Академический Документы
Профессиональный Документы
Культура Документы
What
would you do? There are lots of concerns that cause network delays, The
Administrator / Network Engineer must check the following simple tasks
before he / she proceed.
Get the user(s) to demonstrate the problem.
Determine how many other users are affected.
Ensure desktop hardware and configuration is OK.
Trace all connections (they may be on another subnet).
Commence some monitoring or diagnostics.
Determine problem (if there is one).
Check for the virus / spyware activity.
If everything seems OK, then try to restart the router / switch, same
time try to restart the system.
Name some of the ways of combining TCP/IP traffic and SNA traffic
over the same link.
DLSw (Data Link Switching)(aka RFC1434)
RFC1490 (frame relay carrier)
Serial Tunneling (STUN)
BAN or BNN (Boundary Access Node, Boundary Network Node)
What is Firewall?
A firewall is a secure and trusted machine that sits between a private
network and a public network. The firewall machine is configured with a set
of rules that determine which network traffic will be allowed to pass and
which will be blocked or refused. In some large organizations, you may even
find a firewall located inside their corporate network to segregate sensitive
areas of the organization from other employees. Many cases of computer
crime occur from within an organization, not just from outside.
What is UDP?
User Datagram Protocol or UDP is part of the Internet Protocol suite, using
which, programs running on different computers on a network can send short
messages known as Datagram’s to one another. UDP can be used in
networks where TCP is traditionally used, but unlike TCP, it does not
guarantee reliability or the right sequencing of data. Datagram’s may go
missing without notice, or arrive in a different order from the one in which
they were sent.
What is DHCP?
Dynamic Host Configuration Protocol (DHCP) is a network protocol that
enables a server to automatically assign an IP address to a computer from a
defined range of numbers configured for a given network.
What is a metric?
Metrics is a property of a route in computer networking; consisting of any
value used by routing algorithms to determine whether one route should
perform better than another (the route with the lowest metric is the
preferred route). The routing table stores only the best possible routes, while
link-state or topological databases may store all other information as well.
For example, Routing Information Protocol uses hopcount (number of hops)
to determine the best possible route.
where is the AD database held? What other files are related to AD?
AD Database is saved in %systemroot%/ntds.You can see other files also in
this folder. These are the main files controlling the AD structure
ntds.dit
edb.log
res1.log
res2.log
Edb.chk
What is an IP address?
An Internet Protocol (IP) address is a numerical label that is assigned to
devices participating in a computer network that uses the Internet Protocol
for communication between its nodes
What is ARP?
A subnetwork, or subnet, is a logically visible, distinctly addressed part of a
single Internet Protocol network.[1][2] The process of subnetting is the
division of a computer network into groups of computers that have a
common, designated IP address routing prefix
What is a subnet?
A subnet (short for "subnetwork") is an identifiably separate part of an
organization's network. Typically, a subnet may represent all the machines
at one geographic location, in one building, or on the same local area
network (LAN). Having an organization's network divided into subnets allows
it to be connected to the Internet with a single shared network address.
Without subnets, an organization could get multiple connections to the
Internet, one for each of its physically separate subnetworks, but this would
require an unnecessary use of the limited number of network numbers the
Internet has to assign. It would also require that Internet routing tables on
gateways outside the organization would need to know about and have to
manage routing that could and should be handled within an organization.
What is APIPA?
Short for Automatic Private IP Addressing, a feature of later Windows
operating systems. With APIPA, DHCP clients can automatically self-configure
an IP address and subnet mask when a DHCP server isn't available. When a
DHCP client boots up, it first looks for a DHCP server in order to obtain an IP
address and subnet mask. If the client is unable to find the information, it
uses APIPA to automatically configure itself with an IP address from a range
that has been reserved especially for Microsoft. The IP address range is
169.254.0.1 through 169.254.255.254. The client also configures itself with a
default class B subnet mask of 255.255.0.0. A client uses the self-configured
IP address until a DHCP server becomes available.
The APIPA service also checks regularly for the presence of a DHCP server
(every five minutes, according to Microsoft). If it detects a DHCP server on
the network, APIPA stops, and the DHCP server replaces the APIPA
networking addresses with dynamically assigned addresses.
APIPA is meant for non routed small business environments, usually less than
25 clients.
What is an RFC?
A Request for Comments (RFC) document defines a protocol or policy used
on the Internet. An RFC can be submitted by anyone. Eventually, if it gains
enough interest, it may evolve into an Internet Standard (see FAQ XXX).
Each RFC is designated by an RFC number. Once published, an RFC never
changes. Modifications to an original RFC are assigned a new RFC number.
What is CIDR?
Classless Inter-Domain Routing (CIDR) is a methodology of allocating IP
addresses and routing Internet Protocol packets.
You have the following Network ID: 192.115.103.64/27. What is the IP range
for your network?
It ranges from 192.115.103.64 - 192.115.103.96
But the usable address are from 192.115.103.64 -192.115.103.94
192.115.103.95 - it is the broadcast address
192.115.103.96 - will be the ip address of next range
we can use 30 hostess in this network
You have the following Network ID: 131.112.0.0. You need at least
500 hosts per network. How many networks can you create? What
subnet mask will you use?
Subnetmask is 255.255.252.0, we can create 4 subnet and atleast we can
connect 500host per network
What is DHCPINFORM?
DHCPInform is a DHCP message used by DHCP clients to obtain DHCP
options. While PPP remote access clients do not use DHCP to obtain IP
addresses for the remote access connection, Windows 2000 and Windows 98
remote access clients use the DHCPInform message to obtain DNS server IP
addresses, WINS server IP addresses, and a DNS domain name. The
DHCPInform message is sent after the IPCP negotiation is concluded. The
DHCPInform message received by the remote access server is then
forwarded to a DHCP server. The remote access server forwards DHCPInform
messages only if it has been configured with the DHCP Relay Agent.
Ubiquitous communications
Network OS extension
Binary large objects (BLOBs)
Global directories and Network yellow pages
Authentication and Authorization services
System management
Network time
Database and transaction services
Internet services
Object- oriented services
What is a TP Monitor?
There is no commonly accepted definition for a TP monitor. According to Jeri
Edwards' a TP Monitor is "an OS for transaction processing".
TP Monitor does mainly two things extremely well. They are Process
management and Transaction management?
They were originally introduced to run classes of applications that could
service hundreds and sometimes thousands of clients. TP Monitors provide
an OS - on top of existing OS - that connects in real time these thousands of
humans with a pool of shared server processes.
The middleware building block runs on both the client and server
sides of an application. It is broken into three categories:-
Transports stack
Network OS
Service-specific middleware.
GUI clients
OOUI clients
What are called Non-GUI clients, GUI Clients and OOUI Clients?
Non-GUI Client: These are applications, generate server requests with a
minimal amount of human interaction.
GUI Clients: These are applicatoins, where occassional requests to the server
result from a human interacting with a GUI
(Example: Windows 3.x, NT 3.5)
OOUI clients : These are applications, which are highly-iconic, object-oriented
user interface that provides seamless access to information in very visual
formats.
(Example: MAC OS, Windows 95, NT 4.0)
What is OLTP?
In the transaction server, the client component usually includes GUI and the
server components usually consists of SQL transactions against a database.
These applications are called OLTP (Online Transaction Processing) OLTP
Applications typically,
Receive a fixed set of inputs from remote clients. Perform multiple pre-
compiled SQL comments against a local database. Commit the work and
Return a fixed set of results.
What are the five major technologies that can be used to create
Client/Server applications?
Database Servers
TP Monitors
Groupware
Distributed Objects
Intranets.
What is Client/Server?
Clients and Servers are separate logical entities that work together over a
network to accomplish a task. Many systems with very different architectures
that are connected together are also called Client/Server.
What is region?
When hierarchical routing is used, the routers are divided into what we call
regions, with each router knowing all the details about how to route packets
to destinations within its own region, but knowing nothing about the internal
structure of other regions.
What is virtual channel?
Virtual channel is normally a connection from one source to one destination,
although multicast connections are also permitted. The other name for
virtual channel is virtual circuit.
What is Beaconing?
The process that allows a network to self-repair networks problems. The
stations on the network notify the other stations on the ring when they are
not receiving the transmissions. Beaconing is used in Token ring and FDDI
networks.
What is the minimum and maximum length of the header in the TCP
segment and IP datagram?
The header should have a minimum length of 20 bytes and can have a
maximum length of 60 bytes.
What is attenuation?
The degeneration of a signal over distance on a network cable is called
attenuation.
What are the data units at different layers of the TCP / IP protocol
suite?
The data unit created at the application layer is called a message, at the
transport layer the data unit created is called either a segment or an user
datagram, at the network layer the data unit created is called the datagram,
at the data link layer the datagram is encapsulated in to a frame and finally
transmitted as signals along the transmission media.
Guided Media: These are those that provide a conduit from one device to
another that include twisted-pair, coaxial cable and fiber-optic cable. A signal
traveling along any of these media is directed and is contained by the
physical limits of the medium. Twisted-pair and coaxial cable use metallic
that accept and transport signals in the form of electrical current. Optical
fiber is a glass or plastic cable that accepts and transports signals in the
form of light.
What is SAP?
Series of interface points that allow other computers to communicate with
the other layers of network protocol stack.
What is REX?
Request to Exit (REX) - A signal that informs the controller that someone has
requested to exit from a secure area.
What is redirector?
Redirector is software that intercepts file or prints I/O requests and translates
them into network requests. This comes under presentation layer.
What is OSPF?
It is an Internet routing protocol that scales well, can route traffic along
multiple paths, and uses knowledge of an Internet's topology to make
accurate routing decisions.
What is Kerberos?
It is an authentication service developed at the Massachusetts Institute of
Technology. Kerberos uses encryption to prevent intruders from discovering
passwords and gaining unauthorized access to files.
What is MAU?
In token Ring, hub is called Multistation Access Unit (MAU).
What is ICMP?
ICMP is Internet Control Message Protocol, a network layer protocol of the
TCP/IP suite used by hosts and gateways to send notification of datagram
problems back to the sender. It uses the echo test / reply to test whether a
destination is reachable and responding. It also handles both control and
error messages.
What is Brouter?
Hybrid devices that combine the features of both bridges and routers
What is RAID?
A method for providing fault tolerance by using multiple hard disk drives
What is cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic
cable
What is subnet?
A generic term for section of a large networks usually separated by a bridge
or router.
A gateway operates at the upper levels of the OSI model and translates
information between two completely different network architectures or data
formats.
What is DNS?
Domain Name System (DNS) is an Internet Engineering Task Force (IETF)
standard name service that allows your computer to register and resolve
domain names.
The DNS makes it possible to assign domain names to organizations
independent of the routing of the numerical IP address. In other words, DNS
is a system that translates domain names into IP addresses. This is
necessary because computers only make use of IP addresses yet we use only
human readable names since the names are easier to remember than IP
addresses.
The easiest way to remember the layers of the OSI model is to use the handy
mnemonic
"All People Seem To Need Data Processing":
Layer Name Mnemonic
7 Application All
6 Presentation People
5 Session Seem
4 Transport To
3 Network Need
2 Data Link Data
1 Physical Processing
What Is URI?
A URI (Uniform Resource Identifier) names both local and remote Internet
resources similar to URLs.
What Is TCP?
TCP (Transmission Control Protocol) is the main transport protocol utilized in
IP networks.
The TCP protocol exists on the Transport Layer of the OSI Model. The TCP
protocol is a connection-oriented protocol which provides end-to-end
reliability.
By connection-oriented, we mean that before two network nodes can
communicate using TCP, they must first complete a handshaking protocol to
create a connection.
When we say that TCP provides end-to-end reliability, we mean that TCP
includes mechanisms for error detection and error correction between the
source and the destination.
These properties of TCP are in contrast to UDP, which is connectionless and
unreliable. Higher layer protocols which utilize TCP include HTTP, SMTP,
NNTP, FTP, telnet, SSH, and LDAP.
0 1 2 3
01234567890123456789012345678901
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+
| Source Port | Destination Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+
| Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+
| Acknowledgment Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+
| Data | |U|A|P|R|S|F| |
| Offset| Reserved |R|C|S|S|Y|I| Window |
| | |G|K|H|T|N|N| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+
| Checksum | Urgent Pointer |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+
| Options | Padding |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+
| data |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+
What Is UDP?
User Datagram Protocol or UDP is part of the Internet Protocol suite, using
which, programs running on different computers on a network can send short
messages known as Datagrams to one another. UDP can be used in networks
where TCP is traditionally used, but unlike TCP, it does not guarantee
reliability or the right sequencing of data. Datagrams may go missing
without notice, or arrive in a different order from the one in which they were
sent.
What Is Malware?
Malware, short for malicious software, is software designed to infiltrate a
computer without the owner's informed consent. The expression is a general
term used by computer professionals to mean a variety of forms of hostile,
intrusive, or annoying software or program code.[1] The term "computer
virus" is sometimes used as a catch-all phrase to include all types of
malware, including true viruses.
An IPX address is a total of 80 bits. 32 bits is used for the network number
and 48 bits is used for the node number. In most cases the node number is
the Ethernet address. Since we do not participate in a global IPX network, the
network number is assigned at the campus level. The convention for IPX
network numbers on the Madison campus is that the IPX network number is
an IP address on the same network segment.
An Appletalk address is a total of 24 bits. 16 bits are used for the network
number and 8 bits for the node number. The node number is chosen
automatically at random from the node numbers that are not in use at the
time the node starts up, so the node number may vary across startups.
The network layer does not guarantee delivery of packets. Packets may be
dropped due to transmission errors, network congestion, an unknown
address, or other reasons.
What is IP Address Spoofing?
IP address spoofing means generating IP packets/ data with fake IP
addresses.
What is FSB? In personal computers, the front-side bus (FSB) is the bus
that carries data between the CPU and the Northbridge
What is SMP?
In computing, symmetric multiprocessing or SMP involves a multiprocessor
computer-architecture where two or more identical processors can connect
to a single shared main memory. Most common multiprocessor systems
today use SMP architecture. In case of multi-core processors, the SMP
architecture applies to the cores, treating them as separate processors
What is a UPS?
Can you configure two hard disks to use the Master setting on the
same PC?
What is SAS?
How would you create an answer file for Windows XP? How would
you create one for Windows Vista?
What is Sysprep?
When should you use each of the fallowing tools: System Restore,
LKGC and Recovery Console?
How can you reset user's passwords if you don't know his current
password?
You want to grant a user the right to perform backups – should you
add him to the administrators group?
What is MMC?
What is gpedit.msc?
How would you use the MMC to manage other servers on your
network?
Networking
What is a NIC?
What is multicast?
What is Broadcast?
Describe some of the settings that are added by TCP and by UDP to
the packet's header.
What will happen if you execute the following command: "arp –d *"?
What is ICMP?
When would you use the ping command with the "-t" switch?
What command-line tool would help you discover for which port
numbers your computer is listening?
What is CIDR?