Engineer / Network Administrator (Security)
you thinking of leaving your current position and considering a new job as
Network Engineer/Administrator with a new company in LAN/WAN Network Security environment?
technologies and questions may be asked during the interview!
often with “jr.” and “sr.” prefixes. The major responsibility of a network
engineer (security) is to determine “how to implement network security” in
routed LAN/WAN environments. They design and implement both the hardware and
software necessary technologies to secure computer network. They have
high-level technical skills in LAN/WAN security. The major responsibility of a
network admin (security) includes adding security software and hardware,
performance monitoring, troubleshooting, logging errors, backing up and restoring
data, and assigning permissions to users.
(security) position, make sure that you have enough knowledge of firewalls
(software & hardware), VPNs (IPsec, SSL, and Get VPN etc.) with general
network technologies as described below:
* Data communication and transmission techniques
* Fundamentals of OSI & TCP/IP model
* Router’s basic operations (startup, nvram, flash/IOS backup
& recovery)
* IP Addressing and Summarization
* IP Routing : Basics of RIP , EIGRP , OSPF & BGP
* NAT (object based)
* ACL (object based)
* Contexts
* Failover (Active-Standby & Active-Active)
* Transparent
* MPF (Modular Policy Framework)
* Site to Site
* SSL
* Get VPN
* Easy VPN
* DMVPN
Flex
* Access-lists
* Route-Maps
* Prefix-Lists
* Distribute-Lists
* Filter-lists
* Class-maps & Policy-maps
* AAA Server
* Dot 1x Authentication
* Ip SLA
Network Security Engineer/Administrator:
be prepared with all of the following answers before facing any interview for a
Network Security position.
networks connected to the internet. They can be implemented as hardware or
software, or a combination of both. All incoming and outgoing network traffic
are examined and accepted/rejected by the firewall as per defined rules.
firewall protects a computer network against unauthorized incoming or outgoing
access. Network firewalls may be hardware devices or software programs.
traffic flow from an untrusted network (outside). A firewall is not able to
detect an attack in which the data is deviating from its regular pattern,
whereas an IPS can detect and reset that connection as it has inbuilt anomaly
detection.
a new firewall into a network can be a complicated process due to various
issues (e.g. IP address reconfiguration, network topology changes, current
firewall etc.) because the firewall is not a routed hop and you can easily
introduce a transparent firewall into an existing network.
ip packets based on source and destination addresses, ports, or protocols. The
packet filter examines the header of each packet based on a specific set of
rules, and on that basis, decides to prevent it from passing or allow. Packet
filtering is also part of a firewall program for protecting a local network
from unwanted access.
and is a firewall technology that monitors the state of active connections and
uses this information to determine which network packets are allowed through
the firewall. Stateful inspection analyses packets down to the application
layer.
encryption and decryption. In this mechanism, public key is used to encrypt
messages and only the corresponding private key can be used to decrypt them. To
encrypt a message, a sender has to know the recipient’s public key.
message used for security purposes. It is used to verify the authenticity of
the sender.
user/client privileges or access levels related to network resources, including
firewalls, routers, switches and application features. Authorization is
normally preceded by authentication and during authorization. It’s system that
verifies an authenticated user’s access rules and either grants or refuses
resource access.
the primary node, it is synced to the secondary node. When the primary node
fails, sessions continue to pass traffic through the secondary node without
having to re-establish.
connection over a public network such as the internet.
communicate in a secure manner by authenticating and encrypting each IP packet
of a communication session.
establish secure connections with each other over a public network such as the
Internet. Site-to-site VPN is different from remote-access VPN as it eliminates
the need for each computer to run VPN client software as if it were on a
remote-access VPN.
phases:
a ‘show crypto ipsec sa peer 12.12.12.12′ command instead.
any internet enabled location without any special client software at a remote
site. You only need a standard web browser and its native SSL encryption.
SSL VPNs provides anywhere connectivity without any configuration or special software
at remote site.
encapsulates packets in order to route other protocols over IP networks.
of the data. A receiving GRE removes the wrapper, enabling the original packet
to be processed by the receiving stack.
* GRE tunnels connect discontinuous sub-networks.
* GRE tunnels allow VPNs across wide area networks (WANs).
* GRE tunnels encase multiple protocols over a single-protocol
backbone.
* GRE tunnels provide workarounds for networks with limited
hops.
their roles.
firewalls provide packet filtering and they generally operate at layer 3
(Network Layer). Second generation firewalls operate up to the Transport layer
(layer 4) and records all connections passing through it and determines whether
a packet is the start of a new connection, a part of an existing connection, or
not part of any connection. Second generation firewall is mainly used for
Stateful Inspection.
of application layer filtering is that it can “understand” certain applications
and protocols (such as File Transfer Protocol (FTP), Domain Name System (DNS),
or Hypertext Transfer Protocol (HTTP)).
a flood of data or requests to a target system resulting in a consume/crash of
the target system’s resources. The attacker often uses ip spoofing to conceal
his identity when launching a DoS attack.
identity as trusted for attacking host. For example, if an attacker convinces a
host that he is a trusted client, he might gain privileged access to a host.
trust given to a network attached to the respective interface. The security
level can be configured between 0 to 100 where higher number are more trusted
than lower. By default, the ASA allows packets from a higher (trusted) security
interface to a lower (untrusted) security interface without the need for an ACL
explicitly allowing the packets.
used to control user’s rights to access network resources and to keep track of
the activity of users over a network. The current standard by which devices or
applications communicate with an AAA server is the Remote Authentication
Dial-In User Service (RADIUS).
security/threat prevention technology that examines network traffic flows to
detect and prevent vulnerability exploits. An Intrusion Prevention System can play
a good role to protect against various network security attacks such as brute
force attacks, Denial of Service (DoS) attacks, and vulnerability detection.
Moreover, an IPS also ensures prevention against protocol exploits.
secure the network from intrusions which include:
* Signature-Based
* Anomaly-Based
* Policy-Based
* Protocol-Analysis-Based
aspect to clear any interview for Network Security Engineer/Administrator
position and it is not possible for anyone to explain all kind of questions so
you can download more questions from the download link posted here and if you
find any difficulty getting the answer to any question then you can write me @
Comment section.
Design Engineer Candidates Need to Know
thinking to leave your current position for a new job as a network designer with
a new company?
article is for you and any of the described technologies and questions may be
asked during the interview!
responsibility of a network design engineer is to design both the hardware and
software technologies needed for a company’s network setup. A network designer
examines vendor-agnostic network design principles and is often responsible for
designing all of the network infrastructure, including routing, switching,
security, LAN, WAN, VoIP, wireless, optimization, load balancing, etc. If you
are more interested in network design and architecture, then don’t walk away
from the equipment, open up your brain to new approaches building networks.
all networking specialization).
following technologies:
* Layer 2 control plane
* Layer 3 control plane
* VoIP, security, wireless network architecture
* Network virtualization
* Design considerations
* Analyze design requirements
* Develop and Implement network designs
* Validate and optimize network design
very large networks who may not do one ounce of actual installation or
implementation of the network.”
network technologies or seen even a router or switch can be a network designer.
Equally, there are people who lay cables and configure routers and switches all
day. In the middle ground are the amateur designers who will throw a solution
together based on nothing but experience and reality, so it depends where you
want to be as a network engineer.
(implementation) focuses on “How.” Designing track gives you concepts and processes that will
enable you to better plan and lay out a network. It also gives you concepts such
as the design lifecycle, network lifecycle, etc. It attempts to teach you
different methodologies to sort through design problems and how to tackle them.
where he/she needs strong logical and technological points of view because
he/she needs to design with wireless, voice, and security in mind and not just
routing and switching.
for before facing any interview for the network designing environment.
responsibilities and don’t forget to share your achievements as a network
design engineer. You can also mention your involvement in complex LAN, WLAN,
and IPT infrastructure solutions and large-scale projects in unique
environments with collaboratively working within a team.
takes information and/or project specifications from customers and turns it
into a completed design definition which meets the agreed specification, with
due consideration to factors such as security and operational support including
routing, switching, security, LAN, WAN, VoIP, wireless, optimization, load
balancing, etc.
engineer?
suggestions/decisions taken by you on network/device migration and up-grading
from your previous experience. You can also share your involvement in project
review meetings and regular representation of the network services with your
team, and how it helped your team to achieve organizational goals of network
services.
taken by you and don’t try to explore decisions that were wrong in term of
technical or any misfit technology but this doesn’t mean that you will not
share your creativity and solution development skills.
engineer?
for a network engineer as listed below;
• Layer 3 control plane
• VoIP, security, wireless network architecture
• Network virtualization
• Design considerations
• Analyze design requirements
• Develop and implement network designs
• Validate and optimize network design
network designing position.
start your answer with a list of technologies used by you. You might have to
face cross-questioning for the described list of technologies.
demonstrate flexibility and sound design principles that allow your employer to
meet the requirements of network project. You can also share your best-practice
design methods that helped you to update and improve your way of working.
path a packet takes through the network. when you execute a traceroute command,
your machine sends out 3 UDP packets with a TTL (time-to-live) of 1.
successive batch of packets sent. This keeps going until you reach the
destination.
request to a specified interface on the network and, in response, it expects to
receive an ICMP echo reply. By doing this, the program can test connectivity,
gauge response time, etc.
operational bandwidth of each channel in each link?
digital channels and each channel of both T1/E1 gives you 64 kbps bandwidth.
channel has 64k Bw.
channel has 64k Bw. So for T1 – you get 23*64 = 1472kbps
forward a packet along the best path toward its destination.
* Destination network-id
* Next hop
* Exit Interface (outgoing network interface)
* Administrative distance:
* Metric: Assigns a cost to each available route so that the
most cost-effective path can be chosen
when a router alternately advertises a destination network via one route then
another in quick sequence; also if an interface on a router has a hardware
failure, it will cause the router to announce it alternately as “up” and
“down”.
* Broadband connection
* VoIP phone*
* Nexton soft-switches
* Router
* Audiocodec
* Astric server
(EGP) used for routing between autonomous systems. TCP port 179 is used to
establish session
* Customer is connected to multiple Internet service providers
(ISPs).
* Service provider networks (Transit autonomous system).
* In very large enterprise networks, where we can use BGP at
core layer as a redundant routing protocol.
connection over a public network such as the Internet. IPsec VPN means VPN over
IP Security allows two or more users to communicate in a secure manner by
authenticating and encrypting each IP packet of a communication session.
these issues?
issues:
communication network traffic. A commonly used IntServ QoS tool is RSVP
(resource reservation protocol), which provides QoS by guaranteeing treatment
to a particular traffic flow.
provides different levels
an overview of solution, platform, system, product, or process. High-level
design involves decomposing system into modules and representing the interfaces
and invocation relationships among modules. A high-level design document will
usually include a high-level architecture diagram depicting the components,
interfaces, and networks that need to be further specified or developed.
of the individual modules identified during HLD. LLD describes each and every
module in an elaborate manner so that the engineer can directly implement the
network based on this.
Engineer-Administrators (Data-WAN)
administrator? Or are you thinking to leave your current position for a new job
as a network engineer/administrator with a new company in a routed LAN/WAN
environment?
article is for you and any of described technologies and questions may be asked
of you during the interview!
“senior” prefix. The major responsibility of a network engineer is to determine
“how to implement technologies” in a routed LAN/WAN environment. They design
and implement both the hardware and software technologies needed for a computer
network. They have high-level technical skills in local area networks (LANs) or
wide area networks (WANs).
operation of computer networks. In general, they configure and administer
existing networks rather than designing networks from the beginning. They play
a very challenging role in a routed LAN/WAN environment, including
customization of the network as per the organization’s needs, such as adding
software and hardware, performance monitoring, troubleshooting, logging errors,
backing up and restoring data, assigning permissions to users, and helping
users with network issues.
position, make sure that you have enough knowledge on below technologies.
* Data communication and transmission techniques
* Fundamentals of OSI and TCP/IP model
* Router’s basic operations (startup, NVRAM, flash/IOS backup
and recovery)
* IP address classes
* Classful and classless IP addresses
* IP subnetting
* Understating wild card masks
* CIDR,FLSM,VLSM
* IPv6 fundamentals
* Difference between RIPv1,RIPv2 and RIPng
* Passive Interface
* RIP Timers
* RIP AD and Multicast Address
* Split Horizon and Route Poisoning
* Auto and Manual Summarization
* Neighborship Conditions
* Passive Interface
* Split Horizon
* Authentication
* EIGRP Stub Routing and Stuck in Active
* Equal and Unequal Load Balancing
* EIGRP ADs and Multicast Address
* OSPF Area Types
* OSPF Neighborship Conditions
* Concepts of ABR and ASBR Router
* DR/BDR Fundamentals and Election
* OSPF Times and Authentications
* OSPF Summarizations (Inter-Area, External, and Default Info
Originate)
* OSPF AD and Multicast Addresses
* OSPF Network and LSA Types
* BGP Fundamentals – Why and When to Use BGP?
* BGP States and Message Types
* BGP Neighborship Conditions
* iBGP and eBGP
* BGP Summarization
* Use of Update Source, eBGP-Multi-Hop, Next-Hop-Self Commands
* BGP Path Attributes
* BGP Synchronization and Split-Horizon Rule
* BGP Address Families
* BGP Communities
* MPLS Fundamentals – IP CEF, LIB, LFIB
* LDP and TDP
* P, PE and CE Routers
* PUSH,POP,SWAP Functions
* PHP – Penultimate Hop Popping
* BGP – VPN
* MPLS over ATM /Frame Relay
* QoS Models and Tools
* Difference between L2 and L3 Queues
* Characteristics of CoS, ToS, IPP, DSCP AF and EF
* Class Maps and Policy Maps
* Access-List Fundamentals
* Route-Maps
* Prefix-Lists
* Distribute-Lists
* Filter-Lists
* First-Hop Redundancy Protocols (HSRP,VRRP,GLBP)
* Network Address Translation (Static, Dynamic, PAT)
* Network Time Protocols, Syslog Server, SNMP
* Basics of VPNs (IPsec, Site to Site , DMVPN, Remote VPN)
* IP Multicast Routing (IGMP,PIM SM/DM, MSDP)
* Policy-Based Routing
* IP SLA
Administrator: All of the questions below are very common and must be
prepared for before facing any interview for the data-WAN environment.
communication between different networks. Basic roles performed by a router
are:
* Inter-network communication
* Best path selection
* Packet forwarding
* Packet filtering
only for directly connected networks. To establish communication between
indirectly connected networks, we require ROUTING. We can use static or dynamic
(IGP or EGP) routing, according to topology requirement.
select a route as best, a router considers the following parameters;
* Longest prefix match
* Minimum AD (administrative distance)
* Lowest metric value
perform equal cost load balancing.
sends a query message to its neighbor demanding a feasible successor (back-up
route) and a query received by the router may be forwarded to other neighbors
that could lead to a loop, as well. The wait for the response of query message
is called “stuck in active” (SIA).
communication. By default, Inter-area communication is not possible without
backbone area.
connecting two or more ABRs attached to this area.
neighbor?
exchange hello packets, but not LSA information. Adjacent routers are routers
that have fully exchanged their LSA information and are stable.
relationship and, if the state is FULL/DR or FULL/BDR, it means that the
adjacency is formed.
steps to troubleshoot it.
using “show ip bgp summary.” If the state is Idle, it means that the peer
address or AS is not defined properly; if the state is Active, it means that TCP port 179
is not open, the peer is not reachable, network congestion, or BGP
misconfiguration.
* Misconfigured neighbor’s IP address and AS number
* Reachability issues when interfaces other than directly
connected interfaces are used while peering (update-source issue).
* Authentication must be properly implemented (if configured)
* Router-ID must be unique
rule says “prefix learned from an iBGP neighbor will not be advertised to
another iBGP neighbor.”
To overcome this situation, we have multiple options:
route reflector server: Rather than peering with every iBGP router in a full
mesh, it makes IBGP neighbors as route reflector clients to overcome the split
horizon issue.
source- and destination-based. Standard ACLs can only filter layer 3 network
traffic, while extended ACLs can be used to filter layer 3 and layer 4, as
well.
which can be applied over most routing protocols. This means that, If you don’t
want any specific network in your routing table, then you can use
distribute-list.
sometimes called layer 2.5.
before the egress router. The MPLS label on a switched packet is popped by
either the egress router or the penultimate router, depending on your
configuration. If you decide to use penultimate hop popping, you essentially
terminate the LSP one hop earlier. The MPLS labels are popped by the routers
that connect to the egress router, rather than all of them being popped by the
same egress router.
(class of service) filed in the VLAN header. This will be used to prioritize
traffic. Later, a QOS scheduler can use the COS filed to qualify the traffic
into different QOS queues.
achieved through ToS (type of service) priority values—IPP (3-bit), DSCP (6-bit),
which can be set in the TOS field of the IP header. This TOS will later be used
by scheduling process to achieve QOS.
software-based. That’s why we can modify L3 queues to meet our requirements.
* Data communication and transmission techniques
* Fundamentals of OSI and TCP/IP model
* Basic operations of a switch (startup, NVRAM, flash/IOS backup
& recovery)
* IP address classes
* Classful and classless IP addresses
* IP subnetting
* Understating wild card masks
* CIDR, FLSM, and VLSM
* IPv6 fundamentals
* RIP
* EIGRP
* OSPF
* Basic requirements of VLANs
* VLAN Database
* Normal/Extended VLAN, voice VLAN
* Inter-VLAN routing
* Switch Virtual Interface (SVI)
* Trunk encapsulations
* DTP (Dynamic Trunking Protocol)
* Native VLAN
* Manual VLAN pruning
* Requirement and functionalities of VTP
* VTP modes/versions
* VTP revision number
* VTP pruning
* VTP authentication
* Needs of STP
* Switch priority, port priority, path cost, STP timers
* PVST and PVST+
* RSTP and RPVST
* Multi-Spanning Tree (MST)
* Spanning Tree Enhancements (PortFast, UplinkFast,
BackboneFast, etc.)
* LACP, PAgP, manual
* Layer 2, layer 3
* Ether-channel Load-balancing
* Ether-channel misconfiguration guard
* Hot Standby Routing Protocol (HSRP)
* Virtual Routing Redundancy Protocol (VRRP)
* Gateway Load Balancing Protocol (GLBP)
* QoS Models and Tools
* Layer 2 queues
* DHCP Snooping
* Dynamic ARP Inspection (DAI)
* BPDU Guard, BPDU Filter, Root Guard, Loop Guard, UDLD
* AAA server
* VLAN Access-Maps
* Private VLANs
* Storm Control
* Port-Security
* IP Source Guard
* System Management (VTY, Telnet, HTTP, SSH, FTP, TFTP)
* SNMP, Syslog
* DHCP client, IOS DHCP server, DHCP relay
Administrator (Data – LAN) Position
for before facing any interview for the data-LAN environment.
connecting a number of computer systems with network protocols.
The Ethernet system called 10BASE-T provides transmission speeds of up to 10
Mbps. Devices are connected to the cable and compete for access using a Carrier
Sense Multiple Access with Collision Detection (CSMA/CD) protocol.
100 megabits per second and is typically used for LAN backbone systems. Gigabit
Ethernet provides an even higher level of backbone support at 1,000 megabits
per second (1 gigabits per second).
network, in which all nodes can reach each other by broadcast in a LAN
environment.
can collide with one another when being sent on a shared medium.
Only one device in the collision domain may transmit at one time, and the other
devices in the domain listen to the network in order to avoid data collisions.
multiple network devices over LAN but their functionalities are different. Hubs
operate at layer 1 whereas switches operate at layer 2. Hubs support half
duplex transmission while switches support full duplex. There is one broadcast
and collision domain in a hub, but a switch has one broadcast plus as many collision
domains as the number of switch ports.
Fast-Ethernet/Gig-Ethernet.
unmanageable switches?
multiple network devices over the same geographical location. It processes and
forwards data at the data link layer (layer 2) of the OSI model.
They are typically used in small offices or home environments.
control to manage Spanning Tree Protocol, Port Speed, VLANS, etc. They provide
a serial console and command-line access via telnet and SSH, as well as
management via SNMP.
allows a network administrator to create groups of logically networked devices
based on functions, departments, or projects. The basic reason for splitting a
network into VLANs is to reduce congestion on a large LAN.
* Security
* Cost reduction
* High performance
* Broadcast storm mitigation
* Improved IT staff efficiency
* Simple project or application management
port. If a switch receives untagged frames on a trunk port, they are assumed to
be part of the VLAN that are designated on the same switch port as the native
VLAN. Frames that pass through a switch port on the native VLAN are not tagged.
all switches in the network receive all broadcasts, even in situations in which
few users are connected to that VLAN. Pruning is a method to prevent flooding
across the network from unnecessary traffic.
(routers, IP phones, printers, desktops, etc.)
configured with multiple VLANs.
database replication in a switching environment. VTP has four modes: server,
client, transparent and off. VLANs created on a VTP server synchronises with
VTP clients automatically.
The VTP configuration has a revision number which will increase when you make a
change on a VLAN database.
client, client to client) but will not synchronize itself. It manages its own
VLAN database, which will not be shared with any other switch.
switching technologies to eliminate layer 2 switching loops. The root bridge
serves as an administrative point for all spanning-tree calculations to
determine which redundant links to block.
seconds from its ports which contain bridge-id, bridge-mac, cost,
port-priority, etc.
there is a tie in priority, then the lowest MAC address will determine which
bridge becomes the root. Lower priority is preferred compared to a higher. The
default bridge priority is 32768 and you can set it in multiples of 4096.
technology used to configure a separate spanning tree instance for each VLAN.
It supports ISL trunking encapsulation whereas PVST+ supports Dot1Q trunking
encapsulation.
difference is fast convergence. RPVST skips the listening state during the
transition.
number of different VLANs involved. With 30 to 40 VLANs you can use PVST
without any concerns.
40 spanning tree databases (a separate database for each VLAN) and if you
decide to use MST, you need to provision some instances (logical grouping of
VLANs).
switch has to maintain only two spanning tree databases (a separate database
for each instance) then.
balancing using EtherChannels?
grouping of several physical Ethernet links to create one logical Ethernet link
for the purpose of providing fault-tolerance and high-speed links between
switches, routers and servers.
predefined hash algorithms but you cannot control the port that a particular
flow uses.
The hash algorithm cannot be configured or changed to load balance the traffic
among the ports in an EtherChannel.
src_mac_addr | dest_mac_addr | src_port | dest_port} [dest_ip_addr |
dest_mac_addr | dest_port.
protocol that automatically assigns IP addresses to hosts with other related
configuration information such as the subnet mask and default gateway.
request and resend it to the real DHCP server. It means a DHCP server is
installed at a remote location and your LAN gateway is acting as a DHCP relay
agent (proving the information of DHCP server using “ip helper address”
command).
configure a switch port connected to a DHCP server as a trusted port. The
trusted port is responsible for the reply DHCP requests. DHCP snooping is the
best solution to prevent man-in-the-middle DHCP attacks.
provide first hop redundancy.
* Cisco proprietary
* 1 Active + 1 standby router and 1 or more listening routers
* Uses separate virtual IP addresses as gateway
* Hello timer is 3 seconds and hold-down timer is 10 seconds
* Preempt is disabled by default
* Multicast at 224.0.0.2 (ver1), multicast at 224.0.0.102
(ver2). Both versions use UDP port 1985
* HSRP (v2) supports IPv6
* Open standard (IETF)
* 1 master and 1 or more backup routers
* Physical IP address can be used for Virtual IP
* Hello timer is 1 second and hold-down timer is 3 seconds
* Preempt is enabled by default
* Multicast at 224.0.0.18 – IP 112
* VRRP does not support IPv6
often with “jr.” and “sr.” prefixes. The major responsibility of a network
engineer (security) is to determine “how to implement network security” in
routed LAN/WAN environments. They design and implement both the hardware and
software necessary technologies to secure computer network. They have
high-level technical skills in LAN/WAN security. The major responsibility of a
network admin (security) includes adding security software and hardware,
performance monitoring, troubleshooting, logging errors, backing up and
restoring data, and assigning permissions to users.
(security) position, make sure that you have enough knowledge of firewalls
(software & hardware), VPNs (IPsec, SSL, and Get VPN etc.) with general
network technologies as described below:
* Data communication and transmission techniques
* Fundamentals of OSI & TCP/IP model
* Router’s basic operations (startup, nvram, flash/IOS backup
& recovery)
* IP Addressing and Summarization
* IP Routing : Basics of RIP , EIGRP , OSPF & BGP
* NAT (object based)
* ACL (object based)
* Contexts
* Failover (Active-Standby & Active-Active)
* Transparent
* MPF (Modular Policy Framework)
* Site to Site
* SSL
* Get VPN
* Easy VPN
* DMVPN
Flex
* Access-lists
* Route-Maps
* Prefix-Lists
* Distribute-Lists
* Filter-lists
* Class-maps & Policy-maps
* AAA Server
* Dot 1x Authentication
* Ip SLA
Engineer/Administrator: All listed questions are very common and important and you
must be prepared with all of the following answers before facing any interview
for a Network Security position.
networks connected to the internet. They can be implemented as hardware or
software, or a combination of both. All incoming and outgoing network traffic
are examined and accepted/rejected by the firewall as per defined rules.
firewall protects a computer network against unauthorized incoming or outgoing
access. Network firewalls may be hardware devices or software programs.
traffic flow from an untrusted network (outside). A firewall is not able to
detect an attack in which the data is deviating from its regular pattern,
whereas an IPS can detect and reset that connection as it has inbuilt anomaly
detection.
a new firewall into a network can be a complicated process due to various
issues (e.g. IP address reconfiguration, network topology changes, current
firewall etc.) because the firewall is not a routed hop and you can easily
introduce a transparent firewall into an existing network.
ip packets based on source and destination addresses, ports, or protocols. The
packet filter examines the header of each packet based on a specific set of
rules, and on that basis, decides to prevent it from passing or allow. Packet
filtering is also part of a firewall program for protecting a local network
from unwanted access.
and is a firewall technology that monitors the state of active connections and
uses this information to determine which network packets are allowed through
the firewall. Stateful inspection analyses packets down to the application
layer.
encryption and decryption. In this mechanism, public key is used to encrypt
messages and only the corresponding private key can be used to decrypt them. To
encrypt a message, a sender has to know the recipient’s public key.
used for security purposes. It is used to verify the authenticity of the
sender.
user/client privileges or access levels related to network resources, including
firewalls, routers, switches and application features. Authorization is
normally preceded by authentication and during authorization. It’s system that
verifies an authenticated user’s access rules and either grants or refuses
resource access.
the primary node, it is synced to the secondary node. When the primary node
fails, sessions continue to pass traffic through the secondary node without
having to re-establish.
connection over a public network such as the internet.
communicate in a secure manner by authenticating and encrypting each IP packet
of a communication session.
establish secure connections with each other over a public network such as the
Internet. Site-to-site VPN is different from remote-access VPN as it eliminates
the need for each computer to run VPN client software as if it were on a
remote-access VPN.
phases:
a ‘show crypto ipsec sa peer 12.12.12.12′ command instead.
any internet enabled location without any special client software at a remote
site. You only need a standard web browser and its native SSL encryption.
SSL VPNs provides anywhere connectivity without any configuration or special
software at remote site.
encapsulates packets in order to route other protocols over IP networks.
transmission of the data. A receiving GRE removes the wrapper, enabling the
original packet to be processed by the receiving stack.
* GRE tunnels connect discontinuous sub-networks.
* GRE tunnels allow VPNs across wide area networks (WANs).
* GRE tunnels encase multiple protocols over a single-protocol
backbone.
* GRE tunnels provide workarounds for networks with limited
hops.
their roles.
firewalls provide packet filtering and they generally operate at layer 3 (Network
Layer). Second generation firewalls operate up to the Transport layer (layer 4)
and records all connections passing through it and determines whether a packet
is the start of a new connection, a part of an existing connection, or not part
of any connection. Second generation firewall is mainly used for Stateful
Inspection.
of application layer filtering is that it can “understand” certain applications
and protocols (such as File Transfer Protocol (FTP), Domain Name System (DNS),
or Hypertext Transfer Protocol (HTTP)).
a flood of data or requests to a target system resulting in a consume/crash of
the target system’s resources. The attacker often uses ip spoofing to conceal
his identity when launching a DoS attack.
identity as trusted for attacking host. For example, if an attacker convinces a
host that he is a trusted client, he might gain privileged access to a host.
trust given to a network attached to the respective interface. The security
level can be configured between 0 to 100 where higher number are more trusted
than lower. By default, the ASA allows packets from a higher (trusted) security
interface to a lower (untrusted) security interface without the need for an ACL
explicitly allowing the packets.
accounting, used to control user’s rights to access network resources and to
keep track of the activity of users over a network. The current standard by
which devices or applications communicate with an AAA server is the Remote
Authentication Dial-In User Service (RADIUS).
security/threat prevention technology that examines network traffic flows to
detect and prevent vulnerability exploits. An Intrusion Prevention System can
play a good role to protect against various network security attacks such as
brute force attacks, Denial of Service (DoS) attacks, and vulnerability
detection. Moreover, an IPS also ensures prevention against protocol exploits.
secure the network from intrusions which include:
* Signature-Based
* Anomaly-Based
* Policy-Based
* Protocol-Analysis-Based
aspect to clear any interview for Network Security Engineer/Administrator
position and it is not possible for anyone to explain all kind of questions so
you can download more questions from the download link posted here and if you
find any difficulty getting the answer to any question then you can write me @
Comment section.
Engineer/Administrators
you thinking of leaving your current position for a new job as a VoIP engineer/administrator
with a new company in a Unified communication networking?
is for you.
higher-level position, often with a “junior” or “senior” prefix. The major
responsibility of a VoIP engineer is to design and implement both the hardware
and software technologies needed for a VoIP setup. They have to customize VoIP
networks as per the organization’s needs, such as adding software and hardware,
performance monitoring, troubleshooting, logging errors, backing up and
restoring data, assigning permissions to users, and helping users for VoIP
network issues.
sure that you have enough knowledge on the below technologies:
* Fundamentals of OSI & TCP/IP model
* IP Addressing & Summarization
* Basics of routers and routing (EIGRP,OSPF,BGP)
* Basics of LAN Switching (VLANs, Inter-VLAN routing, STP)
* Network Services (Telnet, SSH, NTP, DHCP, Syslog)
* IP phone boot process
* Phone registration through CME (IOS based)
* CME features- call park, call pick-up, paging, intercom
* Understanding of clusters, ISDN configuration
* VoIP dial peers and POTS
* Cisco ip phone registration through CUCM (Manual/Auto/BAT)
* Understanding and Implementation of voice gateways
MGCP,H.323,SIP
* Signaling and Flow of voice gateways
* Call routing elements : route group, route list, SLRG
* Partition & CSS
* Media Recourses
* Integration of CUCM with CUC via SCCP & SIP
* Mobility : device/extension mobility, MUA, Single Number reach
(SNR)
* Survivable Remote Site Telephony (SRST)
* Call manager fall back
* Resource Reservation Protocol (RSVP)
* Automated Alternate Routing (AAR)
Engineer/Administrators:
All of the
questions below are very common and must be prepared for before facing any
interview for the unified communication environment.
send your voice (analog data) over the internet (digital data) to an end user.
It enables users to use the Internet as the transmission medium for voice calls
at a very low cost.
it different from traditional phone service?
flit all over the Internet or private networks, just like e-mails or Web pages,
though voice packets get priority status. The packets get reassembled and
converted to sound on the other end of the call but in traditional phone
service, a phone conversation is converted into electronic signals that
traverse an elaborate network of switches, in a dedicated circuit that lasts
the duration of a call.
some drawbacks as listed below:
* Some VoIP services don’t work during power outages and the
service provider may not offer backup power.
* Not all VoIP services connect directly to emergency services
through 9-1-1.
* VoIP providers may or may not offer directory assistance/white
page listings.
* Broadband connection
* VoIP phone
* Nexton soft-switches
* Router
* Audiocodec
* Astric server
Services Routers to provide high-density voice connectivity, conferencing, and
transcoding capabilities in Cisco IP Communications solutions.
the PSTN. It converts analog telephony signals to digital.
* Call routing, packet processing and control signalling
managementVoice and fax compression/decompressionExternal controller interfaces,
for example to a soft switch, billing system or network management system
* Uses clear text for call controlUses a client-server
modelIdeally positioned for service providers (centrally located call
agents)Centralized management and control (Dial plan, etc.)Enhanced call
survivabilityBetter feature interaction with capabilities like Caller-IDSupport
of QSIG supplementary services with CCM
* Uses Abstract Syntax Notation 1 for call control messagesUses
a peer-to-peer modelScales well in an enterpriseFractional PRI supportCaller-ID
support on analog FXOMany more TDM interface types and
signallingGateway-resident applications like TCL and VXMLCAC network design
with H.323 GatekeepersNo release dependencies between GWs and CCMCall
preservation for SRST on PRIsNFAS support
exchange, between the SIP user agents.; It basically includes a
request-response cycle.
usually created through generations of SUCCESSFUL final response.
endpoints.
while talking?
create a crackling sound when you talk, but is not common for VoIP provider or
internet connection as digital systems don’t generate sounds like this. It’s
only possible that it could be from the person on the other end who is also on
an analog telephone line but if this happens with different people then it’s
likely your phone. Try to replace the phone.
between the gateway and the Route Pattern, thus creating a more flexible method
of selecting a PSTN gateway.
created per country, a huge amount of administrative overhead can be saved,
especially for organizations with a large number of sites.
telephone systems) dial-peers?
protocol where POTS dial peers route calls to legacy PBX systems via local
ports which can be analog (like FXS, FXO) or digital (like E1/T).
trunk?
Internet connection. This VoIP “trunk” (or phone line) connects to a provider
who routes your calls through their gateway and usually has very reasonably
lower rates on long distance calls, international calls and in-bound toll free
calls.
conferences, user presence information, and Enhanced 9-1-1 (E9-1-1) emergency
calls.
* Eliminate BRI and PRI subscription fees because SIP trunk
connected directly to an Internet telephony service provider
* Eliminate IP-PSTN gateways (or even your entire PBX)
* Low cost long distance calls, international calls, etc.
* Expansion of lines is dependent on bandwidth, which can easily
be increased if needed. It means that with SIP trunking you don’t need to buy
lines in blocks of 24 or 32. Instead, you can buy the bandwidth you need in
smaller increments.
are we using t E1 and T1 for digital transmission?
has a data rate of 1.544 mbps and E1 has a data rate of 2.048 mbps.
channels (E1-32 Channel and T1-24 channels) but speed (64 kbps) remains the
same for both links: may be for inter – connection between the E1 and T1 lines.
This is interconnected because it is used for international connectivity
purposes.
Japan. E1 is mostly used in Europe.
operational bandwidth of each channel in each link?
digital channels and each channel of both T1/E1 gives you 64 kbps bandwidth.
channel has 64k Bw.
channel has 64k Bw. So for T1 – you get 23*64 = 1472kbps
and CSS?
establishment and control of a telecommunication circuit and the management of
the network.
signalling where Channel Associated Signalling (CAS) conveys signalling
information relating to multiple bearer channels. These bearer channels
therefore have their signalling channel in common.
packet loss and jitter than G711. G729 uses 33 Kbps of bandwidth whereas G711
uses 87 Kbps. G729 is compressed but still sounds very good in poor network but
G711 sounds better only with good network conditions.
trunking between Cisco and Avaya PBX.
Q signalling (QSIG), a protocol for Integrated Services Digital Network (ISDN)
communications based on the Q.931 standard, is used for signalling between
digital PBXs.
standpoint of clearing any interview for a VoIP network engineer/administrator
position. It is not possible for anyone to explain all kinds of questions, but
you can get more frequently asked interview questions for VoIP Network
Engineering Jobs from the download link posted here. If you find any difficulty in answering any questions, then you
can write me @ Comment section.
Collision Domain
described as an event that usually happens on an Ethernet network when we use a
“Shared Media” to connect the devices in an Ethenrnet network. A
“Shared Media” is a type of connecting media which is used to connect
different network devices, where every device share the same media. Example: 1)
Ethernet Hubs, 2)
Bus Topology
Media” there are no separate channels for sending and recieving the data
signals, but only one channel to send and recieve the data signals.
media when the devices are connected together using Bus topology, or
by using an Ethernet Hub.
Both are half-duplex, means that the devices can Send OR Recieve data signals
at same time. Sending and recieving data signals at same time is not supported.
Ethernet Network when two devices simultaneously try to send data on the Shared
Media, since Shared Media is half-duplex and sending and recieving is not
supported at same time. Please refer CSMA/CD to
learn how Ethernet avoid Collision.
of life in an Ethernet network when Ethernet operates in Half-duplex and under
most circumstances should not be considered as a problem.
Domain is any network segment in which collisions can happen (usually in
Ethernet networks). In other words, a Collision Domain consists of all the
devices connected using a Shared Media (Bus Topolgy or
using Ethernet Hubs)
where a Collision can happen between any device at any time.
“Computer A” send a data signal to “Computer X” and
“Computer B” send a data signal to “Computer Y”, at same
instance, a Collision will happen.
a collision domain increases, chances of collisions are also more. If there is
more traffic in a collision domain, the chances of collisions are also more.
More collisions will normally happen with a large number of network devices in
a Collision domain.
result in low quality network where hosts spending more and more time for
packet retransmission and packet processing. Usually switches are used to
segment (divide) a big Collision domain to many small collision domains. Each
port of an Ethernet Switch is operating in a separate Collision domain.
cannot happen between two devices which are connected to different ports of a
Switch.
collision and related network problems now because we are not using Network
Hubs to connect our devices. Ethernet Network Hubs are
replaced with Ethernet Network
Switches long way back.
Broadcast Domain
communication, where the sending device send a single copy of data and that
copy of data will be delivered to every device in the network segment. Brodcast
is a required type of communication and we cannot avoid Broadcasts, because
many protocols (Example: ARP and
DHCP)
and applications are dependent on Broadcast to function.
Domain consists of all the devices that will receive any broadcast packet
originating from any device within the network segment.
“Computer A” is sending a broadcast and switch will forward it to
every ports and all the switchs will get a copy of broadcast packet. Every
switch will flood the broadcast packet to all the ports. Router also will get a
copy of broadcast packet, but the Router will not forward the packet to the
next network segment.
the Broadcast Domain increases, number of Broadcasts also increases and the
quality of the network will come down because of the following reasons.
Decrease in available Bandwidth: Large number of Broadcasts
will reduce the available bandwidth of network links for normal traffic because
the broadcast traffic is forwarded to all the ports in a switch.
Decrease in processing power of computers:
Since the computers need to process all the broadcast packets it recieve, a
portion of the computer CPU power is spent on processing the broadcast packets.
Normally a Broadcast packet is relevent to a particular computer and for other
computers that broadcast packet is irrelevant (For example, DHCPDISCOVER
message is relevent only for a DHCP Server. For other computers DHCPDISCOVER is
irrelevant and they will drop the packet after processing). This will reduce
the processing power of computers in a Broadcast domain.
allow broadcasts from one of its connected network segment to cross the router
and reach another network segment. The primary function of a Router is to
segment (divide) a big broadcast domain in to multiple smaller broadcast
domains.
Difference
between Static and Dynamic IP.
permanent address assigned to each device in a network, whereas Dynamic IP, a
temporary address assigned to the device via DHCP software. IP address assigned
to your service by your cable or DSL Internet provider is typically dynamic IP.
In routers and operating systems, the default configuration for clients is
dynamic IP
What is the
difference between public and private IP?
equipment accessible to everyone on the internet. A private IP address is for
private use within the network and allows many more PCs to be connected. If you
are using a private IP and wants VOIP, you need to change to a public IP
address.
What is
Network Address Translation?
as an agent between the Internet and a local network. It is a dynamic method
which is used to minimize Internet connectivity needs. Network address
translation describes the rewriting of the Internet Protocol (IP) addresses of
data packets so that multiple transmissions require only one IP address.
Define IP
multicast.
traffic by sending stream of information to many recipients at one go. Video
conferencing, stock quotas are the examples based on IP multicast.
What is
subneting?
IP address is represented. It logically organizes the network. For instance, it
can logically group computers belongs to the finance department.
Define
Address Resolution Protocol.
is responsible for mapping an IP address to its corresponding physical network
address. It is mostly seen on Ethernet network.
Explain
Maximum Transfer Unit, MTU.
of data that can be transferred across a network.
What is
Routing Protocol?
send routing information between any routers in an autonomous system.
destination, this packet has a specific path or route it follows. Different
routing protocols are used to find the shortest path to the destination. The
protocols maintain routing tables. Routing tables consist of a set of rules
used to determine where these packets will travel. When a packet is received, a
network device examines the packet and matches it to the routing table entry
providing the best match for its destination. The packet keeps hopping until it
reaches its destination
Explain the
structure and use of internet addresses.
In human language the IP addresses are written in dotted decimal notation.
These are then converted to binary by the computer. Each IP address has two
parts: Network identifier or a network ID and host ID. The current internet
protocol standard is IPV4. The IP addresses are divided into three classes: a
class A network, a class B network, and a class C network. Class A being the
largest. The four digit numbers in an IPV4 address, each network of class A
will have different first number, and then its network will be addressed by the
rest of the three numbers, or three bytes. The IP addresses identify a machine
to deliver packets and load web pages.
Explain how
names are translated (resolved) into IP address.
to resolve names into IP addresses. When a web address is entered into the
browser, the DNS client sends a request to the DNS server to find the
corresponding IP address for the name. The DNS server receives this request and
searches for the corresponding IP address in the database. If at this point the
resolution fails, this server sends this request to the parent server. The
request keeps going up the hierarchy to the parent servers or the closest
authoritative of the DNS server to resolve the address. If the request times
out an error is retuned to the client. If the server is able to resolve the
name requested, it passes the information back to the client. The next request
sent by the client is to request for a web page for the IP address.
Describe the
basics of internet routing.
destination, this packet has a specific path or route it follows. Different
routing protocols are used to find the shortest path to the destination. The
protocols maintain routing tables. Routing tables consist of a set of rules
used to determine where these packets will travel. When a packet is received, a
network device examines the packet and matches it to the routing table entry
providing the best match for its destination. The packet keeps hopping until it
reaches its destination.
Define
broadcast domain.
computer network where any computer connected to the network can directly
transmit to any other computer in the domain without having to go through a
routing device.
Bridge vs
switch
LAN networks. A switch is something like you can connect many computers to a
switch and then one computer can connect to another through the switch. Switch
is a unicast one to one connection.
What is a
Router?
a software in a computer which decides the next network point to which a packet
should be forwarded to reach its destination on Internet. It is usually
included as part of the network switch and is located at a gateway, including
each point-of-presence on the Internet. The router is connected to at least two
networks and determines which way to send each information packet based on its
understanding of the state of the networks it is connected to.
Define
gateway
provides entrance into another network. On the Internet, a node or stopping
point can be either a gateway node or a host (end-point) node. Both the
computers of Internet users and the computers that serve pages to users are
host nodes. The computers that control traffic within your company’s network or
at your local Internet service provider (ISP) are gateway nodes.
What is
firewall?
software installed to provide security to the private networks connected to the
internet. They can be implemented in both hardware and software, or a
combination of both. All data entering or leaving the Intranet passes through
the firewall which allows only the data meeting the administrators’ rules to
pass through it.
What are the
types of firewalls?
This type of Firewall detects packets and block unnecessary packets and makes
network traffic release.
Firewalls:
It’s a software base firewall available in Router provides only light
filtering.
It’s a firewall stored in server with an existing Operating System like Windows
and UNIX.
Its device like box allows strong security from public network. Mostly used by
big networks.
Proxy server allows all clients to access Internet with different access
limits. Proxy server has its own firewall which filters the all packet from web
server.
What is Data
encryption?
safety and very important for confidential or critical data. It protect data
from being read, altered or forged while transmission.
What is the
Public Key Encryption?
and private key for encryption and decryption. In this mechanism, public key is
used to encrypt messages and only the corresponding private key can be used to
decrypt them. To encrypt a message, a sender has to know recipient’s public
key.
Define
Digital Signatures.
attachment to an electronic message used for security purpose. It is used to
verify the authenticity of the sender.
What is
Ethernet technology?
speed broadcast bus technology. In this type, all the station shares a single
ether channel and receives every single transmitted signal.
What is CSMA
and CD concept?
access), presence of any digital signal in a network is checked before
transmission. Data transmission occurs only when no signal is sensed.
responsible for monitoring carrier in order to avoid signal jam.
What is
NetBIOS protocol?
Input/Output System) Protocol allows applications on separate computers to
communicate over a LAN. It runs over TCP/IP giving each computer in the network
a NetBIOS name and IP address. E.g. It can be used for computers running
Windows 2000 (or before) to join a computer network running Windows 2000 (or
later).
What is IGMP
protocol?
Protocol, allows internet hosts to multicast. i.e. to send messages to a group
of computers. There may be a group of internet hosts interested to multicast.
IGMP allows router to determine which host groups have members on a given
network segment. It helps to establish group memberships. It is commonly used
for streamlining videos and gaming. The protocol can be implemented both as a
host side and router side. The host side is responsible to notify its
membership in a group. The notification is made to a local router. This local
router (router side) in turn sends out queries.
What is TCP
/ IP protocol?
Internet Protocol: – It is a family of protocols used for communication and
connection between hosts on the internet. It is the most widely used standard
for transmitting data over the internet. The four layers in the protocol are
(from bottom to top):- Physical layer, Data link layer, Network layer,
transport layer and application layer, also called as the OSI model. In TCP/IP
, IP is responsible for forwarding packets while TCP ensures the correct
delivery of data from client to server. TCP detects loss of data as well.
What is HTTP
(Hypertext Transfer Protocol)?
Protocol is provides a set of rules to transfer files, videos, images over the
world wide web. When the web browser is opened, a HTTP request call is made. A
web server contains a HTTP daemon. This daemon is used to wait for HTTP
requests and handle them when they arrive. The web browser from where HTTP
requests are made is called as a client. These requests are sent to the server.
It uses a reserved port no 80.
What is NNTP
(Network News Transfer Protocol)?
Protocol is used to manage the notes posted on Unset newsgroup (a collection of
posted notes on a subject posted by different users). NNTP servers are
responsible for managing Usenet newsgroup collected globally. A NTTP client is
a part of the web browser also called as a news reader. It uses a reserver port
no 119.
What is POP3
(Post Office Protocol 3)?
fro receiving emails. It is a client server protocol which holds the email.
Once the email is downloaded from the server, POP3 deletes it from the server.
Ordinal numbers are used to identify specific messages.
What is SNMP
(Simple Network Management Protocol)?
Protocol is typically used for managing the network. Managing the network
includes managing the nodes present in the network. These nodes may be server,
routers, bridges and hubs. SNMP agents are used to achieve this. Managing the
network is essential because it helps to monitor network performance, detect
network faults or failures, audit network usage etc. the SNMP messages like
TRAP, GET or SET may be invoked by network elements or network management
system.
What is Routing
Protocols?
assist in achieving the basic purpose of routing. They specify the routers the
method to communicate with each other. They help the routers select the best
possible path between nodes. There are different types of protocols such as
link-state routing protocols, path vector protocols and distance vector routing
protocols. These protocols prevent routing loops to form or break if formed
already. They help to decide preferred routes from a sequence of hop costs..
What is
Distance Vector Routing Protocols?
Routing Protocols Is to find out the best path for he data packet to reach the
destination. Distance here could be the hops. The three different types of
Distance Vector routing protocols include:- Routing Information Protocol (RIP
v1 and v2) and Interior Gateway Routing Protocol. The protocol is easy to
manage however not well scalable.
initially prepares a Routing table which is shared with other routers. This
routing table is shared between routers present in the same network. A new
routing table is prepared when some new information is received from some other
router. Now, the bad routing paths are removed keeping only the smallest hop
paths. This new table is then communicated to other routers.
Explain
Transmission Control Protocol, TCP
end delivery of segments of information. Segments are acknowledged to the
source when received by the destination. Data is broken up into segments and
sequenced properly before transmission. This arrangement of segments allows
destination to trace lost data in transmission.
What is TCP
protocol?
used to establish communication between nodes or networks and exchange data
packets. It guarantees delivery of data packets in the order they were sent.
Hence it is most commonly used in all applications that require guaranteed
delivery of data. It can handle both timeouts (if packets were delayed) and
retransmission (if packets were lost). The stream of data is transmitted in
segments. The segment header is 32 bit. it is a connectionless communication
protocol at the third level (network) of the OSI model.
TCP vs. UDP.
data. UDP on the other hand, does not guarantee delivery of data. TCP delivers
messages in the order they were sent. UDP has no ordering mechanisms. In TCP
data is sent as a stream while UDP sends data as individual packets. UDP is
faster than TCP. TCP is a connection oriented protocol while UDP is
connectionless.
Explain User
Datagram Protocol, UDP.
unreliable service. UDP messages can be lost and duplicated.
What is UDP
protocol?
communication protocol. It is normally used as an alternative for TCP/IP.
However there are a number of differences between them. UDP does not divide
data into packets. Also, UDP does not send data packets in sequence. Hence, the
application program must ensure the sequencing. UDP uses port numbers to
distinguish user requests. It also has a checksum capability to verify the
data.
TCP vs. UDP.
data. UDP on the other hand, does not guarantee delivery of data. TCP delivers
messages in the order they were sent. UDP has no ordering mechanisms. In TCP
data is sent as a stream while UDP sends data as individual packets. UDP is
faster than TCP. TCP is a connection oriented protocol while UDP is
connectionless.
What is TCP
windowing concept?
primarily used to avoid congestion in the traffic. It controls the amount of
unacknowledged data a sender can send before it gets an acknowledgement back
from the receiver that it has received it.
What is
Trusted and Untrusted Networks?
transparently. The machines using a trusted network are usually administered by
an Administrator to ensure that private and secured data is not leaked. Access
to this network is limited. Computers using trusted networks are more secured
and confidential because of strong firewalls.
owners. They can allow improper access to sensitive or personal data. These
machines are usually separate. Such machines could me more prone to
attacks.
used in scenarios where remote access to a network becomes essential. Remote
access VPN allows data to be accessed between a company’s private network and
remote users through a third party service provider; Enterprise service
provider. E.g Sales team is usually present over the globe. Using Remote access
VPN, the sales updates can be made.
Remote locations are present and can be made to join to a single network.
Machines present on these remote locations work as if they are working on a
single network.
different companies need to work in a shared environment. E.g. Distributors and
service companies. This network is more manageable and reliable.
method uses an authentication protocol. The methods are:
method: Extensible authentication protocol
authenticates remote access connection. The authentication mechanism is decided
between the remote VPN client and authenticator (ISA). The mechanism is typical
in which authenticator requests for authentication information and the
responses are given by the remote VPN client.
method: Microsoft Challenge Handshake
Authentication Protocol (MS-CHAP) starts with the authenticator (Remote access
server) challenge. The challenge to the remote access client sends a session
identifier and challenge string. The client in response sends the nonreversible
encryption of the string, the identifier and password. Authenticator checks the
credentials and grants access on a successful authentication.
(PAP):- Uses plain text passwords. Does not involve
encryption. Used for less secure clients.
Authentication Protocol (SPAP):- It is a password
authentication protocol. It is less secure as the same user password is always
sent in the same reversibly encrypted form
What is
Tunneling?
to transfer data securely between two networks. The data is split into smaller
packets and passed through the tunnel. The data passing through the tunnel has
3 layers of encryption. The data is encapsulated. Tunneling can be approached
by Point to Point tunneling protocol.
What are
voluntary and compulsory tunnels?
Users computer is an end point of the tunnel and acts as tunnel client. Here
the client or user issues a request to configure and create a voluntary tunnel.
They require a dial up or LAN connection. Example of dial up connection is
internet at home where a call is made to the ISP and connection is obtained.
In compulsory tunneling, instead of the user a vpn remote access server
configures and creates a tunnel. Hence, the end point is the Remote sever not
the user.
Explain
static and dynamic tunnels.
are static tunnels. Tunnels that are auto discovered are dynamic tunnels. In
dynamic tunneling, tcp connections can be checked dynamically. If no
connections exist that are routed through the tunnel, a check for more suitable
gateway can be done. Static tunneling may at times require dedicated
equipments.
Explain the
importance of increasing and decreasing subnet bits.
increasing the subnets and decreasing the hosts. Removing or decreasing 1’s
means decreasing subnets and increasing hosts. Hence by increasing or
decreasing the subnet architecture can be decided as per needs.
Why do we
need a subnet mask?
identification of host part and network part of an IP address. Subnet mask can
be used to find if an IP address is present on a subnet or not.
What is
RTP?
a standard or a way to transfer or manage real time data over a network. It
does not guarantee the delivery of data or provide any quality of service.
However it helps to manage the data. Which means that RTP can be used deliver
the necessary data to the application to make sure it can put the received
packets in the correct order Real time data examples could be audio and
video.
What is RTP
Multiplexing?
media flows within a single RTP data payload between two points. This means
that it can be used to carry multiple streams of data in one RTP packet. RTP
multiplexing will reduce the bandwidth used. RTP multiplexing will also
increase scalability.
Explain the
use of RTP and RTCP protocols.
Real time data like voice packets.
2. RTP can be used with RTCP which makes it possible to monitor data.
3. Packet loss can be detected by RTP using Sequence number
Packets lost, round trip time.
Describe the
format of RTP and RTCP packets.
is as follows:- (L to R)
currently 2
Bit 2:- P- indicates padding bytes
Bit 3:- X- Indicates presence of extension header
Bit 4-7:- CC- Contains number of CSRC identifiers that follows the header
Bit 8:- M- Current data has some special relevance (if set)
Bit 9-15:- PT- Indicates format of payload
Bit 16-31:- Sequence number
Timestamp: – 32bits – time stamp of packet
SSRC- Synchronization source identifier uniquely identifies the source of a
stream.
CSRC -Contributing source IDs enumerate contributing sources to a stream which
has been generated from multiple sources
Extension header: – first 32 bit word contains profile specific identifier and
length specifier
format is as follows:- (L to R)
Bit 0-1:- Indicates version, currently 2
Bit 2:- P- indicates padding bytes
Bit 3 to 7:- Count of number of reception report blocks
Bit 8 to 15:- Type: – Determined RTCP packet type. Type can take values from 0
to 255
16 to 31:- Length- Length of RTCP packet – 1
SR: – Sender Report for transmission and reception from active senders
RR: – Receiver report for reception from in active senders
SDES: – Source description items
BYE- indicates end of participation
APP: – Application specific functions
Describe how
the multicast protocol works.
protocol delivers a singles message to multiple machines. One packet from the
source is replicated and sent to the destination. Every multicast message
requires a multi case group. The group defines the addresses which will receive
the message. The group is defined by the class D address. Different routing
protocols are used to find the multicast groups and build routes for them.
Distance Vector Multicast protocol is one of them. The receiver, to whom the
multicast packet is sent to, needs to ‘join’ the group. Joining the group is
enabled and managed by IGMP. Multicast routers are used to transmit the
messages from one network to another.
Describe how
to control the scope of multicast transmissions.
multicast transmission restricts the range of group members. TTL (Time To Live)
is one of the mechanisms to limit the scope. If the TTL value is small, packets
would only be multicast to smaller distance destinations. More the value of
TTL, more would be the scope of transmission to a larger number of machines.
Administrative scoping is another mechanism. In this, transmission is
restricted to a specific address space of an organization or a site.
- When the same message or packet
needs to be sent to multiple destinations, multicasting is used. - Within campus and offices,
using multicasting file distribution can be done. - System messages, news and
videos can be sent at the same time. - More commonly used for audio
and video streaming.
What is a
socket?
application to a network protocol. A socket enables communication between a
client and a server. The communication is started when the client is assigned a
local port number, and binds a socket to it. The client writes on the socket
and gets information from server by reading it.
What are
Sockets? How do Sockets Work?
application to a network protocol. A socket enables communication between a
client and a server. The communication is started when the client is assigned a
local port number, and binds a socket to it. The client writes on the socket
and gets information from server by reading it. The Socket class is used to
communicate. It provides rich set of methods for both asynchronous and synchronous
data transfer. ConnectAsynch is used to start an asynchronous connection.
SendAsynch and ReceiveAsynch are used to send and receive data. Shutdown and
close methods are used to shutdown and close the sockets.
Datagram vs.
stream.
pipe that allows full duplex connection. A datagram or a packet on the other
hand, has a source and a destination. There is no connection. Stream is like a
communication channel while datagram is completely self contained. Streams
provide a reliable and sequenced communication. Datagram’s on the other hand
are unreliable and no sequence maintained.
What is a
stream socket?
communications between a client and server. This communication is reliable and
sequenced. Stream sockets are above TCP to run across any networks. They
provide unduplicated flow of data and have well established mechanism for
creating and destroying connections and for detecting errors.
What is SSL?
is used to establish a secured and an encrypted connection between a server and
the browser. SSL is most commonly seen in payment and banking web sites. To
create a SSL connection, a SSL certificate needs to be created. If the website
has a SSL certificate installed, a small icon is displayed in the tool bar to
make customers confident that the site is secured.
socket Classes are:
for network communications. It allows both synchronous and asynchronous data
transfer. Shutdown method should be used to end the Socket once the data
transfer is complete. Using SetSocketOption the socket can be configured.
Declaration:
Public Class Socket _
Implements IDisposable
Server sockets are used to respond to requests received over the network.
- Flexible and powerful.
- Cause low network traffic if
efficiently used. - Only updated information can be
sent.
- The Java applets can establish
communication only with the machine requested and not with any other
machine on the network. - Sockets allow only raw data to
be sent. This means that both client and server need to have mechanisms to
interpret the data.
What is
meant by Symmentric Multiprocessing (SMP)?
any processor to do work of another processor. SMP allows multiple processors
to process programs that are a part of common OS and memory. Most common
example of SMP is OLTP where many users access the same database in a
relatively simple set of transactions. SMP efficiently balances the workload of
the processors.
What are
TP-Lite and TP-Heavy Monitors?
Monitor functions in a database engine. TP-Heavy Monitor allows the machine to
initiate some complex multi server transactions. TP Heavy monitors support
client server architecture.
What is
Distance Vector Routing Protocols?
Routing Protocols Is to find out the best path for he data packet to reach the
destination. Distance here could be the hops. The three different types of
Distance Vector routing protocols include:- Routing Information Protocol (RIP
v1 and v2) and Interior Gateway Routing Protocol. The protocol is easy to
manage however not well scalable.
initially prepares a Routing table which is shared with other routers. This
routing table is shared between routers present in the same network. A new
routing table is prepared when some new information is received from some other
router. Now, the bad routing paths are removed keeping only the smallest hop
paths. This new table is then communicated to other routers.
What is POP3
(Post Office Protocol 3)?
fro receiving emails. It is a client server protocol which holds the email.
Once the email is downloaded from the server, POP3 deletes it from the server.
Ordinal numbers are used to identify specific messages.
What is NNTP
(Network News Transfer Protocol)?
Protocol is used to manage the notes posted on Unset newsgroup (a collection of
posted notes on a subject posted by different users). NNTP servers are
responsible for managing Usenet newsgroup collected globally. A NTTP client is
a part of the web browser also called as a news reader. It uses a reserver port
no 119.
What is HTTP
(Hypertext Transfer Protocol)?
Protocol is provides a set of rules to transfer files, videos, images over the
world wide web. When the web browser is opened, a HTTP request call is made. A
web server contains a HTTP daemon. This daemon is used to wait for HTTP
requests and handle them when they arrive. The web browser from where HTTP
requests are made is called as a client. These requests are sent to the server.
It uses a reserved port no 80.
What is IGMP
protocol?
Protocol, allows internet hosts to multicast. i.e. to send messages to a group
of computers. There may be a group of internet hosts interested to multicast.
IGMP allows router to determine which host groups have members on a given
network segment. It helps to establish group memberships. It is commonly used
for streamlining videos and gaming. The protocol can be implemented both as a
host side and router side. The host side is responsible to notify its
membership in a group. The notification is made to a local router. This local
router (router side) in turn sends out queries.
Define
gateway
provides entrance into another network. On the Internet, a node or stopping
point can be either a gateway node or a host (end-point) node. Both the
computers of Internet users and the computers that serve pages to users are
host nodes. The computers that control traffic within your company’s network or
at your local Internet service provider (ISP) are gateway nodes.
Explain how
names are translated (resolved) into IP address.
to resolve names into IP addresses. When a web address is entered into the
browser, the DNS client sends a request to the DNS server to find the
corresponding IP address for the name. The DNS server receives this request and
searches for the corresponding IP address in the database. If at this point the
resolution fails, this server sends this request to the parent server. The
request keeps going up the hierarchy to the parent servers or the closest
authoritative of the DNS server to resolve the address. If the request times
out an error is retuned to the client. If the server is able to resolve the
name requested, it passes the information back to the client. The next request
sent by the client is to request for a web page for the IP address.
Explain the
structure and use of internet addresses.
In human language the IP addresses are written in dotted decimal notation.
These are then converted to binary by the computer. Each IP address has two
parts: Network identifier or a network ID and host ID. The current internet
protocol standard is IPV4. The IP addresses are divided into three classes: a class
A network, a class B network, and a class C network. Class A being the largest.
The four digit numbers in an IPV4 address, each network of class A will have
different first number, and then its network will be addressed by the rest of
the three numbers, or three bytes. The IP addresses identify a machine to
deliver packets and load web pages.
Define IP
multicast.
traffic by sending stream of information to many recipients at one go. Video
conferencing, stock quotas are the examples based on IP multicast.
What is
Network Address Translation?
as an agent between the Internet and a local network. It is a dynamic method
which is used to minimize Internet connectivity needs. Network address translation
describes the rewriting of the Internet Protocol (IP) addresses of data packets
so that multiple transmissions require only one IP address.
What is the
difference between public and private IP?
equipment accessible to everyone on the internet. A private IP address is for
private use within the network and allows many more PCs to be connected. If you
are using a private IP and wants VOIP, you need to change to a public IP
address
How would
you define IP address?
address is the address of a device attached to an IP network (TCP/IP network).
It is a must for every client, server and network device to have a unique IP
address for each network connection (network interface). Every IP packet contains
a source IP address and a destination IP address. As a device moves from one
network to another, its IP address changes.
communication are uniquely identified by a 32 bit address called as an IP
address. The routers use the IP address information to forward the packet to
the destination computer.
IP addresses are used exclusively within a private network and not for public
to see.
are registered IP addresses used for public.
address and a host address. IP addresses are expressed in four sets of three
numbers, separated with dots. Each set is called as an octet because when
converted to binary; it denotes eight binary.
MAC vs. IP
Addressing
the data link layer, IP addressing functions at the network layer (layer 3).
It’s a slight oversimplification, but one can think of IP addressing as
supporting the software implementation and MAC addresses as supporting the
hardware implementation of the network stack. The MAC address generally remains
fixed and follows the network device, but the IP address changes as the network
device moves from one network to another.
Define
Telnet
protocol for creating a connection to a remote server.
Define DNS
domain and host names to IP addresses. DNS automatically converts the names we
type in our Web browser address bar to the IP addresses of Web servers hosting
those sites. DNS implements a distributed database to store this name and
address information for all public hosts on the Internet.
What
is Application layer?
at the top of the TCP/IP protocol layers. This one contains the network
applications which make it possible to communicate using the lower layers. The
software in this layer therefore communicates using one of the two protocols of
the layer below (the transport layer), i.e. TCP or UDP. In computer networking,
an application layer firewall is a firewall operating at the application layer
of a protocol stack.[1] Generally it is a host using various forms of proxy
servers to proxy traffic instead of routing it. As it works on the application
layer, it may inspect the contents of the traffic, blocking what the firewall
administrator views as inappropriate content, such as certain websites,
viruses, and attempts to exploit known logical flaws in client software, and so
forth. An application layer firewall does not route traffic on the network
layer. All traffic stops at the firewall which may initiate its own connections
if the traffic satisfies the rules.
Explain the
core naming mechanism, Domain Name System (DNS).
convert the names of the website on the internet to IP addresses. The domain
names for each IP addresses are stored in a database that is distributed across
different servers. A domain name space consists of a tree of domain names. The
tree has zones. Zones consist of a collection of connected nodes. These nodes
are served by a name server. A domain name is usually in the form of
mydomain.com. Here, .com is the top level domain. Where as mydomain is the sub domain or
subdivision. A host name is a domain name that has one or more IP addresses
associated with it.
Explain the
functionality of PING.
check if the system is in network or not. It also gives packet lost
information. In windows ping command is written as ping ip_address. The output
returns the data packets information. The number of packets sent, received and
lost is returned by PING
What is
multicasting?
message to be sent to a group of recipients. Emailing, teleconferencing, are
examples of multicasting. It uses the network infrastructure and standards to
send messages.
Explain IP,
TCP and UDP.
establish communication between nodes or networks and exchange data packets. It
guarantees delivery of data packets in the order they were sent. Hence it is
most commonly used in all applications that require guaranteed delivery of
data. It can handle both timeouts (if packets were delayed) and retransmission
(if packets were lost). The stream of data is transmitted in segments. The
segment header is 32 bit. it is a connectionless communication protocol at the
third level (network) of the OSI model.
of data over the internet. IP uses IP addresses to identity each machine
uniquely. Message is sent using small packets. The packet contains both the
sender and receivers address. IP does not guarantee the delivery in the same
order as sent. This is because the packets are sent via different routes. It is
a connectionless communication protocol at the third level (network) of the OSI
model.
protocol. It is normally used as an alternative for TCP/IP. However there are a
number of differences between them. UDP does not divide data into packets.
Also, UDP does not send data packets in sequence. Hence, the application
program must ensure the sequencing. UDP uses port numbers to distinguish user
requests. It also has a checksum capability to verify the data.
topology.
describes the layout of a network. It describes how different nodes and
elements are connected to each other. Different types of topology:
- All nodes connected with
another in a loop. - Each device is connected to one
or more another device on either side.
- All nodes connected to a
central and a common cable called as a back bone. - In bus topology, the server is
at one end and the clients are connected at different positions across the
network. - Easy to manage and install.
- If the backbone fails, the
entire communication fails.
- All nodes connected to a
central hub. - The communication between the
nodes is through the hub. - Relative requires more cables
as compared to BUS. However if any node fails, it wont affect the entire
LAN.
What is a
network? What are the different kinds of network? Explain them
or nodes connected together. They are connected with each other by
communication paths.
nodes covering a small physical area. LAN’s are most commonly seen in offices,
building etc. LAN’s enable higher transfer rate of data, smaller coverage of
area and hence less wiring.
covering a wide area. WAN typically connects and allow communication between
regions or national boundaries. The most common example of WAN is internet.
nodes in some larger area by open connections or virtual circuits in some
larger network (e.g., the Internet) instead of by physical wires. It is used
for secure communication through the public internet. VPN alone may not support
explicit security features, such as authentication or content encryption.
of a single administrative person. It can be considered as an internal network
of an organization. If it is large, web servers are used to provide information
to the users.
within a single organization. It can be categorized as WAN, MAN etc. however;
it cannot have a single LAN. It must have a connection (at least one) with
external network.
Explain the
7 Layers of OSI.
It represents all the electrical and physical specifications for
devices.
It provides the functional and procedural means to transfer data between
network entities and to detect and possibly correct errors that may occur in
the Physical layer.
The Network layer provides the functional and procedural means of transferring
variable length data sequences from a source to a destination via one or more
networks.
It provides transparent transfer of data between end users.
It controls the sessions between computers. It connects, manages and terminates
the connections between the local and remote application.
layer
It transforms data to provide a standard interface for the
Application layer.
It provides a means for the user to access information on the network through
an application.
Define File
Transfer Protocol.
standard Internet protocol, is the simplest way to exchange files between
computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which
transfers displayable Web pages and related files, and the Simple Mail Transfer
Protocol (SMTP), which transfers e-mail, FTP is an application protocol that
uses the Internet’s TCP/IP protocols. FTP is commonly used to transfer Web page
files from their creator to the computer that acts as their server for everyone
on the Internet. It’s also commonly used to download programs and other files
to your computer from other servers.
What is FTP
(File Transfer Protocol)?
used to exchange files on the internet. To enable the data transfer FTP uses
TCP/IP, FTP is most commonly used to upload and download files from the
internet. FTP can be invoked from the command prompt or some graphical user
interface. FTP also allows to update (delete, rename, move, and copy) files at
a server. It uses a reserved port no 21
Define the
term Protocol.
communicating across a network. A protocol is the “language” of the
network. It is a method by which two dissimilar systems can communicate. TCP is
a protocol which runs over a network.
What’s the
difference Between an Intranet and the Internet?
between an intranet and the Internet: The Internet is an open, public space,
while an intranet is designed to be a private space. An intranet may be
accessible from the Internet, but as a rule it’s protected by a password and
accessible only to employees or other authorized users.
server may respond much more quickly than a typical Web site. This is because
the public Internet is at the mercy of traffic spikes, server breakdowns and
other problems that may slow the network. Within a company, however, users have
much more bandwidth and network hardware may be more reliable. This makes it
easier to serve high-bandwidth content, such as audio and video, over an
intranet.
What is LAN?
spans a relatively small area. Most LANs are confined to a single building or
group of buildings. However, one LAN can be connected to other LANs over any
distance via telephone lines and radio waves. A system of LANs connected in
this way is called a wide-area network (WAN). Most LANs connect workstations
and personal computers. Each node (individual computer) in a LAN has its own
CPU with which it executes programs, but it also is able to access data and
devices anywhere on the LAN. This means that many users can share expensive
devices, such as laser printers, as well as data. Users can also use the LAN to
communicate with each other, by sending e-mail or engaging in chat
sessions.
internet using IP is carried in messages called IP datagrams.
Like all network protocol messages, IP uses a specific format for its
datagrams.
following fields:
- Version: the version of IP used
to generate the datagram. For IPv4, this is of course the number 4 - Internet Header Length:
Specifies the length of the IP header, in 32-bit words. - Type of service: information to
provide quality of service features - Total Length
- Identification: it can be used
if the datagram must be fragmented by a router during delivery and then
for reassembling. - Flags: (Don’t Fragment, More
Fragment) - Fragment Offset: When
fragmentation of a message occurs, this field specifies the offset, or
position. - Time to Live: specifies how
long the datagram is allowed to “live” - Protocol: ICMP, TCP, UDP, etc
- Header Checksum: to provide
basic protection against corruption in transmission. - Source Address
- Destination Address
- Options
- Padding: if number of bits used
for options is not a multiple of 32, then paddin is added - Data
What is Data
Fragmentaion? Explain how Data Fragmentaion works
space is used inefficiently due to which storage capacity and performance is
reduced.
large object is inserted into storage that has already suffered external
fragmentation due to which the data object is broken up into many pieces that
are not close together.
into many small pieces over time, its called External fragmentation.
What is
VLSM, Variable length subnet masking?
addressing resources to subnets according to their individual need rather than
some general network-wide rule.
Classless Inter-Domain Routing (CIDR)
- It is a way to aggregate
multiple Internet addresses of the same class. - The adjacent network address
(eg:192.168.2.0/24 and an address 192.168.3.0/24) can be merged (into
192.168.2.0/23) using supernetting. - Supernetting is the basis for
most routing protocols currently used on the Internet. - It is mostly used to combine
Class C network addresses.
of breaking the network into smaller units. These units care called as subnets.
Here a subnet could be several machines in a single LAN. Networks using IP can
create sub networks of logical addresses. With every IP address there some of
the bits in the machine can be used to identify a specific subnet. The IP
address then contains three parts: the network number, the subnet number, and
the machine number.
customized; i.e. modifying the dividing point between subnet ID and host ID to
suit the needs of our network. The subnet mask that we use when creating a
customized subnet is, called a custom subnet mask. This custom subnet mask is
used to find the customization..
What is
Subneting? Explain the advantages of using Subneting.
into several subnets.
This is usually done for the following purposes:
- Reducing
network traffic by decreasing the number of broadcasts - Exceeding
the limitations in a local area network - Enabling
people to connect to the network remotely without opening the entire
network
Explain the
advantages of using Subneting.
- Easier
network management and trouble shooting - Routing
table’s size is reduced which means faster network transfers - Solves
network congestion problems:- Since the complete network is divided into
smaller networks - Network
addresses can be decentralized e.g. the administrator of the network can
monitor the subnet.
Explain the
classes of IP addresses. Why do we need them?
Range: from 0.0.0.0 to 127.255.255.255.
Leftmost bit: 0.
First 8 bits: netid.
Remaining 24 bits: hostid.
Range: from 128.0.0.0 to 191.255.255.255.
Leftmost 2 bits: 10
First 16 bits: netid
Last 16 bits: the hostid
Range: from 192.0.0.0 to 223.255.255.255.
Class C networks use the first 24 bits to determine the netid.
Leftmost 3 bits: 110
The next 21 bits define network.
8 bits define the hostid.
First 4 bits: 1110
The remaining 28 bits define multicast addresses.
No netid or hostid in a class D address.
Addresses is used for multicasting.
First 4 bits: 1111
Addresses reserved for special use on the Internet.
There is no netid or hostid in a class E address.
What is IP
Multicasting?
identifies a particular group of hosts in network.
This group of hosts is called a multicast group.
Explain the
concept and capabilities of Unicast IP Addresses
identifies a host in a network.
The datagram with a unicast IP address is received and processed by only a
single host.
- Closest to the end user
- Interact directly with the
software application.
- Translates application to
network format, and vice versa - Works to transform data into
the form that the application layer can accept - Formats and encrypts data to be
sent across a network
- Controls the connections
between computers - Establishes, manages and
terminates the connections between the local and remote application. - Provides full-duplex,
half-duplex, or simplex operation - Establishes checkpointing,
adjournment, termination, and restart procedures
- Provides transparent transfer
of data between end users - Providing reliable data
transfer services to the upper layers - Controls the reliability of a
given link through flow control, segmentation / desegmentation, and error
control.
- Provides the functional and
procedural means of transferring variable length data sequences from a
source to a destination via one or more networks - Performs networkrouting
functions - Performs fragmentation and
reassembly, and report delivery errors.
- Provides the functional and
procedural means to transfer data between network entities - Detects and corrects errors
that occur in the Physical Layer.
- Defines the electrical and
physical specifications for devices.
multiple computers, a router connects multiple networks. Routers comprise of
data consisting of large tables of networks and addresses. Routers use
algorithms to determine the shortest route to an address in a network.
- ROM:- Used to store the routers
bootstrap details, operating system software. - Flash memory: – holds the
operating systems images. The content is retained when the router is
restarted. - RAM: – Used to store the
Routing tables, configuration files, caching and buffering details.
Content is lost when lost router is switched off or restarted. - NVRAM:- Stores the routers
startup config files. Data is non volatile. - Network interfaces to connect
router to network.
- Virtual terminals: For
accessing routers - Network management stations.
What are
switches? Explain the concepts of Layer-3 switches.
multiple network segments.
A switch analyzes the MAC address and then determines where to send the data.
So a file addressed to a computer reaches only that computer through the use of
a switch.
The term ‘switch’ commonly refers to a Network bridge that processes and routes
data at the Data link layer (layer 2) of the OSI model.
process data at the Network Layer are often referred to as Layer 3 switches or
Multilayer switches.
What is
‘Gateway Of Last Resort’?
Default gateway is a route used by the router when no other known route exists
to transmit the IP packet. Known routes are present in the routing table.
Hence, any route not known by the routing table is forwarded to the default
route. Each router which receives this packet will treat the packet the same
way, if the route is known, packet will be forwarded to the known route.
Explain
Circuit Level Gateway.
to find if a session in TCP handshaking is legitimate or not. It can be
considered as a layer between application layer and transport layer. They
protect the information of the private network they protect. Circuit level
gateways do not filter packets.
What is an
application gateway?
application program that runs on a firewall between two networks. An
application gateway is used for establishing connection between client program
and destination service. The client negotiates with the gateway to communicate
with the service of destination. Here, gateway can be called as a proxy. Hence,
two connections are made. One between client and proxy; other, between proxy
and destination service. Connections take place behind the firewall
Explain IP
datagram, Fragmentation and MTU.
describe a portion of IP data. Each IP datagram has set of fields arranged in
an order. The order is specific which helps to decode and read the stream
easily. IP datagram has fields like Version, header length, Type of service,
Total length, checksum, flag, protocol, Time to live, Identification, source
and destination ip address, padding, options and payload.
is the size of the largest packet that a communication protocol can pass. The
size can be fixed by some standard or decided at the time of connection
breaking the IP packets into smaller pieces. Fragmentation is needed when the
datagram is larger than the MTU. Each fragment becomes a datagram in itself and
transmitted independently from source. When received by destination they are
reassembled.
What is IP
Spoofing and how can it be prevented?
by attackers to gain unauthorized access to a system. Here, the intruder sends
messages to a computer with an IP address indicating that the message is coming
from a trusted host. This is done by forging the header so it contains a
different address and make it appear that the packet was sent by a different
machine.
Packet filtering: – to allow packets with recognized formats to enter the
network
Using special routers and firewalls.
Encrypting the session
What is PPP
protocol? Explain PPP packet format.
communication between 2 computers over a serial cable, phone line or other
fiber optic lines. E.g. Connection between an Internet Service Provider and a
host. PPP also provides authentication. PPP operates by sending Request packets
and waiting for Acknowledge packets that accept, reject or try to change the
request. The protocol is also used to negotiate on network address or
compression options between the nodes.
frames beginning or end
Address field: 1 byte: – Used for broadcast address (destination address)
Control field: 1 byte: – Used as a control byte
Protocol field: – 1 or 2 bytes: – Setting of protocol in information field (of
datagram)
Information: – 0 or more bytes: – Datagram (whether it contains data or control
information)
Padding: – 0 or more bytes: – optional padding
FCS: – 2 or more bytes: – error check sum
Explain how
NAT works.
translates and IP address used in a network to another IP address known within
another network. A NAT table is maintained for global to local and local to
mapping of IP’s. NAT can be statically defined or dynamically translate from a
pool of addresses. The NAT router is responsible for translating traffic coming
and leaving the network. NAT prevents malicious activity initiated by outside
hosts from reaching local hosts by being dependent on a machine on the local
network to initiate any connection to hosts on the other side of the router.
What are the
differences between a domain and a workgroup?
can be a server to manage the network. On the other hand in a workgroup all
computers are peers having no control on each other. In a domain, user doesn’t
need an account to logon on a specific computer if an account is available on
the domain. In a work group user needs to have an account for every computer.
In a domain, Computers can be on different local networks. In a work group all
computers needs to be a part of the same local network.
Explain the
concept of DHCP.
Protocol is used assigning IP addresses to computers in a network. The IP
addresses are assigned dynamically. Certainly, using DHCP, the computer will
have a different IP address every time it is connected to the network. In some
cases the IP address may change even when the computer is in network. This
means that DHCP leases out the IP address to the computer for sometime. Clear
advantage of DHCP is that the software can be used to manage IP address rather
than the administrator.
Explain
RSVP. How does it work?
used to reserve resources across a network. It is used for requesting a
specific Quality of Service (QoS) from the network. This is done by carrying
the request (that needs a reservation of the resource) of the host throughout
the network. It visits each node in the network. RSVP used two local modules
for reservation of resources. Admission control module confirms if there are
sufficient available resources while policy module checks for the permission of
making a reservation. RSVP offers scalability. On a successful completion of
both checks RSVP uses the packet classifier and packet scheduler for the desired
Qos requested.
What are
Ping and Tracert?
used to send information to some remote computers to receive some information.
Information is sent and received by packets. Ping I particularly used to check
if the system is in network or not. It also gives packet lost information. In
windows ping command is written as ping ip_address Tracert is called as trace
route. It is used to track or trace the path the packet takes from the computer
where the command is given until the destination. In windows ping command is
written as tracert ip_address
What is the
use of IGMP protocol?
Protocol: – It allows internet hosts to participate in multicasting. The IGMP
messages are used to learn which hosts is part of which multicast groups. The
mechanism also allow a host to inform its local router, that it wants to
receive messages.
Explain the
use of Internet Control Message Protocol (ICMP).
is one of the important protocols in the Internet Protocol suite. It is mainly
used in operating system of networked computers, for the purpose of sending
error messages, for example, a requested service is unavailable or the host
could not be reached. It is not directed by the network applications. ICMPs are
utilized by routers, hosts for communicating the updates or error information
to other routers.
What is the
TTL (Time to Live)? Why is it required?
Internet Protocol. It communicates to the network router whether or not the
packet should be in the network for too long or discarded. Usually, data
packets might not be transmitted to their intended destination within a
stipulated period of time. The TTL value is set by a system default value which
is an 8-bit binary digit field in the header of the packet. The purpose of TTL
is, it would specify certain time limit in seconds, for transmitting the packet
header. When the time is exhausted, the packet would be discarded. Each router
receives the subtracts count, when the packet is discarded, and when it becomes
zero, the router detects the discarded packets and sends a message, Internet
Control Message Protocol message back to the originating host.
What is the
Domain Name System (DNS)? What are the advantages of it?
computer systems, services or for that matter any resource participating in the
internet. Various information with domain names is assigned to each of the
participants. DNS translates the names of domain into meaningful to humans into
binary identifiers that are associated with the equipment of network to locate
and address these devices.
downtime.
Any cast technology enables requests are answered to the next closest node in
the case of maintenance or downtime.
Explain TCP
Windowing concept.
is used for avoiding congestion in the network traffic. Unacknowledged amount
of data that is sent by the sender before the data gets acknowledgment back
from the receiver that it has received it is controlled.
What is the
User Datagram Protocol (UDP)?
computer applications to send messages as datagram packets from source to
destination on an Internet Protocol, with out using prior communications for
setting up special transmission paths. An unreliable service is provided by UDP
which makes the datagram packets may arrive irrespective of order. UDP is a
better solution for time-sensitive applications due to the reason ‘dropping
packets is preferable to use delayed packets’. Its stateless nature makes the
server to answer smaller queries to huge number of clients.
Define
Subnetting.
networked computers which have common IP address routing prefix.
smaller and more efficient subnets is known as subnets. Subnetting prevents
Ethernet packet collision which has excessive rates in a large network. Routers
are used to manage the traffic and constitute borders among subnets.
What is
Network Mask?
determination of what subnet an IP address belongs to. An IP address has
network address and the host address. The first two numbers represents the
network address and the second two numbers represents the host of the
network.
Define
Broadcast, Unicast and Multicast.
piece of information to send from one point to another. There are only sender
and receiver. All LANs support unicast transfer mode and most applications that
employ TCP transport protocol uses unicast messaging.
is sent a piece of information from one point to all other points. There is one
sender and multiple receivers. All LANs support broadcast transmission.
information sent from one or more points to a set of other points. The senders
and receivers are one or more.
Explain the
classes of IP address
classes. For convenience of humans, IP addresses are expressed in the decimal
format. Every number in each class is represented as binary to computers.
are known as ‘octets’. Each of them has eight bit positions. The octets are
divided into two sections: Net and Host. The first octet represents Net for
identifying the network and the Host contains the last octet. There are five IP
classes.
There are 1 to 126 are part of this class. That means there are 126 Class A
networks. Class A networks accounts for half of the total available IP
addresses.
address with a first octet from 128 to 191 is part of this class. Class B
networks have a first bit value of 1 and a second bit value of 0 in the first
octet.
IP address with a first octet starts from 192-223. Class C networks have a
first bit value of 1, second bit value of 1 and a third bit value of 0 in the
first octet.
and the fourth bit as 0. The other 28 bits are used for identifying the group
of computers which is intended for multicast messages.
The four bits value is 1. The other 28 bits are used for identifying the group
of computers which is intended for multicast messages.
Explain the
services provided by IP (Internet Protocol) – Addressing, Fragmentation, Packet
timeouts and options
packets, IP needs to know about the address of the destination. By including
the host addressing, this task is carried out by IP. As IP operates in an
internet, its systems are designed to accept the addressing of devices which
are unique.
link layer for the purpose of transmission on the network. The physical network
frame size that uses IP may be different. To resolve this, IP fragments the
datagram into certain pieces. So that, each piece can be carried on the
network. The receiving systems use these pieces and reassemble the whole IP
datagram again.
instruction from the command station. If the command is not sent by the
station, it shuts down.
Interconnection (OSI) model specifies how dissimilar computing devices such as
Network Interface Cards (NICs), bridges and routers exchange data over a
network by offering a networking framework for implementing protocols in seven
layers. Beginning at the application layer, control is passed from one layer to
the next. The following describes the seven layers as defined by the OSI model,
shown in the order they occur whenever a user transmits information.
layer supports the application and end-user processes. Within this layer, user
privacy is considered and communication partners, service and constraints are
all identified. File transfers, email, Telnet and FTP applications are all
provided within this layer.
(Syntax)
this layer, information is translated back and forth between application and
network formats. This translation transforms the information into data
the application layer and network recognize regardless of encryption and
formatting.
this layer, connections between applications are made, managed and terminated
as needed to allow for data exchanges between applications at each end of a
dialogue.
data transfer is ensured as information is transferred transparently between
systems in this layer. The transport layer also assures appropriate flow
control and end-to-end error recovery.
switching and routing technologies, this layer is responsible for creating
virtual circuits to transmit information from node to node. Other functions
include routing, forwarding, addressing, internetworking, error and congestion
control, and packet sequencing.
in data packets are encoded and decoded into bits within this layer. Errors
from the physical layer flow control and frame synchronization are corrected
here utilizing transmission protocol knowledge and management. This layer
consists of two sub layers: the Media Access Control (MAC) layer, which
controls the way networked computers gain access to data and transmit it, and
the Logical Link Control (LLC) layer, which controls frame synchronization,
flow control and error checking.
layer enables hardware to send and receive data over a carrier such as cabling,
a card or other physical means. It conveys the bitstream through the network at
the electrical and mechanical level. Fast Ethernet, RS232, and ATM are all
protocols with physical layer components.
information is received, so that the physical layer is the first and
application layer is the final layer that information passes through.
General
Topology Configurations
Ethernet use a star topology where access is controlled by a central computer.
Generally a computer is located at one end of the segment, and the other end is
terminated in central location with a hub or a switch. Because UTP is often run
in conjunction with telephone cabling, this central location can be a telephone
closet or other area where it is convenient to connect the UTP segment to a
backbone. The primary advantage of this type of network is reliability, for if
one of these ‘point-to-point’ segments has a break; it will only affect the two
nodes on that link. Other computer users on the network continue to operate as
if that segment were non-existent.
Collisions
there are rules for sending packets of data to avoid conflicts and to protect
data integrity. Nodes determine when the network is available for sending
packets. It is possible that two or more nodes at different locations will
attempt to send data at the same time. When this happens, a packet collision
occurs.
crucial element in the design and operation of networks. Increased collisions
are often the result of too many users on the network. This leads to
competition for network bandwidth and can slow the performance of the network
from the user’s point of view. Segmenting the network is one way of reducing an
overcrowded network, i.e., by dividing it into different pieces logically
joined together with a bridge or switch.
CSMA/CD
Ethernet uses a protocol called Carrier Sense Multiple Access/Collision
Detection (CSMA/CD). CSMA/CD is a type of contention protocol that defines how
to respond when a collision is detected, or when two devices attempt to
transmit packages simultaneously. Ethernet allows each device to send messages
at any time without having to wait for network permission; thus, there is a
high possibility that devices may try to send messages at the same time.
each device that was transmitting a packet delays a random amount of time
before re-transmitting the packet. If another collision occurs, the device
waits twice as long before trying to re-transmit.
just discussed will help define the specific products that network managers use
to build Ethernet networks. The following presents the key products needed to
build an Ethernet LAN.
Transceivers
to as Medium Access Units (MAUs). They are used to connect nodes to the various
Ethernet media. Most computers and network interface cards contain a built-in
10BASE-T or 10BASE2 transceiver which allows them to be connected directly to
Ethernet without the need for an external transceiver.
an attachment unit interface (AUI) connector to allow the user to connect to any
type of medium via an external transceiver. The AUI connector consists of a
15-pin D-shell type connector, female on the computer side, male on the
transceiver side.
new interface called the MII (Media Independent Interface) was developed to
offer a flexible way to support 100 Mbps connections. The MII is a popular way
to connect 100BASE-FX links to copper-based Fast Ethernet devices.
Network Interface Cards
commonly referred to as NICs, are used to connect a PC to a network. The NIC
provides a physical connection between the networking cable and the computer’s
internal bus. Different computers have different bus architectures. PCI bus
slots are most commonly found on 486/Pentium PCs and ISA expansion slots are
commonly found on 386 and older PCs. NICs come in three basic varieties: 8-bit,
16-bit, and 32-bit. The larger the number of bits that can be transferred to
the NIC, the faster the NIC can transfer data to the network cable. Most NICs
are designed for a particular type of network, protocol, and medium, though
some can serve multiple networks.
plug-and-play specifications. On these systems, NICs are automatically
configured without user intervention, while on non-plug-and-play systems,
configuration is done manually through a set-up program and/or DIP switches.
almost all networking standards. Fast Ethernet NICs are often 10/100 capable,
and will automatically set to the appropriate speed. Gigabit Ethernet NICs are
10/100/1000 capable with auto negotiation depending on the user’s Ethernet
speed. Full duplex networking is another option where a dedicated connection to
a switch allows a NIC to operate at twice the speed.
Hubs/Repeaters
connect together two or more Ethernet segments of any type of medium. In larger
designs, signal quality begins to deteriorate as segments exceed their maximum
length. Hubs provide the signal amplification required to allow a segment to be
extended a greater distance. A hub repeats any incoming signal to all ports.
star topologies such as 10BASE-T. A multi-port twisted pair hub allows several
point-to-point segments to be joined into one network. One end of the
point-to-point link is attached to the hub and the other is attached to the
computer. If the hub is attached to a backbone, then all computers at the end
of the twisted pair segments can communicate with all the hosts on the
backbone. The number and type of hubs in any one-collision domain is limited by
the Ethernet rules. These repeater rules are discussed in more detail later.
about hubs is that they only allow users to share Ethernet. A network of
hubs/repeaters is termed a “shared Ethernet,” meaning that all
members of the network are contending for transmission of data onto a single network
(collision domain). A hub/repeater propagates all electrical signals including
the invalid ones. Therefore, if a collision or electrical interference occurs
on one segment, repeaters make it appear on all others as well. This means that
individual members of a shared network will only get a percentage of the
available network bandwidth.
networking technology, it will be helpful to explain the different types of
networks in use.
Local Area Networks (LANs)
independent computers that exchange information with each other over a shared
communication medium. Local Area Networks or LANs are usually confined to a
limited geographic area, such as a single building or a college campus. LANs
can be small, linking as few as three computers, but can often link hundreds of
computers used by thousands of people. The development of standard networking
protocols and media has resulted in worldwide proliferation of LANs throughout
business and educational organizations.
Wide Area Networks (WANs)
widely separated physically. Wide area networking combines multiple LANs that
are geographically separate. This is accomplished by connecting the several
LANs with dedicated leased lines such as a T1 or a T3, by dial-up phone lines
(both synchronous and asynchronous), by satellite links and by data packet
carrier services. WANs can be as simple as a modem and a remote access server
for employees to dial into, or it can be as complex as hundreds of branch
offices globally linked. Special routing protocols and filters minimize the
expense of sending data over vast distances.
Wireless Local Area Networks (WLANs)
radio frequency (RF) technology to transmit and receive data over the air. This
minimizes the need for wired connections. WLANs give users mobility as they
allow connection to a local area network without having to be physically
connected by a cable. This freedom means users can access shared resources without
looking for a place to plug in cables, provided that their terminals are mobile
and within the designated network coverage area. With mobility, WLANs give
flexibility and increased productivity, appealing to both entrepreneurs and to
home users. WLANs may also enable network administrators to connect devices
that may be physically difficult to reach with a cable.
and Electronic Engineers (IEEE) developed the 802.11 specification for wireless
LAN technology. 802.11 specifies over-the-air interface between a wireless
client and a base station, or between two wireless clients. WLAN 802.11
standards also have security protocols that were developed to provide the same
level of security as that of a wired LAN.
The first of these protocols is Wired Equivalent Privacy (WEP). WEP provides
security by encrypting data sent over radio waves from end point to end point.
protocol is Wi-Fi Protected Access (WPA). WPA was developed as an upgrade to
the security features of WEP. It works with existing products that are
WEP-enabled but provides two key improvements: improved data encryption through
the temporal key integrity protocol (TKIP) which scrambles the keys using a
hashing algorithm. It has means for integrity-checking to ensure that keys have
not been tampered with. WPA also provides user authentication with the
extensible authentication protocol (EAP).
Problem Description
Windows commands to help me troubleshoot Websense in my network.
Resolution
commands discussed in this document fall into three categories:
Determine which groups a user belongs
Helpful commands entered from the Start > Run dialog box
Comman-line tools for troubleshooting network connectivity
Determine which groups a user belongs
generate a list of groups that a user belongs, open a command prompt and enter
the following commands:
net user <username> /domain
example:
net user jdoe /domain
Helpful commands entered from the Start >
Run dialog box
Select Start
> Run to execute any of the following commands. mstsc |
Opens the Remote Desktop (RDP) tool
|
winmsd
|
Opens the System Information dialog
box |
inetcpl.cpil
|
Opens the Internet Explorer Properties
dialog box |
odbccp32.cpl
|
Opens the ODBC Data Source
Administrator |
mmc
|
Opens the Microsoft Management Console
(MMC) |
services.msc
|
Opens the Windows Services dialog box
|
eventvwr.msc
|
Opens the Windows Event Viewer
|
dsa.msc
|
Opens the Active Directory User and
Computers management console |
dssite.msc
|
Opens the Active Directory Sites and
Services management console |
adminpak.msi
|
Launches the Administration Tools Pack
installer |
dxdiag
|
Opens the DirectX Diagnostic Tool
|
\< Name or IP>C$
|
Opens a UNC to the C: share
|
cmd
|
Opens the Windows Command Prompt using
the 32-bit cmd shell |
Command-line
tools for troubleshooting network connectivity
list contains some common commands for troubleshooting network connectivity.
Select Start > Run and then type cmd to access the appropriate command prompt. Activating a command
window viaStart > Programs > Accessories does not allow all of the following tools to run correctly.
arp -a
|
Shows gateway MAC address.
|
gpresult
|
Starts the Operating System Group
Policy Result tool |
ipconfig /all
|
Displays the full TCP/IP configuration
for all adapters |
ipconfig /flushdns
|
Flushes the DNS resolver cache.
Helpful when troubleshooting DNS name resolution problems |
nbtstat -a <MachineName>
|
Obtains info from WINS or LMHOST
(discovers who is logged on) |
nbtstst -A <IP>
|
Gets info from WINS or LMHOST
(discovers who is logged on) |
nbtstat -R
|
Purges and reloads the remote cache
name table |
nbtstat -n
|
Lists local NetBIOS names.
|
nbtstat -r
|
Useful for detecting errors when
browsing WINS or NetBIOS |
netstat -ab
|
The b switch links each used port with its application
|
netstat -an
|
Shows open ports
|
netstat -an 1 | find “15868”
|
Locates only lines with the number
15868 and redisplays every one second |
netstat -an | find
“LISTENING” |
Shows open ports with LISTENING status
|
net use
|
Retrieves a list of network
connections |
net use file://1.2.3.4/
|
Sees if the machine can poll IP
1.2.3.4 |
net user
|
Shows user account for the computer
|
net user /domain
|
Displays user accounts for the domain
|
net user /domain <UserName>
|
Shows account details for specific
user |
net group /domain
|
Shows group accounts for the domain
|
net view
|
Displays domains in the network
|
net view /domain
|
Specifies computers available in a
specific domain |
net view /domain: <DomainName> |
more |
Shows user accounts from specific
domain |
net view /cache
|
Shows workstation names
|
nslookup
|
Looks up IP/hostnames and displays
information helpful in diagnosing DNS issues |
ping -a <IP>
|
Resolves IP to Hostname
|
ping -t <IP>
|
Pings host until stopped
|
set U
|
Shows which user is logged on
|
set L
|
Shows the logon server
|
telnet <IP> <port>
|
Confirms whether the port is open
|
Use this command to hit the Domain Controller resulting in
DC Agent picking up the user name you logged onto the server with. An
example of the command follows:
net use \<Domain Controller IP or Hostname>
Notes & Warnings
NOTE
|
Some commands may output more data then the
default command window can show. To view the complete data, use the pipe command ( > or | ) to direct the output to a file. For example, type net user domain > GroupOutPut.txt to create a text file called GroupOutPut.txt that contains the output data. |
Panel, but this takes quite a few clicks. The ipconfig command is a fast way of
determining your computer’s IP address and other information, such as the
address of its default gateway — useful if you want to know the IP address of
your router’s web interface.
a Command Prompt window. You’ll see a list of all the network connections your
computer is using. Look under Wireless LAN adapter if you’re connected to Wi-Fi
or Ethernet adapter Local Area Connection if you’re connected to a wired
network.
immediately. Windows uses a cache that remembers DNS responses it’s received, saving
time when you access the same addresses again in the future.
the new DNS servers instead of using old, cached entries, run the ipconfig
/flushdns command after changing your DNS server.
website or other network connection issues, Windows and other operating systems
have some standard tools you can use to identify problems.
google.com and Windows will send packets to Google.com. Google will
respond and let you know it’s received them. You’ll be able to see if any
packets didn’t make it to Google.com — perhaps you’re experiencing packet loss
— and how long it took you to hear back — perhaps the network is saturated and
packets are taking a while to reach their destinations.
the route it takes for a packet to reach a destination. For example, run tracert
google.com and you’ll see the path your packet takes to reach Google.
If you’re having issues connecting to a website, tracert can show you where the
problem is occurring.
commands, read our introduction to troubleshooting Internet
connection problems.
Windows 8. You can use it to create your own shortcuts and place them on
your Start screen or desktop,
allowing you to more easily shut down Windows without digging through the charms
bar or logging out first.
computer. On Windows 8, you can even use a special switch to restart your
computer into the advanced startup options menu.
Shut Down: shutdown
/s /t 0
Restart: shutdown
/r /t 0
Restart Into Startup
Options: shutdown /r /o
system state to its original state — either from a clean Windows install or as
the computer came from its manufacturer. You can create your own custom
recovery images, but this feature is hidden — you have to do it with the recimg command
from a command line. This allows you to removemanufacturer-installed bloatware or add your favorite desktop programs to
your recovery image.
our overview of everything you need to know about creating and
using custom recovery images on Windows 8.
images. These system images contain a complete snapshot of every single file on
the system, so they’re different from Windows 8’s recovery images.
removed, system administrators and geeks can still create system image backups
by running the wbadmin start backup cmdlet in a
PowerShell window. Unlike all the other
commands here, this command-line tool must be run from within PowerShell, not
the Command Prompt.
that scans its system files and looks for problems. If system files are missing
or corrupted, the system file checker will repair them. This may fix problems
with some Windows systems.
as Administrator and run the sfc /scannowcommand.
You’ll have to install it from the Control Panel. Once installed, you can use
the telnet command to connect to telnet servers without
installing any third-party software.
it, but if you’re connected directly to a device and it requires that you use telnet
to set something up — well, that’s what you have to do.
encryption, but it also has an option that will write garbage data to a drive,
clearing its free space and ensuring no deleted file can be recovered. Deleted files normally stick around on disk unless you’re using a solid state drive.
The cipher command effectively allows you to “wipe” a drive without installing
any third-party tools.
to wipe like so:
displaying all sorts of network statistics when used with its various options.
One of the most interesting variants of netstat is netstat -an,
which will display a list of all open network connections on their computer,
along with the port they’re using and the foreign IP address they’re connected
to.
Connecvity
Important:
proceeding with troubleshooting, please check the Steam Server Status page to ensure the issue which you are
encountering is not related
to system-wide downtime. (If you encounter any timeout errors when attempting
to access Steam sites, it is very likely that there is a system-wide issue and
Steam will not be accessible until the issue is resolved)
follow the steps below to diagnose network connectivity issues within Steam:
Test Your Router trying
anything else:
connecting your computer directly to your modem.
bypassing your router, please refer to the Using a Router with Steam topic for instructions on configuring your
router.
running your router in DMZ mode is not supported by Steam and may result in
connection issues.
connections are not recommended for online gaming. To ensure reliability,
make sure you are using a wired connection to the internet while playing
online.
Troubleshoot all Firewalls
configure your firewall for Steam.
time or Steam has recently been updated, a firewall may be preventing Steam
from connecting to the Steam Network – even if Steam worked correctly before
the update was applied.
Disable Background Applications
Which May Interfere With Steam and
reconfigure, disable or uninstall any programs which may be preventing Steam
and Valve games from connecting.
Viruses, Trojans, Adware and
Spyware
Adware, and Viruses Interfering with Steam.
Power Cycle Your Network
Hardware
modem and router, wait a few seconds, then plug them back in. Sometimes, these
devices simply need to be refreshed.
Try Launching Steam using TCP
“-tcp” launch option. Please see the Setting
Steam Launch Optionstopic for instructions.
Required Ports for Steam
required ports to run the Steam application are listed here.
It is possible that other games available on Steam will require further
ports to be available.
Note:
university networks and proxies block required ports for Steam operation –
please consult your network administrator to ensure the required ports are open
if you are using a university network or a proxy. Ports required for Steam
can not be re-mapped to HTTP or reconfigured to a custom port range.
notice that your Steam connection only has issues during certain hours of the
day (usually in the evenings between 5pm and 11pm), it is probable that your
ISP is blocking or “shaping” your connection. Please test your
connection at other hours of the day and contact your ISP directly if you
believe this is causing the connection issue.
are several ISPs which block ports required for the proper operation of Steam
and Steam games:
must be disabled through provider’s service portal)
Telecom (Steam
traffic blocked)
Broadband (Steam
traffic blocked)
are connection issues with certain ISPs that can be avoided depending on what
type of cable/DSL modem and router you have.
follow the guide for Client
dropped by ser