Professional Documents
Culture Documents
Interview Questions - System Engineer
Interview Questions - System Engineer
Interview Questions - System Engineer
It’s a group of computing devices connected/ linked together in-order to allow them to share resources; there are two types of
networks
1- Peer to peer network (each computer in the network acts as a server and client at the same time)
2- Server based network, a server is a powerful computer that provides a services for the network, it provides a centralized
control over the network, and security
What is a topology?
Refers to the physical or the logical layout of the network, it defines the way of how different nodes are connected in the
network,
There are 2 types of network topologies, Physical or Logical, the major difference between both of them; that the physical
topology focusing on the physical layout, and how nodes physically are connected, however the logical focusing on the patterns
of data transfer between the network nodes.
The physical and the logical topologies of a network doesn’t necessarily have to be identical, however in general network
topologies can be categorized into like 5 types :
1- Bus topology : all the devices are connected sequentially to the same backbone
2- Star topology : all the nodes in the network are connected to a central device like a hub or switch
3- Ring topology : all the nodes are connected sequentially to the same backbone like in the bus, except; the ending
Point is connected to the starting point
4- Tree topology : the root node is connected to two sub-level nodes like a hierarchical mode
5- Mesh topology : each node is connected to some or all of the other nodes in the network, this redundancy makes
the network highly fault tolerant
What is a Gateway ?
The gateway is the network point that acts as an entrance to another network, in a large enterprise network the gateway is often
acts as a proxy server and firewall server. And it’s often associated with a Router
What is a protocol ?
a protocol is a communication language, it’s a set of rules that governs the communication between 2 nodes, defines how data is
transmitted
OSI stands for Open System Interconnection, reference model; it defines the mechanism of data transmission from Point A to
Point B on the network, into 7 stages (7 layers)
Which layers are network support layers ?
a. Physical Layer
b. Data link Layer and
c. Network Layers
Which layers are user support layers ?
a. Session Layer
b. Presentation Layer and
c. Application Layer
Which layer links the network support layers and user support layers ?
The Transport layer links the network support layers and user support layers.
Physical layer coordinates the functions required to transmit a bit stream over a physical medium.
The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link and is responsible for node-node
delivery.
a. Framing
b. Physical Addressing
c. Flow Control
d. Error Control
e. Access Control
The Network Layer is responsible for the source-to-destination delivery of packet possibly across multiple networks (links).
a. Logical Addressing
b. Routing
The Transport Layer is responsible for source-to-destination delivery of the entire message.
a. Service-point Addressing
b. Segmentation and reassembly
c. Connection Control
d. Flow Control
e. Error Control
The Session layer is the network dialog Controller. It establishes, maintains and synchronizes the interaction between the
communicating systems.
a. Dialog control
b. Synchronization
What are the responsibilities of Presentation Layer ?
The Presentation layer is concerned with the syntax and semantics of the information exchanged between two systems.
a. Translation
b. Encryption
c. Compression
The Application Layer enables the user, whether human or software, to access the network. It provides user interfaces and
support for services such as e-mail, shared database management and other types of distributed information services.
Stands for Transmission Control Protocol over the Internet Protocols, it provides end-to-end connectivity, and it verifies how
data should be formatted, addressed, transmitted, routed and received at the other end.
How it Works ?
There are four distinct elements that uniquely identify TCP connections. They are :-
To establish a TCP session, the two computers participating in the session must first go through what is known as the ” three-
ways handshake” (SYNCK – SYNCK/ACK - ACK). There are two scenarios where a three-way handshake would take place,
namely : -
What are the differences between Router and Switch and Hub?
Switch:
-‐ Operates on layer 2 of the OSI (Data Link Layer)
-‐ Makes decisions based on the MAC Address
-‐ Loop Avoidance
-‐ Breaks up collision domains
-‐ It creates a separate collision domains but a single broadcast domain
-‐ Cant communicate among different networks – Internally (LAN)
Router:
-‐ Router Operates on Layer 3 of the OSI model (Network Layer)
-‐ Makes decision based on IP logical Addressing
-‐ Breaks up the Collision domain and broadcast domains
-‐ Can communication among different Networks (WANs)
Hub:
-‐ Operates on layer 1 (Physical Layer) of the OSI model
-‐ No filtering, no Addressing
-‐ It creates a broadcast and collision domains
-‐ Makes forwarding to all the ports when a signal is arrived
-‐ It’s basically just a multi-port repeater (it’s not a smart device)
Bridge: - Operates on Layer (2) of the OSI Model (Data link Layer)
Flow control is handled by TCP through a process called windowing. The two end devices negotiate the window size when
initially establishing the connection; then they dynamically renegotiate window size during the life of the connection, increasing
its size until it reaches the maximum window size of 65,535 bytes or until errors occur.
Window size is specified in the window field of the TCP header. After sending the amount of data specified in the window size,
the source must receive an acknowledgment before sending the next window size of data.
TCP is Connection Oriented protocol uses 3 ways handshake sync- sync/ack – ack
UDP user datagram protocol is connectionless protocol and it’s unreliable protocol
User Datagram protocol is a protocol that is used at the Transport layer for connectionless, non-guaranteed communications.
Unlike TCP, UDP does not setup a connection and does not use acknowledgments.
Common network applications that use UDP include Domain Name System (DNS) , Streaming Media Applications ,
Voice over IP , Trival File Transfer Protocol ( TFTP) and online Games .
IP Address ?
1- Public
2- Private
3- Special
Public IP address is the real IP Address used on the internet and there are 5 classes of the public IP addresses :
Class A: 1 – 126
Class B: 128 – 191
Class C: 192 – 223
Class D: 224 – 239
Class E: 240 – 254
Private IP address are the IP address which you can use it in a private Network LAN, because of the limitation of the real IP
address on the internet .
The 3 classes are :
Special IP address reserved IP addresses for example (255.255.255.255) reserved for Broadcasting
It provides a dedicated link between 2 devices and the entire capacity of the link is reserved for the transmission between the 2
devices
A LAN Stands for Local Area Network, a group of computers or network devices connected together in a small geographical
area, normally within an office or in a building
WAN, stands for a Wide Area Network. It provides a wide range communication, it covers a large geographical area
Define a Bandwidth ?
What is throughput?
Unguided data transmission, sending data via electromagnetic field , without using any physical conductor
What is VLAN ?
VLAN stands for Virtual LAN, and it’s a Logical grouping of a network, even if they were physically connected together, and it
provides a security, and broadcast domain control
Explain VLAN ?
We know switch having one broadcast domain and multiple collision domains.
In a normal case when a switch sends a broadcast it will reach all ports.
Each VLAN has its own individual broadcast domain. Individual ports or groups of ports can be assigned to a specific VLAN.
Only ports belonging to the same VLAN can freely communicate to each other.
A router or layer 3 switch is needed for Inter-VLAN Communication. Broadcasts from one VLAN will never be sent out
ports belonging to another VLAN.
A VLAN is a single broadcast domain, which means that if a user in the engineering VLAN sends a broadcast frame only users
in the same VLAN will receive it.
Users are only able to communicate within the same VLAN (unless you use a router).
Users don’t have to be grouped physically together, as you can see we have users in the Engineering VLAN sitting on the 1st,
2nd and 3rd floor.
Trunking : Carrying multiple VLANs over the same physical connection. We must configure a trunk link between two
switches. Only trunk links are capable of carrying multiple VLAN information
Native VLAN : By default, frames in this VLAN are untagged when sent across a trunk. VLAN 1 is called native VLAN (By
default)
Dynamic Trunking Protocol (DTP) : Can be used to automatically establish trunks between capable ports (insecure method!)
Switched Virtual Interface (SVI) : A virtual interface which provides a routed gateway into and out of a VLAN
• IEEE 802.1Q [dot1Q] : An open standard that is supported on switches from many vendors and most NICs.
• Cisco ISL (Inter-Switch Link): An old Cisco proprietary protocol that is only supported on some Cisco switches.
Note : Older switches are dynamic desirable by default and modern switches are dynamic auto by default. Its better to manually
configure trunk and give non-negotiate command. The negotiation of the switchport status by using dynamic auto or dynamic
desirable is called DTP (Dynamic Trunking Protocol). You can disable it completely by using the switchport nonegotiate
command
VLAN information is not saved in the running-config or startup-config but in a separate file called vlan.dat on your flash
memory. If you want to delete the VLAN information you should delete this file by typing delete flash:vlan.dat.
VLAN Creation
Switch(config)# vlan 100
Switch(config-vlan)# name Engineering
Switch(config-vlan)#exit
For security reasons it might be a good idea not to allow all VLANs on your trunk link. We can change this by using the
switchport trunk allowed vlan command.
The first switchport command will prevent the trunk port from passing traffic from VLANs 50-100. The second switchport
command will re-allow the trunk port to pass traffic from VLANs 60-65.
SVI Configuration
Switch(config)# interface vlan100
Switch(config-if)# ip address 192.168.100.1 255.255.255.0
We need to follow a similar configuration for our router to enable communication with our switch and allow all VLAN traffic to
pass through and route as necessary.
Show Commands
show vlan
show interface fa 0/24 switchport]
show interface trunk
show interface fa 0/24 trunk
All what you want is just one Domain Controller and one DHCP, One DNS already installed on Windows 2012 server.
Lets say you have 2 or 3 VLANs and you have 1 DHCP already installed on windows server 2012
I’ll show you in a step by step how to configure multiple VLANs to one DHCP.
This is the first VLAN setting, now you can repeat these steps with the second VLAN (VLAN_2) Admin_VLAN.
Select the Domain again, and right click and select a new scope à then follow the same settings steps, all what you need to
change is the second VLAN Switch IP address with the new range of the IP addresses.
The multi-VLAN port is a special feature, which allows switch for configuring a single port for 2 or more VLANs. This feature
allows users from different VLANs to access a server or router without implementing InterVLAN routing capability. A multi-
VLAN port performs normal switching functions in all its assigned VLANs.
Multi-VLAN port will not work when a trunk is configured on the switch.
Multi-VLAN port only used to connect a router or server. The switch automatically transitions to VTP transparent mode when
the multi-VLAN port feature is enabled, making the VTP disabled.
The multi-VLAN port feature is supported only on the Catalyst 2900 XL/3500 XL series switches. This feature is not supported
on the Catalyst 4000/5000/6000 series or any other Cisco Catalyst switches.
Configuration
Switch(config-if)# switchport mode multi
In static VLAN, as a device enters the network, the device automatically assumes the VLAN of the port.
If the user changes ports and needs access to the same VLAN, the network administrator must manually make a port-to-VLAN
- In dynamic VLAN devices are automatically assigned into a VLAN based on its MAC address. This allows a client device to
remain in the same VLAN, regardless of which switch port the device is attached to. VLAN membership of a user always
remains the same even when he/she is moved to another location.
Dynamic VLANs are created through the use of software. With a VLAN Management Policy Server (VMPS), an administrator
can assign switch ports to VLANs dynamically based on information such as the source MAC address of the device connected to
the port or the username used to log onto that device. As a device enters the network, the switch queries a database for the
VLAN membership of the port that device is connected to.
Static VLAN assignment provides a simple way to assign VLAN to a port while Dynamic VLANs allow a great deal of
flexibility and mobility for end users but require more administrative overhead.
We have two computers, one switch and one server, everything is in one VLAN and the two computers and server can
communicate with each other.
For security reason we have to block computer A and computer B from communicating each other. But both Computer A and
Computer B can communicate with server. In such scenario we can use protected ports. By default all ports are unprotected
ports.
"After enabling protected ports, the ports we configured protected ports cant communicate each other. Protected ports can
communicate with Unprotected Ports"
Configuration
Configure "Switchport protected" command on both interfaces where computer A and Computer B is connected.Then we can
say interfaces connected to ComputerA and ComputerB are protected. Interface connected to SERVER is still unprotected.You
can verify the working of protected ports by pinging each other.Also we can verify it by using below show command
If you're experiencing connectivity problems in a VLAN environment, you should perform the following troubleshooting steps:
- Check the status of the interface with the show interfaces command. Use CDP to check connectivity.
Check the duplexing of the connection (auto negotiation is a common problem with the negotiation of the duplexing mode).
- Is your router and switch configuration correct? Verify that you've configured your routing protocol and your router's
interface. If you're trunking between the router and the switch, verify this configuration.
- Have you set up your VLAN configuration correctly? Check to make sure that the appropriate interfaces are associated
with the correct VLANs.
VPN Stands for Virtual Private Network it provide a secure method for connecting to a private network over the Internet, and it
allows only the authorized used to access the network using a user name and password , VPN devices are a remote access
devices
VPN Architecture :
VPN primarily used to secure private network traffic over an unsecured network, such as the internet,
VPN helps provide a secure mechanism for encrypting and encapsulating private network traffic and moving it through an
intermediate network. Data is encrypted for confidentiality, and packets that might be intercepted on the shared or public
network are indecipherable without the correct encryption keys. Data is also encapsulated, or wrapped, with an IP header
containing routing information.
There are a number of ways to use VPN. The most common scenario is when a remote user accesses a private network across the
Internet using a remote access VPN connection. In another scenario, a remote office connects to the corporate network using
either a persistent or an on-demand site-to-site VPN connection (also known as a router-to-router VPN connection).
Each of these VPN scenarios can be deployed to provide connectivity over a public network, such as the Internet, or over a
private intranet. VPN connections can also be deployed in an extranet scenario to communicate securely with business partners.
An extranet functions as an intranet that can be securely shared with a designated business partner.
With both the remote access and site-to-site connections, VPNs enable an organization to replace long distance dial-up or leased
lines with local dial-up or leased lines to an Internet service provider (ISP).
Remote access VPN
Client makes a remote access VPN connection. A remote access client is a single computer user who connects to a private
network from a remote location. The VPN server provides access to the resources of the network to which the VPN server is
connected. The packets sent across the VPN connection originate at the VPN client.
The VPN client authenticates itself to the VPN server and, for mutual authentication; the VPN server authenticates itself to the
VPN client.
Site-to-site VPN
A site-to-site VPN connection connects two portions of a private network or two private networks. For example, this allows an
organization to have routed connections with separate offices, or with other organizations, over the Internet. A routed VPN
connection across the Internet logically operates as a dedicated Wide Area Network (WAN) link.
The VPN server provides a routed connection to the network to which the VPN server is attached. On a site-to-site VPN
connection, the packets sent from either router across the VPN connection typically do not originate at the routers. The calling
router (the VPN client) authenticates itself to the answering router (the VPN server), and, for mutual authentication, the
answering router authenticates itself to the calling router.
Using an Internet-based VPN connection, an organization can avoid long-distance charges while taking advantage of the global
availability of the Internet.
Remote Access VPN Connections over the Internet
A remote access VPN connection over the Internet enables a remote access client to initiate a dial-up connection to a local ISP
instead of connecting to a corporate or outsourced network access server (NAS). By using the established physical connection to
the local ISP, the remote access client initiates a VPN connection across the Internet to the organization’s VPN server. When the
VPN connection is created, the remote access client can access the resources of the private intranet. The following figure shows
remote access over the Internet.
VPN Tunneling
Tunneling is a network technology that enables the encapsulation of one type of protocol packet within the datagram of a
different protocol. For example, Windows VPN connections can use Point-to-Point Tunneling Protocol (PPTP) packets to
encapsulate and send private network traffic, such as TCP/IP traffic over a public network such as the Internet.
For PPTP and Layer Two Tunneling Protocol (L2TP), a tunnel is similar to a session. Both of the tunnel endpoints must agree to
the tunnel and must negotiate configuration variables, such as address assignment, encryption, or compression parameters. In
most cases, data transferred across the tunnel is sent using a datagram-based protocol. A tunnel management protocol is used as
the mechanism to create, maintain, and terminate the tunnel.
After the tunnel is established, data can be sent. The tunnel client or server uses a tunnel data transfer protocol to prepare the data
for transfer. For example, when the tunnel client sends a payload to the tunnel server, the tunnel client first appends a tunnel data
transfer protocol header to the payload. The client then sends the resulting encapsulated payload across the network, which
routes it to the tunnel server. The tunnel server accepts the packets, removes the tunnel data transfer protocol header, and
forwards the payload to the target network. Information sent between the tunnel server and the tunnel client behaves similarly.
1- Voluntary tunneling
2- Compulsory tunneling
1- Voluntary Tunneling
A user or client computer can issue a VPN request to configure and create a voluntary tunnel. In this case, the users computer is
a tunnel endpoint and acts as the tunnel client.
Voluntary tunneling occurs when a client computer or routing server creates a virtual connection to the target tunnel server. To
accomplish this, tunneling client software and the appropriate tunneling protocol must be installed on the client computer. For
the protocols discussed in this technical reference, voluntary tunnels require an IP connection (either LAN or dial-up).
In a dial-up situation, the client must establish a dial-up connection to the network before the client can set up a tunnel. This is
the most common case. The best example of this is the dial-up Internet user, who must dial an ISP and obtain an Internet
connection before a tunnel over the Internet can be created.
For a LAN-attached client computer, there is already a connection to the network that can provide routing of encapsulated
payloads to the chosen LAN tunnel server. This would be the case for a client that is using an always-on broadband Internet
connection.
It is a common misconception that VPN connections require a dial-up connection. They require only IP connectivity between the
VPN client and VPN server. Some clients (such as home computers) use dial-up connections to the Internet to establish IP
transport. This is a preliminary step in preparation for creating a tunnel and is not part of the tunnel protocol itself.
2- Compulsory Tunneling
In compulsory tunneling, a VPN-capable remote access server configures and creates a compulsory tunnel. With a compulsory
tunnel, the user's computer is not a tunnel endpoint. Another device, the dial-up access server, between the user's computer and
the tunnel server is the tunnel endpoint and acts as the tunnel client.
A number of vendors that sell dial-up access servers have implemented the ability to create a tunnel on behalf of a dial-up client.
The computer or network device providing the tunnel for the client computer is variously known as a Front End Processor (FEP)
for PPTP or an L2TP Access Concentrator (LAC) for L2TP. For the purposes of this reference, the term FEP is used to describe
this functionality, regardless of the tunneling protocol. To carry out its function, the FEP must have the appropriate tunneling
protocol installed and must be capable of establishing the tunnel when the client computer connects.
In compulsory tunneling, the client computer places a dial-up call to a tunneling-enabled NAS at the ISP. For example, a
corporation might have contracted with an ISP to deploy a nationwide set of FEPs. These FEPs can establish tunnels across the
Internet to a tunnel server connected to the organization’s private network, thus consolidating calls from geographically diverse
locations into a single Internet connection at the organization network.
This configuration is known as compulsory tunneling because the client is compelled to use the tunnel created by the FEP. Once
the initial connection is made, all network traffic to and from the client is automatically sent through the tunnel. With
compulsory tunneling, the client computer makes a single PPP connection. When a client dials into the NAS, a tunnel is created
and all traffic is automatically routed through the tunnel. An FEP can be configured to tunnel all dial-up clients to a specific
tunnel server. The FEP could also tunnel individual clients, based on the user name or destination.
Unlike the separate tunnels created for each voluntary client, multiple dial-up clients can share a tunnel between the FEP and the
tunnel server. When a second client dials into the access server (FEP) to reach a destination for which a tunnel already exists,
there is no need to create a new instance of the tunnel between the FEP and tunnel server. Instead, the data traffic for the new
client is carried over the existing tunnel. Since there can be multiple clients in a single tunnel, the tunnel is not terminated until
the last user of the tunnel disconnects.
PPTP
Point-to-Point Tunneling Protocol (PPTP) encapsulates Point-to-Point Protocol (PPP) frames into IP datagrams for transmission
over an IP-based network, such as the Internet or over a private intranet. PPTP is described in RFC 2637 in the IETF RFC
Database.
PPTP uses a TCP connection, known as the PPTP control connection, to create, maintain, and terminate the tunnel. PPTP uses a
modified version of Generic Routing Encapsulation (GRE) to encapsulate PPP frames as tunneled data. The payloads of the
encapsulated PPP frames can be encrypted, compressed, or both.
PPTP assumes the availability of an IP network between a PPTP client (a VPN client using the PPTP tunneling protocol) and a
PPTP server (a VPN server using the PPTP tunneling protocol). The PPTP client might already be attached to an IP network that
can reach the PPTP server, or the PPTP client might have to use a dial-up connection to a NAS to establish IP connectivity as in
the case of dial-up Internet users.
Authentication that occurs during the creation of a PPTP-based VPN connection uses the same authentication mechanisms as
PPP connections, such as Extensible Authentication Protocol (EAP), Microsoft Challenge-Handshake Authentication Protocol
(MS-CHAP), Microsoft Challenge-Handshake Authentication Protocol version 2 (MS-CHAP v2), CHAP, Shiva Password
Authentication Protocol (SPAP), and Password Authentication Protocol (PAP). PPTP inherits encryption, compression, or both
of PPP payloads from PPP. For PPTP connections, EAP-Transport Layer Security (EAP-TLS), MS-CHAP, or MS-CHAP v2
must be used for the PPP payloads to be encrypted using Microsoft Point-to-Point Encryption (MPPE).
MPPE provides only link encryption between the VPN client and the VPN server. It does not provide end-to-end encryption,
which is data encryption between the client application and the server hosting the resource or service that is being accessed by
the client application. If end-to-end encryption is required, IPSec can be used to encrypt IP traffic from end-to-end after the
PPTP tunnel is established.
There is a PPTP control connection between the IP address of the PPTP client using a dynamically allocated TCP port and the IP
address of the PPTP server using the reserved TCP port 1723. The PPTP control connection carries the PPTP call control and
management messages that are used to maintain the PPTP tunnel. This includes the transmission of periodic PPTP Echo-Request
and PPTP Echo-Reply messages to detect a connectivity failure between the PPTP client and PPTP server. PPTP control
connection packets consist of an IP header, a TCP header, a PPTP control message, and a data-link trailer and header as shown
in the following figure:
A Proxy server is a server that acts as an intermediary between the user workstation and the Internet so that the company can
ensure security, administrative control, and caching service
A proxy server is associated with or part of a Gateway server that separates the company network from the outside networks and
a firewall server that protects the company network from the outside intrusions
A proxy server receives a request for an Internet service (such as a webpage request) from a user. If it passes filtering
requirements, the proxy server assuming it also a cache server, and it looks in its local cache if it previously downloaded this
webpage, if the page is found in the cache, it returns it to the user without needing to forward I the request to the internet and if
the page is not found in the cache the proxy server acts as a client on behalf of the user, using one of its own IP addresses to
request the page over the internet then it forwards the page to the local user.
An advantage of the proxy server is that its cache can serve all the users, and if one Internet page is frequently requested from
the users, then proxy caches it inside its cache.
The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package
What is a layer?
What is a DNS ?
A DNS stands for Domain Name Systems, its an Internet service, it translates the Domain names form Alphabetic to IP
addresses. How it works, open your browser and type www.google.com. Your local DNS will start to look inside it’s database
,for the correct address for that domain, and if it couldn’t find it , will make a DNS forward to another DNS and so, until it gets
the correct IP address for that website name, all of these processes takes milliseconds , you won’t even notice
What is DCHP?
DHCP is Dynamic Configuration Control Protocol. It s main functionality to obtain automatic IP address to any computer is
connected in a network into 4 steps
1- DHCP-Discover
2- DHCP Offer
3- DHCP Request
4- DHCP Acknowledgment
What is a Firewall ?
It’s a system (could be Hardware or Software) designed to prevent unauthorized access to/from a private network, it, does a
packet filtering
ACL (Access Control List) and firewall both shares the packet filtering features, however the main difference between both that
ACL does stateless inspection and Firewall does stateful inspection, which means that the firewall not only sees the TCP packet
but also it can know whether there was a proper beginning for that TCP conversation
Subnet used to break up large networks into smaller sub-networks, and it provides traffic control
1- Failover cluster
2- Network load balancing clusters (NLB)
Failover clusters are designed for applications that have long-running in-memory state, or that have large, frequently updated
data states. These are called stateful applications, and they include database applications and messaging applications. Typical
uses for failover clusters include file servers, print servers, database servers, and messaging servers.
Network Load Balancing is intended for applications that do not have long-running in-memory state. These are called stateless
applications. A stateless application treats each client request as an independent operation, and therefore it can load-balance
each request independently. Stateless applications often have read-only data or data that changes infrequently. Front-end Web
servers, virtual private networks (VPNs), File Transfer Protocol (FTP) servers, and firewall and proxy servers typically use
Network Load Balancing. Network Load Balancing clusters can also support other TCP- or UDP-based services and applications
By using a failover cluster, you can ensure that users have nearly constant access to important server-based resources.
A failover cluster is a set of independent computers that work together to increase the availability of services and applications.
The clustered servers (called nodes) are connected by physical cables and by software. If one of the nodes fails, another node
begins to provide service through a process known as failover.
You can use the Failover Cluster Manager snap-in to validate failover cluster configurations, create and manage failover clusters,
and migrate some resource settings to a cluster running Windows Server 2008 R2 / 2012 Server
In Windows Server 2008, the changes to failover clusters (formerly known as server clusters) are aimed at simplifying cluster
setup and management, making the clusters more secure and stable, improving networking in clusters, and improving how
failover clusters communicate with storage.
A failover cluster is a group of independent servers that are running Windows Server 2008 /2012 and working together to
increase the availability of services and applications.
When a failure occurs on one computer in a cluster, resources are redirected and the workload is redistributed to another
computer in the cluster. You can use failover clusters to ensure that users have nearly constant access to important server-based
resources.
Windows deployment services enables you to deploy (Install) Windows Operating Systems, you can use it to setup a new
computers by using Network-based installation, this means that you don’t have to install each operating system directly from
local installation media (CD/DVD)
If the message is sent from a source to a single destination node, it is called Unicasting.
If the message is sent to some subset of other nodes, it is called Multicasting.
If the message is sent to all the m nodes in the network it is called Broadcasting.
What is a Multiplexer ?
A multiplexer (MUX) is a device allowing one or more low-speed analog or digital input signals to be selected, combined and
transmitted at a higher speed on a single shared medium or within a single shared device. Thus, several signals may share a
single device or transmission conductor such as a copper wire or fiber optic cable. A MUX functions as a multiple input, single
output switch.
In telecommunications the combined signals, analog or digital, are considered a single output higher speed signal transmitted on
several communication channels by a particular multiplex method or technique. With two input signals and one output signal,
the device is referred to as a 2-to-1 multiplexer; with four input signals it is a 4-to-1 multiplexer; etc.
Multiplexer (MUX)
For analog signals in telecommunications (and signal processing), a TDM (time division multiplexer) may select multiple
samples of separate analog signals and combine them into one PAM (pulse amplitude modulated) wide-band analog signal.
For digital signals in telecommunications on a computer network or with digital video, several variable bit-rate data streams of
input signals (using packet mode communication) may be combined, or multiplexed, into one constant bandwidth signal. With
an alternate method utilizing a TDM, a limited number of constant bit-rate data streams of input signals may be multiplexed into
one higher bit-rate data stream.
A multiplexer requires a demultiplexer to complete the process, i.e. to separate multiplex signals carried by the single shared
medium or device.
Often an multiplexer and a demultiplexer are combined into a single device (also often just called a multiplexer) allowing the
device to process both incoming and outgoing signals. Alternately, a multiplexer’s single output may be connected to a
demultiplexer’s single input over a single channel. Either method is often used as a cost-saving measure. Since most
communication systems transmit in both directions, the single combined device, or two separate devices (in latter example), will
be needed at both ends of the transmission line.
Other types of multiplexing technologies and processes include (not a comprehensive listing):
TDM is a digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate
required by the sending and receiving devices.
What is Synchronous STDM ?
In STDM, the multiplexer allocates exactly the same time slot to each device at all times, whether or not a device has anything to
transmit.
a. Guided Media
i. Twisted - Pair cable
1. Shielded TP
2. Unshielded TP
ii. Coaxial Cable
iii. Fiber-optic cable
b. Unguided Media
i. Terrestrial microwave
ii. Satellite Communication
What is Checksum ?
Checksum is used by the higher layer protocols (TCP/IP) for error detection
What are the two types of transmission technology available ?
Transmission is a physical movement of information and concern issues like bit polarity, synchronization, clock etc.
Communication means the meaning full exchange of information between two communication media.
à Difference between Full duplex (FDX), Half Duplex (HDX) and Simplex
26 – What is SNMP?
It Is an Application-Layer protocol that facilitates the exchange of information between network devices.
It’s a part of TCP/IP protocol suite, and it’s used to collect information and configure network devices such as; Servers, Routers,
Switches, other communication devices.
In a standard SNMP, it uses one administrative computer called Manager, which manages the Network devices (Agents) using 3
commands
-‐ Get / Set Request
-‐ Get / Set Response
-‐ Trap message … Trap is a synchronous notification from the Agent to the Manager
What is CRC?
-‐ CRC stands for Cyclic Redundancy Check, its 2 bytes added to the end of every Modbus Message for error detection
-‐ Every bye in the message is used to calculate the CRC message, the receiving device also calculates the CRC and
compare it to the CRC from the sending device, if even one bit is in the message is received incorrectly the CRCs will
be different and an error will result
What is Firmware ?