CCNA Interview Questions and Answers
CCNA Interview Questions and Answers
Page |1
NETWORKER INTERVIEW |
Page |2
Preface
CCNA stands for Cisco Certified Network Associate. CCNA certification is an
associate-level ideal certification program for entry-level network engineers to
maximize their foundational networking knowledge. It is one of the most respected
and reputed certification in the networking industry. This EBook is ideal for
candidates who have completed or pursuing CCNA certification and intending to
go for interviews. This EBook will help you to prepare for interviews and to revise
your concepts which you have learned during your CCNA certification.
Copyright
Copyright © 2016. All rights reserved. No part of this book may be reproduced or
transmitted in any form or by any means, electronic or mechanical, including
photocopying, recording, or by any information storage and retrieval system,
without written permission from the publisher.
NETWORKER INTERVIEW |
Page |3
The publisher and the author make no representations or warranties with respect to
the accuracy or completeness of the contents of this work and specifically disclaim
all warranties, including without limitation warranties of fitness for a particular
purpose. The advice and strategies contained herein may not be suitable for every
situation. Neither the publisher nor the author shall be liable for damages arising
here from.
To Our Readers
Thank you for looking to Networker Interview for your CCNA interview
preparation needs. We at Networker Interview are proud of our reputation for
providing candidates with the knowledge needed to succeed in the highly
competitive interviews.
Website
For CCNA, CCNP, CCIE and more visit http://networkerinterview.net
NETWORKER INTERVIEW |
Page |4
What are the Functions of Transport, Network and Data Link Layer?
Transport layer
1. On the sending device, the Transport layer is responsible for breaking
the data into smaller packets, so that if any packet is lost during
transmission, it will be sent again. At the receiving device, the transport
layer will be responsible for opening all of the packets and reconstructing
the original message.
2. It provides end-to-end data transport services.
3. Establishes logical connection between the sending host and destination
host on an internetwork.
4. Transport layer also performs sequencing. Sequencing is a connection-
oriented service that places TCP segments in right order if they are
received out of order.
Network layer
1.The Network layer (layer 3) manages device addressing.
2. It tracks the location of devices on the network.
3. It determines the best way to move data between devices that are not
locally attached.
4. Routers functions at the Network layer to provide the routing services
within an internetwork.
NETWORKER INTERVIEW |
Page |5
Session Layer – The Session layer is responsible for setting up, managing,
and tearing down sessions between applications running on
communicating stations. Session layer also synchronizes dialogue between
the presentation layers of the two hosts and manages their data exchange.
What are the different protocols works at each of the layers of OSI
Model?
Physical Layer
ISDN (Integrated Services Digital Network), ADSL (Asymmetric Digital
Subscriber Line), Universal Serial Bus, Bluetooth, Controller Area Network,
Ethernet.
NETWORKER INTERVIEW |
Page |6
Network Layer
ICMP, IGMP, IPV4, IPV6, IPSEC, OSPF, EIGRP, RIP, BGP.
Transport Layer
TCP, UDP, GRE.
Session Layer
NFS (Network File System).
Presentation Layer
Data encryption/decryption, Data compression, Data Conversion Protocols
Application Layer
DNS, DHCP, FTP, HTTP, NTP, SNMP, SMP, TELNET, TFTP, SSH.
NETWORKER INTERVIEW |
Page |7
FTP 20, 21
TELNET 23
SMTP 25
DNS 53
67 (DHCP Server)
DHCP
68 (DHCP Client)
TFTP 69
HTTP 80
POP3 110
NTP 123
IMAP4 143
SNMP 161
BGP 179
HTTPS 443
RIP 520
NETWORKER INTERVIEW |
Page |8
ICMP 1
IGMP 2
IPV4 4
TCP 6
EGP 8
IGP 9
UDP 17
IPV6 41
GRE 47
EIGRP 88
OSPF 89
VRRP 112
NETWORKER INTERVIEW |
Page |9
What is a Frame?
The Data Link layer formats the message into pieces, each called a data
frame and adds a customized header containing the source and destination
hardware address.
What are the protocols that are included by each layer of TCP/IP
model?
Layers of TCP/IP
Protocols
model
NETWORKER INTERVIEW |
P a g e | 10
TCP UDP
Transmission Control Protocol User Datagram Protocol
It is reliable It is unreliable
It is sequenced (TCP packets are It is unsequenced
sent in a sequence and are received
in the same sequence.)
Lost packets are retransmitted No retransmission
Acknowledgement (received packets No Acknowledgement
are acknowledged)
TCP is heavy-weight. UDP is lightweight
The speed for TCP is slower than UDP is faster.
UDP.
Low overhead but higher than UDP Low overhead than TCP
TCP uses Windowing and Flow No Windowing or Flow Control
Control
TCP is used for application that UDP is used for application that
requires high reliability but not high requires faster operation but not
speed. reliability.
NETWORKER INTERVIEW |
P a g e | 11
What is Ethernet?
Ethernet is a data link and physical layer specification that allows all hosts
on a network to share the same bandwidth of a link. It is dominating
technology used in LAN networking for controlling access to a shared
network medium.
NETWORKER INTERVIEW |
P a g e | 12
Explain CSMA/CD?
Carrier Sense Multiple Access with Collision Detection (CSMA/CD), is a
protocol used to prevent collisions by enabling devices share the bandwidth
evenly without allowing two devices transmit at the same time on the
network.
What is ARP?
Address Resolution Protocol (ARP) is a network protocol, which is used to
map a network layer protocol address (IP Address) to a data link layer
hardware address (MAC Address). In short, ARP resolves IP address to
the corresponding MAC address of the device.
What is the Source & Destination IP address in ARP Request and ARP
Reply packet?
ARP Request
Source - Mac address of host sending the ARP request. (Senders MAC
address)
Destination - FF:FF:FF:FF:FF:FF (Broadcast)
ARP Reply
Source - Mac address of host replying for ARP Request.
Destination - Mac address of host which generated the ARP request initially
(unicast).
NETWORKER INTERVIEW |
P a g e | 13
NETWORKER INTERVIEW |
P a g e | 14
What are the different Classes of IP address and give the range of
each class?
There are five classes of IP addresses: -
Class A - 0 to 127 (0 & 127 cannot be used)
Class B - 128 to 191
Class C - 192 to 223
Class D - 224 to 239 (MULTICAST ADDRESSES)
Class E - 240 to 255 (RESEARCH & DEVELOPMENT)
NETWORKER INTERVIEW |
P a g e | 15
NETWORKER INTERVIEW |
P a g e | 16
Which two fields in the ICMP header is used to identify the intent of
ICMP message?
Type and Code.
What is IP datagram?
IP datagram can be used to describe a portion of IP data. Each IP
datagram has set of fields arranged in order. IP datagram has following
fields Version, Header length, Type of service, Total length, Checksum,
Flag, Protocol, Time to live, Identification, Source IP Address and
Destination IP Address, Padding, Options and Payload.
What is Fragmentation?
Fragmentation is a process of breaking the IP packets into smaller pieces
(fragments). Fragmentation is required when the datagram size is larger
than the MTU. Each fragment than becomes a datagram in itself and
transmitted independently from source. These datagrams are reassembled
by the destination.
NETWORKER INTERVIEW |
P a g e | 17
NETWORKER INTERVIEW |
P a g e | 18
What is TCP?
Transmission Control Protocol is a connection oriented protocol. This
means that before any data transfer can take place, certain parameters has
to be negotiated in order to establish the connection.
NETWORKER INTERVIEW |
P a g e | 19
What is ACL?
Access Control List is a packet filtering method that filters the IP packets
based on source and destination address. It is a set of rules and conditions
that permit or deny IP packets to exercise control over network traffic.
NETWORKER INTERVIEW |
P a g e | 20
Configuration
R1(config)# access-list 10 deny host 192.168.1.1
R1(config)# interface fa0/0
R1(config-if)# ip access-group 10 in
Configuration
R1(config)# access-list 110 deny tcp any host 192.168.1.1 eq 23
R1(config)# interface fa0/0
R1(config-if)# ip access-group 110 in
NETWORKER INTERVIEW |
P a g e | 21
In name ACL we can give sequence number which means we can insert a
new statement in middle of ACL.
Configuration
R1(config)# ip access-list extended CCNA
R1(config)# 15 permit tcp host 10.1.1.1 host 20.1.1.1 eq 23
R1(config)# exit
This will insert above statement at Line 15.
R1(config)# interface fa0/0
R1(config-if)# ip access-group ccna in
NETWORKER INTERVIEW |
P a g e | 22
NETWORKER INTERVIEW |
P a g e | 23
Key Information
Access lists only filters traffic that is going through the router. They
will not filter the traffic that has originated from the router.
If we will remove one line from an access list, entire access-list will be
removed.
Every Access list should have at least one permit statement or it will
deny all traffic.
What is NAT?
Network Address Translation translates the private addresses into public
addresses before packets are routed to public network. It allows a network
device such as router to translate addresses between the private and
public network.
NETWORKER INTERVIEW |
P a g e | 24
NETWORKER INTERVIEW |
P a g e | 25
255.255.255.0
R1(config)# ip nat inside source list 10 pool CCNA overload
R1(config)# interface fa0/0
R1(config-if)# ip nat inside (It identifies this interface as inside interface)
R1(config)# interface fa0/1
R1(config-if)# ip nat outside (It identifies this interface as outside
interface)
R1(config)# access-list 10 permit 192.168.1.0 0.0.0.255 (To specify which
private addresses needs to be translated)
What are Inside Local, Inside Global, Outside Local, Outside Global
address?
Inside local address is an IP address of host before translation.
Inside Global address is the public IP address of host after translation.
Outside Local address is the address of router interface connected to ISP.
Outside Global address is the address of outside destination (ultimate
destination).
What is Routing?
The function of routing is to route packets between networks that are not
locally attached.
What is a Router?
A Router is a networking device that performs routing i.e. it routes packets
between devices that are on different networks.
Router is a Layer 3 device.
What is a Protocol?
Protocols are set of rules that govern how devices communicate and share
information across a network. Examples of protocols include:
• IP – Internet Protocol.
• HTTP – Hyper Text Transfer Protocol.
• SMTP – Simple Mail Transfer Protocol.
NETWORKER INTERVIEW |
P a g e | 26
2. Privilege mode - In Privilege mode we can both view and make changes
to the configuration of a router. IOS prompt in Privilege Mode is Router#
Command to navigate to privilege mode from user exec mode:-
Router>enable
Router#
NETWORKER INTERVIEW |
P a g e | 27
NETWORKER INTERVIEW |
P a g e | 28
What is IGP?
An Interior Gateway Protocol refers to a routing protocol that handles
routing within a single autonomous system. Example: - RIP, IGRP, EIGRP,
and OSPF.
NETWORKER INTERVIEW |
P a g e | 29
What is EGP?
An Exterior Gateway Protocol refers to a routing protocol that handles
routing between different Autonomous Systems (AS). Example: - Border
Gateway Protocol (BGP).
NETWORKER INTERVIEW |
P a g e | 30
NETWORKER INTERVIEW |
P a g e | 31
What is Cost?
Cost is the inverse proportion of bandwidth of the links.
What is CDP?
Cisco Discovery Protocol is a CISCO proprietary protocol to help
administrators in collecting information about both locally attached and
remote devices.
What is RIP?
RIP is a Distance-Vector Routing protocol. It is a classful routing protocol
(classful routing protocols do not send subnet mask information in their
routing updates). It does not support VLSM (Variable Length Subnet
Masking). RIP uses Hop count as it’s metric to determine the best path to a
remote network and it supports maximum hop count of 15. Any route
farther than 15 hops away is considered as unreachable. It sends its
complete routing table out of all active interfaces every 30 seconds.
NETWORKER INTERVIEW |
P a g e | 32
RIPV1 RIPV2
NETWORKER INTERVIEW |
P a g e | 33
NETWORKER INTERVIEW |
P a g e | 34
What are the default values EIGRP Hello and Hold timer?
Hello Time - 5 seconds
Hold Time - 15 seconds
What is Successor?
Successor is the best path to reach to a destination in the topology table.
NETWORKER INTERVIEW |
P a g e | 35
NETWORKER INTERVIEW |
P a g e | 36
What is the need for dividing the autonomous system into various
areas?
We would divide the autonomous system into various areas to keep route
updates to a minimum to conserve resources and to keep problems from
propagating throughout the network.
NETWORKER INTERVIEW |
P a g e | 37
NETWORKER INTERVIEW |
P a g e | 38
NETWORKER INTERVIEW |
P a g e | 39
NETWORKER INTERVIEW |
P a g e | 40
Explain Switching?
The function of Switching is to switch data packets between devices on the
same network.
What is a Switch?
A Switch is a device which is used to connect multiple devices inside Local
Area Network (LAN). Unlike hubs, switch examines each packet and
processes it accordingly rather than simply repeating the signal to all ports.
Switch operates at layer 2 (Data Link Layer) of the OSI model.
NETWORKER INTERVIEW |
P a g e | 41
NETWORKER INTERVIEW |
P a g e | 42
What is a MAC address table and how a switch will build a MAC table?
Switch maintains an address table called MAC address Table or CAM
Table (Content Addressable Memory Table). When the switch receives a
frame, source MAC address is learned and recorded in the MAC address
table along with the port of arrival, VLAN and time stamp. The switch
dynamically builds the MAC address table by using the source MAC
address of the frames received. This table is then used by switch to
determine where to forward traffic on a LAN.
Explain Flooding?
If the destination MAC address is not found in the MAC address table, the
NETWORKER INTERVIEW |
P a g e | 43
switch forwards the frame out all of its ports except the port on which the
frame was received. This is known as flooding.
NETWORKER INTERVIEW |
P a g e | 44
unlike 802.1Q, it can be used only between Cisco switches. ISL works by
adding Header (26 Bytes) and Trailer (4 Bytes) with Original Ethernet
Frame.
What is a Native VLAN and What type of traffic will go through Native
VLAN?
The Trunk port is assigned a default VLAN ID for a VLAN that all untagged
traffic will travel on. This VLAN is called the Native VLAN and is always
VLAN 1 by default (but can be changed to any VLAN number). Any
untagged or tagged traffic with unassigned VLAN ID is assumed to belong
to the Native VLAN.
NETWORKER INTERVIEW |
P a g e | 45
What is VTP?
VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol used by
Cisco switches to exchange VLAN information. VTP is used to synchronize
VLAN information (Example:-VLAN ID or VLAN Name) with switches inside
the same VTP domain.
NETWORKER INTERVIEW |
P a g e | 46
NETWORKER INTERVIEW |
P a g e | 47
What are STP Timers and Explain different types of STP Timers?
STP uses three timers to make sure that a network converges properly
before a bridging loop can form.
Hello timer - The time interval between Configuration BPDUs sent by the
root bridge. It is 2 seconds by default.
Forward Delay timer - The time interval that a switch port spends in both
the Listening and Learning states. The default value is 15 seconds.
Max (Maximum) Age timer - Maximum length of time a BPDU can be
stored without receiving an update. It can also be define as a time interval
that a switch stores a BPDU before discarding it. It is 20 seconds by
default.
NETWORKER INTERVIEW |
P a g e | 48
Blocked port - A blocked port is the port that is used to prevent loops. It
only listens to BPDUs. Any port other than Root port & Designated port is a
Block Port.
What is BPDU?
All the switches exchange information to select Root Bridge as well as for
configuration of the network. This is done through Bridge Protocol Data
Unit (BPDU). Each switch compares the parameters in the BPDU that it
sends to one neighbor with the one that it receives from another neighbor.
NETWORKER INTERVIEW |
P a g e | 49
What is DHCP?
Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to
hosts dynamically. It allows easier administration and works well in small as
well as very large network environments. All types of hardware can be used
as a DHCP server including a Cisco router.
NETWORKER INTERVIEW |
P a g e | 50
NETWORKER INTERVIEW |
P a g e | 51
clients and servers if they are not on the same physical subnet. Relay
agents are used to forward requests and replies between clients and DHCP
servers when they are not on the same physical subnet.
DHCP relay agent can be configured using the ip helper-address
command.
What is SNMP?
The Simple Network Management Protocol (SNMP) enables a network
device to share information about itself and its activities. It uses the User
Datagram Protocol (UDP) as the transport protocol for passing data
between managers and agents.
NETWORKER INTERVIEW |
P a g e | 52
Explain MIB?
MIB is a hierarchical Database Structure for information on the device.
Example - Serial numbers are in a specific location, NIC Statistics etc.
Explain HSRP?
HSRP is a Cisco proprietary protocol that provides a redundant gateway for
hosts on the same subnet. It does not support load balancing i.e. only one
router is active and two or more routers just sit there in standby mode and
does not pass traffic unless active router failed.
NETWORKER INTERVIEW |
P a g e | 53
NETWORKER INTERVIEW |
P a g e | 54
Explain VRRP?
Virtual Router Redundancy Protocol (VRRP) is an open standard protocol
that provides a redundant gateway for hosts on a local subnet. It functions
similar to HSRP with slight differences. It does not support load balancing.
VRRP provides one redundant gateway address from a group of routers.
The active router in VRRP is called the master router and all other routers
are called the backup routers. The master router is the one with the highest
priority in the VRRP group.
Explain GLBP?
Gateway Load Balancing Protocol (GLBP) is a Cisco proprietary protocol
that provides a redundant gateway for hosts on a local subnet. It also
provides load balancing which is the advantage of GLBP over HSRP and
VRRP.
NETWORKER INTERVIEW |
P a g e | 55
NETWORKER INTERVIEW |
P a g e | 56
It shows all the EIGRP neighbors. The H field indicates the order in which the
neighbor was discovered. Address is the IP address of neighbor. Interface is the
interface on which neighborship has been established. The hold time is how long
this router will wait for a Hello packet to arrive from a specific neighbor. The
uptime indicates how long the neighborship has been established.
NETWORKER INTERVIEW |
P a g e | 57
It shows all the routes which are learned through EIGRP routing protocol. Notice
that EIGRP routes are indicated with D symbol and that the default AD of these
routes is 90.
It shows the successor and feasible successor. Each entry has two numbers in
parentheses. The first indicates the feasible distance, and the second indicates
advertised distance to a remote network.
NETWORKER INTERVIEW |
P a g e | 58
5. # Show ip route
It shows the routing table i.e. all the routes that are learned through different
routing protocols.
6. # Show ip protocols
This command shows all the routing protocols that are running on router. It also
shows the additional information about routing protocol like EIGRP autonomous
system number, EIGRP metric or K values etc.
NETWORKER INTERVIEW |
P a g e | 59
Show ip ospf interface brief command shows the interfaces on which OSPF is
enabled.
The show ip ospf neighbor command shows the information about all OSPF
neighbors and the adjacency state. If a DR or BDR exists, that information will also
be shown. It also shows the dead interval.
NETWORKER INTERVIEW |
P a g e | 60
This command shows the routes that are learned through OSPF routing protocol.
O symbol represents the routes that are learned through OSPF. IA represents the
OSPF inter area routes.
This command shows all types of LSA. It gives information about the number of
routers in the internetwork plus their router IDs.
NETWORKER INTERVIEW |
P a g e | 61
5. # Show ip protocols
This command provides information about all currently running protocols. For
OSPF, it shows the OSPF processes that are currently running on the router plus it
shows the ODPF router ID.
6. # Show ip route
Show ip route command shows the routing table of router. It shows all the routes
that are learned through different routing protocols. O represents the routes that
are learned through OSPF. C represents directly connected routes.
NETWORKER INTERVIEW |
P a g e | 62
7. # Show ip ospf
This command display OSPF information all OSPF processes running on the router.
Information includes the Router ID, area information, SPF statistics, and LSA timer
information.
NETWORKER INTERVIEW |
P a g e | 63
Scenario Questions
Answer
PC1 first compares its IP address and subnet mask to the IP address
of PC2 and decides that PC2 is in same subnet.
1. Before PC1 can communicate with PC2, PC1 needs to know the
hardware (MAC) address of the destination host (PC2).
2. Next, PC1 checks its ARP cache to see if the hardware address of
PC2 has already been resolved and is present in its ARP cache.
NETWORKER INTERVIEW |
P a g e | 64
NETWORKER INTERVIEW |
P a g e | 65
Answer
NETWORKER INTERVIEW |
P a g e | 66
NETWORKER INTERVIEW |
P a g e | 67
NETWORKER INTERVIEW |
P a g e | 68
13. When PC2 receives this ARP request, first it records the MAC
address of router’s e1 interface in its ARP table.
14. After updating the ARP cache, PC2 will respond with ARP reply. ARP
reply is not a broadcast frame; it is a unicast frame. In ARP Reply,
source IP address will be 192.168.2.1, destination IP address will be
192.168.2.10, source Mac address will PC2’s Mac address,
destination Mac address will be router’s e1 interface MAC address.
15. On receiving the ARP reply packet, router will record the MAC
address of PC2 in its ARP table.
16. Than router will make the IP header with source IP 192.168.1.1 and
destination IP 192.168.2.1. Router encapsulates this IP header within
Ethernet frame with source MAC address as router’s MAC address
and destination MAC address as PC2’s MAC address.
17. Router will send this packet to PC2.
18. Now PC2 on receiving the ICMP echo request packet, will prepare to
send the echo reply to PC1.
19. PC2 knows that PC1 is on different subnet. Therefore to
communicate with PC1, it needs to send this packet to its default
gateway i.e. router.
20. PC2 already have the MAC address of router’s e1 interface resolved
in its ARP table.
21. PC2 will now make the IP header with source IP 192.168.2.1 and
destination IP 192.168.1.1. PC2 encapsulates this IP header within
Ethernet frame with source MAC address as PC2’s MAC address and
destination MAC address as router’s e1 interface MAC address. PC2
will send this packet to its default gateway i.e. router.
22. On receiving this packet router will check destination MAC address
which is its MAC address, than it will check destination IP address
which is not router’s IP address. So, it will come to know that this
packet is not destined for it.
23. Now router will check its routing table for destination IP address.
Router has the route for destination address 192.168.1.1 in its routing
table. To send the packet to PC1, router needs to know the Mac
address of PC1. Router already has the MAC address of PC1
resolved in its ARP table.
NETWORKER INTERVIEW |
P a g e | 69
24. Than router will make the IP header with source IP 192.168.2.1 and
destination IP 192.168.1.1. Router encapsulates this IP header within
Ethernet frame with source MAC address as router’s eo interface
MAC address and destination MAC address as PC1’s MAC address.
25. Router will send this packet to PC1.
26. PC1 will receive this packet successfully.
Answer - No
1. When PC1 ping PC2, it will reach to R1. R1 will check its routing table
for the route to destination address (172.16.30.1). R1 does not have
NETWORKER INTERVIEW |
P a g e | 70
route to 172.16.30.1 in its routing table but due to the default route
towards R2, packet will be forwarded out on port fa0/1 towards R2.
2. On receiving this packet, R2 will check its routing table for the route to
172.16.30.1. R2 does not have route for destination address. Due to
default route on R2 towards R3, R2 will forward the packet to R3.
3. On receiving this packet, R3 will check its routing table for the route to
172.16.30.1. R3 have route for destination address in its routing table.
So, it will forward the ICMP packet on port fa0/1 to PC2.
4. Now PC2 on receiving the ICMP echo request will prepare to send the
echo reply to PC1.
5. PC2 will send the echo reply with the source IP 172.16.30.1 and
destination IP 192.168.1.1 which will reach to R3. On receiving this, R3
will check its routing table for a route to PC1. R3 does not have route to
PC1, but due to default route towards R2, packet will be forwarded out
on port fa0/0 to R2.
6. R2 will check its routing table for a route to PC1. R2 does not have route
to PC1, but due to default route towards R3, packet will be forwarded
out on port fa0/1 to R3.
7. R3 will receive this packet again and due to default route towards R2, it
will send this packet again to R2.
8. These steps will take place repeatedly and the packet will keep on
transmitting between R2 and R3. So, PC1 cannot ping successfully to
PC2 in above scenario.
When the TTL value of packet becomes zero, packet will be discarded.
NETWORKER INTERVIEW |
P a g e | 71
No, a router is not needed as both PC1 and PC2 are in the same
network.
Both the PC’s are in same network and can communicate directly. So,
an IP address is not needed for the communication between PC1 and
PC2.
NETWORKER INTERVIEW |
P a g e | 72
Switch will learn the MAC address of PC1 on its port Fa0/0 and MAC
address of PC2 on its port Fa0/1.
After PC1 communicates with PC2, there will be two MAC addresses
present in the MAC address table of the switch. Those two MAC
addresses will be of PC1 and PC2.
----------------------------------------------------------------------------------------------------
End of Document
If you have any suggestions, demands, feedback or if you have any problem with
the content of this book, please send a mail to [email protected].
Alternatively you can also comment on the website. We will surely work on it.
NETWORKER INTERVIEW |