Header Ads

Recently post

Questions for Network Engineer / Network Administrator (Security)

Top Interview Questions for Network Engineer / Network Administrator (Security)
Are you looking for job as a Network Security Engineer? Or are you thinking of leaving your current position and considering a new job as Network Engineer/Administrator with a new company in LAN/WAN Network Security environment?
If yes, then this article is for you and any of described technologies and questions may be asked during the interview!
Network Engineer/Administrator (security) is a higher-level position, often with “jr.” and “sr.” prefixes. The major responsibility of a network engineer (security) is to determine “how to implement network security” in routed LAN/WAN environments. They design and implement both the hardware and software necessary technologies to secure computer network. They have high-level technical skills in LAN/WAN security. The major responsibility of a network admin (security) includes adding security software and hardware, performance monitoring, troubleshooting, logging errors, backing up and restoring data, and assigning permissions to users.
Before facing any interview for a network engineer/administrator (security) position, make sure that you have enough knowledge of firewalls (software & hardware), VPNs (IPsec, SSL, and Get VPN etc.) with general network technologies as described below:
Network concepts:
·         * Data communication and transmission techniques
·         * Fundamentals of OSI & TCP/IP model
·         * Router’s basic operations (startup, nvram, flash/IOS backup & recovery)
·         * IP Addressing and Summarization
·         * IP Routing : Basics of RIP , EIGRP , OSPF & BGP
Firewall
·         * NAT (object based)
·         * ACL (object based)
·         * Contexts
·         * Failover (Active-Standby & Active-Active)
·         * Transparent
·         * MPF (Modular Policy Framework)
VPN
·         * Site to Site
·         * SSL
·         * Get VPN
·         * Easy VPN
·         * DMVPN
·         Flex
Route-Filtering
·         * Access-lists
·         * Route-Maps
·         * Prefix-Lists
·         * Distribute-Lists
·         * Filter-lists
·         * Class-maps & Policy-maps
Network security
·         * AAA Server
·         * Dot 1x Authentication
·         * Ip SLA
Questions for an Interview of Network Security Engineer/Administrator: 
All listed questions are very common and important and you must be prepared with all of the following answers before facing any interview for a Network Security position.
Q. What is a firewall?
A: A firewall is used to provide security to the private networks connected to the internet. They can be implemented as hardware or software, or a combination of both. All incoming and outgoing network traffic are examined and accepted/rejected by the firewall as per defined rules.
Q. What is the difference between network gateway and a firewall?
A: A network gateway joins two networks together and a network firewall protects a computer network against unauthorized incoming or outgoing access. Network firewalls may be hardware devices or software programs.
Q. What is the difference between IPS and a firewall?
A: The primary function of a firewall is to prevent/control traffic flow from an untrusted network (outside). A firewall is not able to detect an attack in which the data is deviating from its regular pattern, whereas an IPS can detect and reset that connection as it has inbuilt anomaly detection.
Q. What is a transparent firewall?
A: A transparent firewall is considered as Layer 2. Deploying a new firewall into a network can be a complicated process due to various issues (e.g. IP address reconfiguration, network topology changes, current firewall etc.) because the firewall is not a routed hop and you can easily introduce a transparent firewall into an existing network.
Q. What is packet filtering?
A: Packet filtering is the process of permitting or blocking ip packets based on source and destination addresses, ports, or protocols. The packet filter examines the header of each packet based on a specific set of rules, and on that basis, decides to prevent it from passing or allow. Packet filtering is also part of a firewall program for protecting a local network from unwanted access.
Q. Define stateful inspection?
A: Stateful inspection is known as dynamic packet filtering and is a firewall technology that monitors the state of active connections and uses this information to determine which network packets are allowed through the firewall. Stateful inspection analyses packets down to the application layer.
Q. What is the Public Key Encryption?
A: Public key encryption uses public and private key for encryption and decryption. In this mechanism, public key is used to encrypt messages and only the corresponding private key can be used to decrypt them. To encrypt a message, a sender has to know the recipient’s public key.
Q. Define Digital Signatures
A: Digital signature is an attachment to an electronic message used for security purposes. It is used to verify the authenticity of the sender.
Q. What is Authorization?
A: Authorization is a security mechanism used to determine user/client privileges or access levels related to network resources, including firewalls, routers, switches and application features. Authorization is normally preceded by authentication and during authorization. It’s system that verifies an authenticated user’s access rules and either grants or refuses resource access.
Q. What is stateful failover?
A: Every time a session is created for a flow of traffic on the primary node, it is synced to the secondary node. When the primary node fails, sessions continue to pass traffic through the secondary node without having to re-establish.
Q. What is VPN and describe IPsec VPN
A: Virtual Private Network (VPN) creates a secure network connection over a public network such as the internet.
IPsec VPN means VPN over IP Security allows two or more users to communicate in a secure manner by authenticating and encrypting each IP packet of a communication session.
Q. What is Site to Site and remote access VPN?
A: A site-to-site VPN allows offices in multiple locations to establish secure connections with each other over a public network such as the Internet. Site-to-site VPN is different from remote-access VPN as it eliminates the need for each computer to run VPN client software as if it were on a remote-access VPN.
Q. How do you check the status of the tunnel’s phase 1 & 2 ?
A: Use following commands to check the status of tunnel phases:
Phase 1 : show crypto isakmp and State : MM_ACTIVE
Phase 2 : show crypto ipsec sa
Note: if you have lot of tunnels and the output is confusing use a ‘show crypto ipsec sa peer 12.12.12.12′ command instead.
Q. What is SSL VPN? How it is different from IPsec VPN?
A: SSL VPN provides remote access connectivity from almost any internet enabled location without any special client software at a remote site. You only need a standard web browser and its native SSL encryption.
IPsec is a dedicated point-to-point fixed VPN connection where SSL VPNs provides anywhere connectivity without any configuration or special software at remote site.
Q. What is GRE and why is it required?
A: Generic Routing Encapsulation (GRE) is a protocol that encapsulates packets in order to route other protocols over IP networks.
GRE enables a wrapper to be placed around a packet during transmission of the data. A receiving GRE removes the wrapper, enabling the original packet to be processed by the receiving stack.
Advantages of GRE tunnels include the following:
·         * GRE tunnels connect discontinuous sub-networks.
·         * GRE tunnels allow VPNs across wide area networks (WANs).
·         * GRE tunnels encase multiple protocols over a single-protocol backbone.
·         * GRE tunnels provide workarounds for networks with limited hops.
Q. Firewalls work at what layer? Define firewall generations and their roles.
A: Firewalls work at layer 3, 4 & 7. First generation firewalls provide packet filtering and they generally operate at layer 3 (Network Layer). Second generation firewalls operate up to the Transport layer (layer 4) and records all connections passing through it and determines whether a packet is the start of a new connection, a part of an existing connection, or not part of any connection. Second generation firewall is mainly used for Stateful Inspection.
Third generation firewalls operate at layer 7. The key benefit of application layer filtering is that it can “understand” certain applications and protocols (such as File Transfer Protocol (FTP), Domain Name System (DNS), or Hypertext Transfer Protocol (HTTP)).
Q. What is DoS attack? How can it be prevented?
A: DoS (Denial of Service) attack can be generated by sending a flood of data or requests to a target system resulting in a consume/crash of the target system’s resources. The attacker often uses ip spoofing to conceal his identity when launching a DoS attack.
Q. What is IP Spoofing?
A: An IP spoofing attack enables an attacker to replace its identity as trusted for attacking host. For example, if an attacker convinces a host that he is a trusted client, he might gain privileged access to a host.
Q. What are the security-levels in cisco ASA?
A: ASA uses security levels to determine the parameters of trust given to a network attached to the respective interface. The security level can be configured between 0 to 100 where higher number are more trusted than lower. By default, the ASA allows packets from a higher (trusted) security interface to a lower (untrusted) security interface without the need for an ACL explicitly allowing the packets.
Q. What is AAA?
A: AAA stands for authentication, authorization and accounting, used to control user’s rights to access network resources and to keep track of the activity of users over a network. The current standard by which devices or applications communicate with an AAA server is the Remote Authentication Dial-In User Service (RADIUS).
Q. What is IPS? How does it work?
A: An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits. An Intrusion Prevention System can play a good role to protect against various network security attacks such as brute force attacks, Denial of Service (DoS) attacks, and vulnerability detection. Moreover, an IPS also ensures prevention against protocol exploits.
Intrusion Prevention System uses four types of approaches to secure the network from intrusions which include:
·         * Signature-Based
·         * Anomaly-Based
·         * Policy-Based
·         * Protocol-Analysis-Based
The above described questions are very tricky and important in aspect to clear any interview for Network Security Engineer/Administrator position and it is not possible for anyone to explain all kind of questions so you can download more questions from the download link posted here and if you find any difficulty getting the answer to any question then you can write me @ Comment section.
Top Interview Questions that Network Design Engineer Candidates Need to Know
Are you looking for job as a network design engineer? Or are you thinking to leave your current position for a new job as a network designer with a new company?
If you answered yes to either of those questions, then this article is for you and any of the described technologies and questions may be asked during the interview!
Network design engineer is a higher-level position; the major responsibility of a network design engineer is to design both the hardware and software technologies needed for a company’s network setup. A network designer examines vendor-agnostic network design principles and is often responsible for designing all of the network infrastructure, including routing, switching, security, LAN, WAN, VoIP, wireless, optimization, load balancing, etc. If you are more interested in network design and architecture, then don’t walk away from the equipment, open up your brain to new approaches building networks.
The scope of network designing is enormous (going through almost all networking specialization).
A network design engineer must have the knowledge of the following technologies:
·         * Layer 2 control plane
·         * Layer 3 control plane
·         * VoIP, security, wireless network architecture
·         * Network virtualization
·         * Design considerations
·         * Analyze design requirements
·         * Develop and Implement network designs
·         * Validate and optimize network design
I have read somewhere “there are those who design networks…. very large networks who may not do one ounce of actual installation or implementation of the network.”
Yes, it is possible that a person who has never worked on network technologies or seen even a router or switch can be a network designer. Equally, there are people who lay cables and configure routers and switches all day. In the middle ground are the amateur designers who will throw a solution together based on nothing but experience and reality, so it depends where you want to be as a network engineer.
The network designer in general focuses on the “Why“, where the network engineer (implementation) focuses on “How.” Designing track gives you concepts and processes that will enable you to better plan and lay out a network. It also gives you concepts such as the design lifecycle, network lifecycle, etc. It attempts to teach you different methodologies to sort through design problems and how to tackle them.
Also, the network designer has very broad technical knowledge where he/she needs strong logical and technological points of view because he/she needs to design with wireless, voice, and security in mind and not just routing and switching.
My Best Questions for an Interview of Network Design Engineer
All of the questions below are very common and must be prepared for before facing any interview for the network designing environment.
Q: What is your experience as a network design engineer?
A: You can answer with your wealth of network experience and job responsibilities and don’t forget to share your achievements as a network design engineer. You can also mention your involvement in complex LAN, WLAN, and IPT infrastructure solutions and large-scale projects in unique environments with collaboratively working within a team.
Basically, a network design engineer works with project teams, takes information and/or project specifications from customers and turns it into a completed design definition which meets the agreed specification, with due consideration to factors such as security and operational support including routing, switching, security, LAN, WAN, VoIP, wireless, optimization, load balancing, etc.
Q: What decisions/suggestions you have made as network design engineer?
A: Here you can provide the information on major suggestions/decisions taken by you on network/device migration and up-grading from your previous experience. You can also share your involvement in project review meetings and regular representation of the network services with your team, and how it helped your team to achieve organizational goals of network services.
Answer the question with all of positive decisions/suggestion taken by you and don’t try to explore decisions that were wrong in term of technical or any misfit technology but this doesn’t mean that you will not share your creativity and solution development skills.
Q: Describe the set of required skills for a network design engineer?
A: Answer this question with the description of required key skills for a network engineer as listed below;
• Layer 2 control plane
• Layer 3 control plane
• VoIP, security, wireless network architecture
• Network virtualization
• Design considerations
• Analyze design requirements
• Develop and implement network designs
• Validate and optimize network design
Q: Describe techniques you used as a network design engineer?
A: This question is asked very often during the interview for network designing position.
You must prepare the answer before facing the interview. You can start your answer with a list of technologies used by you. You might have to face cross-questioning for the described list of technologies.
You will be expected to share challenging timescales and demonstrate flexibility and sound design principles that allow your employer to meet the requirements of network project. You can also share your best-practice design methods that helped you to update and improve your way of working.
Q. How do traceroute and ping work?
A: Traceroute is a network debugging utility that attempts to trace the path a packet takes through the network. when you execute a traceroute command, your machine sends out 3 UDP packets with a TTL (time-to-live) of 1.
Traceroute works by increasing the “time-to-live” value of each successive batch of packets sent. This keeps going until you reach the destination.
Ping: It sends an ICMP (Internet control message protocol) echo request to a specified interface on the network and, in response, it expects to receive an ICMP echo reply. By doing this, the program can test connectivity, gauge response time, etc.
Q: How many channels are in E1 and T1 link and what is the operational bandwidth of each channel in each link?
A: E1 link contains 32 channels while T1 link contains 24 digital channels and each channel of both T1/E1 gives you 64 kbps bandwidth.
An E1 link consists of 30B channels and 1D channel and each channel has 64k Bw.
So for E1 – you get 30*64 = 1920kbps
A T1 link consists of 23B channels and a D channel and each channel has 64k Bw. So for T1 – you get 23*64 = 1472kbps
Q. What are the main contents of a routing table?
A: A routing table contains the information necessary to forward a packet along the best path toward its destination.
A basic routing table includes the following information:
·         * Destination network-id
·         * Next hop
·         * Exit Interface (outgoing network interface)
·         * Administrative distance:
·         * Metric: Assigns a cost to each available route so that the most cost-effective path can be chosen
Q: What is a route flap?
A: Route flapping occurs very often in computer networking when a router alternately advertises a destination network via one route then another in quick sequence; also if an interface on a router has a hardware failure, it will cause the router to announce it alternately as “up” and “down”.
Q: What basic set-up equipment is needed for VoIP?
A: For general VoIP set up we require the following things;
·         * Broadband connection
·         * VoIP phone*
·         * Nexton soft-switches
·         * Router
·         * Audiocodec
·         * Astric server
Q: Why do we use BGP?
A: Border gateway protocol is an exterior gateway protocol (EGP) used for routing between autonomous systems. TCP port 179 is used to establish session
We can use BGP in the following conditions:
·         * Customer is connected to multiple Internet service providers (ISPs).
·         * Service provider networks (Transit autonomous system).
·         * In very large enterprise networks, where we can use BGP at core layer as a redundant routing protocol.
Q: Describe what a VPN is and how it works.
A: Virtual Private Network (VPN) creates a secure network connection over a public network such as the Internet. IPsec VPN means VPN over IP Security allows two or more users to communicate in a secure manner by authenticating and encrypting each IP packet of a communication session.
Q: What are delay, jitter and packet loss and how can we overcome these issues?
A: Network traffic often suffers from one or more of the following issues:
Delay: Excessive time required for a packet to traverse the network
Jitter: The uneven arrival of packets, considered as delay variation
Packet loss: Dropped packets are not retransmitted
QoS can be used to overcome these issues, especially for unified communication network traffic. A commonly used IntServ QoS tool is RSVP (resource reservation protocol), which provides QoS by guaranteeing treatment to a particular traffic flow.
And DiffServ QoS tool classifies different types of traffic and provides different levels
of service based on those distinctions.
Q: Describe high-level and low-level network design.
A: A HLD is referred to as software architecture; it provides an overview of solution, platform, system, product, or process. High-level design involves decomposing system into modules and representing the interfaces and invocation relationships among modules. A high-level design document will usually include a high-level architecture diagram depicting the components, interfaces, and networks that need to be further specified or developed.
LLD, also known as detailed design, is used to design internals of the individual modules identified during HLD. LLD describes each and every module in an elaborate manner so that the engineer can directly implement the network based on this.
Top Interview Questions for Network Engineer-Administrators (Data-WAN)
Are you looking for job as a network engineer/network administrator? Or are you thinking to leave your current position for a new job as a network engineer/administrator with a new company in a routed LAN/WAN environment?
If you answered yes to either of those questions, then this article is for you and any of described technologies and questions may be asked of you during the interview!
Network Engineer is a higher-level position, often with a “junior” or “senior” prefix. The major responsibility of a network engineer is to determine “how to implement technologies” in a routed LAN/WAN environment. They design and implement both the hardware and software technologies needed for a computer network. They have high-level technical skills in local area networks (LANs) or wide area networks (WANs).
Network Administrator is responsible for the smooth, efficient, and secure operation of computer networks. In general, they configure and administer existing networks rather than designing networks from the beginning. They play a very challenging role in a routed LAN/WAN environment, including customization of the network as per the organization’s needs, such as adding software and hardware, performance monitoring, troubleshooting, logging errors, backing up and restoring data, assigning permissions to users, and helping users with network issues.
Before facing any Interview for network engineer/administrator position, make sure that you have enough knowledge on below technologies.
General network concepts:
·         * Data communication and transmission techniques
·         * Fundamentals of OSI and TCP/IP model
·         * Router’s basic operations (startup, NVRAM, flash/IOS backup and recovery)
IP addressing and summarization:
·         * IP address classes
·         * Classful and classless IP addresses
·         * IP subnetting
·         * Understating wild card masks
·         * CIDR,FLSM,VLSM
·         * IPv6 fundamentals
Routing:
RIP
·         * Difference between RIPv1,RIPv2 and RIPng
·         * Passive Interface
·         * RIP Timers
·         * RIP AD and Multicast Address
·         * Split Horizon and Route Poisoning
EIGRP
·         * Auto and Manual Summarization
·         * Neighborship Conditions
·         * Passive Interface
·         * Split Horizon
·         * Authentication
·         * EIGRP Stub Routing and Stuck in Active
·         * Equal and Unequal Load Balancing
·         * EIGRP ADs and Multicast Address
OSPF
·         * OSPF Area Types
·         * OSPF Neighborship Conditions
·         * Concepts of ABR and ASBR Router
·         * DR/BDR Fundamentals and Election
·         * OSPF Times and Authentications
·         * OSPF Summarizations (Inter-Area, External, and Default Info Originate)
·         * OSPF AD and Multicast Addresses
·         * OSPF Network and LSA Types
BGP
·         * BGP Fundamentals – Why and When to Use BGP?
·         * BGP States and Message Types
·         * BGP Neighborship Conditions
·         * iBGP and eBGP
·         * BGP Summarization
·         * Use of Update Source, eBGP-Multi-Hop, Next-Hop-Self Commands
·         * BGP Path Attributes
·         * BGP Synchronization and Split-Horizon Rule
·         * BGP Address Families
·         * BGP Communities
MPLS
·         * MPLS Fundamentals – IP CEF, LIB, LFIB
·         * LDP and TDP
·         * P, PE and CE Routers
·         * PUSH,POP,SWAP Functions
·         * PHP – Penultimate Hop Popping
·         * BGP – VPN
·         * MPLS over ATM /Frame Relay
QoS
·         * QoS Models and Tools
·         * Difference between L2 and L3 Queues
·         * Characteristics of CoS, ToS, IPP, DSCP AF and EF
·         * Class Maps and Policy Maps
Route Filtering
·         * Access-List Fundamentals
·         * Route-Maps
·         * Prefix-Lists
·         * Distribute-Lists
·         * Filter-Lists
IP Services and Network Securities
·         * First-Hop Redundancy Protocols (HSRP,VRRP,GLBP)
·         * Network Address Translation (Static, Dynamic, PAT)
·         * Network Time Protocols, Syslog Server, SNMP
·         * Basics of VPNs (IPsec, Site to Site , DMVPN, Remote VPN)
·         * IP Multicast Routing (IGMP,PIM SM/DM, MSDP)
·         * Policy-Based Routing
·         * IP SLA
My Best Questions for an Interview of Network Engineer/Network Administrator: All of the questions below are very common and must be prepared for before facing any interview for the data-WAN environment.
1. What is a router? Or define the basic requirements of a router?
Answer: A router is a layer 3 network device used to establish communication between different networks. Basic roles performed by a router are:
·         * Inter-network communication
·         * Best path selection
·         * Packet forwarding
·         * Packet filtering
2. What is the use of routing? or Why we use routing?
Answer: By default, a router provides inter-network communication only for directly connected networks. To establish communication between indirectly connected networks, we require ROUTING. We can use static or dynamic (IGP or EGP) routing, according to topology requirement.
3. Define the criteria for best path selection of a router?
Answer: A router’s routing table contains only best route. To select a route as best, a router considers the following parameters;
·         * Longest prefix match
·         * Minimum AD (administrative distance)
·         * Lowest metric value
If all listed parameters are the same, then it would perform equal cost load balancing.
4. Define “stuck in active.”
Answer: If a successor route (best route) fails, then the router sends a query message to its neighbor demanding a feasible successor (back-up route) and a query received by the router may be forwarded to other neighbors that could lead to a loop, as well. The wait for the response of query message is called “stuck in active” (SIA).
5. Can we use OSPF without backbone area?
Answer: Yes, but it will be limited to intra-area (same area) communication. By default, Inter-area communication is not possible without backbone area.
6. What do you mean by OSPF transit area ?
Answer: A transit area is the area that has a virtual link connecting two or more ABRs attached to this area.
7. What is the difference between an OPPF neighbor and an adjacent neighbor?
Answer: Neighbors are the routers that are in the same area and exchange hello packets, but not LSA information. Adjacent routers are routers that have fully exchanged their LSA information and are stable.
If OSPF state is in 2WAY/DROTHER, it means a neighbor relationship and, if the state is FULL/DR or FULL/BDR, it means that the adjacency is formed.
8. BGP neighborship is not coming up. Please define the various steps to troubleshoot it.
Answer: To troubleshoot BGP, first we need to check neighbor state using “show ip bgp summary.” If the state is Idle, it means that the peer address or AS is not defined properly; if the state is Active, it means that TCP port 179 is not open, the peer is not reachable, network congestion, or BGP misconfiguration.
Common neighbor stability problems of BGP
·         * Misconfigured neighbor’s IP address and AS number
·         * Reachability issues when interfaces other than directly connected interfaces are used while peering (update-source issue).
·         * Authentication must be properly implemented (if configured)
·         * Router-ID must be unique
You can get more information from my BGP Tshoot article.
9. What is route reflector and why it is required?
Answer: Route reflector is a solution for BGP split horizon. The rule says “prefix learned from an iBGP neighbor will not be advertised to another iBGP neighbor.”
To overcome this situation, we have multiple options:
1.      Make your network a full mesh
2.      Route confederation
3.      Confederation
Route reflector is something like a central point acting as a route reflector server: Rather than peering with every iBGP router in a full mesh, it makes IBGP neighbors as route reflector clients to overcome the split horizon issue.
10. What is the difference between standard and extended ACL?
Answer: Standard ACLs are source-based, whereas extended ACLs are source- and destination-based. Standard ACLs can only filter layer 3 network traffic, while extended ACLs can be used to filter layer 3 and layer 4, as well.
11. What is the use of distribute-list?
Answer: To filter a routing database, we use distribute-list, which can be applied over most routing protocols. This means that, If you don’t want any specific network in your routing table, then you can use distribute-list.
12. MPLS works on which layer?
Answer: MPLS operates between layer 2 and layer 3, so it is sometimes called layer 2.5.
13. What is penultimate hop popping (PHP) and what is its use?
Answer: PHP is the technique for removing the (POP) MPLS label before the egress router. The MPLS label on a switched packet is popped by either the egress router or the penultimate router, depending on your configuration. If you decide to use penultimate hop popping, you essentially terminate the LSP one hop earlier. The MPLS labels are popped by the routers that connect to the egress router, rather than all of them being popped by the same egress router.
14. What is the difference between layer 2 and layer 3 QoS?
Answer: L2-QoS is at the MAC layer and can be applied by using CoS (class of service) filed in the VLAN header. This will be used to prioritize traffic. Later, a QOS scheduler can use the COS filed to qualify the traffic into different QOS queues.
L3 QOS is required for IP level classification; it can be achieved through ToS (type of service) priority values—IPP (3-bit), DSCP (6-bit), which can be set in the TOS field of the IP header. This TOS will later be used by scheduling process to achieve QOS.
L2 queues are hardware-based, while L3 queues are software-based. That’s why we can modify L3 queues to meet our requirements.
General Network Concepts:
·         * Data communication and transmission techniques
·         * Fundamentals of OSI and TCP/IP model
·         * Basic operations of a switch (startup, NVRAM, flash/IOS backup & recovery)
IP Addressing & Summarization:
·         * IP address classes
·         * Classful and classless IP addresses
·         * IP subnetting
·         * Understating wild card masks
·         * CIDR, FLSM, and VLSM
·         * IPv6 fundamentals
Basics of Routing
·         * RIP
·         * EIGRP
·         * OSPF
LAN Switching:
VLAN
·         * Basic requirements of VLANs
·         * VLAN Database
·         * Normal/Extended VLAN, voice VLAN
·         * Inter-VLAN routing
·         * Switch Virtual Interface (SVI)
Implement and Troubleshoot Trunking
·         * Trunk encapsulations
·         * DTP (Dynamic Trunking Protocol)
·         * Native VLAN
·         * Manual VLAN pruning
VLAN Trunking Protocol
·         * Requirement and functionalities of VTP
·         * VTP modes/versions
·         * VTP revision number
·         * VTP pruning
·         * VTP authentication
Spanning Tree Protocol
·         * Needs of STP
·         * Switch priority, port priority, path cost, STP timers
·         * PVST and PVST+
·         * RSTP and RPVST
·         * Multi-Spanning Tree (MST)
·         * Spanning Tree Enhancements (PortFast, UplinkFast, BackboneFast, etc.)
Implement and Troubleshoot Ether-channel
·         * LACP, PAgP, manual
·         * Layer 2, layer 3
·         * Ether-channel Load-balancing
·         * Ether-channel misconfiguration guard
First Hop Redundancy
·         * Hot Standby Routing Protocol (HSRP)
·         * Virtual Routing Redundancy Protocol (VRRP)
·         * Gateway Load Balancing Protocol (GLBP)
L2- QoS
·         * QoS Models and Tools
·         * Layer 2 queues
Layer 2 Network Security
·         * DHCP Snooping
·         * Dynamic ARP Inspection (DAI)
·         * BPDU Guard, BPDU Filter, Root Guard, Loop Guard, UDLD
·         * AAA server
·         * VLAN Access-Maps
·         * Private VLANs
·         * Storm Control
·         * Port-Security
·         * IP Source Guard
Network Services
·         * System Management (VTY, Telnet, HTTP, SSH, FTP, TFTP)
·         * SNMP, Syslog
·         * DHCP client, IOS DHCP server, DHCP relay
Top Interview Questions for a Network Engineer/Network Administrator (Data – LAN) Position
All of the questions below are very common and must be prepared for before facing any interview for the data-LAN environment.
Q: What is Ethernet? Define the different types of Ethernet.
A: Ethernet is a physical and data link layer LAN technology for connecting a number of computer systems with network protocols.
The Ethernet system called 10BASE-T provides transmission speeds of up to 10 Mbps. Devices are connected to the cable and compete for access using a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol.
Fast Ethernet or 100BASE-T provides transmission speeds of up to 100 megabits per second and is typically used for LAN backbone systems. Gigabit Ethernet provides an even higher level of backbone support at 1,000 megabits per second (1 gigabits per second).
Q: What do broadcast and collision domains mean?
A: A broadcast domain is a logical boundary of a computer network, in which all nodes can reach each other by broadcast in a LAN environment.
A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium.
Only one device in the collision domain may transmit at one time, and the other devices in the domain listen to the network in order to avoid data collisions.
Q: What are the basic differences between a hub and a switch?
A: Both hubs and switches are centralised devices that connect multiple network devices over LAN but their functionalities are different. Hubs operate at layer 1 whereas switches operate at layer 2. Hubs support half duplex transmission while switches support full duplex. There is one broadcast and collision domain in a hub, but a switch has one broadcast plus as many collision domains as the number of switch ports.
A hub operates at Ethernet but switches operate at Fast-Ethernet/Gig-Ethernet.
Q: What is a switch? What is the difference between manageable and unmanageable switches?
A: A switch is a multi-port network bridge used to connect multiple network devices over the same geographical location. It processes and forwards data at the data link layer (layer 2) of the OSI model.
Unmanaged switches have no configuration interface or options. They are typically used in small offices or home environments.
A managed network switch is configurable and provides the control to manage Spanning Tree Protocol, Port Speed, VLANS, etc. They provide a serial console and command-line access via telnet and SSH, as well as management via SNMP.
Q: What is VLAN and why is it used?
A: A VLAN (Virtual LAN) is a logical broadcast domain which allows a network administrator to create groups of logically networked devices based on functions, departments, or projects. The basic reason for splitting a network into VLANs is to reduce congestion on a large LAN.
The primary benefits of using VLANs are:
·         * Security
·         * Cost reduction
·         * High performance
·         * Broadcast storm mitigation
·         * Improved IT staff efficiency
·         * Simple project or application management
Q: What is a native VLAN?
A: A native VLAN is an untagged VLAN on an 802.1q trunked switch port. If a switch receives untagged frames on a trunk port, they are assumed to be part of the VLAN that are designated on the same switch port as the native VLAN. Frames that pass through a switch port on the native VLAN are not tagged.
Q: What is VLAN pruning?
A: By default, a trunk port allows all VLANs through the trunk; all switches in the network receive all broadcasts, even in situations in which few users are connected to that VLAN. Pruning is a method to prevent flooding across the network from unnecessary traffic.
Q: Define the role of access and trunk ports.
A: A Switch port plays two common roles as access and trunk.
Access Port: Carries single VLAN traffic. Mostly used to connect end devices (routers, IP phones, printers, desktops, etc.)
Trunk Port: Transports multi-VLAN traffic. Mostly used between switches configured with multiple VLANs.
Q: Why do we use VTP and what is the transparent mode in VTP?
A: VTP is a Cisco proprietary switching technology, used for VLAN database replication in a switching environment. VTP has four modes: server, client, transparent and off. VLANs created on a VTP server synchronises with VTP clients automatically.
The VTP configuration has a revision number which will increase when you make a change on a VLAN database.
VTP Transparent switches forwards VTP advertisements (server to client, client to client) but will not synchronize itself. It manages its own VLAN database, which will not be shared with any other switch.
Q: What is Spanning Tree Protocol and root bridge election?
A: Spanning Tree Protocol (STP) is one of the most important switching technologies to eliminate layer 2 switching loops. The root bridge serves as an administrative point for all spanning-tree calculations to determine which redundant links to block.
All switches send BPDUs (Bridge Protocol Data Unit) every 2 seconds from its ports which contain bridge-id, bridge-mac, cost, port-priority, etc.
For root bridge selection, STP prefers lowest bridge-priority if there is a tie in priority, then the lowest MAC address will determine which bridge becomes the root. Lower priority is preferred compared to a higher. The default bridge priority is 32768 and you can set it in multiples of 4096.
Q: What is the difference between PVST, PVST+ and RPVST?
A: Per VLAN Spanning Tree (PVST) is a Cisco proprietary technology used to configure a separate spanning tree instance for each VLAN. It supports ISL trunking encapsulation whereas PVST+ supports Dot1Q trunking encapsulation.
Rapid PVST (RPVST) works the same as PVST, but their main difference is fast convergence. RPVST skips the listening state during the transition.
Q: Give a reason for selecting MST rather than PVST.
A: The main reason for selecting MST rather than PVST/STP is the number of different VLANs involved. With 30 to 40 VLANs you can use PVST without any concerns.
However, if there are 40 VLANs in a switch, it has to maintain 40 spanning tree databases (a separate database for each VLAN) and if you decide to use MST, you need to provision some instances (logical grouping of VLANs).
Let’s say you configure two instances, each with 20 VLANs. The switch has to maintain only two spanning tree databases (a separate database for each instance) then.
Q: What is EtherChannel and is it possible to achieve load balancing using EtherChannels?
A: EtherChannel is a LAN port aggregation technology which allows grouping of several physical Ethernet links to create one logical Ethernet link for the purpose of providing fault-tolerance and high-speed links between switches, routers and servers.
Yes, EtherChannel supports load balancing on the basis of predefined hash algorithms but you cannot control the port that a particular flow uses.
The hash algorithm cannot be configured or changed to load balance the traffic among the ports in an EtherChannel.
Main hash algorithms are src_ip_addr | dest_ip_addr | src_mac_addr | dest_mac_addr | src_port | dest_port} [dest_ip_addr | dest_mac_addr | dest_port.
Q: What is DHCP, DHCP relay, and DHCP snooping?
A: Dynamic Host Configuration Protocol (DHCP) is a network protocol that automatically assigns IP addresses to hosts with other related configuration information such as the subnet mask and default gateway.
DHCP Relay is just a proxy that is able to receive a DHCP request and resend it to the real DHCP server. It means a DHCP server is installed at a remote location and your LAN gateway is acting as a DHCP relay agent (proving the information of DHCP server using “ip helper address” command).
DHCP snooping is a security mechanism which enables you to configure a switch port connected to a DHCP server as a trusted port. The trusted port is responsible for the reply DHCP requests. DHCP snooping is the best solution to prevent man-in-the-middle DHCP attacks.
Q: What are the basic differences between HSRP and VRRP?
A: Both HSRP and VRRP are high availability protocols that provide first hop redundancy.
HSRP
·         * Cisco proprietary
·         * 1 Active + 1 standby router and 1 or more listening routers
·         * Uses separate virtual IP addresses as gateway
·         * Hello timer is 3 seconds and hold-down timer is 10 seconds
·         * Preempt is disabled by default
·         * Multicast at 224.0.0.2 (ver1), multicast at 224.0.0.102 (ver2). Both versions use UDP port 1985
·         * HSRP (v2) supports IPv6
VRRP
·         * Open standard (IETF)
·         * 1 master and 1 or more backup routers
·         * Physical IP address can be used for Virtual IP
·         * Hello timer is 1 second and hold-down timer is 3 seconds
·         * Preempt is enabled by default
·         * Multicast at 224.0.0.18 – IP 112
·         * VRRP does not support IPv6
Network Engineer/Administrator (security) is a higher-level position, often with “jr.” and “sr.” prefixes. The major responsibility of a network engineer (security) is to determine “how to implement network security” in routed LAN/WAN environments. They design and implement both the hardware and software necessary technologies to secure computer network. They have high-level technical skills in LAN/WAN security. The major responsibility of a network admin (security) includes adding security software and hardware, performance monitoring, troubleshooting, logging errors, backing up and restoring data, and assigning permissions to users.
Before facing any interview for a network engineer/administrator (security) position, make sure that you have enough knowledge of firewalls (software & hardware), VPNs (IPsec, SSL, and Get VPN etc.) with general network technologies as described below:
Network concepts:
·         * Data communication and transmission techniques
·         * Fundamentals of OSI & TCP/IP model
·         * Router’s basic operations (startup, nvram, flash/IOS backup & recovery)
·         * IP Addressing and Summarization
·         * IP Routing : Basics of RIP , EIGRP , OSPF & BGP
Firewall
·         * NAT (object based)
·         * ACL (object based)
·         * Contexts
·         * Failover (Active-Standby & Active-Active)
·         * Transparent
·         * MPF (Modular Policy Framework)
VPN
·         * Site to Site
·         * SSL
·         * Get VPN
·         * Easy VPN
·         * DMVPN
·         Flex
Route-Filtering
·         * Access-lists
·         * Route-Maps
·         * Prefix-Lists
·         * Distribute-Lists
·         * Filter-lists
·         * Class-maps & Policy-maps
Network security
·         * AAA Server
·         * Dot 1x Authentication
·         * Ip SLA
Questions for an Interview of Network Security Engineer/Administrator: All listed questions are very common and important and you must be prepared with all of the following answers before facing any interview for a Network Security position.
Q. What is a firewall?
A: A firewall is used to provide security to the private networks connected to the internet. They can be implemented as hardware or software, or a combination of both. All incoming and outgoing network traffic are examined and accepted/rejected by the firewall as per defined rules.
Q. What is the difference between network gateway and a firewall?
A: A network gateway joins two networks together and a network firewall protects a computer network against unauthorized incoming or outgoing access. Network firewalls may be hardware devices or software programs.
Q. What is the difference between IPS and a firewall?
A: The primary function of a firewall is to prevent/control traffic flow from an untrusted network (outside). A firewall is not able to detect an attack in which the data is deviating from its regular pattern, whereas an IPS can detect and reset that connection as it has inbuilt anomaly detection.
Q. What is a transparent firewall?
A: A transparent firewall is considered as Layer 2. Deploying a new firewall into a network can be a complicated process due to various issues (e.g. IP address reconfiguration, network topology changes, current firewall etc.) because the firewall is not a routed hop and you can easily introduce a transparent firewall into an existing network.
Q. What is packet filtering?
A: Packet filtering is the process of permitting or blocking ip packets based on source and destination addresses, ports, or protocols. The packet filter examines the header of each packet based on a specific set of rules, and on that basis, decides to prevent it from passing or allow. Packet filtering is also part of a firewall program for protecting a local network from unwanted access.
Q. Define stateful inspection?
A: Stateful inspection is known as dynamic packet filtering and is a firewall technology that monitors the state of active connections and uses this information to determine which network packets are allowed through the firewall. Stateful inspection analyses packets down to the application layer.
Q. What is the Public Key Encryption?
A: Public key encryption uses public and private key for encryption and decryption. In this mechanism, public key is used to encrypt messages and only the corresponding private key can be used to decrypt them. To encrypt a message, a sender has to know the recipient’s public key.
Q. Define Digital Signatures
A: Digital signature is an attachment to an electronic message used for security purposes. It is used to verify the authenticity of the sender.
Q. What is Authorization?
A: Authorization is a security mechanism used to determine user/client privileges or access levels related to network resources, including firewalls, routers, switches and application features. Authorization is normally preceded by authentication and during authorization. It’s system that verifies an authenticated user’s access rules and either grants or refuses resource access.
Q. What is stateful failover?
A: Every time a session is created for a flow of traffic on the primary node, it is synced to the secondary node. When the primary node fails, sessions continue to pass traffic through the secondary node without having to re-establish.
Q. What is VPN and describe IPsec VPN
A: Virtual Private Network (VPN) creates a secure network connection over a public network such as the internet.
IPsec VPN means VPN over IP Security allows two or more users to communicate in a secure manner by authenticating and encrypting each IP packet of a communication session.
Q. What is Site to Site and remote access VPN?
A: A site-to-site VPN allows offices in multiple locations to establish secure connections with each other over a public network such as the Internet. Site-to-site VPN is different from remote-access VPN as it eliminates the need for each computer to run VPN client software as if it were on a remote-access VPN.
Q. How do you check the status of the tunnel’s phase 1 & 2 ?
A: Use following commands to check the status of tunnel phases:
Phase 1 : show crypto isakmp and State : MM_ACTIVE
Phase 2 : show crypto ipsec sa
Note: if you have lot of tunnels and the output is confusing use a ‘show crypto ipsec sa peer 12.12.12.12′ command instead.
Q. What is SSL VPN? How it is different from IPsec VPN?
A: SSL VPN provides remote access connectivity from almost any internet enabled location without any special client software at a remote site. You only need a standard web browser and its native SSL encryption.
IPsec is a dedicated point-to-point fixed VPN connection where SSL VPNs provides anywhere connectivity without any configuration or special software at remote site.
Q. What is GRE and why is it required?
A: Generic Routing Encapsulation (GRE) is a protocol that encapsulates packets in order to route other protocols over IP networks.
GRE enables a wrapper to be placed around a packet during transmission of the data. A receiving GRE removes the wrapper, enabling the original packet to be processed by the receiving stack.
Advantages of GRE tunnels include the following:
·         * GRE tunnels connect discontinuous sub-networks.
·         * GRE tunnels allow VPNs across wide area networks (WANs).
·         * GRE tunnels encase multiple protocols over a single-protocol backbone.
·         * GRE tunnels provide workarounds for networks with limited hops.
Q. Firewalls work at what layer? Define firewall generations and their roles.
A: Firewalls work at layer 3, 4 & 7. First generation firewalls provide packet filtering and they generally operate at layer 3 (Network Layer). Second generation firewalls operate up to the Transport layer (layer 4) and records all connections passing through it and determines whether a packet is the start of a new connection, a part of an existing connection, or not part of any connection. Second generation firewall is mainly used for Stateful Inspection.
Third generation firewalls operate at layer 7. The key benefit of application layer filtering is that it can “understand” certain applications and protocols (such as File Transfer Protocol (FTP), Domain Name System (DNS), or Hypertext Transfer Protocol (HTTP)).
Q. What is DoS attack? How can it be prevented?
A: DoS (Denial of Service) attack can be generated by sending a flood of data or requests to a target system resulting in a consume/crash of the target system’s resources. The attacker often uses ip spoofing to conceal his identity when launching a DoS attack.
Q. What is IP Spoofing?
A: An IP spoofing attack enables an attacker to replace its identity as trusted for attacking host. For example, if an attacker convinces a host that he is a trusted client, he might gain privileged access to a host.
Q. What are the security-levels in cisco ASA?
A: ASA uses security levels to determine the parameters of trust given to a network attached to the respective interface. The security level can be configured between 0 to 100 where higher number are more trusted than lower. By default, the ASA allows packets from a higher (trusted) security interface to a lower (untrusted) security interface without the need for an ACL explicitly allowing the packets.
Q. What is AAA?
A: AAA stands for authentication, authorization and accounting, used to control user’s rights to access network resources and to keep track of the activity of users over a network. The current standard by which devices or applications communicate with an AAA server is the Remote Authentication Dial-In User Service (RADIUS).
Q. What is IPS? How does it work?
A: An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits. An Intrusion Prevention System can play a good role to protect against various network security attacks such as brute force attacks, Denial of Service (DoS) attacks, and vulnerability detection. Moreover, an IPS also ensures prevention against protocol exploits.
Intrusion Prevention System uses four types of approaches to secure the network from intrusions which include:
·         * Signature-Based
·         * Anomaly-Based
·         * Policy-Based
·         * Protocol-Analysis-Based
The above described questions are very tricky and important in aspect to clear any interview for Network Security Engineer/Administrator position and it is not possible for anyone to explain all kind of questions so you can download more questions from the download link posted here and if you find any difficulty getting the answer to any question then you can write me @ Comment section.
Top Interview Questions for VoIP Engineer/Administrators
Are you looking for job as a VoIP engineer/administrator? Or are you thinking of leaving your current position for a new job as a VoIP engineer/administrator with a new company in a Unified communication networking?
If you answered yes to either of those questions, this article is for you.
A Network Engineer/Administrator (VoIP) position is a higher-level position, often with a “junior” or “senior” prefix. The major responsibility of a VoIP engineer is to design and implement both the hardware and software technologies needed for a VoIP setup. They have to customize VoIP networks as per the organization’s needs, such as adding software and hardware, performance monitoring, troubleshooting, logging errors, backing up and restoring data, assigning permissions to users, and helping users for VoIP network issues.
Before facing any interview for a VoIP engineer position, make sure that you have enough knowledge on the below technologies:
General Network concepts
·         * Fundamentals of OSI & TCP/IP model
·         * IP Addressing & Summarization
·         * Basics of routers and routing (EIGRP,OSPF,BGP)
·         * Basics of LAN Switching (VLANs, Inter-VLAN routing, STP)
·         * Network Services (Telnet, SSH, NTP, DHCP, Syslog)
VoIP Topics
·         * IP phone boot process
·         * Phone registration through CME (IOS based)
·         * CME features- call park, call pick-up, paging, intercom
·         * Understanding of clusters, ISDN configuration
·         * VoIP dial peers and POTS
·         * Cisco ip phone registration through CUCM (Manual/Auto/BAT)
·         * Understanding and Implementation of voice gateways MGCP,H.323,SIP
·         * Signaling and Flow of voice gateways
·         * Call routing elements : route group, route list, SLRG
·         * Partition & CSS
·         * Media Recourses
·         * Integration of CUCM with CUC via SCCP & SIP
·         * Mobility : device/extension mobility, MUA, Single Number reach (SNR)
·         * Survivable Remote Site Telephony (SRST)
·         * Call manager fall back
·         * Resource Reservation Protocol (RSVP)
·         * Automated Alternate Routing (AAR)
My Best Questions for an Interview for VoIP Engineer/Administrators:
All of the questions below are very common and must be prepared for before facing any interview for the unified communication environment.
Q. What is VoIP?
A: Voice over Internet Protocol (VoIP) is the technology to send your voice (analog data) over the internet (digital data) to an end user. It enables users to use the Internet as the transmission medium for voice calls at a very low cost.
Q. How does VoIP (voice over Internet protocol) work? What makes it different from traditional phone service?
A: In VoIP, phone conversations are converted to packets that flit all over the Internet or private networks, just like e-mails or Web pages, though voice packets get priority status. The packets get reassembled and converted to sound on the other end of the call but in traditional phone service, a phone conversation is converted into electronic signals that traverse an elaborate network of switches, in a dedicated circuit that lasts the duration of a call.
Q. What are some disadvantages of using VoIP?
A: VoIP is far better than traditional telephony but it has some drawbacks as listed below:
·         * Some VoIP services don’t work during power outages and the service provider may not offer backup power.
·         * Not all VoIP services connect directly to emergency services through 9-1-1.
·         * VoIP providers may or may not offer directory assistance/white page listings.
Q. What basic set-up equipment is needed for VoIP?
A: For general VoIP set up we require the following things:
·         * Broadband connection
·         * VoIP phone
·         * Nexton soft-switches
·         * Router
·         * Audiocodec
·         * Astric server
Q. What is PVDM and what is the use of it?
A: PVDM stands for Packet Voice DSP (digital signal processor) Module and it enables Cisco Integrated Services Routers to provide high-density voice connectivity, conferencing, and transcoding capabilities in Cisco IP Communications solutions.
Q. What is VoIP gateway and explain the basic features of it?
A: A VoIP gateway works as a bridge between an IP network and the PSTN. It converts analog telephony signals to digital.
VoIP gateways include the following features:
·         * Call routing, packet processing and control signalling managementVoice and fax compression/decompressionExternal controller interfaces, for example to a soft switch, billing system or network management system
Q. What is the difference between MGCP & H.323 Voice gateways?
A:
MGCP
·         * Uses clear text for call controlUses a client-server modelIdeally positioned for service providers (centrally located call agents)Centralized management and control (Dial plan, etc.)Enhanced call survivabilityBetter feature interaction with capabilities like Caller-IDSupport of QSIG supplementary services with CCM
H.323
·         * Uses Abstract Syntax Notation 1 for call control messagesUses a peer-to-peer modelScales well in an enterpriseFractional PRI supportCaller-ID support on analog FXOMany more TDM interface types and signallingGateway-resident applications like TCL and VXMLCAC network design with H.323 GatekeepersNo release dependencies between GWs and CCMCall preservation for SRST on PRIsNFAS support
Q. What is the difference between Transaction, Dialog and Session?
A: Transaction: A Transaction refers to a fundamental unit of message exchange, between the SIP user agents.; It basically includes a request-response cycle.
Dialog: A peer-to-peer relationship between two use agents. It is usually created through generations of SUCCESSFUL final response.
Session: A Session refers to the exchange of media between two or more endpoints.
Q. What you will do if you get a crackling sound on VoIP line while talking?
A: Often we get this kind of issue with analog phones which create a crackling sound when you talk, but is not common for VoIP provider or internet connection as digital systems don’t generate sounds like this. It’s only possible that it could be from the person on the other end who is also on an analog telephone line but if this happens with different people then it’s likely your phone. Try to replace the phone.
Q. What is SLRG & why do we use it?
A: SLRG (Standard Local Route Groups) eliminates the pairing between the gateway and the Route Pattern, thus creating a more flexible method of selecting a PSTN gateway.
Because it reduces the number of route patterns that need to be created per country, a huge amount of administrative overhead can be saved, especially for organizations with a large number of sites.
Q. What is the basic difference between VoIP and POTS (Plain old telephone systems) dial-peers?
A: VoIP dial peers route calls to other VoIP systems via IP protocol where POTS dial peers route calls to legacy PBX systems via local ports which can be analog (like FXS, FXO) or digital (like E1/T).
QWhat is sip trunk and what are the basic benefits of using SIP trunk?
A: SIP Trunk is a voice call connection placed over your Internet connection. This VoIP “trunk” (or phone line) connects to a provider who routes your calls through their gateway and usually has very reasonably lower rates on long distance calls, international calls and in-bound toll free calls.
Additionally, SIP trunks can carry instant messages, multimedia conferences, user presence information, and Enhanced 9-1-1 (E9-1-1) emergency calls.
·         * Eliminate BRI and PRI subscription fees because SIP trunk connected directly to an Internet telephony service provider
·         * Eliminate IP-PSTN gateways (or even your entire PBX)
·         * Low cost long distance calls, international calls, etc.
·         * Expansion of lines is dependent on bandwidth, which can easily be increased if needed. It means that with SIP trunking you don’t need to buy lines in blocks of 24 or 32. Instead, you can buy the bandwidth you need in smaller increments.
Q. What is the difference between E1 and T1 Link? In which country are we using t E1 and T1 for digital transmission?
A: The main difference between E1 and T1 is the data rate. T1 has a data rate of 1.544 mbps and E1 has a data rate of 2.048 mbps.
Other differences between T1 and E1 lies in the number of channels (E1-32 Channel and T1-24 channels) but speed (64 kbps) remains the same for both links: may be for inter – connection between the E1 and T1 lines. This is interconnected because it is used for international connectivity purposes.
T1 is used mainly in the United States, Canada, Hong Kong and Japan. E1 is mostly used in Europe.
Q. How many channels are in E1 and T1 link? What is the operational bandwidth of each channel in each link?
A: E1 link contains 32 channels where T1 link contains 24 digital channels and each channel of both T1/E1 gives you 64 kbps bandwidth.
An E1 link consists of 30B channels and 1D channel and each channel has 64k Bw.
So for E1 – you get 30*64 = 1920kbps
A T1 link consists of 23B channels and a D channel and each channel has 64k Bw. So for T1 – you get 23*64 = 1472kbps
Q. What is the signalling and what is the difference between CAS and CSS?
A: Signalling is a way of information exchange to establishment and control of a telecommunication circuit and the management of the network.
Common channel signalling (CAS) uses a dedicated channel for the signalling where Channel Associated Signalling (CAS) conveys signalling information relating to multiple bearer channels. These bearer channels therefore have their signalling channel in common.
CCS with E1 =30 B channels and 1 D channel
CCS with T1 = 23 B channels and 1 D channel
CAS with E1 = 31 B Channels
CAS with T1 = 24 B Channels
B=Bearer channels responsible for carrying voice signal
D=Data channel responsible for signalling control
Q. What are the basic differences between G711 and G729 codec?
A: G729 is a compressed audio codec with better tolerance for packet loss and jitter than G711. G729 uses 33 Kbps of bandwidth whereas G711 uses 87 Kbps. G729 is compressed but still sounds very good in poor network but G711 sounds better only with good network conditions.
Q. Can we configure trunking between Cisco and Avaya PBX?
A: QSIG PRI trunking configuration can be used to establish trunking between Cisco and Avaya PBX.
Q signalling (QSIG), a protocol for Integrated Services Digital Network (ISDN) communications based on the Q.931 standard, is used for signalling between digital PBXs.
The questions above are very tricky and important from the standpoint of clearing any interview for a VoIP network engineer/administrator position. It is not possible for anyone to explain all kinds of questions, but you can get more frequently asked interview questions for VoIP Network Engineering Jobs from the download link posted here. If you find any difficulty in answering any questions, then you can write me @ Comment section.

Collision Domain

A term collision is described as an event that usually happens on an Ethernet network when we use a "Shared Media" to connect the devices in an Ethenrnet network. A "Shared Media" is a type of connecting media which is used to connect different network devices, where every device share the same media. Example: 1) Ethernet Hubs, 2) Bus Topology
In a "Shared Media" there are no separate channels for sending and recieving the data signals, but only one channel to send and recieve the data signals.
We call the media as shared media when the devices are connected together using Bus topology, or by using an Ethernet Hub. Both are half-duplex, means that the devices can Send OR Recieve data signals at same time. Sending and recieving data signals at same time is not supported.
Collisions will happen in an Ethernet Network when two devices simultaneously try to send data on the Shared Media, since Shared Media is half-duplex and sending and recieving is not supported at same time. Please refer CSMA/CD to learn how Ethernet avoid Collision.
Collisions are a normal part of life in an Ethernet network when Ethernet operates in Half-duplex and under most circumstances should not be considered as a problem.
A CollisionDomain is any network segment in which collisions can happen (usually in Ethernet networks). In other words, a Collision Domain consists of all the devices connected using a Shared Media (Bus Topolgy or using Ethernet Hubs) where a Collision can happen between any device at any time.
Collision Domain
For Example, if "Computer A" send a data signal to "Computer X" and "Computer B" send a data signal to "Computer Y", at same instance, a Collision will happen.
As the number of devices in a collision domain increases, chances of collisions are also more. If there is more traffic in a collision domain, the chances of collisions are also more. More collisions will normally happen with a large number of network devices in a Collision domain.
Increased collisions will result in low quality network where hosts spending more and more time for packet retransmission and packet processing. Usually switches are used to segment (divide) a big Collision domain to many small collision domains. Each port of an Ethernet Switch is operating in a separate Collision domain.
In other words, Collision cannot happen between two devices which are connected to different ports of a Switch.
No need to worry much about collision and related network problems now because we are not using Network Hubs to connect our devices. Ethernet Network Hubs are replaced with Ethernet Network Switches long way back.

Broadcast Domain

Broadcast is a type of communication, where the sending device send a single copy of data and that copy of data will be delivered to every device in the network segment. Brodcast is a required type of communication and we cannot avoid Broadcasts, because many protocols (Example: ARP and DHCP) and applications are dependent on Broadcast to function.
A BroadcastDomain consists of all the devices that will receive any broadcast packet originating from any device within the network segment.
Broadcast Domain
In above picture, "Computer A" is sending a broadcast and switch will forward it to every ports and all the switchs will get a copy of broadcast packet. Every switch will flood the broadcast packet to all the ports. Router also will get a copy of broadcast packet, but the Router will not forward the packet to the next network segment.
As the number of devices in the Broadcast Domain increases, number of Broadcasts also increases and the quality of the network will come down because of the following reasons.
1) Decrease in available Bandwidth: Large number of Broadcasts will reduce the available bandwidth of network links for normal traffic because the broadcast traffic is forwarded to all the ports in a switch.
2) Decrease in processing power of computers:Since the computers need to process all the broadcast packets it recieve, a portion of the computer CPU power is spent on processing the broadcast packets. Normally a Broadcast packet is relevent to a particular computer and for other computers that broadcast packet is irrelevant (For example, DHCPDISCOVERmessage is relevent only for a DHCP Server. For other computers DHCPDISCOVER is irrelevant and they will drop the packet after processing). This will reduce the processing power of computers in a Broadcast domain.
By design, Routers will not allow broadcasts from one of its connected network segment to cross the router and reach another network segment. The primary function of a Router is to segment (divide) a big broadcast domain in to multiple smaller broadcast domains.

Difference between Static and Dynamic IP.

Static IP is also called as permanent address assigned to each device in a network, whereas Dynamic IP, a temporary address assigned to the device via DHCP software. IP address assigned to your service by your cable or DSL Internet provider is typically dynamic IP. In routers and operating systems, the default configuration for clients is dynamic IP 

What is the difference between public and private IP?

A public IP address allows equipment accessible to everyone on the internet. A private IP address is for private use within the network and allows many more PCs to be connected. If you are using a private IP and wants VOIP, you need to change to a public IP address. 

What is Network Address Translation?

Network Address Translation acts as an agent between the Internet and a local network. It is a dynamic method which is used to minimize Internet connectivity needs. Network address translation describes the rewriting of the Internet Protocol (IP) addresses of data packets so that multiple transmissions require only one IP address. 

Define IP multicast.

IP multicast technology reduces traffic by sending stream of information to many recipients at one go. Video conferencing, stock quotas are the examples based on IP multicast. 

What is subneting?

Subnet adds one level to the way IP address is represented. It logically organizes the network. For instance, it can logically group computers belongs to the finance department. 

Define Address Resolution Protocol.

Address Resolution Protocol ARP, is responsible for mapping an IP address to its corresponding physical network address. It is mostly seen on Ethernet network. 

Explain Maximum Transfer Unit, MTU.

MTU specifies the largest amount of data that can be transferred across a network. 

What is Routing Protocol?

Routing protocol is the way to send routing information between any routers in an autonomous system. 
When a source sends a packet to a destination, this packet has a specific path or route it follows. Different routing protocols are used to find the shortest path to the destination. The protocols maintain routing tables. Routing tables consist of a set of rules used to determine where these packets will travel. When a packet is received, a network device examines the packet and matches it to the routing table entry providing the best match for its destination. The packet keeps hopping until it reaches its destination

Explain the structure and use of internet addresses.

Each IP address is 32 bit long. In human language the IP addresses are written in dotted decimal notation. These are then converted to binary by the computer. Each IP address has two parts: Network identifier or a network ID and host ID. The current internet protocol standard is IPV4. The IP addresses are divided into three classes: a class A network, a class B network, and a class C network. Class A being the largest. The four digit numbers in an IPV4 address, each network of class A will have different first number, and then its network will be addressed by the rest of the three numbers, or three bytes. The IP addresses identify a machine to deliver packets and load web pages. 

Explain how names are translated (resolved) into IP address.

Domain Name server or DNS is used to resolve names into IP addresses. When a web address is entered into the browser, the DNS client sends a request to the DNS server to find the corresponding IP address for the name. The DNS server receives this request and searches for the corresponding IP address in the database. If at this point the resolution fails, this server sends this request to the parent server. The request keeps going up the hierarchy to the parent servers or the closest authoritative of the DNS server to resolve the address. If the request times out an error is retuned to the client. If the server is able to resolve the name requested, it passes the information back to the client. The next request sent by the client is to request for a web page for the IP address. 

Describe the basics of internet routing.

When a source sends a packet to a destination, this packet has a specific path or route it follows. Different routing protocols are used to find the shortest path to the destination. The protocols maintain routing tables. Routing tables consist of a set of rules used to determine where these packets will travel. When a packet is received, a network device examines the packet and matches it to the routing table entry providing the best match for its destination. The packet keeps hopping until it reaches its destination. 

Define broadcast domain.

It is a logical area in a computer network where any computer connected to the network can directly transmit to any other computer in the domain without having to go through a routing device.  

Bridge vs switch

A bridge connects two different LAN networks. A switch is something like you can connect many computers to a switch and then one computer can connect to another through the switch. Switch is a unicast one to one connection. 

What is a Router?

A router is a device or sometimes a software in a computer which decides the next network point to which a packet should be forwarded to reach its destination on Internet. It is usually included as part of the network switch and is located at a gateway, including each point-of-presence on the Internet. The router is connected to at least two networks and determines which way to send each information packet based on its understanding of the state of the networks it is connected to. 

Define gateway

A gateway is a network point that provides entrance into another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes.

What is firewall?

A firewall is a hardware or software installed to provide security to the private networks connected to the internet. They can be implemented in both hardware and software, or a combination of both. All data entering or leaving the Intranet passes through the firewall which allows only the data meeting the administrators’ rules to pass through it. 

What are the types of firewalls?

Packet Filtering Firewall:
This type of Firewall detects packets and block unnecessary packets and makes network traffic release.
Screening Router Firewalls:
It's a software base firewall available in Router provides only light filtering.
Computer-based Firewall:
It's a firewall stored in server with an existing Operating System like Windows and UNIX.
Hardware base Firewall:
Its device like box allows strong security from public network. Mostly used by big networks.
Proxy Server:
Proxy server allows all clients to access Internet with different access limits. Proxy server has its own firewall which filters the all packet from web server.

What is Data encryption?

Data encryption ensures data safety and very important for confidential or critical data. It protect data from being read, altered or forged while transmission. 

What is the Public Key Encryption?

Public key encryption use public and private key for encryption and decryption. In this mechanism, public key is used to encrypt messages and only the corresponding private key can be used to decrypt them. To encrypt a message, a sender has to know recipient’s public key. 

Define Digital Signatures.

Digital signature is an attachment to an electronic message used for security purpose. It is used to verify the authenticity of the sender. 

What is Ethernet technology?

Ethernet technology is a high speed broadcast bus technology. In this type, all the station shares a single ether channel and receives every single transmitted signal. 

What is CSMA and CD concept?

In CSDA (carrier sense multiple access), presence of any digital signal in a network is checked before transmission. Data transmission occurs only when no signal is sensed.
CD, Collision detection is responsible for monitoring carrier in order to avoid signal jam. 

What is NetBIOS protocol?

NetBIOS (Network Basic Input/Output System) Protocol allows applications on separate computers to communicate over a LAN. It runs over TCP/IP giving each computer in the network a NetBIOS name and IP address. E.g. It can be used for computers running Windows 2000 (or before) to join a computer network running Windows 2000 (or later).  

What is IGMP protocol?

Internet Group Management Protocol, allows internet hosts to multicast. i.e. to send messages to a group of computers. There may be a group of internet hosts interested to multicast. IGMP allows router to determine which host groups have members on a given network segment. It helps to establish group memberships. It is commonly used for streamlining videos and gaming. The protocol can be implemented both as a host side and router side. The host side is responsible to notify its membership in a group. The notification is made to a local router. This local router (router side) in turn sends out queries. 

What is TCP / IP protocol?

Transmission Control Protocol / Internet Protocol: - It is a family of protocols used for communication and connection between hosts on the internet. It is the most widely used standard for transmitting data over the internet. The four layers in the protocol are (from bottom to top):- Physical layer, Data link layer, Network layer, transport layer and application layer, also called as the OSI model. In TCP/IP , IP is responsible for forwarding packets while TCP ensures the correct delivery of data from client to server. TCP detects loss of data as well. 

What is HTTP (Hypertext Transfer Protocol)?

HTTP or Hyper Text Transfer Protocol is provides a set of rules to transfer files, videos, images over the world wide web. When the web browser is opened, a HTTP request call is made. A web server contains a HTTP daemon. This daemon is used to wait for HTTP requests and handle them when they arrive. The web browser from where HTTP requests are made is called as a client. These requests are sent to the server. It uses a reserved port no 80. 

What is NNTP (Network News Transfer Protocol)?

NNTP or Network News Transfer Protocol is used to manage the notes posted on Unset newsgroup (a collection of posted notes on a subject posted by different users). NNTP servers are responsible for managing Usenet newsgroup collected globally. A NTTP client is a part of the web browser also called as a news reader. It uses a reserver port no 119. 

What is POP3 (Post Office Protocol 3)?

POP3 or Post Office Box 3 is used fro receiving emails. It is a client server protocol which holds the email. Once the email is downloaded from the server, POP3 deletes it from the server. Ordinal numbers are used to identify specific messages.

What is SNMP (Simple Network Management Protocol)?

SNMP or Simple Network Management Protocol is typically used for managing the network. Managing the network includes managing the nodes present in the network. These nodes may be server, routers, bridges and hubs. SNMP agents are used to achieve this. Managing the network is essential because it helps to monitor network performance, detect network faults or failures, audit network usage etc. the SNMP messages like TRAP, GET or SET may be invoked by network elements or network management system. 

What is Routing Protocols?

Routing protocols are used to assist in achieving the basic purpose of routing. They specify the routers the method to communicate with each other. They help the routers select the best possible path between nodes. There are different types of protocols such as link-state routing protocols, path vector protocols and distance vector routing protocols. These protocols prevent routing loops to form or break if formed already. They help to decide preferred routes from a sequence of hop costs.. 

What is Distance Vector Routing Protocols?

The main goal of Distance Vector Routing Protocols Is to find out the best path for he data packet to reach the destination. Distance here could be the hops. The three different types of Distance Vector routing protocols include:- Routing Information Protocol (RIP v1 and v2) and Interior Gateway Routing Protocol. The protocol is easy to manage however not well scalable.
The Distance Vector protocol initially prepares a Routing table which is shared with other routers. This routing table is shared between routers present in the same network. A new routing table is prepared when some new information is received from some other router. Now, the bad routing paths are removed keeping only the smallest hop paths. This new table is then communicated to other routers.

Explain Transmission Control Protocol, TCP

TCP ensures reliable and end to end delivery of segments of information. Segments are acknowledged to the source when received by the destination. Data is broken up into segments and sequenced properly before transmission. This arrangement of segments allows destination to trace lost data in transmission. 

What is TCP protocol?

Transmission control Protocol is used to establish communication between nodes or networks and exchange data packets. It guarantees delivery of data packets in the order they were sent. Hence it is most commonly used in all applications that require guaranteed delivery of data. It can handle both timeouts (if packets were delayed) and retransmission (if packets were lost). The stream of data is transmitted in segments. The segment header is 32 bit. it is a connectionless communication protocol at the third level (network) of the OSI model.

TCP vs. UDP.

TCP guarantees the delivery of data. UDP on the other hand, does not guarantee delivery of data. TCP delivers messages in the order they were sent. UDP has no ordering mechanisms. In TCP data is sent as a stream while UDP sends data as individual packets. UDP is faster than TCP. TCP is a connection oriented protocol while UDP is connectionless.

Explain User Datagram Protocol, UDP.

The UDP is a connectionless, unreliable service. UDP messages can be lost and duplicated.

What is UDP protocol?

User Data Protocol is a communication protocol. It is normally used as an alternative for TCP/IP. However there are a number of differences between them. UDP does not divide data into packets. Also, UDP does not send data packets in sequence. Hence, the application program must ensure the sequencing. UDP uses port numbers to distinguish user requests. It also has a checksum capability to verify the data. 

TCP vs. UDP.

TCP guarantees the delivery of data. UDP on the other hand, does not guarantee delivery of data. TCP delivers messages in the order they were sent. UDP has no ordering mechanisms. In TCP data is sent as a stream while UDP sends data as individual packets. UDP is faster than TCP. TCP is a connection oriented protocol while UDP is connectionless.

What is TCP windowing concept?

TCP windowing concept is primarily used to avoid congestion in the traffic. It controls the amount of unacknowledged data a sender can send before it gets an acknowledgement back from the receiver that it has received it. 

What is Trusted and Untrusted Networks?

Trusted networks: Such Networks allow data to be transferred transparently. The machines using a trusted network are usually administered by an Administrator to ensure that private and secured data is not leaked. Access to this network is limited. Computers using trusted networks are more secured and confidential because of strong firewalls.
Untrusted networks: Such networks are usually administered by the owners. They can allow improper access to sensitive or personal data. These machines are usually separate. Such machines could me more prone to attacks. 
What are the different types of VPN?
Remote Access VPN:- Also called as Virtual Private dial-up network (VPDN) is mainly used in scenarios where remote access to a network becomes essential. Remote access VPN allows data to be accessed between a company’s private network and remote users through a third party service provider; Enterprise service provider. E.g Sales team is usually present over the globe. Using Remote access VPN, the sales updates can be made.
Site to Site VPN – Intranet based: This type of VPN can be used when multiple Remote locations are present and can be made to join to a single network. Machines present on these remote locations work as if they are working on a single network.
Site to Site VPN – Extranet based: This type of VPN can be used when several different companies need to work in a shared environment. E.g. Distributors and service companies. This network is more manageable and reliable. 
What are the different authentication methods used in VPNs?
The authentication method uses an authentication protocol. The methods are:
EAP authentication method: Extensible authentication protocol authenticates remote access connection. The authentication mechanism is decided between the remote VPN client and authenticator (ISA). The mechanism is typical in which authenticator requests for authentication information and the responses are given by the remote VPN client.
MS Chap Authentication method: Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) starts with the authenticator (Remote access server) challenge. The challenge to the remote access client sends a session identifier and challenge string. The client in response sends the nonreversible encryption of the string, the identifier and password. Authenticator checks the credentials and grants access on a successful authentication.
Unencrypted passwords (PAP):- Uses plain text passwords. Does not involve encryption. Used for less secure clients.
Shiva Password Authentication Protocol (SPAP):- It is a password authentication protocol. It is less secure as the same user password is always sent in the same reversibly encrypted form

What is Tunneling?

Tunneling is a mechanism provided to transfer data securely between two networks. The data is split into smaller packets and passed through the tunnel. The data passing through the tunnel has 3 layers of encryption. The data is encapsulated. Tunneling can be approached by Point to Point tunneling protocol.

What are voluntary and compulsory tunnels?

Voluntary Tunneling
Users computer is an end point of the tunnel and acts as tunnel client. Here the client or user issues a request to configure and create a voluntary tunnel. They require a dial up or LAN connection. Example of dial up connection is internet at home where a call is made to the ISP and connection is obtained.
Compulsory tunneling
In compulsory tunneling, instead of the user a vpn remote access server configures and creates a tunnel. Hence, the end point is the Remote sever not the user. 

Explain static and dynamic tunnels.

Tunnels that are created manually are static tunnels. Tunnels that are auto discovered are dynamic tunnels. In dynamic tunneling, tcp connections can be checked dynamically. If no connections exist that are routed through the tunnel, a check for more suitable gateway can be done. Static tunneling may at times require dedicated equipments. 

Explain the importance of increasing and decreasing subnet bits.

Adding 1’s as a bit means increasing the subnets and decreasing the hosts. Removing or decreasing 1’s means decreasing subnets and increasing hosts. Hence by increasing or decreasing the subnet architecture can be decided as per needs. 

Why do we need a subnet mask?

A subnet mask allows identification of host part and network part of an IP address. Subnet mask can be used to find if an IP address is present on a subnet or not. 

What is  RTP?

Real-Time Transfer Protocol lays a standard or a way to transfer or manage real time data over a network. It does not guarantee the delivery of data or provide any quality of service. However it helps to manage the data. Which means that RTP can be used deliver the necessary data to the application to make sure it can put the received packets in the correct order Real time data examples could be audio and video. 

What is RTP Multiplexing?

RTP multiplexing allows multiple media flows within a single RTP data payload between two points. This means that it can be used to carry multiple streams of data in one RTP packet. RTP multiplexing will reduce the bandwidth used. RTP multiplexing will also increase scalability. 

Explain the use of RTP and RTCP protocols.

Use of RTP and RTCP:-
1. RTP can be used to transfer Real time data like voice packets.
2. RTP can be used with RTCP which makes it possible to monitor data.
3. Packet loss can be detected by RTP using Sequence number
RTCP provides Qos feedback :- Packets lost, round trip time. 

Describe the format of RTP and RTCP packets.

The 32 bits of RTP packet format is as follows:- (L to R)
Bit 0-1:- Indicates version, currently 2
Bit 2:- P- indicates padding bytes
Bit 3:- X- Indicates presence of extension header
Bit 4-7:- CC- Contains number of CSRC identifiers that follows the header
Bit 8:- M- Current data has some special relevance (if set)
Bit 9-15:- PT- Indicates format of payload
Bit 16-31:- Sequence number
Timestamp: - 32bits – time stamp of packet
SSRC- Synchronization source identifier uniquely identifies the source of a stream.
 
CSRC -Contributing source IDs enumerate contributing sources to a stream which has been generated from multiple sources
Extension header: - first 32 bit word contains profile specific identifier and length specifier
The 32 bits of RTCP header format is as follows:- (L to R)
Bit 0-1:- Indicates version, currently 2
Bit 2:- P- indicates padding bytes
Bit 3 to 7:- Count of number of reception report blocks
Bit 8 to 15:- Type: - Determined RTCP packet type. Type can take values from 0 to 255
16 to 31:- Length- Length of RTCP packet - 1
SR: - Sender Report for transmission and reception from active senders
RR: - Receiver report for reception from in active senders
SDES: - Source description items
BYE- indicates end of participation
APP: - Application specific functions 

Describe how the multicast protocol works.

Multicast protocol or Internet protocol delivers a singles message to multiple machines. One packet from the source is replicated and sent to the destination. Every multicast message requires a multi case group. The group defines the addresses which will receive the message. The group is defined by the class D address. Different routing protocols are used to find the multicast groups and build routes for them. Distance Vector Multicast protocol is one of them. The receiver, to whom the multicast packet is sent to, needs to ‘join’ the group. Joining the group is enabled and managed by IGMP. Multicast routers are used to transmit the messages from one network to another. 

Describe how to control the scope of multicast transmissions.

Controlling the scope of multicast transmission restricts the range of group members. TTL (Time To Live) is one of the mechanisms to limit the scope. If the TTL value is small, packets would only be multicast to smaller distance destinations. More the value of TTL, more would be the scope of transmission to a larger number of machines. Administrative scoping is another mechanism. In this, transmission is restricted to a specific address space of an organization or a site. 
Explain why use Multicasting.
  • When the same message or packet needs to be sent to multiple destinations, multicasting is used.
  • Within campus and offices, using multicasting file distribution can be done. 
  • System messages, news and videos can be sent at the same time.
  • More commonly used for audio and video streaming. 

What is a socket?

A socket is used to connect an application to a network protocol. A socket enables communication between a client and a server. The communication is started when the client is assigned a local port number, and binds a socket to it. The client writes on the socket and gets information from server by reading it. 

What are Sockets? How do Sockets Work?

A socket is used to connect an application to a network protocol. A socket enables communication between a client and a server. The communication is started when the client is assigned a local port number, and binds a socket to it. The client writes on the socket and gets information from server by reading it. The Socket class is used to communicate. It provides rich set of methods for both asynchronous and synchronous data transfer. ConnectAsynch is used to start an asynchronous connection. SendAsynch and ReceiveAsynch are used to send and receive data. Shutdown and close methods are used to shutdown and close the sockets.

Datagram vs. stream.

Stream can be considered as a pipe that allows full duplex connection. A datagram or a packet on the other hand, has a source and a destination. There is no connection. Stream is like a communication channel while datagram is completely self contained. Streams provide a reliable and sequenced communication. Datagram’s on the other hand are unreliable and no sequence maintained. 

What is a stream socket?

A stream socket provides two way communications between a client and server. This communication is reliable and sequenced. Stream sockets are above TCP to run across any networks. They provide unduplicated flow of data and have well established mechanism for creating and destroying connections and for detecting errors. 

What is SSL?

SSL is Secured Socket Layer. SSL is used to establish a secured and an encrypted connection between a server and the browser. SSL is most commonly seen in payment and banking web sites. To create a SSL connection, a SSL certificate needs to be created. If the website has a SSL certificate installed, a small icon is displayed in the tool bar to make customers confident that the site is secured. 
What are the two important TCP Socket classes? Explain them
The two most important socket Classes are:
Socket Class: The Socket class provides enriched methods and properties for network communications. It allows both synchronous and asynchronous data transfer. Shutdown method should be used to end the Socket once the data transfer is complete. Using SetSocketOption the socket can be configured.
Declaration:

Public Class Socket _
Implements IDisposable
Server Socket Class: The server Socket class is used to implement server sockets. Server sockets are used to respond to requests received over the network. 
What are the advantages and disadvantages of Java Sockets?
Advantages:
  • Flexible and powerful.
  • Cause low network traffic if efficiently used.
  • Only updated information can be sent.
Disadvantages:
  • The Java applets can establish communication only with the machine requested and not with any other machine on the network.
  • Sockets allow only raw data to be sent. This means that both client and server need to have mechanisms to interpret the data. 

What is meant by Symmentric Multiprocessing (SMP)?

Symmetric Multiprocessing allows any processor to do work of another processor. SMP allows multiple processors to process programs that are a part of common OS and memory. Most common example of SMP is OLTP where many users access the same database in a relatively simple set of transactions. SMP efficiently balances the workload of the processors. 

What are TP-Lite and TP-Heavy Monitors?

TP – Lite is an integration of TP Monitor functions in a database engine. TP-Heavy Monitor allows the machine to initiate some complex multi server transactions. TP Heavy monitors support client server architecture.

What is Distance Vector Routing Protocols?

The main goal of Distance Vector Routing Protocols Is to find out the best path for he data packet to reach the destination. Distance here could be the hops. The three different types of Distance Vector routing protocols include:- Routing Information Protocol (RIP v1 and v2) and Interior Gateway Routing Protocol. The protocol is easy to manage however not well scalable.
The Distance Vector protocol initially prepares a Routing table which is shared with other routers. This routing table is shared between routers present in the same network. A new routing table is prepared when some new information is received from some other router. Now, the bad routing paths are removed keeping only the smallest hop paths. This new table is then communicated to other routers.

What is POP3 (Post Office Protocol 3)?

POP3 or Post Office Box 3 is used fro receiving emails. It is a client server protocol which holds the email. Once the email is downloaded from the server, POP3 deletes it from the server. Ordinal numbers are used to identify specific messages. 

What is NNTP (Network News Transfer Protocol)?

NNTP or Network News Transfer Protocol is used to manage the notes posted on Unset newsgroup (a collection of posted notes on a subject posted by different users). NNTP servers are responsible for managing Usenet newsgroup collected globally. A NTTP client is a part of the web browser also called as a news reader. It uses a reserver port no 119. 

What is HTTP (Hypertext Transfer Protocol)?

HTTP or Hyper Text Transfer Protocol is provides a set of rules to transfer files, videos, images over the world wide web. When the web browser is opened, a HTTP request call is made. A web server contains a HTTP daemon. This daemon is used to wait for HTTP requests and handle them when they arrive. The web browser from where HTTP requests are made is called as a client. These requests are sent to the server. It uses a reserved port no 80. 

What is IGMP protocol?

Internet Group Management Protocol, allows internet hosts to multicast. i.e. to send messages to a group of computers. There may be a group of internet hosts interested to multicast. IGMP allows router to determine which host groups have members on a given network segment. It helps to establish group memberships. It is commonly used for streamlining videos and gaming. The protocol can be implemented both as a host side and router side. The host side is responsible to notify its membership in a group. The notification is made to a local router. This local router (router side) in turn sends out queries. 

Define gateway

A gateway is a network point that provides entrance into another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes. 

Explain how names are translated (resolved) into IP address.

Domain Name server or DNS is used to resolve names into IP addresses. When a web address is entered into the browser, the DNS client sends a request to the DNS server to find the corresponding IP address for the name. The DNS server receives this request and searches for the corresponding IP address in the database. If at this point the resolution fails, this server sends this request to the parent server. The request keeps going up the hierarchy to the parent servers or the closest authoritative of the DNS server to resolve the address. If the request times out an error is retuned to the client. If the server is able to resolve the name requested, it passes the information back to the client. The next request sent by the client is to request for a web page for the IP address. 

Explain the structure and use of internet addresses.

Each IP address is 32 bit long. In human language the IP addresses are written in dotted decimal notation. These are then converted to binary by the computer. Each IP address has two parts: Network identifier or a network ID and host ID. The current internet protocol standard is IPV4. The IP addresses are divided into three classes: a class A network, a class B network, and a class C network. Class A being the largest. The four digit numbers in an IPV4 address, each network of class A will have different first number, and then its network will be addressed by the rest of the three numbers, or three bytes. The IP addresses identify a machine to deliver packets and load web pages.

Define IP multicast.

IP multicast technology reduces traffic by sending stream of information to many recipients at one go. Video conferencing, stock quotas are the examples based on IP multicast. 

What is Network Address Translation?

Network Address Translation acts as an agent between the Internet and a local network. It is a dynamic method which is used to minimize Internet connectivity needs. Network address translation describes the rewriting of the Internet Protocol (IP) addresses of data packets so that multiple transmissions require only one IP address. 

What is the difference between public and private IP?

A public IP address allows equipment accessible to everyone on the internet. A private IP address is for private use within the network and allows many more PCs to be connected. If you are using a private IP and wants VOIP, you need to change to a public IP address

How would you define IP address?

IP address or Internet Protocol address is the address of a device attached to an IP network (TCP/IP network). It is a must for every client, server and network device to have a unique IP address for each network connection (network interface). Every IP packet contains a source IP address and a destination IP address. As a device moves from one network to another, its IP address changes. 
Computers using the TCP/IP for communication are uniquely identified by a 32 bit address called as an IP address. The routers use the IP address information to forward the packet to the destination computer.
IP addresses are categorized as:
Private address: these IP addresses are used exclusively within a private network and not for public to see.
Public Address: these are registered IP addresses used for public.
Each IP address has a network address and a host address. IP addresses are expressed in four sets of three numbers, separated with dots. Each set is called as an octet because when converted to binary; it denotes eight binary.

MAC vs. IP Addressing

Whereas MAC addressing works at the data link layer, IP addressing functions at the network layer (layer 3). It's a slight oversimplification, but one can think of IP addressing as supporting the software implementation and MAC addresses as supporting the hardware implementation of the network stack. The MAC address generally remains fixed and follows the network device, but the IP address changes as the network device moves from one network to another. 

Define Telnet

Telnet is the main Internet protocol for creating a connection to a remote server.

Define DNS

The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites. DNS implements a distributed database to store this name and address information for all public hosts on the Internet. 

What is Application layer?

The application layer is located at the top of the TCP/IP protocol layers. This one contains the network applications which make it possible to communicate using the lower layers. The software in this layer therefore communicates using one of the two protocols of the layer below (the transport layer), i.e. TCP or UDP. In computer networking, an application layer firewall is a firewall operating at the application layer of a protocol stack.[1] Generally it is a host using various forms of proxy servers to proxy traffic instead of routing it. As it works on the application layer, it may inspect the contents of the traffic, blocking what the firewall administrator views as inappropriate content, such as certain websites, viruses, and attempts to exploit known logical flaws in client software, and so forth. An application layer firewall does not route traffic on the network layer. All traffic stops at the firewall which may initiate its own connections if the traffic satisfies the rules. 

Explain the core naming mechanism, Domain Name System (DNS).

A Domain Name system is used to convert the names of the website on the internet to IP addresses. The domain names for each IP addresses are stored in a database that is distributed across different servers. A domain name space consists of a tree of domain names. The tree has zones. Zones consist of a collection of connected nodes. These nodes are served by a name server. A domain name is usually in the form of mydomain.com. Here, .com is the top level domain.  Where as mydomain is the sub domain or subdivision. A host name is a domain name that has one or more IP addresses associated with it. 

Explain the functionality of PING.

Ping Is particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address. The output returns the data packets information. The number of packets sent, received and lost is returned by PING

What is multicasting?

Multicasting allows a single message to be sent to a group of recipients. Emailing, teleconferencing, are examples of multicasting. It uses the network infrastructure and standards to send messages. 

Explain IP, TCP and UDP.

TCP – Transmission control Protocol is used to establish communication between nodes or networks and exchange data packets. It guarantees delivery of data packets in the order they were sent. Hence it is most commonly used in all applications that require guaranteed delivery of data. It can handle both timeouts (if packets were delayed) and retransmission (if packets were lost). The stream of data is transmitted in segments. The segment header is 32 bit. it is a connectionless communication protocol at the third level (network) of the OSI model.
IP – Internet protocol is used for transmission of data over the internet. IP uses IP addresses to identity each machine uniquely. Message is sent using small packets. The packet contains both the sender and receivers address. IP does not guarantee the delivery in the same order as sent. This is because the packets are sent via different routes. It is a connectionless communication protocol at the third level (network) of the OSI model.
UDP – User Data Protocol is a communication protocol. It is normally used as an alternative for TCP/IP. However there are a number of differences between them. UDP does not divide data into packets. Also, UDP does not send data packets in sequence. Hence, the application program must ensure the sequencing. UDP uses port numbers to distinguish user requests. It also has a checksum capability to verify the data.
What are network topologies? Explain Ring, Bus and Star topology.
A network topology describes the layout of a network. It describes how different nodes and elements are connected to each other. Different types of topology:
a. Ring:-
  • All nodes connected with another in a loop.
  • Each device is connected to one or more another device on either side.
b. Bus
  • All nodes connected to a central and a common cable called as a back bone.
  • In bus topology, the server is at one end and the clients are connected at different positions across the network.
  • Easy to manage and install.
  • If the backbone fails, the entire communication fails.
c. Star
  • All nodes connected to a central hub.
  • The communication between the nodes is through the hub.
  • Relative requires more cables as compared to BUS. However if any node fails, it wont affect the entire LAN. 

What is a network? What are the different kinds of network? Explain them

A network is a group of computers or nodes connected together. They are connected with each other by communication paths.
Types of Networks:
LAN – Local Area Network connects a group of nodes covering a small physical area. LAN’s are most commonly seen in offices, building etc. LAN’s enable higher transfer rate of data, smaller coverage of area and hence less wiring.
WAN – Wide Area Network connects a group of nodes covering a wide area. WAN typically connects and allow communication between regions or national boundaries. The most common example of WAN is internet.
VPN – Virtual Private Network connects or links nodes in some larger area by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. It is used for secure communication through the public internet. VPN alone may not support explicit security features, such as authentication or content encryption.
Intranet – It is a set of networks under the control of a single administrative person. It can be considered as an internal network of an organization. If it is large, web servers are used to provide information to the users.
Extranet – It is a network that restricts itself within a single organization. It can be categorized as WAN, MAN etc. however; it cannot have a single LAN. It must have a connection (at least one) with external network.

Explain the 7 Layers of OSI.

Layer 1: Physical layer 
It represents all the electrical and physical specifications for devices.  
Layer 2: Data link layer 
It provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical layer.
Layer 3: Network layer 
The Network layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks.
Layer 4: Transport layer 
It provides transparent transfer of data between end users.
Layer 5: Session layer 
It controls the sessions between computers. It connects, manages and terminates the connections between the local and remote application.
Layer 6: Presentation layer 
It transforms data to provide a standard interface for the Application layer.
Layer 7: Application layer 
It provides a means for the user to access information on the network through an application. 

Define File Transfer Protocol.

File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers displayable Web pages and related files, and the Simple Mail Transfer Protocol (SMTP), which transfers e-mail, FTP is an application protocol that uses the Internet's TCP/IP protocols. FTP is commonly used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet. It's also commonly used to download programs and other files to your computer from other servers. 

What is FTP (File Transfer Protocol)?

FTP is File Transfer Protocol. It used to exchange files on the internet. To enable the data transfer FTP uses TCP/IP, FTP is most commonly used to upload and download files from the internet. FTP can be invoked from the command prompt or some graphical user interface. FTP also allows to update (delete, rename, move, and copy) files at a server. It uses a reserved port no 21

Define the term Protocol.

Protocol is a standard way of communicating across a network. A protocol is the "language" of the network. It is a method by which two dissimilar systems can communicate. TCP is a protocol which runs over a network.

What's the difference Between an Intranet and the Internet?

There's one major distinction between an intranet and the Internet: The Internet is an open, public space, while an intranet is designed to be a private space. An intranet may be accessible from the Internet, but as a rule it's protected by a password and accessible only to employees or other authorized users. 
From within a company, an intranet server may respond much more quickly than a typical Web site. This is because the public Internet is at the mercy of traffic spikes, server breakdowns and other problems that may slow the network. Within a company, however, users have much more bandwidth and network hardware may be more reliable. This makes it easier to serve high-bandwidth content, such as audio and video, over an intranet. 

What is LAN?

LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN). Most LANs connect workstations and personal computers. Each node (individual computer) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data. Users can also use the LAN to communicate with each other, by sending e-mail or engaging in chat sessions. 
Explain the concepts and capabilities of IP Datagram.
Data transmitted over an internet using IP is carried in messages called IP datagrams.
Like all network protocol messages, IP uses a specific format for its datagrams.
The IPv4 consists of the following fields:
  • Version: the version of IP used to generate the datagram. For IPv4, this is of course the number 4
  • Internet Header Length: Specifies the length of the IP header, in 32-bit words.
  • Type of service: information to provide quality of service features
  • Total Length
  • Identification: it can be used if the datagram must be fragmented by a router during delivery and then for reassembling.
  • Flags: (Don’t Fragment, More Fragment)
  • Fragment Offset: When fragmentation of a message occurs, this field specifies the offset, or position.
  • Time to Live: specifies how long the datagram is allowed to “live”
  • Protocol: ICMP, TCP, UDP, etc
  • Header Checksum: to provide basic protection against corruption in transmission.
  • Source Address
  • Destination Address
  • Options
  • Padding: if number of bits used for options is not a multiple of 32, then paddin is added
  • Data 

What is Data Fragmentaion? Explain how Data Fragmentaion works

Fragmentation occurs when storage space is used inefficiently due to which storage capacity and performance is reduced.
Data fragmentation occurs when a large object is inserted into storage that has already suffered external fragmentation due to which the data object is broken up into many pieces that are not close together.
When free storage becomes divided into many small pieces over time, its called External fragmentation. 

What is VLSM, Variable length subnet masking?

VLSM is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule. 
What is Superneting? Explain the concept of custom Subneting.
Supernetting or Classless Inter-Domain Routing (CIDR)
  • It is a way to aggregate multiple Internet addresses of the same class.
  • The adjacent network address (eg:192.168.2.0/24 and an address 192.168.3.0/24) can be merged (into 192.168.2.0/23) using supernetting.
  • Supernetting is the basis for most routing protocols currently used on the Internet.
  • It is mostly used to combine Class C network addresses. 
Describe the concept of Subneting.
Subneting is a process of breaking the network into smaller units. These units care called as subnets. Here a subnet could be several machines in a single LAN. Networks using IP can create sub networks of logical addresses. With every IP address there some of the bits in the machine can be used to identify a specific subnet. The IP address then contains three parts: the network number, the subnet number, and the machine number.
What is custom Subneting?
Subnets that can be customized; i.e. modifying the dividing point between subnet ID and host ID to suit the needs of our network. The subnet mask that we use when creating a customized subnet is, called a custom subnet mask. This custom subnet mask is used to find the customization..

What is Subneting? Explain the advantages of using Subneting.

Subneting is dividing a network into several subnets.
This is usually done for the following purposes:
  • Reducing network traffic by decreasing the number of broadcasts
  • Exceeding the limitations in a local area network
  • Enabling people to connect to the network remotely without opening the entire network 

Explain the advantages of using Subneting.

Advantages of using Subneting:-
  • Easier network management and trouble shooting 
  • Routing table’s size is reduced which means faster network transfers
  • Solves network congestion problems:- Since the complete network is divided into smaller networks
  • Network addresses can be decentralized e.g. the administrator of the network can monitor the subnet.

Explain the classes of IP addresses. Why do we need them?

Class A:
Range: from 0.0.0.0 to 127.255.255.255.
Leftmost bit: 0.
First 8 bits: netid.
Remaining 24 bits: hostid.
Class B:
Range: from 128.0.0.0 to 191.255.255.255.
Leftmost 2 bits: 10
First 16 bits: netid
Last 16 bits: the hostid
Class C:
Range: from 192.0.0.0 to 223.255.255.255.
Class C networks use the first 24 bits to determine the netid.
Leftmost 3 bits: 110
The next 21 bits define network.
8 bits define the hostid.
Class D:
First 4 bits: 1110
The remaining 28 bits define multicast addresses.
No netid or hostid in a class D address.
 
Addresses is used for multicasting.
Class E:
First 4 bits: 1111
Addresses reserved for special use on the Internet.
 
There is no netid or hostid in a class E address. 

What is IP Multicasting?

It is an IP address that identifies a particular group of hosts in network. 
This group of hosts is called a multicast group. 

Explain the concept and capabilities of Unicast IP Addresses

It is an IP address that uniquely identifies a host in a network. 
The datagram with a unicast IP address is received and processed by only a single host.
Explain different layers in the OSI model.
Application Layer:
  • Closest to the end user
  • Interact directly with the software application.
Presentation Layer:
  • Translates application to network format, and vice versa
  • Works to transform data into the form that the application layer can accept
  • Formats and encrypts data to be sent across a network
Session Layer
  • Controls the connections between computers
  • Establishes, manages and terminates the connections between the local and remote application.
  • Provides full-duplex, half-duplex, or simplex operation
  • Establishes checkpointing, adjournment, termination, and restart procedures
Transport Layer:
  • Provides transparent transfer of data between end users
  • Providing reliable data transfer services to the upper layers
  • Controls the reliability of a given link through flow control, segmentation / desegmentation, and error control.
Network Layer
  • Provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks
  • Performs networkrouting functions
  • Performs fragmentation and reassembly, and report delivery errors.
Data Link Layer
  • Provides the functional and procedural means to transfer data between network entities
  • Detects and corrects errors that occur in the Physical Layer.
Physical Layer:
  • Defines the electrical and physical specifications for devices.
What is Router? Explain components of Routers.
The way switches connect multiple computers, a router connects multiple networks. Routers comprise of data consisting of large tables of networks and addresses. Routers use algorithms to determine the shortest route to an address in a network. 
What are the basic components of routers?
Answer
Components of Router
Internal components:
  • ROM:- Used to store the routers bootstrap details, operating system software.
  • Flash memory: - holds the operating systems images. The content is retained when the router is restarted.
  • RAM: - Used to store the Routing tables, configuration files, caching and buffering details. Content is lost when lost router is switched off or restarted.
  • NVRAM:- Stores the routers startup config files. Data is non volatile.
  • Network interfaces to connect router to network.
External components:
  • Virtual terminals: For accessing routers 
  • Network management stations.

What are switches? Explain the concepts of Layer-3 switches.

It is a device that connects multiple network segments. 
A switch analyzes the MAC address and then determines where to send the data.
 
So a file addressed to a computer reaches only that computer through the use of a switch.
The term ‘switch’ commonly refers to a Network bridge that processes and routes data at the Data link layer (layer 2) of the OSI model.
Switches that additionally process data at the Network Layer are often referred to as Layer 3 switches or Multilayer switches.

What is 'Gateway Of Last Resort'?

A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to transmit the IP packet. Known routes are present in the routing table. Hence, any route not known by the routing table is forwarded to the default route. Each router which receives this packet will treat the packet the same way, if the route is known, packet will be forwarded to the known route. 

Explain Circuit Level Gateway.

A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be considered as a layer between application layer and transport layer. They protect the information of the private network they protect. Circuit level gateways do not filter packets. 

What is an application gateway?

An application gateway is an application program that runs on a firewall between two networks. An application gateway is used for establishing connection between client program and destination service. The client negotiates with the gateway to communicate with the service of destination. Here, gateway can be called as a proxy. Hence, two connections are made. One between client and proxy; other, between proxy and destination service. Connections take place behind the firewall 

Explain IP datagram, Fragmentation and MTU.

IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged in an order. The order is specific which helps to decode and read the stream easily. IP datagram has fields like Version, header length, Type of service, Total length, checksum, flag, protocol, Time to live, Identification, source and destination ip address, padding, options and payload.
MTU:- Maximum Transmission Unit is the size of the largest packet that a communication protocol can pass. The size can be fixed by some standard or decided at the time of connection
Fragmentation is a process of breaking the IP packets into smaller pieces. Fragmentation is needed when the datagram is larger than the MTU. Each fragment becomes a datagram in itself and transmitted independently from source. When received by destination they are reassembled. 

What is IP Spoofing and how can it be prevented?

IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. This is done by forging the header so it contains a different address and make it appear that the packet was sent by a different machine.
Prevention:-
Packet filtering: - to allow packets with recognized formats to enter the network
Using special routers and firewalls.
Encrypting the session

What is PPP protocol? Explain PPP packet format.

Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host. PPP also provides authentication. PPP operates by sending Request packets and waiting for Acknowledge packets that accept, reject or try to change the request. The protocol is also used to negotiate on network address or compression options between the nodes.
Packet format:-
Flag field: 1 byte: - Indicates frames beginning or end
Address field: 1 byte: - Used for broadcast address (destination address)
 
Control field: 1 byte: - Used as a control byte
Protocol field: - 1 or 2 bytes: - Setting of protocol in information field (of datagram)
Information: - 0 or more bytes: - Datagram (whether it contains data or control information)
Padding: - 0 or more bytes: - optional padding
FCS: - 2 or more bytes: - error check sum 

Explain how NAT works.

Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is maintained for global to local and local to mapping of IP’s. NAT can be statically defined or dynamically translate from a pool of addresses. The NAT router is responsible for translating traffic coming and leaving the network. NAT prevents malicious activity initiated by outside hosts from reaching local hosts by being dependent on a machine on the local network to initiate any connection to hosts on the other side of the router. 

What are the differences between a domain and a workgroup?

In a domain, one or more computer can be a server to manage the network. On the other hand in a workgroup all computers are peers having no control on each other. In a domain, user doesn’t need an account to logon on a specific computer if an account is available on the domain. In a work group user needs to have an account for every computer. 
In a domain, Computers can be on different local networks. In a work group all computers needs to be a part of the same local network. 

Explain the concept of DHCP.

Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The IP addresses are assigned dynamically. Certainly, using DHCP, the computer will have a different IP address every time it is connected to the network. In some cases the IP address may change even when the computer is in network. This means that DHCP leases out the IP address to the computer for sometime. Clear advantage of DHCP is that the software can be used to manage IP address rather than the administrator. 

Explain RSVP. How does it work?

Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network. This is done by carrying the request (that needs a reservation of the resource) of the host throughout the network. It visits each node in the network. RSVP used two local modules for reservation of resources. Admission control module confirms if there are sufficient available resources while policy module checks for the permission of making a reservation. RSVP offers scalability. On a successful completion of both checks RSVP uses the packet classifier and packet scheduler for the desired Qos requested. 

What are Ping and Tracert?

Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets. Ping I particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address Tracert is called as trace route. It is used to track or trace the path the packet takes from the computer where the command is given until the destination. In windows ping command is written as tracert ip_address

What is the use of IGMP protocol?

Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups. The mechanism also allow a host to inform its local router, that it wants to receive messages. 

Explain the use of Internet Control Message Protocol (ICMP).

Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers, for the purpose of sending error messages, for example, a requested service is unavailable or the host could not be reached. It is not directed by the network applications. ICMPs are utilized by routers, hosts for communicating the updates or error information to other routers.  

What is the TTL (Time to Live)? Why is it required?

TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded. Usually, data packets might not be transmitted to their intended destination within a stipulated period of time. The TTL value is set by a system default value which is an 8-bit binary digit field in the header of the packet. The purpose of TTL is, it would specify certain time limit in seconds, for transmitting the packet header. When the time is exhausted, the packet would be discarded. Each router receives the subtracts count, when the packet is discarded, and when it becomes zero, the router detects the discarded packets and sends a message, Internet Control Message Protocol message back to the originating host. 

What is the Domain Name System (DNS)? What are the advantages of it?

A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet. Various information with domain names is assigned to each of the participants. DNS translates the names of domain into meaningful to humans into binary identifiers that are associated with the equipment of network to locate and address these devices. 
Advantages:
More Reliable: Delivers messages to the users with zero downtime.
Faster: DNS are connected well at intersections of internet. Any cast technology enables requests are answered to the next closest node in the case of maintenance or downtime.
Smarter: Automatic corrections of typos. 

Explain TCP Windowing concept.

TCP Windowing is a concept that is used for avoiding congestion in the network traffic. Unacknowledged amount of data that is sent by the sender before the data gets acknowledgment back from the receiver that it has received it is controlled. 

What is the User Datagram Protocol (UDP)?

User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol, with out using prior communications for setting up special transmission paths. An unreliable service is provided by UDP which makes the datagram packets may arrive irrespective of order. UDP is a better solution for time-sensitive applications due to the reason ‘dropping packets is preferable to use delayed packets’. Its stateless nature makes the server to answer smaller queries to huge number of clients.

Define Subnetting.

A subnet describes a set of networked computers which have common IP address routing prefix.
Breaking the networking into smaller and more efficient subnets is known as subnets. Subnetting prevents Ethernet packet collision which has excessive rates in a large network. Routers are used to manage the traffic and constitute borders among subnets. 

What is Network Mask?

A network mask is used for determination of what subnet an IP address belongs to. An IP address has network address and the host address. The first two numbers represents the network address and the second two numbers represents the host of the network. 

Define Broadcast, Unicast and Multicast.

Unicast: A term used in communication to describe a piece of information to send from one point to another. There are only sender and receiver. All LANs support unicast transfer mode and most applications that employ TCP transport protocol uses unicast messaging.
Broadcast: A term used for describing communication that is sent a piece of information from one point to all other points. There is one sender and multiple receivers. All LANs support broadcast transmission. 
Multicast: A term described in communicating a piece of information sent from one or more points to a set of other points. The senders and receivers are one or more. 

Explain the classes of IP address

IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format. Every number in each class is represented as binary to computers.
The four numbers in an IP address are known as ‘octets’. Each of them has eight bit positions. The octets are divided into two sections: Net and Host. The first octet represents Net for identifying the network and the Host contains the last octet. There are five IP classes.
Class A: The class A is used for very large networks. There are 1 to 126 are part of this class. That means there are 126 Class A networks. Class A networks accounts for half of the total available IP addresses.
Class B: It is used for medium size networks. The IP address with a first octet from 128 to 191 is part of this class. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.
Class C: Class C is used for small to middle size networks. IP address with a first octet starts from 192-223. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.
Class D: It has first, second and third bit value as 1 and the fourth bit as 0. The other 28 bits are used for identifying the group of computers which is intended for multicast messages.
Class E: Class E is used for identification purpose. The four bits value is 1. The other 28 bits are used for identifying the group of computers which is intended for multicast messages.

Explain the services provided by IP (Internet Protocol) - Addressing, Fragmentation, Packet timeouts and options

1. Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP. As IP operates in an internet, its systems are designed to accept the addressing of devices which are unique.
2. Fragmenting: The datagram packets are sent to the data link layer for the purpose of transmission on the network. The physical network frame size that uses IP may be different. To resolve this, IP fragments the datagram into certain pieces. So that, each piece can be carried on the network. The receiving systems use these pieces and reassemble the whole IP datagram again.
3. Packet timeouts: A timeout packet is the time for waiting next instruction from the command station. If the command is not sent by the station, it shuts down.  
The Open System Interconnection Model
The Open System Interconnection (OSI) model specifies how dissimilar computing devices such as Network Interface Cards (NICs), bridges and routers exchange data over a network by offering a networking framework for implementing protocols in seven layers. Beginning at the application layer, control is passed from one layer to the next. The following describes the seven layers as defined by the OSI model, shown in the order they occur whenever a user transmits information.
Layer 7: Application
This layer supports the application and end-user processes. Within this layer, user privacy is considered and communication partners, service and constraints are all identified. File transfers, email, Telnet and FTP applications are all provided within this layer.
Layer 6: Presentation (Syntax)
Within this layer, information is translated back and forth between application and network formats.  This translation transforms the information into data the application layer and network recognize regardless of encryption and formatting.
Layer 5: Session
Within this layer, connections between applications are made, managed and terminated as needed to allow for data exchanges between applications at each end of a dialogue.
Layer 4: Transport
Complete data transfer is ensured as information is transferred transparently between systems in this layer. The transport layer also assures appropriate flow control and end-to-end error recovery.
Layer 3: Network
Using switching and routing technologies, this layer is responsible for creating virtual circuits to transmit information from node to node. Other functions include routing, forwarding, addressing, internetworking, error and congestion control, and packet sequencing.
Layer 2: Data Link
Information in data packets are encoded and decoded into bits within this layer. Errors from the physical layer flow control and frame synchronization are corrected here utilizing transmission protocol knowledge and management. This layer consists of two sub layers: the Media Access Control (MAC) layer, which controls the way networked computers gain access to data and transmit it, and the Logical Link Control (LLC) layer, which controls frame synchronization, flow control and error checking.
Layer 1: Physical
This layer enables hardware to send and receive data over a carrier such as cabling, a card or other physical means. It conveys the bitstream through the network at the electrical and mechanical level. Fast Ethernet, RS232, and ATM are all protocols with physical layer components.
This order is then reversed as information is received, so that the physical layer is the first and application layer is the final layer that information passes through.

General Topology Configurations

10BASE-T Ethernet and Fast Ethernet use a star topology where access is controlled by a central computer. Generally a computer is located at one end of the segment, and the other end is terminated in central location with a hub or a switch. Because UTP is often run in conjunction with telephone cabling, this central location can be a telephone closet or other area where it is convenient to connect the UTP segment to a backbone. The primary advantage of this type of network is reliability, for if one of these 'point-to-point' segments has a break; it will only affect the two nodes on that link. Other computer users on the network continue to operate as if that segment were non-existent.

Collisions

Ethernet is a shared medium, so there are rules for sending packets of data to avoid conflicts and to protect data integrity. Nodes determine when the network is available for sending packets. It is possible that two or more nodes at different locations will attempt to send data at the same time. When this happens, a packet collision occurs.
Minimizing collisions is a crucial element in the design and operation of networks. Increased collisions are often the result of too many users on the network. This leads to competition for network bandwidth and can slow the performance of the network from the user's point of view. Segmenting the network is one way of reducing an overcrowded network, i.e., by dividing it into different pieces logically joined together with a bridge or switch.

CSMA/CD

In order to manage collisions Ethernet uses a protocol called Carrier Sense Multiple Access/Collision Detection (CSMA/CD). CSMA/CD is a type of contention protocol that defines how to respond when a collision is detected, or when two devices attempt to transmit packages simultaneously. Ethernet allows each device to send messages at any time without having to wait for network permission; thus, there is a high possibility that devices may try to send messages at the same time.
After detecting a collision, each device that was transmitting a packet delays a random amount of time before re-transmitting the packet. If another collision occurs, the device waits twice as long before trying to re-transmit.

Ethernet Products

The standards and technology just discussed will help define the specific products that network managers use to build Ethernet networks. The following presents the key products needed to build an Ethernet LAN.

Transceivers

Transceivers are also referred to as Medium Access Units (MAUs). They are used to connect nodes to the various Ethernet media. Most computers and network interface cards contain a built-in 10BASE-T or 10BASE2 transceiver which allows them to be connected directly to Ethernet without the need for an external transceiver.
Many Ethernet devices provide an attachment unit interface (AUI) connector to allow the user to connect to any type of medium via an external transceiver. The AUI connector consists of a 15-pin D-shell type connector, female on the computer side, male on the transceiver side.
For Fast Ethernet networks, a new interface called the MII (Media Independent Interface) was developed to offer a flexible way to support 100 Mbps connections. The MII is a popular way to connect 100BASE-FX links to copper-based Fast Ethernet devices.

Network Interface Cards

Network Interface Cards, commonly referred to as NICs, are used to connect a PC to a network. The NIC provides a physical connection between the networking cable and the computer's internal bus. Different computers have different bus architectures. PCI bus slots are most commonly found on 486/Pentium PCs and ISA expansion slots are commonly found on 386 and older PCs. NICs come in three basic varieties: 8-bit, 16-bit, and 32-bit. The larger the number of bits that can be transferred to the NIC, the faster the NIC can transfer data to the network cable. Most NICs are designed for a particular type of network, protocol, and medium, though some can serve multiple networks.
Many NIC adapters comply with plug-and-play specifications. On these systems, NICs are automatically configured without user intervention, while on non-plug-and-play systems, configuration is done manually through a set-up program and/or DIP switches.
Cards are available to support almost all networking standards. Fast Ethernet NICs are often 10/100 capable, and will automatically set to the appropriate speed. Gigabit Ethernet NICs are 10/100/1000 capable with auto negotiation depending on the user’s Ethernet speed. Full duplex networking is another option where a dedicated connection to a switch allows a NIC to operate at twice the speed.

Hubs/Repeaters

Hubs/repeaters are used to connect together two or more Ethernet segments of any type of medium. In larger designs, signal quality begins to deteriorate as segments exceed their maximum length. Hubs provide the signal amplification required to allow a segment to be extended a greater distance. A hub repeats any incoming signal to all ports.
Ethernet hubs are necessary in star topologies such as 10BASE-T. A multi-port twisted pair hub allows several point-to-point segments to be joined into one network. One end of the point-to-point link is attached to the hub and the other is attached to the computer. If the hub is attached to a backbone, then all computers at the end of the twisted pair segments can communicate with all the hosts on the backbone. The number and type of hubs in any one-collision domain is limited by the Ethernet rules. These repeater rules are discussed in more detail later.
A very important fact to note about hubs is that they only allow users to share Ethernet. A network of hubs/repeaters is termed a "shared Ethernet," meaning that all members of the network are contending for transmission of data onto a single network (collision domain). A hub/repeater propagates all electrical signals including the invalid ones. Therefore, if a collision or electrical interference occurs on one segment, repeaters make it appear on all others as well. This means that individual members of a shared network will only get a percentage of the available network bandwidth.

Types of Networks

In describing the basics of networking technology, it will be helpful to explain the different types of networks in use.

Local Area Networks (LANs)

A network is any collection of independent computers that exchange information with each other over a shared communication medium. Local Area Networks or LANs are usually confined to a limited geographic area, such as a single building or a college campus. LANs can be small, linking as few as three computers, but can often link hundreds of computers used by thousands of people. The development of standard networking protocols and media has resulted in worldwide proliferation of LANs throughout business and educational organizations.

Wide Area Networks (WANs)

Often elements of a network are widely separated physically. Wide area networking combines multiple LANs that are geographically separate. This is accomplished by connecting the several LANs with dedicated leased lines such as a T1 or a T3, by dial-up phone lines (both synchronous and asynchronous), by satellite links and by data packet carrier services. WANs can be as simple as a modem and a remote access server for employees to dial into, or it can be as complex as hundreds of branch offices globally linked. Special routing protocols and filters minimize the expense of sending data over vast distances.

Wireless Local Area Networks (WLANs)

Wireless LANs, or WLANs, use radio frequency (RF) technology to transmit and receive data over the air. This minimizes the need for wired connections. WLANs give users mobility as they allow connection to a local area network without having to be physically connected by a cable. This freedom means users can access shared resources without looking for a place to plug in cables, provided that their terminals are mobile and within the designated network coverage area. With mobility, WLANs give flexibility and increased productivity, appealing to both entrepreneurs and to home users. WLANs may also enable network administrators to connect devices that may be physically difficult to reach with a cable.
The Institute for Electrical and Electronic Engineers (IEEE) developed the 802.11 specification for wireless LAN technology. 802.11 specifies over-the-air interface between a wireless client and a base station, or between two wireless clients. WLAN 802.11 standards also have security protocols that were developed to provide the same level of security as that of a wired LAN. 
The first of these protocols is Wired Equivalent Privacy (WEP). WEP provides security by encrypting data sent over radio waves from end point to end point.
The second WLAN security protocol is Wi-Fi Protected Access (WPA). WPA was developed as an upgrade to the security features of WEP. It works with existing products that are WEP-enabled but provides two key improvements: improved data encryption through the temporal key integrity protocol (TKIP) which scrambles the keys using a hashing algorithm. It has means for integrity-checking to ensure that keys have not been tampered with. WPA also provides user authentication with the extensible authentication protocol (EAP).

Problem Description

I need a list of common Windows commands to help me troubleshoot Websense in my network.

Resolution

The Windows troubleshooting commands discussed in this document fall into three categories:

·         Determine which groups a user belongs
·         Helpful commands entered from the Start > Run dialog box
·         Comman-line tools for troubleshooting network connectivity

Determine which groups a user belongs
To generate a list of groups that a user belongs, open a command prompt and enter the following commands:
   net user <username> /domain
Replace <username> with an actual user name. For example:
   net user jdoe /domain

Helpful commands entered from the Start > Run dialog box
Select Start > Run to execute any of the following commands.
User-added image
 mstsc
 Opens the Remote Desktop (RDP) tool
 winmsd
 Opens the System Information dialog box
 inetcpl.cpil
 Opens the Internet Explorer Properties dialog box
 odbccp32.cpl
 Opens the ODBC Data Source Administrator
 mmc
 Opens the Microsoft Management Console (MMC)
 services.msc
 Opens the Windows Services dialog box
 eventvwr.msc
 Opens the Windows Event Viewer
 dsa.msc
 Opens the Active Directory User and Computers management console
 dssite.msc
 Opens the Active Directory Sites and Services management console
 adminpak.msi
 Launches the Administration Tools Pack installer
 dxdiag
 Opens the DirectX Diagnostic Tool
 \\< Name or IP>\C$
 Opens a UNC to the C: share
 cmd
 Opens the Windows Command Prompt using the 32-bit cmd shell

Command-line tools for troubleshooting network connectivity

This list contains some common commands for troubleshooting network connectivity. Select Start > Run and then type cmd to access the appropriate command prompt. Activating a command window viaStart > Programs > Accessories does not allow all of the following tools to run correctly. 

User-added image

arp -a
 Shows gateway MAC address.
 gpresult
 Starts the Operating System Group Policy Result tool
 ipconfig /all
 Displays the full TCP/IP configuration for all adapters
 ipconfig /flushdns
 Flushes the DNS resolver cache. Helpful when troubleshooting DNS name resolution problems
 nbtstat -a <MachineName>
 Obtains info from WINS or LMHOST (discovers who is logged on)
 nbtstst -A <IP>
 Gets info from WINS or LMHOST (discovers who is logged on)
 nbtstat -R
 Purges and reloads the remote cache name table
 nbtstat -n
 Lists local NetBIOS names.
 nbtstat -r
 Useful for detecting errors when browsing WINS or NetBIOS
 netstat -ab
 The b switch links each used port with its application
 netstat -an
 Shows open ports
 netstat -an 1 | find "15868"
 Locates only lines with the number 15868 and redisplays every one second
 netstat -an | find "LISTENING"
 Shows open ports with LISTENING status
 net use 
 Retrieves a list of network connections
 net use file://1.2.3.4/
 Sees if the machine can poll IP 1.2.3.4
 net user
 Shows user account for the computer
 net user /domain
 Displays user accounts for the domain
 net user /domain <UserName>
 Shows account details for specific user
 net group /domain
 Shows group accounts for the domain
 net view
 Displays domains in the network
 net view /domain
 Specifies computers available in a specific domain
 net view /domain: <DomainName> | more
 Shows user accounts from specific domain
 net view /cache 
 Shows workstation names
 nslookup
 Looks up IP/hostnames and displays information helpful in diagnosing DNS issues
 ping -a <IP>
 Resolves IP to Hostname
 ping -t <IP>
 Pings host until stopped
 set U
 Shows which user is logged on
 set L
 Shows the logon server
 telnet <IP> <port>
 Confirms whether the port is open
net use %LOGONSERVER%                      

·         Use this command to hit the Domain Controller resulting in DC Agent picking up the user name you logged onto the server with. An example of the command follows:
·         net use  \\<Domain Controller IP or Hostname>

Notes & Warnings

NOTE
Some commands may output more data then the default command window can show. To view the complete data, use the pipe command ( > or | ) to direct the output to a file. For example, type net user \domain > GroupOutPut.txt to create a text file called GroupOutPut.txt that contains the output data.
ipconfig – Quickly Find Your IP Address
You can find your IP address from the Control Panel, but this takes quite a few clicks. The ipconfig command is a fast way of determining your computer’s IP address and other information, such as the address of its default gateway — useful if you want to know the IP address of your router’s web interface.
To use the command, just type ipconfig into a Command Prompt window. You’ll see a list of all the network connections your computer is using. Look under Wireless LAN adapter if you’re connected to Wi-Fi or Ethernet adapter Local Area Connection if you’re connected to a wired network.
ipconfig-command[4]
ipconfig /flushdns – Flush Your DNS Resolver Cache
If you change your DNS server, the effects won’t necessarily take place immediately. Windows uses a cache that remembers DNS responses it’s received, saving time when you access the same addresses again in the future.
To ensure Windows is getting addresses from the new DNS servers instead of using old, cached entries, run the ipconfig /flushdns command after changing your DNS server.
flush-dns-resolver-cache
ping, tracert – Troubleshoot Network Connection Issues
If you’re experiencing issues connecting to a website or other network connection issues, Windows and other operating systems have some standard tools you can use to identify problems.
First, there’s the ping command. Type ping google.com and Windows will send packets to Google.com. Google will respond and let you know it’s received them. You’ll be able to see if any packets didn’t make it to Google.com — perhaps you’re experiencing packet loss — and how long it took you to hear back — perhaps the network is saturated and packets are taking a while to reach their destinations.
ping-command-on-windows
There’s also the tracert command, which traces the route it takes for a packet to reach a destination. For example, run tracert google.com and you’ll see the path your packet takes to reach Google. If you’re having issues connecting to a website, tracert can show you where the problem is occurring.
tracert-command-on-windows
For more information about using these commands, read our introduction to troubleshooting Internet connection problems.
shutdown – Create Shutdown Shortcuts on Windows 8
The shutdown command is particularly useful on Windows 8. You can use it to create your own shortcuts and place them on your Start screen or desktop, allowing you to more easily shut down Windows without digging through the charms bar or logging out first.
This command can also be used to restart your computer. On Windows 8, you can even use a special switch to restart your computer into the advanced startup options menu.
·         Shut Down: shutdown /s /t 0
·         Restart: shutdown /r /t 0
·         Restart Into Startup Options: shutdown /r /o
create-shut-down-shortcut-on-windows-8
recimg – Create Custom Recovery Images
The Refresh Your PC feature on Windows 8 allows you to restore your computer’s system state to its original state — either from a clean Windows install or as the computer came from its manufacturer. You can create your own custom recovery images, but this feature is hidden — you have to do it with the recimg command from a command line. This allows you to removemanufacturer-installed bloatware or add your favorite desktop programs to your recovery image.
For more information about using recimg, read our overview of everything you need to know about creating and using custom recovery images on Windows 8.
http://cdn5.howtogeek.com/wp-content/uploads/2012/04/image310.png
wbadmin start backup – Create System Recovery Images
Windows 8.1 removes the Windows 7 backup interface, which allowed you to create system backup images. These system images contain a complete snapshot of every single file on the system, so they’re different from Windows 8’s recovery images.
While the graphical interface has been removed, system administrators and geeks can still create system image backups by running the wbadmin start backup cmdlet in a PowerShell window. Unlike all the other commands here, this command-line tool must be run from within PowerShell, not the Command Prompt.
http://cdn5.howtogeek.com/wp-content/uploads/2013/07/xcreate-system-backup-image-from-powershell.png.pagespeed.ic.RZkILtAUAh.png
sfc /scannow – Scan System Files for Problems
Windows includes a system file checker tool that scans its system files and looks for problems. If system files are missing or corrupted, the system file checker will repair them. This may fix problems with some Windows systems.
To use this tool, open a Command Prompt window as Administrator and run the sfc /scannowcommand.
sfc-scannow
telnet – Connect to Telnet Servers
The telnet client isn’t installed by default. You’ll have to install it from the Control Panel. Once installed, you can use the telnet command to connect to telnet servers without installing any third-party software.
You should avoid using telnet if you can help it, but if you’re connected directly to a device and it requires that you use telnet to set something up — well, that’s what you have to do.
install-windows-telnet-client
cipher – Permanently Delete and Overwrite a Directory
The cipher command is mostly used for managing encryption, but it also has an option that will write garbage data to a drive, clearing its free space and ensuring no deleted file can be recovered. Deleted files normally stick around on disk unless you’re using a solid state drive. The cipher command effectively allows you to “wipe” a drive without installing any third-party tools.
To use the command, specify the drive you want to wipe like so:
ciper /w:C:\
cipher wipe drive
netstat -an – List Network Connections and Ports
The netstat command is particularly useful, displaying all sorts of network statistics when used with its various options. One of the most interesting variants of netstat is netstat -an, which will display a list of all open network connections on their computer, along with the port they’re using and the foreign IP address they’re connected to.
netstat-show-connectionsk Connecvity

Important:

Before proceeding with troubleshooting, please check the Steam Server Status page to ensure the issue which you are encountering is not related to system-wide downtime. (If you encounter any timeout errors when attempting to access Steam sites, it is very likely that there is a system-wide issue and Steam will not be accessible until the issue is resolved)
 sues
Please follow the steps below to diagnose network connectivity issues within Steam:
1.    Test Your Router trying anything else:
Try bypassing your router by connecting your computer directly to your modem.
If the issue disappears after bypassing your router, please refer to the Using a Router with Steam topic for instructions on configuring your router.
Note: running your router in DMZ mode is not supported by Steam and may result in connection issues.
Additionally, wireless connections are not recommended for online gaming.  To ensure reliability, make sure you are using a wired connection to the internet while playing online.
2.    Troubleshoot all Firewalls
See the Using a Firewall with Steam topic for instructions to properly configure your firewall for Steam.
Note: If you are installing Steam for the first time or Steam has recently been updated, a firewall may be preventing Steam from connecting to the Steam Network - even if Steam worked correctly before the update was applied.
3.    Disable Background Applications
Review the Programs Which May Interfere With Steam and reconfigure, disable or uninstall any programs which may be preventing Steam and Valve games from connecting.
4.    Viruses, Trojans, Adware and Spyware
5.    Power Cycle Your Network Hardware
If the issue persists, unplug your modem and router, wait a few seconds, then plug them back in. Sometimes, these devices simply need to be refreshed.
6.    Try Launching Steam using TCP
Start Steam with the "-tcp" launch option.  Please see the Setting Steam Launch Optionstopic for instructions.
  

Required Ports for Steam

All required ports to run the Steam application are listed here.  It is possible that other games available on Steam will require further ports to be available.

Note:

Many university networks and proxies block required ports for Steam operation - please consult your network administrator to ensure the required ports are open if you are using a university network or a proxy. Ports required for Steam can not be re-mapped to HTTP or reconfigured to a custom port range.
If you notice that your Steam connection only has issues during certain hours of the day (usually in the evenings between 5pm and 11pm), it is probable that your ISP is blocking or "shaping" your connection.  Please test your connection at other hours of the day and contact your ISP directly if you believe this is causing the connection issue.
There are several ISPs which block ports required for the proper operation of Steam and Steam games:
§  012.net (Steam traffic blocked)
§  Bluewin (Firewall blocks Steam from provider side - must be disabled through provider's service portal)
§  Dutch Telecom (Steam traffic blocked)
§  ISPFree (Steam traffic blocked)
§  Micronet Broadband (Steam traffic blocked)
There are connection issues with certain ISPs that can be avoided depending on what type of cable/DSL modem and router you have.
Please follow the guide for Client dropped by ser



No comments