitaxy,lithography,fabrication,masking,etching--------------------------------------
Ion-Implantation,Silicon wafer,oxidation,types of CMOS,Channel-stop,
LOCOS,SWAMI,LDD,Twin-tub----------------------------------------------------------------- 343
Insulator,SOI process---------------------------------------------------------------------------- 344
BiCMOS,interconnect,Silicide,Polycide,Stick diagram,bipolar technologies---------- 345
Threshold,Body effect,Channel-length,Latchup,demarcation,
Layout design,LVS and DRL tools------------------------------------------------------------ 346
Instance,flat cell,primitive library,Hierarchy,MOSFETs instead of BJTs--------------- 347
Body effect,Cross-sectional of CMOS--------------------------------------------------------- 348