Layers of the OSI model:
Physical
Data
Network
Transport
Session
Presentation
Application
Ports:
SMTP 25
LDAP 389
POP3 110
IMAP 143
RDP 3389
Class Ranges:
A 1 -126
B 128 -191
C 192 -223
D 224 -239
E 240 -255
Purpose of:
DNS -Maps URL to IP
DHCP - Reservation system for IP
Can you write SQL queries?
-Answer is up to you
RAID 0 - Also known as Stripe Set. Data is split evenly across 2 or more disks without Parity Information
RAID 1 -Mirroring
Interviewer: What is a default Route?
-Well a default route is the route that a packet will take when no other routes are specified in the Routers route table.
Describe the 7 layers of the
OSI model
OSI model
Physical - The physical layer consists of the basic networking hardware transmission technologies of a network.
Data Link - MAC responsible for media access control, flow control and error checking
Network - (IP) The network layer is responsible for packet forwarding including routing through intermediate routers
Transport - (TCP/UDP) the Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data flow controls
Session - This layer establishes, manages and terminates connections between applications.
Presentation - This layer formats and encrypts data to be sent across a network. Works by transforming data into a format that can be accepted by the Application Layer.
Application This layer supports application and end-user processes. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.
Session - This layer establishes, manages and terminates connections between applications.
Presentation - This layer formats and encrypts data to be sent across a network. Works by transforming data into a format that can be accepted by the Application Layer.
Application This layer supports application and end-user processes. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.
Explain what an OSPF area.
- Open Shortest Path First (OSPF) is a link-state routing protocol for Internet Protocol (IP) networks.
-An
OSPF network may be structured, or subdivided, into routing areas to
simplify administration and optimize traffic and resource utilization.
Explain what happens when a device comes onto the network and requests a DHCP lease
-The
clients request configuration settings using the DHCP protocol such as
an IP address, a default route and one or more DNS server addresses.
Once the client implements these settings, the host is able to
communicate on that internet. DHCP provide IP address automatically.
Describe IP Sec
-Internet
Protocol Security = IPSec is a technology protocol suite for securing
Internet Protocol (IP) communications by authenticatingand/or encrypting
each IP packet of a communication session.
Describe IKE phase 1 and phase 2
-Internet
Key Exchange (IKE and IKEv2) Is the key to setup a Security Association
(SA) which is a shared security attribute between two network entities
to support secure communication, such as cryptographic alogorithm and
mode, traffic encryption key, and parameters for the network data to be
passed over the connection.
Explain what a VLAN is
-Network
architects set up VLANs to provide the segmentation services
traditionally provided only by routers in LAN configurations.
-VLANs address issues such as scalability, security, and network management
Explain a trunk port
-Trunks
are used to interconnect switches to form networks, and to interconnect
local area networks (LANs) to form wide area networks (WANs) or virtual
LANs (VLANs).
-These ports are capable of carrying traffic for any and ALL VLANs accessible by a switch
Explain an access port
-In
contrast to a trunk port which carries traffic to all VLANs an access
port carries traffic to and from the specific VLAN assigned to it
Explain what a spanning tree protocol is
-So
the Spanning Tree Protocol (STP) is a network protocol that ensures a
loop-freetopology for any bridged Ethernet local area network.
What is the root bridge?
-The
root bridge of the spanning tree is the bridge with the smallest
(lowest) bridge ID. Determined by the Bridge ID and the MAC address
Describe how a switch determines how to send a packet to its destination
-Well
a switch which exists at Layer 2 uses the media access control address
(MAC address) from the host's network interface cards (NICs) to decide
where to forward frames
No comments :
Post a Comment
Please Write Your Comments Here....