Showing posts with label Interview. Show all posts
Showing posts with label Interview. Show all posts

What is the difference between IDS , IPS and Firewall ?

A firewall is simply just a set of filters/rules that are matched against traffic. It can only detect malicious traffic trying to enter a computer system but can not detect anything which has entered the system. A firewall is considered a first line of defense in protecting private information. For greater security IDS and IPS systems should be used along with the firewall.

An IDS (Intrusion Detection System) is passive meaning it basically sits watching packets go through the network. It has a set of rules which it matches the packets against and sets off an alarm if it detects anything suspicious, usually the administrator is alerted. An IDS can detect several types of malicious traffic that would slip by a typical firewall, including network attacks against services, data-driven attacks on applications, host-based attacks like unauthorized logins, and malware like viruses, Trojan horses, and worms. Most IDS products use several methods to detect threats, usually signature-based detection, anomaly-based detection, and stateful protocol analysis.

An IPS (Intrusion Prevention System) has all the features of a good IDS, but can also stop malicious traffic from invading the enterprise. Unlike an IDS, an IPS sits inline with traffic flows on a network, actively shutting down attempted attacks as they’re sent over the wire. It can stop the attack by terminating the network connection or user session originating the attack, by blocking access to the target from the user account, IP address, or other attribute associated with that attacker, or by blocking all access to the targeted host, service, or application.

Read More...

Basic CCNA Interview Questions AND Answers

What is Routing?
Routing is the process of selecting best paths in a network and forward data from source to destination through it. Routing is usually performed by a dedicated device called a router.

What is Protocol?
A 'protocol' is a set of invisible computer rules that enable two devices to connect and transmit data to one another. Protocols determine how data are transmitted between computing devices and over networks.

Explain difference between Router, Switch and Hub?
Hubs, switches, and routers are all computer networking devices with varying capabilities. Let's look in detail
      Hub
A hub is typically the least expensive, least intelligent, and least complicated of the three. Its job is very simple – anything that comes in one port is sent out to the others. Hub has single collision domain and single broadcast domain
      Switch
Switch is a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet protocol. Switches have multiple collision domains and have a single broadcast domain
      Router
Router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers won't forward broadcast. If a router is present in a network, we may have at least TWO broadcast domains.

Explain broadcast and collision domain?
A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.
            A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium or through repeaters

What is the size of IP Address?
32 bit for IPv4 and 128 bit for IPv6

IEEE standard for wireless networking?
IEEE 802.11

What is the range of class A address?
Class A Range from 1.0.0.1 to 126.255.255.254 and Supports 16 million hosts on each of 127 networks.

What is the range of class B address?
Class B range from 128.1.0.1 to 191.255.255.254 and Supports 65,000 hosts on each of 16,000 networks.

What is the range of class C address?
Class C range is from 192.0.1.1 to 223.255.254.254 and Supports 254 hosts on each of 2 million networks.

What is PoE (Power over Ethernet)?
Power over Ethernet or PoE describes the technology which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras.

What is a peer-peer process?
A peer-to-peer (P2P) network is a type of decentralized and distributed network architecture in which individual nodes in the network (called "peers") act as both suppliers and consumers of resources. There will be no centralized system we usually seen like Client server model. Simply in p2p, network devices act as both client and server

What is ping? Why you use ping?
Ping [Packet Internet Groper PING] a computer network tool used to test whether a particular host is reachable across an IP network

What is the difference between tracert and traceroute
Both Tracert and traceroute commands do similar purpose. On a router or switch you would use the command traceroute and on a pc you would use tracert .

What is Round Trip Time?
Round-trip time (RTT), also called round-trip delay, is the time required for a packet to travel from a specific source to a specific destination and back again.Source is the computer sending the packet and the destination is a remote computer or system that receives the packet and retransmits it. A user can determine the RTT to and from an IP address by pinging that address

Define the terms Unicast, Multicast and Broadcast and Anycast?
Unicast – One to One communication                    Eg: http
Multicast – One to a group Communication          Eg: SLP
Broadcasting – One to All communication            Eg: ARP
Anycast – One to nearest Communication             Eg : 6to4

Where do we use cross and standard cable?
To connect same group device use Cross Cable
To connect different group device use Straight Cable
For Example:
To connect one PC to another PC use Cross Cable
To connect one comp to switch OR one switch to router use straight cable

What are the differences between static ip addressing and dynamic ip addressing?
Dynamic IP addresses can change each time you connect to the Internet, while static IP addresses are reserved for you statically and don't change over time. In short, Dynamic IP addresses are provided by DHCP server and static IP addresses are given manually

Difference between CSMA/CD and CSMA/CA?
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) is a media access control method used in local area networking using early Ethernet technology to overcome collision when it happened while Carrier sense multiple access with collision avoidance (CSMA/CA) is used in wireless network to avoid collision

What is DHCP scope?
A Dynamic Host Configuration Protocol (DHCP) scope is the consecutive range of possible IP addresses that the DHCP server can lease to clients on a subnet.

What is Checksum?
A simple error-detection scheme in which each transmitted message is accompanied by a numerical value based on the number of set bits in the message. The receiving station then applies the same formula to the message and checks to make sure the accompanying numerical value is the same. If not, the receiver can assume that the message has been garbled.

What is Redundancy?
Network redundancy is a method which provide a back up for the primary device or route and thereby ensuring network will be available even the primary device or route become failed or unavailable

What are the different memories used in a CISCO router?

ROM
ROM is read-only memory available on a router's processor board. The initial bootstrap software that runs on a Cisco router is usually stored in ROM. ROM also maintains instructions for Power-on Self Test (POST) diagnostics.

Flash Memory
Flash memory is an Electronically Erasable and Re-Programmable memory chip. The Flash memory contains the full Operating System Image (IOS, Internetwork Operating System).Flash memory retains content when router is powered down or restarted.

RAM
RAM is very fast memory that loses its information when the router is shutdown or restarted. On a router, RAM is used to hold running Cisco IOS Operating System, IOS system tables and buffers RAM is also used to store routing tables,RAM Provides temporary memory for the router configuration file of the router while the router is powered on.

RAM Stores running Cisco IOS Operating System, Active program and operating system instructions, the Running Configuration File, ARP (Address Resolution Protocol) cache, routing tables and buffered IP Packets.

NVRAM (Non-volatile Random Access Memory)
NVRAM is used to store the Startup Configuration File. This is the configuration file that IOS reads when the router boots up. It is extremely fast memory and retains its content when the router is restarted.

What are the different types of passwords used in securing a CISCO router?
Here are the five passwords you can set on a Cisco router:
·        Console
·        Aux
·        VTY
·        Enable password
·        Enable Secret

What is the use of "Service Password Encryption"?
"Service Password Encryption" command allows you to encrypt all passwords(including clear text) on your router so they cannot be viewed from your running-config

Define and explain the five conversion steps of data encapsulation.
Data encapsulation is a process that makes use of the layered model concept in that each layer depends on the layer above and below relative to OSI. The lower layer uses encapsulation to put the data from the upper layer into its own encapsulated data field i.e., the information in a protocol is wrapped, or contained, in the data section of another protocol.
In the process of encapsulation, header information is added to the data from the above layer.
The five steps of conversion are
Step
Action
Layers Involved
Keyword
Step 1
Alphanumeric input from user converted into Data
Application/Presentation/Session
DATA
Step 2
Data converted into segments
Transport
SEGMENTS
Step 3
Segments converted into Packets or Datagrams and Network Header is added
Network
PACKETS
Step 4
Packets or Datagrams are built into Frames
Data Link
FRAMES
Step 5
Frames are converted into bits( 1s and 0s) for transmission
Physical
BITS

In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?
#erase startup-config

      Which command is used to copy the configuration from RAM to NVRAM
      #Copy running-config startup-config

Differentiate Logical Topology from Physical Topology?
Physical topology is the network what we can see and Logical topology is the network which data packets are send from source to destination 

What is AS (Autonomous System)?
An autonomous system (AS) can be said as either a single network or a group of networks that is controlled by a common network administrator (or group of administrators) on behalf of a single administrative entity (such as a university, a business enterprise, or a business division). An autonomous system is also sometimes referred to as a routing domain. An autonomous system is assigned a globally unique number, sometimes called an Autonomous System Number (ASN).

What is the difference between Private IP and Public IP?
Public IP is used across internet and Private IPs are used within the local LAN

Explain different cable types?
Straight cable – To connect different group devices (Switch – Router)
Cross Cable - To connect same group device (PC –PC, SwitchSwitch)
Rollover cable – To connect Console port to Computer

How does RIP differ from EIGRP?
      The major difference between both is that EIGRP is Cisco propriety and RIP is open standard
Some internal differences between them are:
·        AD value of Rip is 120 and AD value for EIGRP is 90 internal / 170 external.
·        RIP uses Bellmen ford algorithm to calculate the path while Eigrp use Dual method to calculate the routes paths
·        Maximum hop count for RIP is 15 that is after 15 counts the packet is dropped while that of EIGRP is 100 by default and upto 255 by configuration.
·        RIP(ver 1) is classfull protocol where as EIGRP is classless protocol
·        In RIP full routing table exchanged, but in EIGRP missing routes are exchanged
·        For RIP protocol, hello timers every 30 seconds but in EIGRP hello timer every 5 seconds
·        RIP v1 sends updates as broadcast while EIGRP send updates as Multicast
·        EIGRP uses an Autonomous number to determine which domain it belongs to which is not the case with RIP protocols.
·        RIP is mostly used for smaller networks which EIGRP is used for larger networks.
·        RIP is a distance vector routing protocol while EIGRP is an hybrid routing protocol.
·        RIP sends full update whenever network change occurs whereas EIGRP sends triggered updates

Differentiate User Mode from Privileged Mode
Privileged mode has access to the entire router or switch configuration. User EXEC mode only has limited options. Specifically, to do any configuration changes, you need to enter privileged mode first.User EXEC mode is used mainly for running show commands and to collect details

What is 100BaseFX?
100BaseFX is a version of Fast Ethernet that is often used for wiring campus backbones.

Differentiate full-duplex from half-duplex?
Full-duplex means that communication can occur in both directions at the same time. Half-duplex means communication can only occur in one direction at a time

What does the "show protocol" display?
      To display the configured protocols, use the show protocols command in user EXEC or privileged EXEC mode.
#show protocols [interface-name interface-number]

If you find any mistake in this post feel free to write to shabeeribm@gmail.com
Read More...

Interview Questions : What is TCN ?

What is TCN ?

In normal case MAC address tables that age out after 300 seconds works perfectly fine in a stable network but not when the topology changes.

When a switch detects a change in the network (interface going down or into forwarding state) it will advertise this event to the whole switched network.When the switches receive this message they will reduce the aging time of the MAC address table from 300 seconds to 15 seconds (this is the forward delay timer). This message is called the TCN (Topology Change Notification).

In a normal situation a non-root switch will receive BPDUs on its root port but will never send any BPDUs to the root bridge. When a non-root switch detects a topology change it will generate a topology change notification and send it on its root port towards the root bridge.When a switch receives the topology change notification it will send a (TCA) topology change acknowledgement on its designated port towards the downstream switch. 

Once the topology change notification reaches the root bridge it will set the TC (topology change) bit in the BPDUs it will send. These BPDUs will be forwarded to all the other switches in our network so they can reduce their aging time of the MAC address table.Switches will receives these messages on both forwarding and blocked ports.

Read More...

Vlan Interview Questions and Answers

Vlan Interview Questions and Answers

Click here  to view VLAN Notes

Which switching technology reduces the size of a broadcast domain?
VLAN

Which protocols are used to configure trunking on a switch?
802.1Q

What is SVI ?
Switched Virtual Interface (SVI) is a virtual interface which provides a routed gateway into and out of a VLAN

what is meant by "router on stick" ?
Router on  Stick is a method used for communicating Inter-VLAN's  using a router

which is the default mode in switch ports ?
Older switches are dynamic desirable by default and modern switches are dynamic auto by default

Difference between 802.1Q and ISL ?
Cisco ISL (Inter-Switch Link) is an old Cisco proprietary protocol that is only supported on some Cisco switches. While 802.1Q [dot1Q] is a open standard protocol that is supported on switches from many vendors and most NICs.

What VTP mode allows you to change VLAN information on the switch?
Server mode

Which are the two trunking protocols ?
ISL and IEEE 802.1Q

Which Protocol encapsulate Etherframes ?
ISL encapsulate ethernet frames while 802.1Q tags ethernet frame

Which is the Vlan not tagged by 802.1Q ?
Native Vlan

How to delete vlan information from switch ?
VLAN information is not saved in the running-config or startup-config but in a separate file called vlan.dat on your flash memory. If you want to delete the VLAN information you should delete this file by typing delete flash:vlan.dat.

Difference between access and trunk mode ?
Access mode is used to connect end devices(hosts) to switches while trunk mode is used to connect between switches

Difference between dynamic auto and dynamic desirable ?
  • dynamic desirable : Attempts to negotiate a trunk with the other end
  • dynamic auto : Forms a trunk only if requested by the other end
what is the use of "nonegociate" command in switch ?
"nonegociate"
command disables automatic formation of trunk links.It will be good to configure trunk manually and give non-negociate command for security reason


Explain different switch port modes ?
  • Trunk : Forms an unconditional trunk
  • dynamic desirable : Attempts to negotiate a trunk with the far end
  • dynamic auto : Forms a trunk only if requested by the far end
  • access : Will never form a trunk 
what is DTP ?
Dynamic Trunking Protocol (DTP) is used to automatically establish trunks between capable ports (insecure method!)

Can we see trunk interfaces in show vlan command ?Nope

which is the command used to see trunk interfaces ?
  • show interface trunk
  • show interface Fa1/0/13 trunk 
  • show interface Fa1/0/13 switchport
  • show interfaces status | include trunk
what is the maximum number of vlans permitted in 802.1Q and ISL ?
  • Maximum Vlan permitted in 802.1Q is 4094
  • Maximum Vlan permitted in ISL is 1000
what is the header size of 802.1Q ?
4 bytes

what is the header size of ISL ?
26 bytes

Click here to View and download complete CCNA / CCNP notes and interview questions for $ 
Read More...

Basic networking Questions and Answers 11 - 20

How many pins do serial ports have? 
In computer it's known as com port and could be available in 9pin or 25 pin.On router it have 60 pins.

What's the benefit of subnetting? 
Reduce the size of the routing tables.
Reduce network traffic. Broadcast traffic can be isolated within a single logical network.
Provide a way to secure network traffic by isolating it from the rest of the network.

What are the differences between static ip addressing and dynamic ip addressing? 
With static IP addressing, a computer (or other device) is configured to always use the same IP address. With dynamic addressing, the IP address can change periodically and is managed by a centralized network service

What is APIPA? 
Automatic private IP addressing (APIPA) is a feature mainly found in Microsoft operating systems. APIPA enables clients to still communicate with other computers on the same network segment until an IP address can be obtained from a DHCP server, allowing the machine to fully participate on the network. The range of these IP address are the 169.254.0.1 to 169.254.255.254 with a default Class B subnet mask of 255.255.0.0

What is DHCP scope? 
A scope is a range, or pool, of IP addresses that can be leased to DHCP clients on a given subnet.

What are the criteria necessary for an effective and efficient network? 
Performance : It can be measured in many ways, including transmit time and response time.
Reliability : It is measured by frequency of failure, the time it takes a link to recover from a failure, and the network's robustness.
Security : Security issues includes protecting data from unauthorized access and viruses.

Name the factors that affect the performance of the network? 
Number of Users
Type of transmission medium
Hardware
Software 

Name the factors that affect the reliability of the network?
Frequency of failure
Recovery time of a network after a failure 

What is Protocol?
A protocol is a set of rules that govern all aspects of information communication.

Define Bandwidth and Latency? 
Network performance is measured in Bandwidth (throughput) and Latency (Delay). Bandwidth of a network is given by the number of bits that can be transmitted over the network in a certain period of time.

Latency corresponds to how long it takes a message to travel from one end off a network to the
other. It is strictly measured in terms of time.

Click here to View and download complete CCNA / CCNP notes and interview questions for $ 
Read More...

EIGRP Notes with Interview Questions

EIGRP (Enhanced Interior Gateway Routing Protocol)

Important points about EIGRP
  • EIGRP  is  a Cisco proprietary protocol which means it will work only on Cisco routers.
  • EIGRP is also called advanced distance vector or Hybrid routing protocol.
  • Multicast or unicast is used for exchange of information.
  • Multiple network layer protocols are supported.
  • 100% loop-free.
  • By default,EIGRP will limit itself to use no more than 50% of the interface bandwidth
  • Maximum Hop-Count is 255[ 100 by default]
  • EIGRP is classless protocol
  • EIGRP supports VLSM and authentication
  • EIGRP uses Diffusing Update Algorithm (DUAL) to determine the best path among all “feasible” paths. DUAL also helps ensure a loop-free routing environment.
  • EIGRP will form neighbor relationships with adjacent routers in the same Autonomous System (AS)
  • EIGRP uses RTP (Reliable Transport Protocol) and its function is to deliver EIGRP packets between neighbors in a reliable and ordered way.
  • All EIGRP routing information are exchanged between neighbors via multicast using  the address 224.0.0.10
  • EIGRP routers do not send periodic, full-table routing updates.  Updates are sent when a change occurs, and include only the change
  • K-Values are used for calculating metric. By default EIGRP consider k1 and k3 only
  • EIGRP having internal Administrative distance as 90 and external AD as 170 
  • EIGRP summary route AD value is 5
  • In EIGRP Summarization is enabled by default."No auto-summary" command is needed because by default EIGRP will behave like a classfull routing protocol which means it won’t advertise the subnet mask along the routing information. For example 1.1.1.0/24 and 2.2.2.0/24 will be advertised as 1.0.0.0/8 and 2.0.0.0/8. Disabling auto-summary will ensure EIGRP sends the subnet mask along.
  • EIGRP converges rapidly after link failure
  • EIGRP can load balance on both equal and unequal cost paths."Variance" command is used to configure load balancing
  • EIGRP supports up to 6 loop-free paths with a metric lowers than the product of variance and the best metric
  • Manual summarization can be enabled at any interface 
  • If a packet is not acknowledged,EIGRP re transmit the packet to the non responding neighbor as a unicast.No other traffic is sent to this neighbor until it responds.After 16 unacknowledged re-transmissions,the neighbor is removed from the neighbor table
  • The process of neighbor discovery and route exchange between two EIGRP router is as follows
    • Router A sends out a hello
    • Router B sends back a hello and an update.The update contains routing information
    • Router A acknowledges the update
    • Router A sends its update
    • Router B acknowledges
  •  A neighbor is considered as lost if no hello is relieved within 3 hello periods
Why do we call EIGRP an advanced distance vector or hybrid routing protocol?
Because it shares features of both distance vector and link state protocols. For example  EIGRP advertise routes to directly connected neighbors  like a distance vector protocols and it uses a series of tables like link state protocols 

Advantages of EIGRP 
  • EIGRP uses AS (Autonomous system) number ranging from  1-65535 to identify collection of routers that share same information.
  • EIGRP have less convergent time and is more efficient
  • EIGRP supports both auto and manual route summarization
  • Supports multiple routed protocols like IP ,IPX and apple talks
  • EIGRP converges rapidly in the event of link failure
  • EIGRP can load balance equal and unequal cost path.By default EIGRP supports 4 load balancing path.It can be extended to 6 paths 
EIGRP Packet types 
There are 5 packet types
  1. Hello Packet – In normal scenarios  Hello packets are send in 5 seconds .Hello packets are send between directly connected neighbors. Hello packets are send as Multicast
  2. Update – Update packet are used to send triggered updates. EIGRP won’t send periodic updates like distance vector protocols. They  send triggered updates only when a chance is occurred .Update packets are send as Multicast or unicast
  3. Query – Query packets are send when the successor path is failed and there is no feasible successor (back up path).Query packets are send as multicast
  4. Reply – Reply for query packets. Reply packets are send as unicast
  5. ACK – Ack packets are send as Acknowledgement for update and Reply packet. Send as Unicast

 NOTE : Hello packets don’t have to be acknowledged since EIGRP uses a holddown time. If a
router doesn’t receive hello packets in an X amount of time it will drop the neighbor adjacency.

Stuck in Active: When a route (current successor) goes down, the router first checks its topology table for a feasible successor. If  backup path(feasible successor) is not present, it goes active(actively checking to find new route)  on the that route to find a new successor by sending queries out to its neighbors requesting a path to the lost route. Such state of router while waiting for a reply for a query packet is called Stuck in Active. In normal working condition router running EIGRP protocols is in passive state(P).If there is a failure in successor path and there is no back up path, then router will be in Active state(A).

Conditions to form EIGRP neighbors
Must receive HELLO PACKET from neighbor router
AS number must be same
Must have identical K-values or Metric
Adjacencies will not form unless the primary IP addresses on connecting interfaces are on the same subnet.

EIGRP maintain 3 tables 
•  Neighbor table – list of all neighboring routers. Neighbors must belong to the same Autonomous System
•  Topology table – list of all routes in the Autonomous System
•  Routing table – contains the best route for each known network

EIGRP Neighbors 
EIGRP forms neighbor relationships, called adjacencies, with other routers in the same AS by exchanging Hello packets. Routers share routing information after forming adjacencies. Hello packets are sent as
multicasts to address 224.0.0.10.  By default, EIGRP Hellos are sent every 5 seconds. On slower connections, EIGRP Hellos are sent every 60 seconds by default.

The EIGRP Hello timer can be adjusted on a per interface basis:
Router(config)#Interface fa 0/1
Router(config-if)#  ip hello-interval eigrp 20 15
The above command allows us to change the hello timer to 15 seconds for Autonomous System 20.

In addition to the Hello timer, EIGRP neighbors have a Hold timer. The Hold timer indicates how long a router should wait before marking a neighbor inactive, if it stops receiving hello packets from that neighbor. 

By default, the Hold timer is three times the Hello timer. On high-speed links the timer is set to 15 seconds, and on slower links the timer is set to 180 seconds.

The Hold timer can also be adjusted on a per interface basis: 
Router(config)#Interface fa 0/1
Router(config-if)#  ip hold-interval eigrp 20 21 
The above command allows us to change the hold timer to 21 seconds for Autonomous System 20. 

Changing the Hello timer does not automatically change the Hold timer. Additionally, Hello and Hold timers do not need to match between routers for an EIGRP neighbor relationship to form.

Successor Path and Feasible Successor path 
EIGRP enabled routers will send HELLO Packets to each other and become neighbors. EIGRP neighbors will exchange routing information which will be saved in the topology table. The best path from the topology table will be copied in the routing table. Such path are called Successor. Metric of the successor path is called Feasible distance.

After finding the successor path ,EIGRP will find another path as a back up path to successor to give redundancy is called Feasible successor. The metric used to find  feasible successor is called Advertised distance (AD) or Reported distance (RD).This Advertised distance (AD) is the distance between neighbor of the source and destination . 
In short,
Advertised distance: How far the destination is away for your neighbor.
Feasible distance: The total distance to the destination. 
successor : The best path to the destination

Condition for choosing Feasible successor
Advertised distance (AD) must be less than the metric of successor path 
Advertised distance of feasible successor < Feasible distance of successor.

Note : While calculation best paths, one thing you must keep in mind is  Split horizon rule which states “whatever you learn on an interface you don’t advertise back out of the same interface.”

Feasible Successors provide EIGRP with redundancy, without forcing routers to re-converge when a topology change occurs. If no Feasible Successor exists and a link fails, a route will enter an Active (converging) state until an alternate route is found.

EIGRP Route States 
An EIGRP route can exist in one of two states, in the topology table:
•  Active state
•  Passive State

A Passive state indicates that a route is reachable, and that EIGRP is fully converged. A stable EIGRP network will have all routes in a Passive state.

A route is placed in an Active state when the Successor and any Feasible Successors fail, forcing the EIGRP to send out Query packets and re-converge. Multiple routes in an Active state indicate an unstable EIGRP network. If a Feasible Successor exists, a route should never enter an Active
state.

You can check the status of states by using
Router#  show ip eigrp topology 
To view only active routes in the topology table:  
Router#  show ip eigrp topology active 
EIGRP Metrics 
EIGRP can utilize 5 separate metrics to determine the best route to a
destination:
  1. Bandwidth (K1)
  2. Load (K2
  3. Delay of the Line (K3
  4. Reliability (K4)
  5. MTU (K5)

By default, only Bandwidth and Delay of the Line are used 
K1 = 1, K2 = 0, K3 = 1, K4 = 0, K5 = 0

Graceful Shutdown
When an EIGRP process is shut down, the router sends out “goodbye” messages to its neighbors (in the form of hello packets).   The neighbors can then immediately begin recalculating paths to destinations that went through the shutdown router without having to wait for the hold timer to expire.

GNS3 Labs:

Interview Questions 
What is EIGRP?
What are the different tables in EIGRP?
Why EIGRP is called hybrid protocol
What are the different packets in EIGRP?
What are the advantages of EIGRP other routing protocol ?
What type of Authentication is supported by EIGRP ?
What is the use of "variance" Command in EIGRP?
Internal and external Administrative distance in EIGRP ?
What is Feasible successor ?
What is Advertised distance ?
What is successor  ?
What is the muticast address used by EIGRP to send Hello packets ?
What is "Stuck in Active" ?
what is "Graceful shutdown" ?
what is "Goodbye" message recieved in EIGRP ?
Maximum path load balanced by EIGRP ?
How EIGRP support unequal load balancing ?
What happen when we enable passive interface in EIGRP ?
Conditions for EIGRP neigbours
what is meant by active and passive states in EIGRP ?
What are the different K-values used in EIGRP ?
Read More...

Short note on RIP with Interview Questions


Short note made for quick study for RIP

  • The Routing Information Protocol (RIP) is a distance-vector routing protocol
  • RIP takes the hop count as a metric.
  • RIP have two versions RIP v1 and RIP v2
  • In IPv6 RIP is called as RIPng
  • RIPng must be enabled in interfaces in IPv6
  • RIP sends out the full routing table every periodic update
  • RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination.
  • A maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support.
  • A hop count of 16 is considered an infinite distance
  • RIP implements the split horizon, route poisoning and also hold down mechanisms to prevent incorrect routing information from being propagated
  • RIP router transmitted full updates every 30 seconds
  • RIP uses the User Datagram Protocol (UDP) as one of its transport protocol, and is assigned the reserved port number 520
Interview Questions

  • What is Route Poisoning?
  • What is Split Horizon ?
  • Utilizing RIP, what is the limit when it comes to number of hops?
  • What is the difference between RIP V1 and V2 ?
  • Mulitcast address of RIP v2 ?
  • Administristative distance of RIP ?
  • Can we use RIP in a scenario having more than 15 routers ?
  • What is the difference between RIP and RIPng?


If you need to know answer for any of the above question feel free to ask in comment section
HAPPY NETWORKING !!
Enhanced by Zemanta
Read More...

OSI Reference model notes with interview questions

Earlier there was no reference model for devices.At that time a company can only use a specific vendors device only.There will not be intercompactability between different vendors product.To solve this issue,Open Systems Interconnection (OSI) model was developed by the International Organization for Standardization (ISO).

Layer
Description
Examples
7.
Application
Provides interface for users to communicate with applications.Responsible for initiating or services the request.
SMTP, DNS, HTTP, and Telnet etc
6.
Presentation
The Presentation layer controls theformatting  and syntax of user data for the application layer. This ensures that data from the sending application can be understood by the receiving application.
JPEG,MP3,MPEG etc
5.
Session
Responsible for establishing, managing, and terminating the session. If a session is broken, this layer can attempt to recover the session.
NetBIOS
4.
Transport
Breaks information into segments and is responsible for connection and connectionless communication.
TCP and UDP
3.
Network
Responsible for logical addressing and routing.Packets are formed in network layer
IP, ICMP,  and routers
2.
Data Link
Responsible for physical addressing, error correction, and preparing the information for the media.Frames present here.Consist of two sublayers LLC and MAC
MAC address, CSMA/CD, switches, and bridges
1.
Physical
Deals with the electrical signal.
Cables, connectors, hubs, and repeaters


OSI Model Interview Questions
  • List the layers of OSI ?
  • What are the responsibilities of Data Link Layer?
  • What are the responsibilities of Network Layer?
  • What are the responsibilities of Transport Layer?
  • Routers work at which OSI layers?
  • Switches work at which OSI layer ?
  • In which layer term "Frames" is used ?
  • In which layer term "Packets" is used ?
  • In which layer term "Segments" is used ?
  • Give some example for protocols work in Application layer ?
  • What is CRC? Which layer CRC works ?
  • What is the purpose of the Data Link?
  • What is a Window in networking terms?
  • What is the role of the LLC sublayer in datalink layer?
  • What is the function of the Application Layer in networking?
  • What are the difference between TCP and UDP?
  • What is the port no of DNS and Telnet?
  • Which service use both TCP and UDP ?
  • What is the port no of SMTP and POP3?
  • Which one is reliable – TCP or UDP ?

Enhanced by Zemanta

Read More...