Documente Academic
Documente Profesional
Documente Cultură
Apache
Types of Virtual host
Is it possible to configure 3 webserver per IP and 3 ip in one server?
SSL web server configuration
Is it possible 1 IP & 3 web server & SSL confi to only 1 web server out
List apache directives
Configuration of named virtual hosting
Configuration of IP based virtual hosting
How does Authentication happened in web server and its configuration
Diff between Named and IP bsed virtual hosting
What is use of Virtual hosting?
If you find apache in critical then what you will do in apache server
where will be web site file if i used include in vhosts
Apache working , different b/w ip base & name base hosting ,htaccess ,
& worker.c mpm modules
if their is load on your apache server so how you manage it ? read how
re you apache ?
How to tune apache ?
What is Location ? diffrence between location and directory ?
Start servers, max threads and all those parameters.
What will u do if there are lot of apache logs
What is redirect? And proxy pass?
how to integrate tomcat with apache? mod_jk (load balance)
what is used for port 8009?
what is ajp13?
details about worker.property file?
where is log file locate in Apache?
how will you complie apache ?
what is maxclient?
if there is problem in apche like its taking too much memory how u find
is problem?
Postifx
How to start and stop Postfix / Qmail / Sendmail
of 3?
preforek
you secu
out what
Networking
Diff between TCPdump and Netstat
NFS configuration
TCP header info
SSH configuration
Open ldap config file name
Open Ldap port no
How does router work?
What info reside in routing table?
What is TTL in Ethernet frame?
How does traceroute command work?
What is masquarding, SNAT, DNAT? Example?
Where is use of diff types of nat?
What are things that may cause two linux machines on the same LAN not communicat
e with each other ?
How to configure linux server to be a part of ADS domain? what command is used t
o join linux server to domain?
Command to configure default route on linux server
What is transparent proxy server?
Can we configure username authentication based on transparent proxy server?
Various commands related to network troubleshooting?
What protocol does MTR command use?
How to check routes configured on the server
What are different security levels in Samba
How does SSH public and prvate key authentication?
What is diff between SSH1 and SSH2?
How to find apache is running or not?
In which file ip-address information is stored?
You want to etup squid proxy serverand alow only your internal network to access
internet, tell me exact acl syntax to be put in squid.conf
Is nfs secure or not
Does NFS run on TCP or UDP
How ping work, step by step
A user connect the laptop to the network which is configured to give ip address
by DHCP server. But his laptop doesn t get IP address from DHCP server, Ho will yo
u start debugging?
What is next-server parameter in dhcpd.conf
What is ssh tunneling?
What is OS level parameter in smb.conf?
if you are sitting in mumbai and datacenter in pune , you trying to connect to p
une you are getting packet loss then what will be the reason
port of telnet
purpose of nfs ? explain this process in nfs portmapper , rpc.statd , rpc.nfsd
, rpc.lockd, rpc.mountd ?
what is different b/w root_squash & no_root_squash ?
explain traceroute & tcpdump command ?
what is the port of ldap, pop imap, smtp, http, https, dns , tomcat and ssl.
how to list running services in current runlevel?
what is iptable ? how many tables in it ? how many chain in filter table and wha
t it does?
Say One client hosted 10 server in netmagic... client call you and tells you tha
t..he is not able to access one server ...how will you troubleshoot this issue?
what is the port of mysql server ?
INSERT, GRANT, DELETE, UPDATE in MySQL
InnoDB and MYIsam storage engine's difference ?
My server is in a remote location and I am not able to ping it. No ssh, telnet e
tc... What to do ? ==>> KVM shud do the trick.
OSI layers ?
How to reserve IP in DHCP ?
What is puppet ?
IPTABLES? How to check a particular record in iptables ?
In PHP haw can user override the setting for memory_limit in php.ini, how to av
oid this..?
Explain the steps to replicate a server (DNS,Apache,MySql) from (rhel4 to rhel5
, rhel5 to rhel5) also no one have informed us what are the services running on
the server we even have to analyse that .
How to migrate to replicated server with minimai downtime (say 5 to 10 mins) ?
How to upgrade mysql version of a live server?
How do you do disaster recovery in mysql ?
Difference between port and socket
What do you mean by NAT , explain how NATTING works
what is puppet,redmine & cobbler
How to take a backup of mysql? And syntax?
What is cold backup and hot backup?
What is difference between telnet and ssh?
Port of samba and how to mount samba at client?
How to make replica in mysql?
What is default gateway? And it use?
what are the different types of Backups..?
What is ip address and it range? And classes? Why is it specific?
What is iptable and its tables details?
difference between incremental and differential backup?
mysql replication?
Haproxy & heartbeat concept?
How veritas software work?
mysql clustering?
how ip packet travel, i one packet drop.
tcp vs udp
System Admin
Boot Process
ls linux or Unix same ?
Diff between RAID 5 & RAID 1 and Raid 0, which raid is faster? how?
How do you take backup through ssh without password authentication
How do you know if particular service is not responding?
How do you know if server is compromised?
Steps to troubleshoot any kind of problem
How to install a typical source package / tar ball and explain each step in brif
?
What file permission are needed on directory and files if we want to only read a
file?
What is setuid?
What is sticky bit?
What does top command show?
What is mean by load average value? what is ideal value? How do you troubleshoot
the problem if load average is high? How you will check load? why this critical
state comes?
What is use of lsmod, insmod, depmod, rmmod, modrobe?
How to check memory consumption?
How user can change himself password?
What is SAN and NAS?
What is use of LVM snapshot?
Wht is diffrance between Hardware RAID and Software RAID?
Diff between Ext2, Ext3 and Ext4
How to create encrypted file which will ask for password to open?
How to kill process
What will be steps if any process consuming more memory?
How to untar specific one file from tar file
How to find out fle is exist in ystem or not?
Which file you check for munted devices?
Which is init config file?
What you can find in inittab?
Wht is path?
How to know whih kernel is running?
Which commands show you open files in terminal?
How to access mal through telent?
Which command show current runlevel? details of runlevels?
How will you create user amit having primary group as abc and secondary grp as d
ef
How to check what PCI devices are there in your system
You want to export or share on directory to only one client / ipaddress (windows
box) how will you do it.
Where is the network information stored on linux system, i.e. whether your compu
ter is connected to network or not
/Var Partition is full, you have got new hdd and you want to add it to an existi
ng LVM group vg00, how will you do it and increase /var partition? Can it be don
e online without umounting /var?
Diff between IPtables and IPchain
Step by step procedure to configure LVM
I want to add new HDD to volume group, How can I add? Step with command
Diff between grub and Lilo
What are types of security in Linux
What is imp of xinetd services
How to restart telnet service for root
How to rename all files in one dir having extension *.htm to *.html from command
line
How to take backup of file system starting from / in linux.
How to create temporary swap space in linux
What is size of /proc filesystem?
Monitoring
Nagios configuration
Client side port of nagios
have you ever configured nagios server
Nagios => Have u worked with ? What is Critical, warning in nagios ?
What are the monitoring tools that we can use to monitor multiple servers..?
Use of Nagios ?
FTP
Diff between Active FTP and Passive FTP
Port no for FTP
How to configure firewall for FTP?
What is FTP? What is it good for?
for what 20 and 21 used
Shell Scripting
Diff types of testing for files /directories
How do you locate very first character on the line with regular expression
How do you locate very last character on the line with regular expression
What does + represents in regular expression
What is $? Variable?
What is $* variable?
What is $1 variable?
How to access a value of 10th argument passed to script?
How to debug shell script, line by lie debugging without actual execution
Do you know Scripting? which have you used loop or conditions?
Do u know shell scripting ?
Which partitions might you create on mail server HDDs other than the root, swap
and boot partitions?
Which partitioning tool is available in all distributions?
Which two commands can you use to delete directories?
Which file defines all users on your system?
our wish to print the file vacations with 60 lines to a page. Which command will
accomplish this?
To move /home/ben/memos dir in /home/bob/memos, what is the result by mv /home/b
en/memos /home/bob
What is the command to list ALL (hidden also) files of current directory & it s su
bdirectories?
Do you know the correct sequence of fields in /etc/passwd file?
When you create a new partition, in what terms you need to designate its size
What command you use for cpio to create a backup called backup.cpio of all the u
sers home dirs?
What file defines the levels of messages written to system log files?
List all the files with .mem extension in reverse alphabetical order in a particul
ar directory?
######
1) How to creat swap if you dont have free partation?
this is some what tricky question if you are new to Linux Administration
here is the command to create swap if you dont have free partation
before doing this you have switchoff the swap
swapoff -a
dd if=/dev/zero of=/root/swapfile bs=1k count=1024
swapon filename
2)How to see swap details?
cat /proc/swap
free
3)How to see/get info about RAM in ur system
free
cat /proc/meminfo
4)What is the difference between ext2 and ext3
I)ext3=ext2+journaling
"journaling" is an add-on to a filesystem that records changes as they are made
.
II)ext2 files system is fast
III)less disk writes
IV)ext2 file system in less stable/secure
V)ext2 file system required to run fsck command if the system get crashed
5)How to convert ext2 file system to ext3?
tune2fs -j /dev/hda1
6)How convert ext3 file system to ext2
tune2fs -O^has-journal /dev/hda1
7)What is default block/chunk size for PV
4MB
8)what is the command to update the diskquota on file system
###########################################
Linux admin interview questions
How do you take a single line of input from the user in a shell script?
Write a script to convert all DOS style backslashes to UNIX style slashes in a l
ist of files.
Write a regular expression (or sed script) to replace all occurrences of the let
ter f , followed by any number of characters, followed by the letter a , followed by o
ne or more numeric characters, followed by the letter n , and replace what s found wi
th the string UNIX .
Write a script to list all the differences between two directories.
Write a program in any language you choose, to reverse a file.
What are the fields of the password file?
What does a plus at the beginning of a line in the password file signify?
Using the man pages, find the correct ioctl to send console output to an arbitra
ry pty.
What is an MX record?
What is the prom command on a Sun that shows the SCSI devices?
What is the factory default SCSI target for /dev/sd0?
Where is that value controlled?
What happens to a child process that dies and has no parent process to wait for
it and what s bad about this?
What s wrong with sendmail? What would you fix?
What command do you run to check file system consistency?
What s wrong with running shutdown on a network?
What can be wrong with setuid scripts?
What value does spawn return?
Write a script to send mail from three other machines on the network to root at
the machine you re on. Use a here doc , but include in the mail message the name of t
he machine the mail is sent from and the disk utilization statistics on each mac
hine?
Why can t root just cd to someone s home directory and run a program called a.out si
tting there by typing a.out , and why is this good?
What is the difference between UDP and TCP?
What is DNS?
What does nslookup do?
How do you create a swapfile?
How would you check the route table on a workstation/server?
How do you find which ypmaster you are bound to?
How do you fix a problem where a printer will cutoff anything over 1MB?
What is the largest file system size in solaris? SunOS?
What are the different RAID levels?
##############################################
1) How do you stop a fork bomb if you are already logged into a system
2) You delete a log file that apache is using and did not restart apache yet, ho
w can you recover that log file?
Tell me about the last major Linux project you finished. What were some of t
he obstacles and how did you overcome them. Sometimes asking these open question
s will reveal much more then small questions that are easily answered by Google.
A great senior admin doesn't need to know everything, but they should be able t
o come up with amazing solutions to impossible projects.
Do you contribute to any Open Source projects? Doesn't matter if it's just d
ocumentation, it shows a certain dedication to the craft.
Question: Describe a scenario when you get a "filesystem is full" error, but 'df
' shows there is free space
Answer: The filesystem can run out of inodes, 'df -i' will show that.
Open ended questions:
tell me about how do you manage your knowledge database (wikis, outlines, sp
readsheets, plain text files) and why did you choose particular options
do you use version control? which one and why? are your commit messages good
looking?
:
Tell me two ways to redirect both stderr and stdin at once
&> and >/dev/null 2>&1
demonstrates knowledge of bash vs. bourne shell
Another key point: for senior positions, I expect to see evidence of public writ
ing and presentation skills. If you are a senior person you should have been pub
lished multiple times on the web and in magazines. Heck, just having your own te
ch blog is sufficient. Having presented at least one paper at a conference is a
big plus. I think this in particular separates junior from senior linux admins.
Tell me about the biggest mistake you've made in [some recent time period] a
nd how you would do it differently today. What did you learn from this experienc
e?
There are a lot of
e year 10 times in
better years. And
if you should just
14. Scenario: I have a Linux Server installed with DNS Server and DHCP Server. I
have an Windows XP client.
Client is not able to get the IP address from the DHCP server. What is the probl
em.
Client isnot able to resolve the hostname. What is the problem
15. Scenario: Client complains that he is not able to send an email or receive e
mail. Problem is with the QMAIL server. How will you troubleshoot.
16. How do you change user's home directory
17. How do you configure Kickstart
18. How to login into a system without a password.
19. How to create a self sign-on certficate
20. Do you know what is /etc/pki
21. How do you see the memory usage
22. How do you see the system boot messages
23. Do you know about OS Hardening
24. What OS applications you know
25. How do you change the gateway permanently
26. What do you know about fencing in clusters
27. What is the difference between cp, scp, rsync
28. How do you configure Apache with SSL i.e. HTTPS
29. How do you configure DHCP, NFS, FTP, SAMBA APACHE, TOMCAT server
30. How do you check for already installed packages using RPM.
31. How do you check whether the directory is mounted or not using NFS share at
the client side
32. How do you tar and untar.
33. What is the difference between tar and gunzip
34. How much will the file be compressed
35. How many fields are there in crontab
36. How do you create a crontab file and how do you list the crontab
37. If you have 200 log files, how will you search a particular file. Use grep
38. If I have 2 servers. I want to transfer server1 2GB data to server2 without
causing any overhead on the server1 and on the network. It should be fast. Also
server1 space is full and you cannot add any more overhead on it. What is the me
thod.
39. I have some 50 servers, how will you apply a patch on all the 50 servers at
one time (using scripts) and what is the command to copy the patch on all the 50
servers at a time.
40. What is kernal panic & memory leak. Can you tell me where it happens and how
it happens.
41. How do you implement quotas on the filesystem.
42. What is Autofs.
43. What do you mean by centralize LOG server. How will you configure the client
s to that centralize Log server.
44. How will you monitor the process and memory.
45. What is inside the directory /etc/init.d
46. How to check a particular PID when ps, top are not working.
47. What type of environment are you working. Data center, etc
48. What type of storage device you are using.
49. Tell me about the types of backup strategy. and what are the different tyoes
of method.
50. What are your responsibilities as a Linux admin and which task you liked to
do the most.
51. Can you use cp to copy between 2 different systems.
52. What is Samba and can it be installed in either Linux or Windows.
53. How will you tune the system for the optimum level of performance.
54. What is the difference between Single user mode and Emergency mode.
55. Tell me about your project
56. How will you do monitoring of the system without any tools.
57. What type of logs you used to monitor. Is there any pattern you used to foll
ow in analysing the logs or just blankly see it. How do you search for any error
178. While working on the server you accidentally deleted certain files which ar
e owned by the customer. Later you are contacted by the client and he complains
his files are missing. What do you think would be the best way to handle this si
tuation draft a complete reply to the customer.
179. A server has unexpectedly crashed and it takes your team about 40 minutes t
o get it back up-and-running. A large number of customers were affected, therefo
re during this time you are inundated with queries asking what is going on with
their server, as well as a number of regular tech queries. How do you deal with
this situation? At what point would you write to the affected customers and what
would you tell them?
180. How would you be responding to a long-term customer of your company and to
a customer who recently started using your service. Would you be responding in t
he same style? If yes/no, please write a complete reply to the customer based on
the hypothetical scenario above.You SSH to a server and the response time seems
sluggish, but you can access other servers without any speed issues. Which of t
he following commands is most likely to help you find the source of the problem?
ping, top, free, netstat
181. Have you implemented any mailserver setup in the past, if so what kind of s
etup they were
182. Can you briefly explain to me if we have two servers and we want to load ba
lance between them to distribute the load, what all possible options we have to
set this up
183. Whats the benefits of RAID 10 compared to RAID 0+1 and which is better?
For high performance database server what do you recommend RAID 10 or RAID 0+1 ?
184. we have two servers, web servers and we have load balancer in front, the cu
stomer want to upload files to one node only and we want to replicate files uplo
aded on both servers. Whats the best possible solution to make them identical an
d using what technique
185. How to copy the files using crontab in a simple/automated way and in fastes
t way
186. Say the folder of uploading files is /home/user/public_html/files how to re
plicate it between the two servers
give the command you will use
187. But this will copy the entire folder again and again?. is this the best way
to copy the files between the nodes? how to make rsync secure between two nodes
?
188. Please give me example of the command using ssh with rsync.
189. what if ssh port is different not standard ssh port how to make it work?
########
katalyst partners (mape)
1. Types of kernel
2. what will u do if u get a blank page from one of the site
hosted in ur apache srv
3. mysql slows down after 2 hrs, wht can be the issue.
4. up to what extent ur apache logs can grow, is there any
5. how will increase the performance of apache
6.how will secure mountpoints
What wud u do to secure http?
What wud u do to secure ftp?
how would you create ssl based virtual hosting? explain steps
limit
/etc/nsswitch. conf
/etc/hosts
/etc/defaultrouter
36) The first field field in an /etc/passwd entry is:
The
The
The
The
uid
name
gid
home directory.
-f
-r
-w
-x
foo
foo
foo
foo
38) According to POSIX.2, which option tells sort to compare the keys
in a case-insensitive manner?
-c
-f
-i
-v
39) The renice command may alter the priority of:
A single process
All process in a process group
All processes owned by a user
All of the above
40) To setup a master/slave NIS system such that the slave takes over
lookup requests when the master crashes:
run
run
run
run
ypserv on the
ypserv,ypbind
ypserv,ypbind
ypserv on the
master; ypbind
on the master;
on the master;
master; ypserv
on the slave
ypset on the slave
ypserv,ypbind on the slave
-s on the slave
41) You boot a client machine and attempt to mount an NFS drive from
the server. The NFS mount worked yesterday, and neither the server
nor its NFS export list has been modified since then. The mount
command just hangs. Where do you look for the problem?
42) Acceptable levels of bad nfs calls fall under what percentages?
10-15%
1-2%
45-55%
anything under 90%
43) When debugging a core in gdb, what does the command "bt" give?
the core memory
heap usage
the calling stack
44) Please describe the complete boot process for a Unix system (your choice,
but preferably Sun if known). Start at the moment the power switch
is turned on.
45) What is the main negative aspect of telnet/rshell/ rlogin with
respect to security?
Please list 2 or more mechanisms of overcoming that aspect.
46) How many devices can be attached to a SCSI/SCSI-2 bus? A "wide" SCSI bus?
47) A user performed a "cd;chmod 644 ." before logging out. What
problem occurs when they log in the next time, and what level of
privileged is required to correct the problem?
48) Please describe the path and types of programs that handle an
e-mail message starting from when a system receives the first packet
of information until the recipient reads it.
49) A customer has created a web page and complains that attempts to view
it result in "forbidden" messages. What is the main problem?
Directory listing is as follows:
# ls -al
total 240
drwxr-xr-x
drwx------rw-------rw-------rw-------rw-------rw-------rw-r--r--rw-------rw-------rw-------rw-------rw-------rw-------rw-------rw-------rw-------rw-------rw-------
50) What happens when you issue the following commands (as root):
#
#
#
#
#
1)
2)
3)
4)
5)
6)
7)
8)
9)
kill -1 1
kill -1 -1
init 0
sync
rm /dev/console
What are your responsibilities in your present job?
What has been your biggest contribution at your most recent job?
Which of your jobs have you enjoyed the most?
What type of management style do you work best for?
If you could change one thing in your current job, what would it be?
What would your manager say are your strengths?
What might your manager say as a criticism?
How do you keep up with the changes in technology?
Tell me about a time when you were not satisfied with your performance.
This is, again, bash-specific. All common shells support the use of
which (either by builtin or, in some cases, by which(1)), which
will answer the same question.
> 3. What is a zombie process and how do you find them?
[...]
> ps -aux, will show all processes. Look for "Z" in that stat and defunct
> under the command.
That answer's incomplete; that's relying on BSD ps(1) syntax. On
Solaris, at least, you can use /usr/ucb/ps (though it's quite slow),
but on a true SysV system, you'll need to know how to read ps -ef
output as well.
Also, BSD ps(1) syntax has long deprecated the use of the -.
>
>
>
>
4. How do you find the version of Linux running and the version of gcc
used?
Ans:
cat /proc/version
>
>
>
>
Ans:
Normally, /etc/sysconfig/ network-scripts/ ifcfg-eth0 is the setup for the
first card. To add additional IP addresses, create another file
"ifcfg-eth0: 1" with the new IP address information in it.
6. What is an inode?
Ans:
The inode contains information about the file size, file location,
ownership, etc. Plus, it contains a pointer to the first few blocks of data
in the file.
^^^^^
> pipes on your computer?
Spellcheck is insufficient. Proofread.
>
>
>
>
Ans:
"netstat -na" will give a list of listening connections; but, it doesn't do
an adequate job of listing the programs. Instead, use
"lsof"
that list.
Question 3: In Unix OS, what is the file server? (Asked by Silicon
Magic Corp. people)
Answer: The file server is a machine that shares its disk storage and
files with other machines on the network.
Question 4: What is NFS? What is its job?(Asked by Silicon Magic Corp. people)
Answer: NFS stands for Network File System. NFS enables filesystems
physically residing on one computer system to be used by other
computers in the network, appearing to users on the remote host as
just another local disk.
Question 5: What is CVS? List some useful CVS commands.(Asked by
Silicon Magic Corp.people)
Ans: CVS is Concurrent Version System. It is the front end to the RCS
revision control system which extends the notion of revision control
from a collection of files in a single directory to a hierarchical
collection of directories consisting of revision controlled files.
These directories and files can be combined together to form a
software release.
There are some useful commands that are being used very often. They are
cvs checkout
cvs update
cvs add
cvs remove
cvs commit
Unix/Linux administration interview questions
What is LILO?
LILO stands for Linux boot loader. It will load the MBR, master boot
record, into the memory, and tell the system which partition and hard
drive to boot from.
What is the main advantage of creating links to a file instead of
copies of the file?
A: The main advantage is not really that it saves disk space (though
it does that too) but, rather, that a change of permissions on the
file is applied to all the link access points. The link will show
permissions of lrwxrwxrwx but that is for the link itself and not the
access to the file to which the link points. Thus if you want to
change the permissions for a command, such as su, you only have to do
it on the original. With copies you have to find all of the copies and
change permission on each of the copies.
Write a command to find all of the files which have been accessed
within the last 30 days.
find / -type f -atime -30 > December.files
This command will find all the files under root, which is '/', with
file type is file. '-atime -30? will give all the files accessed less
than 30 days ago. And the output will put into a file call
December.files.
What is the most graceful way to get to run level single user mode?
A: The most graceful way is to use the command init s.
If you want to shut everything down before going to single user mode
then do init 0 first and from the ok prompt do a boot -s.
What does the following command line produce? Explain each aspect of this line.
$ (date ; ps -ef | awk '{print $1}' | sort | uniq | wc -l ) >> Activity.log
A: First let's dissect the line: The date gives the date and time as
the first command of the line, this is followed by the a list of all
running processes in long form with UIDs listed first, this is the ps
-ef. These are fed into the awk which filters out all but the UIDs;
these UIDs are piped into sort for no discernible reason and then onto
uniq (now we see the reason for the sort - uniq only works on sorted
data - if the list is A, B, A, then A, B, A will be the output of
uniq, but if it's A, A, B then A, B is the output) which produces only
packets proliferate.
If a certain broadcast transmit threshold is reached, the port drops
all broadcast traffic. Firewalls are one of the best ways to protect
your network against broadcast storms.
A state in which a message that has been broadcast across a network
results in even more responses, and each response results in still
more responses in a snowball effect. A severe broadcast storm can
block all other network traffic, resulting in a network meltdown.
Broadcast storms can usually be prevented by carefully configuring a
network to block illegal broadcast messages.
8) What is the purpose of VRRP?
9) Ans: The purpose of the VRRP packet is to communicate to all VRRP
routers the priority and the state of the Master router associated
with the Virtual Router ID.
VRRP packets are sent encapsulated in IP packets. They are sent to the
IPv4 multicast address assigned to VRRP.
10) What is a VPN?
Ans: VPN(Virtual Private Network )? these are bascially the logical
networks on the physical line? you can have many VPN oveer same line..
Need of VPN arises when your company need to increase the network but
don't want to buy any more switches.. take an eg. your dept. your room
is packed with employees and ur company need to add 4 more persons to
ur deptt. what will they do.. the solution is to create VPN's?you can
configure the switch ports in other deptts. and create a specific VLAN
of ur deptt.so that the persons can sit there and access to the
required pcs.
11)
12)
Ans
For
For
identify, which computer it needs to send the packet to. For this it
uses the concept of ARP, Address Resolution Protocol, which it uses
over time to build up a table mapping from the Logical addresses to
the Physical addresses. Each computer is identified using its
MAC/Physical address ( u can use the ipconfig -all option to get ur
MAC address).
16) What is ARP/RARP?
Ans : ARP: Stands for Address Resolution Protocol?whenever a request
is sent by a node on one network to the node on another network the
Physical address(MAC) is required and for this the IP address need to
be flow over the network..whenver a router with that network (IP) gets
the msg. the required MAC address is sent through the network this
process of converting the IP address to MAC address is Called ARP..and
the reverse thats the convertion of the Mac address to the IP address
is called RARP ( Reverse Address Resolution Protocol)
RARP: RARP is a TCP/ IP protocol term similar to ARP. RARP is the
method that some machines use to determine their own IP address.
Essentially, a machine sends out a packet that includes a machine
hardware address. A server on the same network receives the packet and
looks up the hardware address. The server then sends back the
associated IP address of that machine. It is used for machines that do
not have the capability to store their own IP addresses locally.
ARP:Address Resolution Protocol. ARP is the protocol used by IP (as in
TCP/IP) for address resolution. Address resolution refers to the
ability of a station to resolve another station's MAC (hardware)
address given its IP address.
17) Describe a TCP connection sequence
18) Ans: The TCP three-way handshake describes the mechanism of
message exchange that allows a pair of TCP devices to move from a
closed state to a ready-to-use, established connection. Connection
establishment is about more than just passing messages between devices
to establish communication. The TCP layers on the devices must also
exchange information about the sequence numbers each device wants to
use for its first data transmission, as well as parameters that will
control how the connection operates. The former of these two data
exchange functions is usually called sequence number synchronization,
and is such an important part of connection establishment that the
messages that each device sends to start the connection are called SYN
(synchronization) messages.
You may recall from the TCP fundamentals section that TCP refers to
each byte of data individually, and uses sequence numbers to keep
track of which bytes have been sent and received. Since each byte has
a sequence number, we can acknowledge each byte, or more efficiently,
use a single number to acknowledge a range of bytes received
19) What is MTU?
Ans : The MTU is the "Maximum Transmission Unit" used by the TCP
protocol. TCP stands for Transmission Control Prototcol. The MTU
determines the size of packets used by TCP for each transmission of
data. Too large of an MTU size may mean retransmissions if the packet
encounters a router along its route that can't handle that large a
packet. Too small of an MTU size means relatively more overhead and
more acknowledgements that have to be sent and handled. The MTU is
rated in "octets" or groups of 8 bits. The so-called "official"
internet standard MTU is 576, but the standard rating for ethernet is
an MTU of 1500.
20) What other TCP setting can you modify besides MTU to shorten packets?