Networking Questions
Networking Questions
2) Which IP address is used for loopback address and for what purpose?
127.0.0.1 is used for loopback address and also for local testing purposes.
Loopback means looping to our own systems, checking our own systems. It is used to
test whether TCP/IP stack is correctly installed.
Segment fragmentation
Numbering segmenting
Reliable and unreliable data delivery
Error detection & error correction
Flow control
Multi tasking
Windowing
When data is sent from a higher layer to a lower layer, each layer adds
some information to the original data; this is called as encapsulation.
The information added is called as header.
When data is sent from lower layer to higher layer, each layer will
remove information from the other layer. This is called as de-
encapsulation.
6) What are the major functions of routers?
A) Packet switching- all incoming data is switched to packets. It deals only with packets
(data with IP address)
B) Packet filtering- router sends and receives only packets. It is used in WAN, so all
incoming packets are filtered mainly for security.
D) Path selection- router is used to select the shortest and best path from source to
destination.
E) QoS- Quality of Service: QoS is the ability of the n/w to provide better or special
service to a set of users or applications.
9) Which registry key is used in normal mode of router and what registry key is
used to recover password?
1. IP addresses
2. Port numbers
3. iOS details
4. Router models
5. Switch models
6. Interface details
7. Device ID- hostname
Static, if one route is fixed for transmission it will stay fixed. If that link is down it cannot
connect and reach the destination even if there are alternate paths. Static route is used
for smaller networks. Symbol of static is s.
Static default– it sends data to unknown destination + specified n/w.ex in isp we can
have different connections. It uses 0.0.0.0 as the address for connection. Symbol of
static default is s*.
B) Dynamic route
It will choose the path by itself. Paths are found by the routing protocols.
Chooses the best or main path. If that path fails, it will find out the next alternate path.
Routing protocols like RIP/EIGRP/OSPF decide the paths.
Distance Vector Protocols send periodic updates every 30 secs or at some time interval
to the adjacent routers.In case if there is a link failure immediately,they inform to update
only after 30 secs. For example, RIP routing information protocol is a distance vector
protocol. Here distance indicates length between two routers and vector means in which
link direction the link is connected between them.
RIP: 120.
EIGRP: 90
OSPF: 110
Switch is a layer device and deals with frames (data with mac address).
You may also like Top 50 Cyber Security Interview Questions and Answers
(updated for 2018)
A VLAN is a logical and orderly alignment of network users and resources. These are
connected to ports on a switch which are administratively defined.
It is used to segment big networks and connect with routers for security purposes.
If there is no VLAN in switches, it can lead to a broadcast storm; as all ports will start
broadcasting. By default all ports in switches are in VLAN1 and they can send and
receive data within VLAN1. We can also create multiple VLANs and join them using
routers.
1. Access port
2. Trunk port
An Access port belongs to and carries the traffic of only one VLAN. We
can pass only single VLAN information. It is used to connect switch
ports with computers with minimum speed of 10Mbps.
A Trunk port is used for multiple connections between switch to routers
and switch to switch.
Server mode
Client mode
Transparent mode
Server mode- Full control over VLAN creations and modifications for
their domains.
Client mode- VTP clients do not allow the administrator to create,
change or delete any VLAN’s; instead they listen to the VTP’s
advertisements from other switches and modify their VLAN
configuration accordingly.
Transparent mode- VTP transparent mode switches will not participate
in VTP advertisements. It can create and delete VLAN’s that are local
only to itself. It will not propagate to other switches, and will not
advertise its own VLAN configuration.
STP (Spanning Tree Protocol) was created by digital equipment corporation. The new
version was created by IEEE which is 802.1d. STP is a bridge-to-bridge protocol used
to maintain a loop free n/w. Redundant links between switches are a good idea because
they help prevent complete network failures in the event one link stops working.
IPv6 contains 128 bits with 8 groups. It has n/w part and host part. Each
group has 16 bits.
So 8*16=128, it is in hexadecimal format (00ff). There are 32
hexadecimal numbers.
Each groups(4 hex digits) are separated by colon.
22) What are the multicast addresses used in IPv4 and IPv6 by different
protocols?
OSPF (IPv4)=224.0.0.5,224.0.0.6
OSPF(IPv6)=ff02::5/ff02::6
RIP (IPv4)=224.0.0.9
RIPng(IPv6)=ff02::9
EIGRP(IPv4)=224.0.0.10
EIGRP(IPv6)=ff02::10
EUI is Extended Unique Identifier 64. It is an interface ID, which is typically composed of mac addresses. We can
create a EUI-64 interface in a 48 bit mac address by inserting the “0xfffe” between the upper three bytes and lower
three bytes of the mac address.
Global unicast addresses are IPv6 public addresses, which can be used
globally as public addresses and are unique in nature; e.g. 2000::1,
3001::1
Any address which begins with hex 2 or 3.
25) What are the major differences between IPv4 and IPv6 addressing?
IPv4 address is 32 bit address and IPv6 is 128 bit address. In IPv4 only 232 addresses
are available which is 4.3 billion addresses out of which only 3.7 billion are actually
usable (many are reserved like class d,e and private). In IPv6 many millions of
addresses are there, it has 3.4*1038 addresses.
26) What is ACL and what are the major types available?
1. Standard
2. Extended
3. Named
Frame relay is a packet switching technology, it is used to join two or more routers with
a single interface. It is cheaper in cost and belongs to ISP.
LMI (Local Management Interface) is a signaling standard that is used between the
routers and frame relay switches. It allows for passing information about the operation
and status of the virtual circuit between the provider’s n/w and the DTE (Data Circuit-
terminating equipment).
32) How many collision domains and broadcast domains are available in router,
switch and hub?
Router- Each port has one separate collision domain and one separate broadcast
domain.
Switch- Each port has one separate collision domain but all ports have one single
broadcast domain.
Hub- All ports have one collision domain and one broadcast domain.
36) What is the subnet mask of the following IP addresses- 10.0.0.1, 160.1.1.1 and
200.2..2.2?
10.0.0.1- 255.0.0.0
160.1.1.1- 255.255.0.0
200.2.2.2- 255.255.255.0
37) What is broadcasting and which addresses are used for broadcasting?
38) What is multicasting and which addresses are used for multicasting?
In a Network if there are 10 Machines and if we send datas to more than one machine
but not all 10 Machines it is called Multicasting.For example sending datas to some 5
machines instead of all 10 Machines.Class D IP address is used for Multicasting
ranging from from 224.x.x.x to 239.x.x.x and the MAC address starting from
0100:5EXX:XXXX series where 0100:5E is the Organizationally Unique Identifier
Address.
Syslog server is a popular server used to store log information- port no: 514. It can be
configured easily. It can store a large volume of data. By default logging, messages are
sent to the router’s console port. It can also be sent to Syslog.
1. Authentication
2. Encryption
3. Message integrity
OSPF (Open Shortest Path First). It is an open standard routing protocol that has been
implemented by a wide range of network vendors, including Cisco. It supports multi
vendors like Cisco, Alcatel, Juniper, 3Com routers. Administrative distance of OSPF is
110, symbol is O.
1. Highest priority
2. Highest router ID
3. Highest IP address
BPDU Guard is used to protect the integrity of switch ports that have portfast enabled.
By default, BPDU guard is disabled; it is mainly used to shut the port in an error
condition.
1. Disabled
2. Blocking
3. Listening
4. Learning
5. Forwarding
EtherChannels can be negotiated between two switches to provide some dynamic link
configuration. Two protocols are available to negotiate bundled links in catalyst
switches- PAgP (Port Aggregation Protocol), LACP (Link Aggregation Control Protocol).
PAgP can be used only in Cisco devices but LACP can be used in other vendors also.
There are two modes of LACP: a) passive mode, and b) active mode.
53) What are the modes of PAGP?
VLSM (Variable Length Subnet Mask) is used to apply a different subnet mask to a
same class address.
IPv6 unicast-routing
It is used to find which routing protocol is trusted. We can have any number of routing
protocols. Each of them can have different paths, values ranging from 0 to 255.