Networking Interview Question With Answer
Networking Interview Question With Answer
25. When were osi model developed and why its standard called 802.xx and so on?
Osi model was developed in february1980 that why these also known as 802.xx standard (notice
80 means ==> 1980, 2means ==> february)
Define network?
A network is a collection of computers, servers, mainframes, network devices, peripherals, or
other devices connected to one another allowing for data to be shared and used. A great example
of a network is the internet, connecting millions of people all over the world together.
What is a link?
The link is the physical and logical network component used to interconnect hosts or nodes in the
network and a link protocol is a suite of methods and standards that operate only between
adjacent network nodes of a local area network segment or a wide area network connection.
What is a node?
A node is a basic unit used in computer science. Nodes are devices or data points on a larger
network. Devices such as a personal computer, cell phone, or printer are nodes. When defining
nodes on the internet, a node is anything that has an ip address.
What is a gateway?
A gateway is a network point that acts as an entrance to another network. On the internet, a node
or stopping point can be either a gateway node or a host (end-point) node. Both the computers of
internet users and the computers that serve pages to users are host nodes.
What is ospf?
Open shortest path first (ospf) is a routing protocol for internet protocol (ip) networks. It uses a
link state routing (lsr) algorithm and falls into the group of interior routing protocols, operating
within a single autonomous system (as). It is defined as ospf version 2 in rfc 2328 (1998) for
ipv4.
What is routing?
Routing is the process of selecting best paths in a network. [a] routing is performed for many
kinds of networks, including the public switched telephone network (circuit switching),
electronic data networks (such as the internet), and transportation networks.
What is a protocol?
The tcp/ip internet protocols, a common example, consist of: transmission control protocol (tcp),
which uses a set of rules to exchange messages with other internet points at the information
packet level. Internet protocol (ip), which uses a set of rules to send and receive messages at the
internet address level.
Switch: In networks, a device that filters and forwards packets between lan segments. Switches
operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the osi
reference model and therefore support any packet protocol. LAN's that use switches to join
segments are called switched LAN's or, in the case of ethernet networks, switched ethernet
LAN's.
Hub: A common connection point for devices in a network. Hubs are commonly used to
connect segments of alan. A hub contains multiple ports. When a packet arrives at one port, it is
copied to the other ports so that all segments of the lan can see all packets.
What is checksum?
A checksum is a count of the number of bits in a transmission unit that is included with the unit
so that the receiver can check to see whether the same number of bits arrived. If the counts
match, it's assumed that the complete transmission was received. Both tcpand udp
communication layers provide a checksum count and verification as one of their services.
What is redundancy?
Redundancy is a system design in which a component is duplicated so if it fails there will be a
backup. Redundancy has a negative connotation when the duplication is unnecessary or is simply
the result of poor planning.
What are the criteria necessary for an effective and efficient network?
Criteria necessary for an effective and efficient network. It can be measured in many ways,
including transmit time and response time. It is measured by frequency of failure, the time it
takes a link to recover from a failure, and the network’s robustness.
Tracert : 1)you can find this utility in windows based operating systems as well as servers. 2) it
rely over icmp type 8(echo packet) & type 0(echo request).
What is round trip time?
In telecommunications, the round-trip delay time (rtd) or round-trip time (rtt) is the length of
time it takes for a signal to be sent plus the length of time it takes for an acknowledgment of that
signal to be received. This time delay therefore consists of the propagation times between the
two points of a signal.
Define the terms unicasting, multicasting and broadcasting and any casting?
Unicast: A term used in communication to describe a piece of information to send from one
point to another. There are only sender and receiver. All lans support unicast transfer mode and
most applications that employ tcp transport protocol uses unicast messaging.
Broadcast: a term used for describing communication that is sent a piece of information from
one point to all other points. There is one sender and multiple receivers. All lans support
broadcast transmission.
Multicast: a term described in communicating a piece of information sent from one or more
points to a set of other points. The senders and receivers are one or more.
Anycast is a network addressing and routing methodology in which datagrams from a single
sender are routed to the topologically nearest node in a group of potential receivers, though it
may be sent to several nodes, all identified by the same destination address.
What are the differences between static ip addressing and dynamic ip addressing?
Difference between static and dynamic ips. When a device is assigned a static ip address, it does
not change. The device always has the same ip address. Most devices use dynamic ip addresses,
which are assigned by the network when they connect.
What are the different types of passwords used in securing a cisco router?
The five main passwords of the cisco ios are: Console, aux , vty, enable password, enable
secret
Rip stands for routing information protocol and eigrp stands for interior gateway routing
protocol.
The major difference between both is that eigrp is cisco propriety that is it can be implemented
only on cisco routers.while this is not the case with rip versions (rip,rip2) they are open
standards.
1.AD value :that is administrative distance which determines the trust worthiness of the routing
protocol.static routing has the highest that is 1. For rip it is 120 for eigrp it is 90 internal / 170
external.
2.RIP uses bellmen ford algorithm to calculate the path while eigrp use dual method to calculate
the routes paths.
3.Maximum hop count for rip is 15 that is after 15 counts the packet is dropped while that of
eigrp is 100 by default and upto 255 by configuration.
4.There is difference between their refresh timers.
5.There is difference between the ip address which they use to send periodic updates over the
network.
6.EIGRP uses an autonomous number to determine which domain it belongs to which is not the
case with rip protocols.
7.RIP is mostly used for smaller networks which eigrp is used for larger networks.
8.RIP is a distance vector routing protocol while eigrp is an link state routing protocol.
9. RIP is classful protocol where as eigrp is classless protocol .
10.In rip full routing table exchanged, but in eigrp missing routes are exchanged .
11. For rip protocol, hello timers every 30 seconds but in eigrp hello timer every 5 seconds .
12. Rip sends full update whenever network change occurs whereas eigrp sends triggered
updates.
What is 100basefx?
100base-fx is a version of fast ethernet over optical fiber. It uses a 1300 nm near-infrared (nir)
light wavelength transmitted via two strands of optical fiber, one for receive (rx) and the other
for transmit (tx).
Differentiate Simplex, full-duplex and half-duplex?
Simplex: simplex is one direction. A good example would be your keyboard to your cpu. The
cpu never needs to send characters to the keyboard but the keyboard always send characters to
the cpu. In many cases, computers almost always send characters to printers, but printers
usually never send characters to computers (there are exceptions, some printers do talk
back). Simplex requires only one lane (in the case of serial).
Half-duplex: half-duplex data transmission means that data can be transmitted in both
directions on a signal carrier, but not at the same time. For example, on a local area network
using a technology that has half-duplex transmission, one workstation can send data on the line
and then immediately receive data on the line from the same direction in which data was just
transmitted.
Full-duplex: full-duplex data transmission means that data can be transmitted in both directions
on a signal carrier at the same time. For example, on a local area network with a technology
that has full-duplex transmission, one workstation can be sending data on the line while another
workstation is receiving data. A full-duplex link can only connect two devices, so many such
links are required if multiple devices are to be connected together.
What is the port no of smtp and pop3?and In which layer term “frames” is used?
Data link layer.
Which layer provides logical addressing that routers will use for path determination?
Network layer.
Which layer specifies voltage, wire speed, and pinout cables and moves bits between
devices?
Physical layer.
Which layer combines bits into bytes and bytes into frames, uses mac addressing, and
provide error detection?
Data link layer.
Which layer is responsible for keeping the data from different applications separate on the
network?
The session layer creates sessions between different hosts’ applications.
Which layer provides the physical transmission of the data and handless error notification,
network topology, and flow control?
Data link layer.
Which layer manages device addressing, tracks the location of devices on the network, and
determines the best way to move data?
Network layer.
Mac address works on which layer? What are the differences of mac sublayer and llc
sublayer?
Data link layer.
Which layer is responsible for converting data packets from the data link layer into
electrical signals?
Physical layer.
At which layer is routing implemented, enabling connections and path selection between
two end systems. ?
Network layer.
Which layer defines how data is formatted, presented, encoded, and converted for use on
the network?
Presentation layer .
Which layer is responsible for creating, managing and terminating sessions between
applications?
The session layer sets up, maintains, and terminates sessions between applications.
What is ipsec?
Ipsec is an internet engineering task force (ietf) standard suite of protocols that provides data
authentication, integrity, and confidentiality as data is transferred between communication points
across ip networks. Ipsec provides data security at the ip packet level.
224.0.0.9
How do you stop rip updates from propagating out an interface on a router?
Passive interfaces
What is the administrative distance of rip?
120
How do we configure rip? Specify the commands.
Router rip
If a rip v2 router advertises its route, would it be received by all the devices on the
network?
Rip v2 is multicast. So the route advertisement would be received only by devices which have
rip v2 enabled. If the advertisement was rip v1, then it would be received by all devices on the
network as rip v1 is broadcast.
Which transport layer protocol does rip use and the associated port number?
Udp – port 520
If a static route and a rip learnt route are available on a router which entry would be
chosen by the router to forward the packet?
Static route would be chosen since it has lower administrative distance than rip.
What is the major benefit of dynamic routing protocol like rip over static route?
In a static route, the route entries have to be manually configured on the router. Where as in a dynamic
routing protocol like rip, routes are learnt automatically.
What is eigrp?
Enhanced interior gateway routing protocol (eigrp) is an advanced distance-vector routing
protocol that is used on a computer network for automating routing decisions and configuration.
The protocol was designed by cisco systems as a proprietary protocol, available only on cisco
routers.
Routes will become stuck-in-active (sia) when a router sends out a query Packet, but does not
receive a reply packet within three minutes. In other Words, a route will become sia if eigrp fails
to re-converge. The local Router will clear the neighbor adjacency with any router(s) that has
failed to Reply, and will place all routes from that neighbor(s) in an active state.
1.Bandwidth (k1) 2. Load (k2) 3. Delay (k3) 4.Reliability (k4) 5.Mtu (k5).
What is successor?
A feasible successor is a path whose reported distance is less than the feasible distance, and it is
considered a backup route. Eigrp will keep up to six feasiblesuccessors in the topology table.
Only the one with the best metric (the successor) is placed in the routing table.
How can i send a default route to the stub router from the hub?
Do this under the outbound interface on the hub router with the ip summary-address eigrp x
0.0.0.0 0.0.0.0command. This command suppresses all the more specific routes and only sends
the summary route. In the case of the 0.0.0.0 0.0.0.0, it means it suppresses everything, and the
only route that is in the outbound update is 0.0.0.0/0. One drawback to this method is that eigrp
installs a 0.0.0.0/0 route to null0 is the local routing table with an admin distance of 5.
What are area types? Why there are different area concepts?
-Standard areas can contain lsas of type 1, 2, 3, 4, and 5, and may contain an asbr. The backbone
is considered a standard area.
-Stub areas can contain type 1, 2, and 3 lsas. A default route is substituted for external routes.
-Totally stubby areas can only contain type 1 and 2 lsas, and a single type 3 lsa. The type 3 lsa
describes a default route, substituted for all external and inter-area routes.
- Not-so-stubby areas implement stub or totally stubby functionality yet contain an asbr. Type 7
lsas generated by the asbr are converted to type 5 by abrs to be flooded to the rest of the ospf
domain.
What is the main importance of stub network? Why it is been developed in ospf?
A stub network is a somewhat casual term describing a computer network, or part of an
internetwork, with no knowledge of other networks, that will typically send much or all of its
non-local traffic out via a single path, with the network aware only of a default route to non-local
destinations.
Lsa type 2 (network lsa) :Generated by designated router (dr) for multiaccess networks and
describe the routers that are connected to that segment. They are sent inside the area to which the
network segment belong. The link id is the interface ip address of the designated router which
describe that particular segment.
Lsa type 3 (summary lsa) :Type 3 lsas are generated by area border routers (abrs). In type 3 lsas
are advertised networks from an area to the rest of the areas in as. Advertised networks in type 4
lsa can be summarized or not. The linkstate id used by this lsa is the network number advertised.
Lsa type 4 (summary lsa):- Generated by abrs, this type os lsa contain routes to asbrs. Link id
used is router id of the asbr described. Are not flooded in stub areas.
Lsa type 5 (external lsa) :-Autonomous system external lsas are generated by asbrs and contain
routes to networks that are external to current as. Link-state id is network number advertised in
lsa. Type 5 lsas are not flooded inside any stub areas.
Lsa type 6 (multicast lsa) :This type of lsa is used for multicast applications.
Lsa type 7 (nssa external lsa):Type 7 lsa allow injection of external routes throug not-so-
stubby-areas (nssa). Generally external routes are advertised by type 5 lsa but they are not
allowed inside any stub area. That’s why type 7 lsa is used, to trick ospf. Type 7 lsa is generated
by nssa asbr and is translated into type 5 lsa as it leaves the area by nssa abr, which is then
propagated throughout the network as type 5 lsa.
Lsa type 8 (external attributes lsa for border gateway protocol (bgp): Used to work with
bgp.
What are the states used in ospf when forming neighbor ship?
2-way. The 2-way state indicates that the local router has received a hello packet with its own
router id in the neighbor field. Thus, bidirectional communication has been established and the
peers are now ospf neighbors.
2. The database description packet: at the time of adjacency is being initialized, these packets are
exchanged. These packets describe topological database contents. The database may be
described by using multiple packets. A pollresponse procedure is used for the description of
multiple packets usage. Among the routers, one is designated to be master, and the other a slave.
The database description packets are sent by the slave after sending the database description
packets by the master.
3. The link state request packet: a router may find the parts of its topological database are out of
date, after database description package exchange with a neighboring router. The link state
request packet is utilized for requesting the pieces of the neighbor’s database which are more up
to date. There may be a need to utilize multiple link state request packets.
4. The link state update packets: the flooding of link state advertisements is implemented by
these packets. A collection of link state advertisements are carried by each link statement update
packet, one hop further from its origin. A packed may be included by several link state
advertisements.
5. The link state acknowledge packets: the reliability of flooding link state advertisement is
made by explicitly acknowledging flooded advertisements. The accomplishment of this
acknowledgement is done through the sending and receiving of link sate acknowledgement
packets. A single link state acknowledgement packet is used to acknowledge the multiple link
state advertisements.
What is the dr/bdr in ospf? How these are elected and in what scenario?
Dr/bdr election happens in shared multi access network to avoid full mesh scenario. In shared
environment, every ospf router will try to form neighbor ship with other router, so dr/bdr comes
in to action and act as single point of contact. Neighborship will only form with dr and backup
dr. Dr router will be the highest priority router and bdr will be second highest priority. If there is
a tie, then highest router-id will be used to make the decision. Router id is elected as the highest
numerical loopback ip or the highest physical active ip address or the interface ip which comes
up first.
What is the multicast ips used by ospf? What multicast ip does dr/bdr router and non-dr
use?
Ospf routers use 224.0.0.5 multicast ip address. However, in dr/bdr it uses 224.0.0.5 and
224.0.0.6. Dr/bdr will use 224.0.0.6 while replying to ospf routers in broadcast multi access
network.
What is the maximum number of ospf processes (vrf aware) on 7600/6500 platforms?
Cisco ios has a limit of 32 routing processes. Two of these are saved for static and directly
connected routes. The cisco 7600 router supports 28 ospf processes per vrf.
What is svi ?
A switched virtual interface (svi) is a vlan of switch ports represented by one interface to a
routing or bridging system. There is no physical interface for the vlan and the svi provides the
layer 3 processing for packets from all switch ports associated with the vlan.
What is dtp?
Dynamic trunking protocol is used to automatically establish trunks between capable ports
(insecure method).
What is a native vlan and what type of traffic will go through native vlan?
The native vlan is the only vlan which is not tagged in a trunk, in other words,native vlan frames
are transmitted unchanged. Per default the native vlan isvlan 1 but you can change that:
#show interface fa0/8 trunk. Port mode encapsulation status native vlan. Fa0/8 on 802.1q.
Spanning tree cannot use multiple links to the same destination. There is no load-sharing feature
with spanning tree. Any redundant link that is not as preferred is blocked (essentially shut down)
until the primary link goes down. Because the “best ports” are put into forwarding state and the
other ports are put into blocking state, there are no loops in the network. When a new switch is
introduced to the network, the algorithm and port states are recalculated to prevent a new loop.
What parameters can be tuned to influence the selection of a port as a root or designated
port?
-If a switch has multiple paths to reach the root bridge (root switch), it must select one path and
the associated port as the root port. Following are the different steps for selecting the root bridge
(switch).
- Spanning tree root port selection process in a non-root switch involves the following steps.
- Select the port connected to the path with the lowest accumulated spanning tree path cost to
theroot bridge (root switch) as the root port, when a non-root switch has multiple paths to reach
the root switch.
- If multiple paths are available to reach the root bridge (root switch) with the same
accumulatedspanning tree path cost in a non-root switch, select the port connected to the
neighbor switch which has the lowest switch id value as the root port.
- If all the multiple paths go through the same neighboring switch to reach the root bridge (root
switch), non-root switch will select the local port which receives the lowest port spanning tree
port priority value from neighbor switch as the root port.
- If the received spanning tree port priority value values are the same between the connecting
ports to reach the root bridge (root switch), non-root switch will select the port which receives
the lowest physical port number from neighbor switch as the root port.
Three types of bridge protocol data units (bpdus) are configuration bpdu (cbpdu), topology
change notification (tcn) bpdu and topology change notification acknowledgment (tca). The
basic purpose of the bridge protocol data units (bpdus) and the spanning tree algorithm (sta) is to
avoid layer 2 switching loops and broadcast storms.
What is the default bridge priority in a bridge id for all cisco switches?
Bridge id priority 32769 (priority 32768 sys-id-ext 1)
A designated port is the port on a local area network (lan) segment with the least spanning tree
path cost to the root bridge (root switch).there can be only one root port on a bridge (switch).
There may be multiple designated ports on a bridge (switch).All the ports on a root bridge (root
switch) are designated port and there is no root port on a root bridge (root switch).a root port can
never be a designated port.if one end of a local area network (lan) segment is a designated port,
other end is called as non designated port (marked as ndp), if it is not a root port. Non designated
port will be always in blocking state, to avoid layer 2 switching loops.
What is the difference between path cost and root path cost?
Spanning tree uses costs associated to ingress ports to calculate the best path to the root bridge.
The root path cost is the cumulative cost from the root to any given switch. Each port has a cost
associated to it. On a cisco switch, the port cost can be altered using .
If the priority value of the two switches are same, which switch would be elected as the root
bridge
Lowest mac address value
What is the destination mac address used by bridge protocol data units (bpdus)?
Bridge protocol data units (bpdus) are frames that contain information about the spanning tree
protocol (stp). Switches send bpdus using a unique mac addressfrom its origin port and a
multicast address as destination mac(01:80:c2:00:00:00, or 01:00:0c:cc:cc:cd for per vlan
spanning tree).
What are stp timers and explain different types of stp timers?
Important spanning tree protocol (stp) timers are hello timer, forward delay timer and max age
timer and their default values are listed below.
Hello timer The hello timer is the time interval between each bridge protocol data unit (bpdu)
that is sent on a port. Defaut spanning tree protocol (stp) hello timer is 2 seconds. You can adjust
spanning tree protocol (stp) hello timer to any value between 1 and 10 sec. Click the following
link to learn how to change the default spanning tree protocol (stp) hello timer.
Forward delay timer The forward delay timer is the time interval that is spent in the listening and
learning state. Default spanning tree protocol (stp) forward delay timer is 15 seconds. You can
adjust the spanning tree protocol (stp) forward delay timer to any value between 4 and 30
seconds.
Max age timer The max age timer controls the maximum length of time interval that a spanning
tree protocol (stp) switch port saves its configuration bridge protocol data unit (bpdu)
information. Default max age timer is 20 seconds. You can tune the spanning tree protocol (stp)
max age timer to any value between 6 and 40 sec.