Monday, 29 July 2013

Network Interview Question and Answer - Set 4

Question 31 : What is Etherchannel and purpose?

Answer : Etherchannel is a bunch of links (at least 2) bundled together to have more throughput, more bandwidth. so if u have 2 trunk links between switches A and B, STP will block one of those. if u put those 2 links inside of a etherchannel, STP will not block any links.  Think of etherchannel as "fat" multilink ; and one link in case of STP.
redundancy - if one of links fails inside of etherchannel, etherchannel is still up up;it does not even go down and up; STP cost will change and STP may re-calculate path to root.
reliability -same as above when one of many link fails, etherchannel is still up
bettwer throughput, more bandwidth - if u bandle 4 links of 100Mbps per one link, in full duplex -I think- u get 800Mbps of throughput/bandwidth.
and yes for trunks; etherchannels are trunks.  in addition to L2, there are also Layer 3 etherchannels (one with Ip address assigned per etherchannel)



Question 32 : How to avoid this error " Translating"?

Example : Switch>
Switch>blah
Translating "blah"...domain server (255.255.255.255)
Answer : Hold down the keys, together: Ctrl+Shift+6
To avoid the problem in the future, use the configuration command of:
no ip domain lookup



Question 33 :NAT Translation debug?  what the "*" next to the second and remaining "NAT" lines means ?

Example : 
05:32:23: NAT: s=10.10.50.4->172.16.11.70, d=172.16.11.7 [70]
05:32:23: NAT*: s=172.16.11.7, d=172.16.11.70->10.10.50.4 [70]
05:32:25: NAT*: s=10.10.50.4->172.16.11.70, d=172.16.11.7 [71]
05:32:25: NAT*: s=172.16.11.7, d=172.16.11.70->10.10.50.4 [71]
05:32:27: NAT*: s=10.10.50.4->172.16.11.70, d=172.16.11.7 [72]
05:32:27: NAT*: s=172.16.11.7, d=172.16.11.70->10.10.50.4 [72]
Answer : An  asterisk (*) indicates that the translation is occurring in the fast  path. The first packet in a conversation always goes through the slow  path (that is, it is process switched). The remaining packets go through  the fast path if a cache entry exists.



Question 34 : What does ip subnet-zero command do?

Example : 50.0.0.0/10
Possible subnets are:
50.0000 0000.x.x (first subnet)
50.0100 0000.x.x
50.1000 0000.x.x
50.1100 0000.x.x (last subnet)
Answer :  It was not allowed to use the all 00 (the first subnet above, also called "subnet zero") subnet, as the subnet bits were all zeros.  In that same thinking, it was not allowed to assign last subnet, were all 1's.
The "subnet-zero" command really should be called: "Go ahead and use the all zeros and all ones subnets (first and last)".
The subnet-zero would allow 4 subnets above to be used instead of just 2.   This command is the default on current IOS, and doesn't need to be added to the configuration.
Here is an example.  Without the use of the subnet-zero, it won't allow us to assign an IP address in the first subnet (subnet zero):
R1(config)#no ip subnet-zero
R1(config)#int loopback 1
R1(config-if)#ip address 50.0.0.1 255.192.0.0
Bad mask /10 for address 50.0.0.1
If we add the subnet-zero command back into the configuration, now it allows an IP address to be assigned from that subnet:
R1(config)#ip subnet-zero
R1(config)#int loopback 1
R1(config-if)#ip address 50.0.0.1 255.192.0.0



Question 35 : What are the Security threats and Examples?

Two Types
i. outside the network
ii. inside the network
The threats from inside the network are:
  • abuse of user rights
  • authentication and authorization issues
  • information leakage to unauthorized people
Threats from the internet, outside our network:
  • spam and phishing messages
  • malicious codes in mail
  • trojan, malware, worms
  • password sniffing and cracking attacks
  • network scanning for exploits
  • DDoS attacks

Question 36 : What is the meaning of “Line is up, protocol is down”?
Layer 2 connection between two switches you're operating with 2 layers. The line is UP and Protocol is Down means, Layer 1 (Physical connectivity is correct. But, the Layer 2 negotiation is not success.
This could be caused by Duplex or Speed mismatch, a unidirectional link of some type, a hardware/software failure on the switch, or the other side could be err-disabled or shutdown on the other side. This could also be a problem if different protocols are used for trunking(ISL vs dot1q).



Question 37 : How many subnets and hosts per subnet can you get from the network 10.0.0.0 255.255.240.0?

This question for you friends... Please answer....

Friday, 26 July 2013

ADSL Broadband : Interview Question and Answers

Question 1: What is adsl?

Answer : Asymmetric Digital Subscriber Line is a high-speed Internet access service that uses your telephone line to send and receive Internet data at much faster speeds than a conventional dial-up connection. With ADSL you are connected to the Internet 24 hours a day (“Always On”). You no longer need to dial up to open your Internet connection. You can also make and receive telephone calls while online. This is because the ADSL signal operates on a digital frequency, while the voice signals (telephone conversation), operate on an analogue frequency. Voice data and Internet data can, therefore, travel along the line simultaneously. The "asymmetric" in ADSL refers to the fact that the data being received by your computer from the Internet (downstream data / downloading), travels at a faster speed than data travelling from your computer to the Internet (upstream data / uploading).

 Most general users will download more data than they will upload, so the slower upstream speed is not a problem. For example, when you click on a hyperlink, your browser sends a few characters upstream to request the page that the hyperlink points to, and the page then comes downstream (downloads) to your PC so you can see it.


Question 2 : How Does Adsl works?

Answer : The telephone system was originally designed to carry the voice along copper telephone wires. The voice is converted into small electric pulses which travel along the telephone wires. These electric pulses are then converted back into sound at the other end, so the other person can hear you. This happens in both directions so you can have a conversation.

ADSL also works through the copper wires of your telephone line. However, Internet data travels along the wires at a different frequency to the voice signals. When ADSL is installed a micro-filter is plugged into your phone connection which separates the frequency of voice signals (telephone line) from that of your Internet data (broadband connection) and it is this that allows you to surf the web and talk on the phone at the same time.


Question 3 : What is the speed of ADSL?

Answer : ADSL is fast. Compared to a dial-up modem, which does  56kbits per second downstream, ADSL is up to ten times faster. That means that a large download that might take ten minutes on a dial-up modem will happen in around a minute on ADSL.


Question 4 : What are the reasons to get low speed broadband?

Answer : 

·  Quality of your phone line - areas with better copper wiring can achieve somewhat faster DSL speeds.
·  Length of the phone line between the residence and the phone company hub (exchange hub). DSL technology is "distance sensitive" - its performance decreases significantly as you get further away from this hub.
·  Service glitches. While normally a constant, DSL speed can suddenly drop if the service provider has technical difficulty with their network.


Question 5 : What are the factors that you can control directly to increase your DSL speed from your end?

Answer : 
  • Spyware on computer(s). Even when the DSL network may be functioning at full speed, spyware programs may be consuming the bandwidth.  Anti-spyware programs should be run regularly on networks to prevent this problem.
  • Wireless router. Routers sit between your computers and the Internet connection. If not functioning properly, a router can greatly limit the DSL speed. Temporarily connecting a computer directly to the Internet can help identify this situation.
  • Slow wireless network connection. In extreme cases, a very slow Wi-Fi connection between a computer and a wireless home network will not keep pace with the speed of the DSL Internet connection. Improving the quality of the Wi-Fi connection will solve this problem.
  • Old computer(s). Very old computers lacking sufficient processing power or memory cannot keep pace with a high-speed DSL connection. You can verify this problem by comparing the DSL speed between computers in your home or buy a new computer.
Question 6 :What is line attenuation?

Answer : 

Attenuation is the loss of signal over distance.
* 20bB. and below = Outstanding
* 20dB-30dB. = Excellent
* 30dB-40dB. = Very Good
* 40dB-50dB. = Good
* 50dB-60dB. = Poor and may experience connectivity issues
* 60dB. and above = Bad and will experience connectivity issues

Line attenuation also affects your speed.

* 75 dB+: Out of range for broadband
* 60-75 dB: max speed up to 512kbps
* 43-60dB: max speed up to 1Mbps
* 0-42dB: speed up to 2Mbps+


Question 7 : What is SNR?

Answer :  Signal-to-noise  means  the level of a desired signal to the level of background noise. It is defined as the ratio of signal power to the noise power, often expressed in (dB).

6dB or below noise margin is bad, it will experience no synch or intermittent synch problems
7dB-10dB is fair but does not leave much room for variances in conditions
11dB-20dB is good with little or no synch problems (if no large variation)
20dB-28dB is excellent
29dB or above is outstanding


Question 8 : What is SLA?

Answer :  Service Level Agreement, a contract between an Provider and the Client which commits the Provider to a required level of service. An SLA should contain a specified level of service, support options, penalty provisions for services not provided, a guaranteed level of system performance as relates to downtime or uptime, a specified level of customer support and what software or hardware will be provided and for what fee.


Question 9 : What is the difference between PPPoE and Bridge Mode?

Answer : PPPoE mode

1. User id and password stored inside the Modem.
2. Multiple PCs can be connected. For example most of the basic ADSL Modems having at least one ADSL port and one USB port. In PPPoE mode, can connect one PC to Ethernet port and one PC to USB port which enable simultaneous internet usage in both the PCs.
3. PPPoE mode is more secured.
4. NAT can be enable in PPPoE mode.

Bridge Mode

1. In bridge mode user id and password to be entered in the dialer of computer.
2. Only single PC can be connected.
3. Less secured because all the ports are open need good firewall to avoid virus infection.


Question 10 : What is Last Mile?

Answer : In telecommunications technology, connectivity between the  customer's home to the  telephone company via Copper cable called last mile.


Question 11 : What is leased Line?

Answer : A permanent telephone connection between two points set up by a telecommunications common carrier. Typically, leased lines are used by businesses to connect long distant offices. Unlike normal dial-up connections, a leased line is always active. The fee for the connection is high. Because the connection doesn't carry anybody else's communications, the carrier can assure a given level of quality.
What is the Function of BRAS or BNG
  • Aggregates the circuits from one or more link access devices such as DSLAM
  • Provides layer 2 connectivity through either transparent bridging or PPP sessions over Ethernet or ATM sessions
  • Enforces quality of service (QoS) policies
  • Provides layer 3 connectivity and routes IP traffic through an Internet service provider’s backbone network to the Internet
  • Release Public ip to the subscriber


Question 12 : What it the Function of DSLAM?

Answer : The DSLAM equipment collects the data from its many modem ports and aggregates their voice and data traffic into one complex composite "signal" via multiplexing. Depending on its device architecture and setup, a DSLAM aggregates the DSL lines over its Asynchronous Transfer Mode (ATM), frame relay, and/or Internet Protocol network (i.e., an IP-DSLAM using PTM-TC [Packet Transfer Mode - Transmission Convergence]) protocol(s) stack.

The DSLAM acts like a switch since its functionality is at Layer 2 of the OSI model. Therefore it cannot re-route traffic between multiple IP networks, only between ISP devices and end-user connection points. The DSLAM traffic is switched to a BRAS where the end user traffic is then routed across the ISP network to the Internet.


Question 13 : Explain Broadband Call Flow?

Answer : 

  1. When the PPPoE client is dialed, the PPPoE client broadcasts a PPPoE Active Discovery Initiation (PADI) message to BNG.
  2. The BNG that receive the PADI message respond with a PPPoE Active Discovery Offer (PADO) message advertising the domains and contexts they support if configured to advertise.
  3. The PPPoE Client sends a PPPoE Active Discovery Request (PADR) message to the BNG.
  4. The BNG receives the PADR message and prepares to bring up the PPP session.  Then responds with PPPoE Active Discovery Session-Confirmation (PADS) message advertising PPPoE session ID.
  5. The PPPoE Client sends PPP LCP Configuration Request message advertising to BNG.
  6. The BNG responds with PPP LCP Configuration Ack if PPP parameters are acceptable.
  7. The BNG then sends PPP CHAP Challenge to PPPoE Client.
  8. The PPPoE Client responds with PPP CHAP Response.
  9. The BNG sends  Access-Request packet to AAA Server with the session’s PPP username and CHAP password.
  10.   AAA sever reply Access-Accept to BNG and BNG will release public ip to the subscriber.


Question : 14 What is the difference between PPPoE and PPPoA?

Answer : Point to Point Protocol over Ethernet (PPPoE) and Point to Point Protocol over ATM (PPPoA) are both technologies that offer a provider the opportunity to roll out broadband services. This document will show why PPPoE should be chosen over PPPoA.

Advantages of a both PPPoE & PPPoA based broadband service

• End user authentication to the network, forces the end user to authenticate to AAA server before being allowed access to the network
• Billing options, gives the provider the ability to offer different billing options, by time, by data, unlimited or by services purchased
• IP address conservation, a provider can limit the number of IPs a specific user can receive or can force a user off the connection at will
• Trouble shooting, a provider can easily tell what users are on or off on a per user basis
• Scalable, all authentication, authorization, and accounting can be handled for every user using existing AAA server
• Invisible to end user, both can be integrated in the Customer Premise Equipment CPE making the connection process invisible to the end user – though we do recommend they stay off the CPE but it is easily done and PPPoA is traditionally only on the CPE
• Service Selection, both can be used to offer multiple services and service selection

Negatives of PPPoA

• Only a single session per CPE can be established. In PPPoE we offer the ability to log in to multiple services or create multiple sessions all at the same time over the same line
• CPE setup and access, in general PPPoA must be configured on the CPE itself, PPPoA software is not available on platforms. Either the CPE must support PPPoE or an ATM network interface must be installed in the PC. ATM network interface cards are expensive and both can be difficult for an end user to configure. Once an end user has the ability to configure the CPE it opens up the problem for incorrect configurations making trouble shooting by the provider very difficult resulting in increased support costs

Positives of PPPoE

• Brand management, by having the customer use software to log on and off they force the user to see the providers brand, logo or company name. Word of mouth is the strongest form of advertising
• Increased revenue opportunities, with PPPoE we can offer the ability to log in to multiple services or create multiple sessions all at the same time over the same line. What do we mean by multiple services? How about a special account for a child that gives them G rated access only? How about a dedicated movie or music server?
• Ease of support, PPPoE software has troubleshooting and help files built in to the application. If an error occurs the error message can be present to the end user with a possible resolution preventing the customer from ever having to call the provider for help. In PPPoA everything is done in the CPE meaning when a problem occurs the only notification is lights on the CPE which tell a user nothing
• End User Familiarity, client side software present users with the familiar look and feel of dial-up which if purchasing a broadband service means they are almost 100% familiar with the dial-up look and fee reducing their learning curve to use the new service
• Works in existing environment, if a provider already offers an Ethernet based service PPPoE can be implements without changing the existing CPE, as mentioned above PPPoA needs an ATM interface


Thursday, 25 July 2013

CCNA : IPV6 Tunneling via IPV4

Dear Friends,

Please go through the below link to learn and configure IPV6 tunnel via IPV4.

http://www.youtube.com/watch?v=JeqD0DKtr08

Regards,
V.Ramar
09538162193

Tuesday, 23 July 2013

Network Interview Question and Answer - set 3

1Question 21 .       Difference between CAM and MAC table?

Answer : CAM maps ports to the MAC addresses found on the ports.  ARP matches IP addresses to MAC addresses.

MAC-ADDRESS-TABLE: kept by Layer-2 devices only.
MAC-ADDRESS-ENTRY - Layer-2 unicast/multicast/broadcast destination.

ARP-TABLE: Kept by routers and L3 switches - L3 devices only.
ARP-ENTRY: Layer-3 unicast/multicast/broadcast destination to layer-2 unicast/multicast/broadcast destination mapping.

if you understand the difference between routing and switching then that should be enough.

Now a switch can be in both layer-2 and layer-3 so it will have both.



2Question 22 .       In switch, FA 0/1 to FA0/15 port is Access port and FA0/16&FA0/17 trunk port. What command used to make default port (two line command)?

Answer : Switch(config):interface range FA0/17 Switch(config-if):no Switchport mode



Question 23.      HSRP : if two routers (R-1 and R-2)
R-1 priority 150
R-2 priority 100
preempt is enabled on both of them. Assume there was booting delay on R-1. so R-2 will be the Active gateway. When R-1 has been booted and be ready, will it take the role of Active router ?? or it will wait until R-2 fails ??

Answer : if two devices have preemt enabled, the one with the highest priority will become "active". This is regardless of the boot order. The higher priority hsrp messages should force the lower priority to go back through the HSRP process and land at "standby".



Question 24.      Configuration on DHCP in order to get IP address(ip pool) where we can specify the range if ip address from DHCP server and we are doing IP subnetting in order to utilize the ip address as per the requirement of local network..
If we use DHCP and subnetting in local area network? What is the difference between two of them? 

Answer : dhcp has nothing to do with creating subnets, it is just a protocol that dynamically assigns ip addresses to devices in a subnet.  its just to help save us the work of manually putting ip addresses on each machine.
Subnet was created by the administrator, we use dhcp to help us allocate the range of addresses that was created when the subnet was created.




Question 25 . Types of BPDUs?

Answer : Three types of Bridge Protocol Data Units (BPDUs) are Configuration BPDU (CBPDU), Topology Change Notification (TCN) BPDU and Topology Change Notification Acknowledgment (TCA).



Question 26.      What is the difference between broadcasting and flooding?

Answer : Broadcasting – It will happened only within the broadcast domain
Flooding : Frames will flood to all the ports, like STP, CDP, DTP frames( if switch have default configuration)



Question 27.      What are the advantages of PPP protocol?

Answer : i. Error detection for each transmitted frame through the use of a CRC code in each frame header.

ii. Support for authentication of the connection using multiple authentication protocols. (PAP & CHAP)

iii. A key advantage of PPP is that it is an extensible protocol suite like PPPoE & PPPoA.



Question 28.      RIP, EIGRP & OSPF using TCP or UDP and it’s port number?

RIP –  UDP – 520
RIPnG – UDP – 521 (IPV6)
EIGRP – TCP – 88
OSPF – TCP - 89



Question 29.       what will happen if we send  untagged packet to a tagged port?

Answer : Access port will discard the frame because access port don’t know the vlan tagged frame.



Question 30.  What is loopback interface and where it is used?


Answer : Loopback interface is virtual interface. Loopback addresses are great for management and if utilized properly can be a great tool to ping and check if your routers are up and running

Friday, 19 July 2013

interview question and answer - set 2

Question No 11. What is the port number of FTP, SSH, TFTP, Telnet, SMTP, POP3, SNMP?

FTP Data -20 - File Transfer Protocol
FTP control – 21 – File Transfer Protocol
SSH – 22 - Secure Shell
TFTP – 69 – Trivial File Transfer Protocol
TELNET – 23 – Remote access
SMTP – 25 – Simple Mail Transfer Protocol
POP3 – 110 – Post Office Protocol
SNMP – 161 – Simple Network Management protocol


Question No 12. Who will release the Public ip address pool to the ISP (Internet Service Provider)?

IANA – Internet Assigned Number Authority.

IANA is responsible for global coordination of the Internet Protocol addressing systems, as well as the Autonomous System Numbers used for routing Internet traffic.
Two types : IP version 4 (IPv4) and IP version 6 (IPv6). IPv4 was initially deployed on 1 January 1983 and is still the most commonly used version. IPv4 addresses are 32-bit numbers often expressed as 4 octets in “dotted decimal” notation. Deployment of the IPv6 protocol began in 1999. IPv6 addresses are 128-bit numbers and are conventionally expressed using hexadecimal strings.

Users are assigned IP addresses by Internet service providers (ISPs).


Question No 13.  TCP/IP comes under which layer in OSI?

TCP/IP and OSI both are not a Layer. Both are reference model.

OSI Reference model.
1.       Application Layer
2.       Presentation Layer
3.       Session Layer
4.       Transport layer
5.       Network Layer
6.       Data link layer
7.       Physical layer

TCP/IP reference model.
1.       Application Layer
2.       Transport Layer
3.       Internet Layer
4.       Data link layer
5.       Physical layer

In another word, the TCP/IP work between the Network and Transport layer. Because, TCP comes under Transport Layer & IP comes under Network Layer.


Question No 14.  Give one example where STP should be used on a network?
By default STP used, when you have a redundant link between the switches.

Question No 15.  If a switch reboots, will the mac-address table on it be retained?

Static mac- address-table entry will be retained and dynamic learned mac address will be removed.

Question No 16. Provide one limitation of access control lists?
  • You cannot see what ACL line was matched by a packet 
  • ACLs do not affect multicast and broadcast traffic that is forwarded from or to the access points (APs) and wireless clients 
  • ACLs are processor dependent and can impact the performance of the controller under heavy load.

Question No 17. Should the DNS server and default gateway on a PC be the same?
Possible: Can enable the dns server on your gateway ip. Then both gateway ip and dns remain same.

Question No 18. Is a gateway required to be configured on a PC to ping the gateway.
No need

Question No 19. What is the difference between NAT and proxy server.
Assume that, there are two organizations. Organization 1 using internet with a NAT device . Organization 2 using internet with Proxy server.
Organization 1 : Assume that the default gateway address of the TCP/IP adapter setting of the users PC is configured with the IP address of the NAT device. At organization 1, when a user attempts to access a device on the internet through any protocol like HTTP, FTP, Ping, Telnet etc, the IP packet carrying the traffic would be sent to the default gateway and NAT applied on the packet. When NAT is applied , the source IP address of the IP packet generated by the user would be re-written with the IP address of the NAT device irrespective of the type of protocol. So all IP packets would be translated and most types of IP traffic can flow through NAT.
Organization 2: The default gateway configured on the TCP/IP adapter settings of the Users PC is the Proxy Servers IP address. Additionally, the browser is also configured with the Proxy Servers IP address. When a user initiates HTTP traffic ( Typing a URL on the browser ), the request would be sent to the Proxy server and the source IP address of the IP packet would be re-written with the Proxy Servers IP address. What would happen if the user tries to FTP or Ping a device which is on the internet ? The request goes to the proxy server, because the default gateway is the proxy servers IP address. But when the packet reaches the Server, it does not have the capacity to re-write the source, because the proxy server supports only packets carrying HTTP traffic. This is why also other packets apart from HTTP are dropped.

Question No 20. What is the Difference between HTTP and HTTPS?
Difference between HTTP and HTTPS:
 i. URL begins with “http://" in case of HTTP while the URL begins with “https://” in case of HTTPS.
ii. HTTP is unsecured while HTTPS is secured.
iii. HTTP uses port 80 for communication while HTTPS uses port 443 for communication.
iv. HTTP operates at Application Layer while HTTPS operates at Transport Layer.
v. No encryption is there in HTTP while HTTPS uses encryption.
vi. No certificates required in HTTP while certificates required in HTTPS.



Network interview Questions and Answers - Set 2


Saturday, 13 July 2013

Policy Based Routing (PBR) - Video

Dear Friends,

Please go through the below link to learn the Policy Based Routing (PBR) configuration

http://www.youtube.com/watch?v=NQVVl0VB2_4


By,
Ramar.