Tuesday, 20 November 2018

SETS

1) What are the functions of Transport, Network and Datalink layers?

Data link layer(L2) deals with Switch. Mac address and also error checksum using LLC(logical link control) to ensure all frames are transfered to the next layer.

Data link layer is the 2nd layer of the OSI model. Switches operates at this layer. Data is in the form of frames. Each frames has a header and trailer. The header portion contains the source and destination mac address. The trailer portion contains the frame check sequence used for error detection. It is of two types,

a) LLC deals with error detection and flow control.
b) Mac defines hardware addressing.

Network layer is the 3rd layer of the OSI model.Routers operates at this layer. Routers provide logical addressing (IP) for path determination. Data is in the form of packets. IP address is used to identify a host on a network.

Transport layer is the 4th layer of the OSI model. This layer deals with port numbers. Data is in the form of Segements. It has two types of protocols,

a) TCP (reliable and connection oriented)
b) UDP (unreliable and connectionless)


2) .What are the different protocols works at each of the layers?

Application layer - HTTP, FTP, SMTP, SNMP, DNS, DHCP, TELNET
   Presentation layer - TLS (Transport layer security), MIME (Multi-purpose Internet Mail Extension), NCP(Network control program)
   Session layer      - SSL, SIP, SAP, NetBIOS
   Transport layer    - TCP, UDP
   Network layer      - IPv4, IPv6, ICMP, IGMP, IPSEC
   Data-Link layer    - ATM, Frame relay, PPP
   Physical layer     - USB, Ethernet

3) What is fragmentation and explain how IP will handle the fragmentation.

If the size of the IP packet is more than the MTU size and is the DF is not set to 1 frag is needed. IP frag breaks packets into smaller pieces and sends to the destination. Frag reassembly happens at two instances, 1. Destination host. 2. If the firewall is inbetween the client and server, it does a DPI to check the type of the data being forwarded.

4) Define Unicast, Multicast and Broadcast. What is the use of Multicast?

   Unicast - It is sent to a specific devices and not to a group of devices on a lan.
   Multicast - It it one to many or many to many distribution. Point to multipoint communication. It is used for replicating the packet to reach multiple receivers                when necessary.
   Broadcast - It is delivered to all devices on a LAN.

5) What are the different Classes of IP address and give the range of each class

Class A - 0   - 126
   Class B - 128 - 191
   Class C - 192 - 223
   Class D - 224 - 239
   Class E - 240 - 255

6) What is network id , broadcast id and subnet mask?


   Network ID - Used to identify a L3 device on a network.
   Broadcast ID - It is the last address of a network.
   Subnet Mask - It defines the range of IP address that can be used in a network.

7) What is the subnetwork address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0?

   200.45.34.56 - 255.255.240.0
   Subnetwork address : 200.45.0.0/20

8) ARP works at which layer and Why?

ARP works in L2. The reason is, ARP is encapsulated in the E2 frame to resolve the Mac address with the help of IP address.

9) Which ICMP message confirms the traceroute is completed?

ICMP echo reply - Type 0 code 0 confirms the traceroute is completed - Windows.
   UDP - Destination unreachable Port unreachable - Type 3 Code 3 - Linux

10) What is the importance of DF, MF flag, offset ?

    DF is dont fragment - Determines whether the frag is required. If DF = 1, Frag doesn't occur.
    MF is More Frag     - Determines more packets are yet to receive by the destination, If MF = 1.
    Offset              - The field indicates where in the datagram this frag belongs.


11) What does the protocol field determines in the IP packet?

Protocol - It informs to which protocol stack the datagram has to be deliverd. Determined by a protocol number.

12) Explain 3 way handshake process?

A three-way handshake is a method used in a TCP/IP network to create a connection between a local host/client and server. It is a three-step method that requires both the client and server to exchange SYN and ACK packets before actual data communication begins.

13) What does window size indicate?

The amount of data the receiver can receive at one point of time. For every ACK there will be WS and it can vary.

14)  What is the difference between PUSH and URG flag?

PUSH flag is used to push the last small byte that is kept in the buffer. It does not allow the segment to wait in the buffer for a long time.
    URG - If the sender wants to send an urgent data, he will look for the current segment and add the urgent flag at the front followed by the normal data. The urgent           pointer denotes the end of urgent data.
          The receiver receives the segment, identifies the urgent flag and and immediately process the urgent data and sends to the application layer in an out of               order fashion.

15) What is the purpose of RST bit?

In RFC, there are three main instances where reset is used.

   a) TCP syn request for the port which is not supported.
   b) TCP segment which is not the first packet.
   c) Sequence and Ack mismatch.

D) When the Keep-Aliver timer expires, the server would reset the connection.

16) Who is responsible for the reliability of UDP packet.

UDP is not a relaible protocol. If relaiblity is required, the sender can use his own mechanism in the application layer. EG) TFTP (Trivial FTP)

17) Why Firewall reassembles the packet?

If the firewall is inbetween the client and server, it does a DPI to check the type of the data being forwarded.

18) What is the difference between Active and Passive FTP?

Active FTP - Initial connection is established by client and Data connection is established by the server. When both client and server are in the same LAN.
Passive FTP- Both initial connection and Data connection is established by the client. When the client is in LAN and the server is in WAN.

19) What is the important of port command?

Port command is used for data transfer. In active FTP, client initiated port command; whereas, in passive FTP, the server initiates the port command.

20) You are not able to access yahoo.com on your private computer, in your home. Please list the steps you will take to find (not necessarily fix) the cause of the problem

1. What is the error you see when you try to access the yahoo.com
    2. Are you not able to access only yahoo.com or other websites.
    3. If only yahoo, check with different browser.
    4. If browser is good, clear the browser cache and cookies.
    5. Reset the browser.
    6. In command prompt, type 'ping yahoo.com', press Enter & post back the result of the ping test.
    7. In command prompt, type 'tracert yahoo.com', press Enter & post back the result of the traceroute test. This is to confirm if the packet is dropped before        reaching the destination.
 
 
   Second Set of Answers:

1) How traceroute works?

Traceroute is the comand used in linux OS to find the path from the source to destination. To identify if the packet has reached the destination it give a message
Destination Unreachable(Port unreachable)

2)  What is the difference between traceroute and tracert?

Traceroute is used to determine the path the packet has travelled from source to detiantion in Linux OS it give a message Destination Unreachable (Port unreachable)(Type3 code 3)
   Tracert is used to determine the path the packet has travelled from source to detiantion in a windows OS it give a Echo reply.(Type0 Code 0)

3) Why there are three columns in traceroute results?

Traceroute has three coloumns
  a)First Coloumn indicates the Hop count
  b)Time taken to reach the destination
  c)IP address of each hop.

4)  What does * indicate in traceroute result?

*indicats the ping request is reached but does not provide the reply of that particular hop IP address due to some security features enabled.

5) What is the purpose of relay agent?

Relay Agent is Configured in routers when the DHCP server is another network.

6) Is DHCP decline message is sent by Client or Server? Explain

DHCP decline message is sent by the client. The client performs this procedure by sending (ARP) requests for the IP address provided in the DHCP ACK. If the client detects that the address is already in use by receiving a reply to the ARP request, the client will send a DHCP DECLINE message to the server and restarts the configuration process again.

 
7)  Explain zone transfer?

Zone Transfer is used to update the records in secondary server.Any changes made in the primary server will update in the secondary server.There are two types of zone transfer
a)AXFR(All file zone tranfer)
b)IXFR(incremental file zone transfer)


8)  What are the types of records?

The different types of records are A ,AAAA, SOA,PTR,CNAME,MX

9) When will DNS use TCP?

When DNS zone transfer happens and the file size is large that is greater than 512 Bytes it uses TCP.

10) Explain DNS query process.

a). When we open web browser and enter www.google.com in the address field. At that point, the computer doesn't know the IP address for www.google.com, so it sends a DNS query to the ISP's DNS server (The DNS server address is obtained by the use of DHCP).

b). The ISP's DNS server doesn't know the IP address for www.google.com, so it will ask one of the ROOT DNS servers.

c). The ROOT DNS server checks its database and finds no entry for google.com, but, it does know where to forward the local DNS server.

d). The local DNS sever now contacts the TLD which is TOP Level Domain. The TLD has the domain names of top level domains such as .com, .org, .net and so on. The TLD still doesn't know the IP address of google.com. Hence, it forwards the DNS query to the next and final level.

e). The local DNS server now contacts the Authorative Name server which knows everything about the domain name which includes the IP address. The ANS now directs to the google's DNS server to get the IP address of google.com.

f). Google's DNS server checks its database and finds an entry for www.google.com. This entry has an IP address of 8.8.8.8. Since the IP address of the DNS server and webserver (www) are identical, this means they are likely to be both on the same physical server.

g). Your ISP's DNS server now knows the IP address for www.google.com and sends the result to our computer.

h). Our computer now knows the IP address of google's website and is able to directly contact it. Naturally, the next step is to send an http request directly to google's webserver and download the webpage.

11) Explain Iterative & recursive query

Iterative Query :Iterative DNS queries are in which a DNS server is queried and returns an answer without querying other DNS servers, even if it cannot provide a                     definitive answer.Server Uses both iterative and recursive query
Recursive Query:Recursive DNS queries occur when a DNS client requests information from a DNS server that is set to query another DNS servers until a definitive answer                is returned to the client. The queries made to subsequent DNS servers from the first DNS server are iterative queries.PC always uses Recursive Query.


12) What is MDI & MDIX ports?

 MDI/MDIX is a type of Ethernet port connection using twisted pair cabling. The MDI (medium dependent interface) is the component of the media attachment unit (MAU) that provides the physical and electrical connection to the cabling medium. An MDIX (MDI crossover) is a version of MDI that enables connection between like devices. MDI ports connect to MDIX ports via straight-through twisted pair cabling; both MDI-to-MDI and MDIX-to-MDIX connections use crossover twisted pair cabling.


13)  Explain Straight Through & Cross Over cabling. Where will it be used.

1)Straight through cable to connect different type of devices.
a) Connect a computer to a switch
b) Connect a computer to a cable modem's LAN port.
c) Connect a router's LAN port to a switch for expanding network)
d) Connect 2 switches
 
2) A crossover cable can be used to:
a) Connect 2 computers directly.
2) Connect a router's LAN port to a switch used for expanding network
3) Connect 2 switches normal port in both switches.


14) What is Proxy ARP and in which scenario you will enable proxy ARP.

Proxy Arp is enabled only when the PC do an AND opearation to find the Mac address of the destination host and it feels it is in the same network, but physically it is connected in the another network the proxy ARP is enabled in the router to pass the packet.

15)  Explain SACK?

SACK is selective acknoledgement , used in TCP to resend only the lost segement. SACK should be permited by both sender and receiver during the three way handshake else both cant use SACK, it avoid duplicate segments.

16. Client has MTU of 1200 and Receiver has MTU of 1400, what value of MTU will be used by Client?

Client uses an MTU of 1200.

17)  in 8 DHCP messages how many Are broadcast?

Discover, Offer, Request, Acknowledgement messages are broadcast.


18) what is DHCP release?

DHCP release:

Once the DHCP IP lease time is finished, the IP will be released from the PC and it perform DORA process to acquire new IP.

19) what is the use of WSF and what if wsf,Sack is not shared during tcp handshake

WSF-Windows Scaling Factor is an option to increase the receive window size if the data sent is greater that the maximum value 65,535 bytes.WSF is negotiated only once when an TCP connection is established.

20)  Explain PMTUD and what are the Error code

- PMTUD-Path Maximum Transfer Unit Discovery
    - usually with the goal of avoiding IP fragmentation
It sends sample data of 1 byte and checks the MTU along the path and PC fragements with lowest MTU. Error message used in PMTUD is Type:3, code 0.

1) Explain tcp timers?
      a)Retransmission Timer – To retransmit lost segments, TCP uses retransmission timer (RTO). When TCP sends a segment the timer starts and stops when the acknowledgment is received
      b)Persistent Timer – To deal with a zero-window-size
      c) Keep Alive Timer – A keepalive timer is used to prevent a long idle connection between two TCPs. If a client opens a TCP connection to a server transfers some data and becomes silent the client will crash. In this case, the connection remains open forever. So a keepalive timer is used. Each time server hears from a client, it resets this timer. The time-out is usually 2 hours. If the server does not hear from the client after hours, it sends a probe segment. If there is no response after 10 probes, each of which is 75 s apart, it assumes that the client is down and terminates the connection.
       d) Time Wait Timer – This timer is used during tcp connection termination. The timer starts after sending the last Ack for 2nd FIN and closing the connection.

2) How far we can extend WSF value?
   Maximum value is 2^14 (16,384 bytes).

3) In which case dhcp server will unicast.
      When the DHCP server in is another network Relay agent is configured in the router and the packet is unicasted from the router to the DHCP server.

4) Why we have time wait state in 4 way handshake.
      Time Wait is to make sure that the final ACK is not lost.IT used the 2MSL(Maximum Segment Life) it is the Time it takes and the connection is closed once the time expires.     

5) How to differentiate fragmented and non-fragmented packets?
      Based on the MF flag, offset value and the Identifier.

6) ping from 192.168.2.10/16 to 192.168.1.10/24
in a same switch? no routers connected. what will be the result?

a)Intially it performs AND operation with /16 and finds that they are in the same network.
b)Sends an ARP request to get the MAc address of the destination.
c)Once an ARP request is resolved it sends an ICMP Request message to the ip 192.168.1.10/24
d)Destiantion perform an AND operation with /24 and find they are in different network 
e)ICMP reply will be sent with an error message "Request Timed Out". 

7. Differecne between urg and push ?

Urgent flag is raised to prioratise data, from the sender side urgent data starting byte is denoted by urgent flag and end byte is denoted by urgent pointer, followed by the normal data. From the receiver end it extracts the urgent data between urgent flag and urgent pointer and forward to application layer in out of fashion order . 

Push flag is raised by sender to avoid segment not to wait in buffer and push the data to receiver and it does not change the sequence order . 

8) What is inter vlan routing?

Inter vlan is used to communicate with different vlan. It can be enabled in L3 switch (SVI) and router . 

In L3 Switch it is done using TAG port ( to communicate with different VLAN in case of same subnet) and ACCESS port ( no communicate with multi vlan)

9)  What is a broadcast domain and a collision domain?

A collision domain:
It is an area in a network where two ethernet frames can collide on one link between two devices. If one emits and if the other emits data at the same time, it creates the collision. 
 
Broadcast domain:
ethernet frames to a mac address destination: FF:FF:FF:FF:FF:FF, it means that it is for all devices that are directly connected to the emitting device. FF:FF:FF:FF:FF:FF is called the broadcast mac address. All the devices who receive it are connected by a SWITCH or switches. 


10) What is a VLAN and how it will reduce the broadcast traffic?

VLANs can help manage broadcast traffic by forming multiple broadcast domains. Breaking up a large network into smaller independent segments reduces the amount of broadcast traffic each network device and network segment has to bear.

11) What is a native VLAN what type of traffic will go through native VLAN

In every L3 switch there is one native VLAN ,and it can be changed but has to make sure in all other device Native vlan is changed . As in all device the Native VALN is same when is packet is received with no VLAN tag it is moved to Native VLAN in that switch.


12. What are the different port states and timers and BPDU

1.a Five port states.

    a) Blocking
    b) Listening
    c) Learning
    d) Forwarding
    e) Disabled

1.b. There are three kinds of BPDUs

    a) Configuration BPDU, used by Spanning tree protocol to provide information to all switches.
    b) TCN (Topology Change Notification), tells about changes in the topology.
    c) TCA (Topology Change Acknowledgment), confirms the reception of the TCN.

13. STP convergence with 4 switches, what is the Root port election criteria


If a Switch has multiple paths to reach the Root Bridge (Root Switch), it must select one path and the associated port as the Root Port. Following are the different steps for selecting the Root Bridge (Switch).

Spanning Tree Root Port selection process in a Non-Root Switch involves the following steps.

    a) Select the port connected to the path with the lowest accumulated Spanning Tree Path Cost to the Root Bridge (Root Switch) as the Root Port, when a Non-Root Switch has multiple paths to reach the Root Switch.
    b) If multiple paths are available to reach the Root Bridge (Root Switch) with the same accumulated Spanning Tree Path Cost in a Non-Root Switch, select the port connected to the neighbor switch which has the lowest Switch ID value as the Root Port.
    c) If all the multiple paths go through the same neighboring switch to reach the Root Bridge (Root Switch), Non-Root Switch will select the local port which receives the lowest port Spanning Tree Port Priority value from neighbor Switch as the Root Port.
    d) If the received Spanning Tree Port Priority value values are the same between the connecting ports to reach the Root Bridge (Root Switch), Non-Root Switch will select the port which receives the lowest physical port number from neighbor Switch as the Root Port. This is the last tie breaker.

14. What are the changes a frame undergoes in a switch

In general, layer-2 switching does not modify the frames. A VLAN tag may be added or removed as necessary for frames between tagged and untagged ports. A layer-3 switch is both a router (l3) and switch (l2). When it switches traffic, it's just like any other layer-2 switch.

15. What is a routing table?

A routing table is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed. All IP-enabled devices, including routers and switches, use routing tables. The basic routing table consists of,

    a) Destination.
    b) Next hop.
    c) Interface. 


16. Static routing is when you statically configure a router to send traffic for particular destinations in preconfigured directions. 
     Dynamic routing is when you use a routing protocol such as OSPF, ISIS, EIGRP, and/or BGP to figure out what paths traffic should take.

16) Define static routing & dynamic routing?

static routing:

Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing traffic.

Dynamic routing:

Dynamic routing is a process where a router can forward data via a different route or given destination based on the current conditions of the communication circuits within a system.

17) What is a default route?

In computer networking, the default route is a setting on a computer that defines the packet forwarding rule to use when no specific route can be determined for a given Internet Protocol destination address.

18) What is a route metric?

Router metrics are metrics used by a router to make routing decisions. A metric is typically one of many fields in a routing table. Metrics are used to determine whether one route should be chosen over another.


19) What is the difference between routing and routed protocol? Give examples.

Routing protocol:
A routing protocol specifies how routers communicate with each other, distributing information that enables them to select routes between any two nodes on a computer network. Routing algorithms determine the specific choice of route.

Eg: OSPF, EIGRP, RIP, RIPV2.

Routed protocol:
A routed protocol is a protocol by which data can be routed. Routed protocol are IP, AppleTalk, and IPX. In this kind of protocols we require an addressing scheme and subnetting. 

2) Explain in detail, PC1 wants to communicate to PC2

PCA- 10.0.0.1/24
PCB- 20.0.0.1/24

PCA Perform AND operation to PCB and finds it is in the different network, so it look for the gateway to reach the destination. Once the ARP is resolved, both PC will ping each other.

7) All ports are access ports and no trunk configured on any ports
 
 Will C1 be able to ping C2- No (Both vlan 10 and 20 in the same switch). If we connect vlan 10 access port in vlan 20, it will communicate.
 Will C1 be able to ping C3- Yes
 Will C1 be able to ping C4- Yes

8) C1 is not able to Ping C3, explain in detail What needs to be done in order to ping between all Machines 

- Asked what is the native vlan in both switches (vlan 10 or vlan 20)
- Have enabled trunking in these switches.
- If they need to communicate between all vlan need inter vlan routing.

10) Troubleshoot the scenario where ping from 192.168.0.2 is not working to 20.20.20.2.
192.168.0.2/24----SW----ROUTER----------ROUTER------SW-----20.20.20.0/24


- Asked whether the static routing is enabled or dynamic routing is enabled.
- What is the error message that they received when ping from the source.
- Asked whether the destination host is active.
- Asked to perform traceroute to the destination to check where the packet is dropped.


? What is renewal & rebidding time in DHCP?

In DHCP the default lease time for the IP is 8 days.

Renewal- Once it completed 50%, it send a request message to the server to get the same IP. If there is no reply from the server, the PC, still use the same ip until the lease time expires.
Rebinding- Once it come to 87.5%, client agan send a request to the server to refresh the shcp table to use the same IP.

If the server still not respond and lease time expires, it again do a DORA process to get a new IP.


? If a router is getting a broadcast message, what will it do?

It check the the destination IP address and check their own routing table and forward the packet to the nest hop.


? A switch with 10 ports and 2Lan has been assigned with 5 ports each. How many broadcast domain and collision domain?


Broadcase domain- 1
Collision domain- 10


? Can we connect Trunk link to server PC?

No- Trunk link is used to connect two switches and exchange the same vlan information.


? After control connection, in data connection packets are getting dropped continuously. What are all the possible issue?

- FTP server in the WAN and behind the firewall is blocking.
- Maybe the Natting is not happening.

? In TCP connection establishment, SYN is sent and Rest is received. Why?

- Duce to port number is not supported.
 EG: Ftp request send to the HTTP server, server do reset.

 1) Explain in detail, PC1 wants to communicate to PC2
  PC A :1.1.1.1
  PC B :1.1.1.100

 When we ping PC 1 to PC 2 it need to do an AND operation as there is not subnet mask present it will not be able to ping from Source to destination.

2)Explain in detail, PC1 wants to communicate to PC2

PCA- 10.0.0.1/24
PCB- 20.0.0.1/24

PCA Perform AND operation to PCB and finds it is in the different network, so it look for the gateway to reach the destination. Once the ARP is resolved, both PC will ping each other.


3) When PC With IP address 1.1.1.1 tries to ping 1.1.1.100 as there are two links present in between the Switch, when the data is sent from A it is sent to switch 1 and it floods the data and B will receive the data twice which forms a loop to avoid these loops we use the concept of STP and block one port with the help of MAC address and path cost.


7) All ports are access ports and no trunk configured on any ports
 
 Will C1 be able to ping C2- No (Both vlan 10 and 20 in the same switch). If we connect vlan 10 access port in vlan 20, it will communicate.
 Will C1 be able to ping C3- Yes
 Will C1 be able to ping C4- Yes

8) C1 is not able to Ping C3, explain in detail What needs to be done in order to ping between all Machines 

- Asked what is the native vlan in both switches (vlan 10 or vlan 20)
- Have enabled trunking in these switches.
- If they need to communicate between all vlan need inter vlan routing.


9) Troubleshoot the scenario where ping from 192.168.0.2 is not working to 20.20.20.2.
192.168.0.2/24----SW----ROUTER----------ROUTER------SW-----20.20.20.0/24


- Asked whether the static routing is enabled or dynamic routing is enabled.
- What is the error message that they received when ping from the source.
- Asked whether the destination host is active.
- Asked to perform traceroute to the destination to check where the packet is dropped.


10) Can I request for an IP in the discover process?

No. We cannot request for an IP.

11) You have 2 PC connected to a switch with different VLAN and your dhcp server is multiple hops away, based on what parameter it will assign IP from its pool?

Based on the network address.


12) What is TCP half open connections?

A half-open TCP connection is when one side of the established connection has crashed, and did not send notification that the connection was ending.


13) Difference between RIP v1 & RIP v2?

 a) RIPv1 is a Distance-Vector Routing protocol.
 b) RIPv1 does not support VLSM (Variable Length Subnet Masking).
 c)RIPv1 support maximum metric (hop count) value of 15. Any router farther than 15 hops( infinity) away is considered as unreachable.
 d) RIPv1 routing updates are sent as Broadcast traffic


 a) RIPv2 is a Hybrid Routing Protocol. A Hybrid Routing Protocol is basically a Distance-Vector protocol which some characteristics of Link State routing  protocols.
 b) RIPv2 support VLSM (Variable Length Subnet Masking).
 c) RIPv2 support maximum metric (hop count) value of 15. Any router farther than 15 hops away is considered as unreachable.
 d) RIPv2 routing updates are sent as Multicast traffic


14) What do you mean by routing update?

Each and every router updates its table which has network ID, interfaces after the Timer expires. This timer controls the interval between routing updates. The update interval is set to 30 seconds, by default, with a small random amount of time added when the timer is reset. ... The default value is 180 seconds.


15) A transfer was going on from PC2 to PC1, what will happen if the ARP table in L2 is flushed out?

The packet will be dropped. 


16) What is INFORM message used for? List some other than NetBIOS, Win server

If the client is requesting for certain parameters (255) and not all the parameter requested by the client is replied by the server in that case it sends a Inform message.Other than NET bios and Win server it also request DNS, gateway lease time, Rebinding Time, Renewal Time,Static Route,Router Discovery etc.

17) What is renewal & rebidding time in DHCP?

In DHCP the default lease time for the IP is 8 days.

Renewal- Once it completed 50%, it send a request message to the server to get the same IP. If there is no reply from the server, the PC, still use the same ip until the lease time expires.
Rebinding- Once it come to 87.5%, client agan send a request to the server to refresh the shcp table to use the same IP.

If the server still not respond and lease time expires, it again do a DORA process to get a new IP.

18) Why first ping request fails?

The reason the first ping usually fails is that the remote router in that LAN has to put the ping request on hold to send out an ARP broadcast to learn the MAC address of the remote device, then wait for a response, and then send the first ping through. This delay is usually too long.


19)A switch with 10 ports and 2Lan has been assigned with 5 ports each. How many broadcast domain and collision domain?

Broadcast domain- 2
Collision domain- 10


20)If a router is getting a broadcast message, what will it do?

It check the the destination IP address and check their own routing table and forward the packet to the nest hop.

21) Can we connect Trunk link to server PC?

No- Trunk link is used to connect two switches and exchange the same vlan information.

22) After control connection, in data connection packets are getting dropped continuously. What are all the possible issue?

- FTP server in the WAN and behind the firewall is blocking.
- Maybe the Natting is not happening.

23) STP – Variant different types
 
 STP – Variant different types

IEEE 802.1D PVST per VLAN spanning tree
IEEE 802.1W rapid spanning tree protocol (RSTP)
IEEE 802.1S Multiple spanning tree protocol (MST)

24) In TCP connection establishment, SYN is sent and Rest is received. Why?

- Due to port number is not supported.
 EG: Ftp request send to the HTTP server, server do reset.


16. What is INFORM message used for? List some other than NetBIOS, Win server?

17. What is renewal & rebidding time in DHCP?

18. Why first ping request fails?

19. A switch with 10 ports and 2Lan has been assigned with 5 ports each. How many broadcast domain and collision domain?

20. If a router is getting a broadcast message, what will it do?

21. Can we connect Trunk link to server PC?

22. After control connection, in data connection packets are getting dropped continuously. What are all the possible issue?

23. STP – Variant different types

24. In TCP connection establishment, SYN is sent and Rest is received. Why?


1. TCP 3 Way handshake
2. Explain using different modes at different times
3. window size
4. Maximum window size
5. Explain WSF
6. Explain SACK Permitted
7. Explain how SACK works
8. Explain ACK with and without SACK Permitted

What are the topics that we covered in this training session?
What are the scenarios that we worked on?

1)TCP
2)MTU

3)a) Scenarios:

Setting up a TCP connection between 2 hosts and 2 routers, 

PC-Router-Router-PC

router uses which layer?
If I'm sending a packet with MTU 1500 bytes, whether the router fragments a packet? If it is yes, what will the router look, it will look for the segmentation or fragmentation?
If it is no why it so, explain.

b)TCP connection is established

Client-Server

->After the connection is eshtablished, data transfer is happening between coth, at a certain point of time the server is down, how the client will be able to know that the server is down or what.

->what is the name of the timer that is used here?

->What will be the duration of the timer?

->What is persistant timer?

->Why it is named as persistant timer?
1) Arp scenario
2) Arp request 



Panel Questions:

1) what happens when you type google.com from a browser
2) list the differences between tcp and udp and explain each
3) what protocol is used in ping 
4) what happens when you ping 
5) what is broadcast and unicast

questions

1 how does a browser know if it has to use http or https
2 how does a clinet decide if to make a iterative or recursive query
3 where does the local dns server send query if t doesnt have , like explain the whole chain of recursion

4 dhcp server - 
  a)how it knows which subnet it came from in relay agent scenario

   b)its a discovery or any other type . name of field

  c)3 mandatory and 3 non mandatory field

  d) is subnet mask provided and is it a mandatory info


5 arp what will be destination mac when try to open google.com

6 format  for tcp sack option , example 1-5 sent 3 dropped what will be ack format

7 what tcp parameters negotiated

8 type of dns queries and records

9 icmp msg codes and uses 

10 fragmentation :  

  a)the receiving device sees the layer 4 information or layer 3 fields to reassemble.
  b) significace of id field and ttl field in ip header


HI Hari,

These were the questions asked to me on the panel


: how does arp work and funcitons ?
: why ping is done to find mac address ?
: why did you check icmp ?
: what happens in arp when you have 2 routers between 2 pc's?
: why are querries and records used in DNS ?


1. Packet flow for Google.com?
2.How does the browser know the link typed is http or https?
3.HTTP and HTTPS port numbers?
4. DNS forward and reverse lookup?
5. What are the parameters exchanged in TCP?


1. Ping pc A to PC B & explain the pkt flow. Three router in between which is on different network.
 
    PC"A"- R1 - R2- R3 - PC"B"

2. How will the ICMP pkt leave PC A.

3. Parameters in ICMP.

4. What is TTL.

5. Wht is fragmentation.

6. Fragmentation feild in IP header.

7. Difference between Identification and fragment offset.

8. Sending 5000 bytes of data with MTU set as 1500. Wht would be Identification and fragment offset value.


THE QUESTIONS WHICH ARE ASKED  ON PANEL 

> IP HEADER 

> TTL VALUE 

> FLAGS 

> IDENTFICATION AND OFFSET VALUE 

> ICMP PING REQUEST    

  2 pc and 3 routers 


Please find the question discussed on the panel.

1.Why do we need mac address 

2.Whether mac address is needed

3.I have two different network 10.0.0.1 and 192.168.1.1.

Will i be able to ping 

4. Then with the layer 3 device... Will i be able to ping 

5. Explain any protocol 


PC-Router-Google Server

What will be the destination MAC address ?

Will the PC know the destination IP or not if they are in the different networks ?


Please find the questions that were asked in the panel today.

1. What are the essential and optional parameters in DHCP options

2. Where is DHCP unicast and broadcast used

3. Based on what message server identifies what kind of message it received

4. Based on what DHCP server decides what ip range it has to give to client

5. How does the PC reach the DHCP server on the other network

6. Why does the SRC IP and DEST IP change when discover packet goes from relay agent to DHCP server


PANEL QUESTIONS 

> ICMP PING REQUEST  FLOW 

> ARP REQUEST 

> TCP FUNCTIONS 

> NETWORK LAYER FUNCTIONS 

> EXPLAIN  FRAGMENTATION 

> EXPLAIN  IP HEADER COMPLETELY 

1. Ping A to B Explain ICMP
2. Trace Route for the same topology

1. Explain how to ping destination from scenario.
2. Explain AND Operation, ARP Cache, and DG
3. Which path DG takes when two routes are statically configured.
4. Explain TTL 
5. Explain Traceroute and Ping
6. Explain Routing using scenario
7. Explain TCP 4 way close
8. Explain State diagram
9. What is 2MSL timer
10. What is Fin Wait 2
11. Is there a timer for Fin Wait 2
12. Can a server wait one day begore transfering data to Client.

1) What  is DNS ? 

2) what is DNs query ? Explain 

3) how clients resolves a domain name ? 

4) Which type of DNS query the DNS client will generate ? (Recursive or iterative)

5) How can a client know that he wants to use a Recursive query or an iterative query ? 

6) How local DNS server processes the DNS request received from DNS client ? 

7) How would the DNS Sever know that which type of query it has received in DNS request ? 

8) explain the process when my local server(css corp) wants to resolve domain name "google.com"

9) what if my DNS server does not respond to the DNS request message , what will my DNS client do ? 

10) what will be the time out period for the DNS request generated by the DNS client if it did not receive any answer ? 

11) How would higherlevel DNS server processes the DNS request from the local DNS server and how it will respond ? 

11) what is ICMP ? 

12) explain ICMP messages its type and code ? 

13) what is TTL value and why it is used ?

1)Types of Resourse records in DNS, explain each records in brief.

2)What is Cname record and what is SOA record?

3)Scenario:

Domain name: csscorp.com
all the PC's are connected to it, how you can access the infiormation in other PC's connected to the domain?

4) Why fragmentation needed?

5) On what basis fragmentation is done?

6)Scenario:

Pc-> L3 switch-> Destination PC

6000 bytes of data from PC-> L3 switch (MTU 1500 bytes)-> Destination PC

IP fragmentation: 

ID
DFbit
MFbit
Fragment Offset



No comments:

Post a Comment