0% found this document useful (0 votes)
286 views

Interview For Network Engineer

VLAN Trunking Protocol (VTP) allows for centralized management of VLAN configurations across multiple switches in a domain. When a VLAN is configured on one VTP server, it is distributed to all other switches in the domain, reducing administration. Switches can operate in server, client, or transparent mode with different capabilities for VLAN configuration and synchronization.

Uploaded by

Parul Garg
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
286 views

Interview For Network Engineer

VLAN Trunking Protocol (VTP) allows for centralized management of VLAN configurations across multiple switches in a domain. When a VLAN is configured on one VTP server, it is distributed to all other switches in the domain, reducing administration. Switches can operate in server, client, or transparent mode with different capabilities for VLAN configuration and synchronization.

Uploaded by

Parul Garg
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

VLAN Trunking Protocol (VTP) is a Cisco proprietary Layer 2 messaging protocol that manages the addition, deletion, and

renaming of Virtual Local Area Networks (VLAN) on a network-wide basis. Cisco's VLAN Trunk Protocol reduces administration in a switched network. When a new VLAN is configured on one VTP server, the VLAN is distributed through all switches in the domain. This reduces the need to configure the same VLAN everywhere. To do this, VTP carries VLAN information to all the switches in a VTP domain. VTP Modes Server In this VTP mode you can create, remove, and modify VLANs. You can also set other configuration options like the VTP version and also turn on/off VTP pruning for the entire VTP domain. VTP servers advertise their VLAN configuration to other switches in the same VTP domain and synchronize their VLAN configuration with other switches based on messages received over trunk links. VTP server is the default mode. The VLANs information are stored on NVRAM and they are not lost after a reboot. Client VTP clients behave the same way as VTP servers, but you cannot create, change, or delete VLANs on the local device. Remember that even in VTP client mode, a switch will store the last known VTP informationincluding the configuration revision number. Dont assume that a VTP client will start with a clean slate when it powers up. Transparent When you set the VTP mode to transparent, then the switches do not participate in VTP. A VTP transparent switch will not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received messages. VLANS can be created, changed or deleted when in transparent mode. In VTP version 2, transparent switches do forward VTP messages that they receive out their trunk ports.

What is Spanning Tree used for? Where two bridges are used to interconnect the same two computer network segments, spanning tree is a protocol that allows the bridges to exchange information so that only one of them will handle a given message that is being sent between two computers within the network. The spanning tree protocol prevents the condition known as a bridge loop. In a local area network (LAN) such as an Ethernet or Token Ring network, computers compete for the ability to use the shared telecommunications path at any given time. If too many computers try to send at the same time, the overall performance of the network can be affected, even to the point of bringing all traffic to a near halt. To make this possibility less likely, the local area network can be divided into two or more network segments with a device called a bridge connecting any two segments. Each message (called a frame) goes through the bridge before being sent to the intended destination. The bridge determines whether the message is for a destination within the same segment as the sender's or for the other segment, and forwards it accordingly. A bridge does nothing more than look at the destination address and, based on its understanding of the two segments (which computers are on which segments), forwards it on the right path (which means to the correct outgoing port). The benefit of network segmentation (and the bridge) is that the amount of competition for use of the network path is reduced by half (assuming each segment has the same number of computers) and the possibility of the network coming to a halt is significantly reduced.

What is CIDR(classless Internet domain Routing) CIDR Stands for classless internet domain routing. which can be used for reduce the wasting of ip address and nowadays we are facing the shortage of the IP address .

What proxy servers are useful? A proxy server, also known as a "proxy" or "application level gateway", is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as the Internet. Proxy servers provide increased performance and security. In some cases, they monitor employees' use of outside resources. A proxy server works by intercepting connections between sender and receiver. All incoming data enters through one port and is forwarded to the rest of the network via another port. By blocking direct access between two networks, proxy servers make it much more difficult for hackers to get internal addresses and details of a private network Proxy servers are useful for serving Internet pages, so for example if a user request the same page more than once they the proxy has cache of that page and serves your browser. Another thing is that the proxy can be used for security and in these case its between your browser and the WWW. Proxy Servers are useful in a variety of ways: 1. It maintains anonymity and mostly do not expose your identity. 2. It speeds up access to internet resources by caching the content. 3. It can block specific websites such as those containing malware thus improving security. 4. To do illegal activities. (This point is there because it is also an advantage, not for you and me but for crackers) RIP (Routing Information Protocols) 1] It is a DVRP 2] Open standard routing protocols 3] Class full routing Protocols --------- Limitation 4] Does not support VLSM --------- Limitation 5] AD = 120 6] Metric = Hop Count 7] Maximum hp count = 15 Routers. 8] Use broadcast add to send updates (255.255.255.255) --------- Limitation 9] Update time = 30 sec. 10] Invalid time = 180 sec. 11] Hold down time = 180 sec. 12] Flash out time = 240 sec. 13] By default does load balancing on equal cost paths. RIP V2(Routing Information Protocols version 2) 1. DVRP (Distance Vector Routing Protocol) 2. Classless routing Protocol 3. Understanding Subnet mask 4. Support VLSM 5. AD = 120 6. Metric = Hop Count 7. Maximum Hop Count 15 8. Use Broadcast add.(224.0.0.9) to send update 9. Summersation cannot be disable

EIGRP (Enhanced Interior Gateway Routing Protocol) 1] It is a Hybrid routing Protocol 2] It is a Cisco property 3] It is a classless routing Protocol. 4] It will support VLSM 5] AD = 90 (Internal-) & 170 (External) 6] Metric = Composite Metric [Bandwidth, delay, reliability, laud & MTU (maximum transmission Unit)] 7] Maximum hop count = 100 by default 255 by configuration. 8] No periodic Update this is a Triggered update. 9] Use multicast add (224.0.0.10) to sent update 10] Hello packet interval = 5 seconds, Hello dead interval = 15 seconds 11] By default does load balancing on equal cost paths and we can apply load balancing on Unequal cost path 12] Does auto-summarization can be disable 13] Maintain 3 tables. Neighbor table sh ip eigrp neighbors ------------command Topology table sh ip eigrp topology ------------command Routing table - sh ip eigrp routing ------------command 14] Major components of EIGRP 1. PDN---- Protocol dependent module (EIGRP supports all the major routed protocol IP, IPX, APX) 2. RIP----- Reliable transport protocol It will send 16 unicast packets of query and reply to the neighbor witch will not ask Nodules the multi cast update. 3. DUAL-----Diffusing update algorithm a. selection of best path b. Maintaining the best path c. the back up route d. Support PDM/VLSM/Summarization. OSPF(Open shortest path first) 1] It is a LSRP (link state routing Protocol) 2] It is a open std routing protocol 3] It is a classless routing protocol 4] It is support VLSM 5] AD = 110 6] Metric = cost[ Formula-Cost=105/(B/W) 7] Maximum hop count Unlimited 8] No periodic update this is only trigged update 9] Use multicast add to send update (224.0.0.6) 10] Hello packet interval = 10 seconds, Hello dead interval = 40 seconds 11] By default does load balancing on equal cost paths 12] It support only manual summarization 13] Maintain 3 tables Neighbor Table Topology/Date Table Routing Table 14] Support the following types to networks I] Point to Pont network (Serial to Serial) II] Point to Multipoint (Serial to Serial) III] Broadcast Multi-access (Ethernet to Ethernet) IV] Non broadcast Multi-access (Frame to Relay) 15] OSPF works best in a Hierarchical Model

You might also like