Explain routing and routing protocols.
Routing is the process of selecting a path for traffic in a network, or between or across multiple networks. This is the primary function of a router (a Layer 3 device).
Routing protocols are the set of rules and algorithms that routers use to communicate with each other and share information about the network's topology. This information allows them to build and maintain routing tables, which they use to determine the best path for forwarding packets.
Routing protocols can be categorized as:
What is the use of the `ping` command?
The ping
command is a basic network utility used to test the reachability of a host on an IP network. It measures the round-trip time for messages sent from the originating host to a destination computer.
It works by sending an ICMP (Internet Control Message Protocol) Echo Request packet to the target host and waiting for an ICMP Echo Reply.
Primary uses are:
Example: ping google.com
What is the use of the `traceroute` (or `tracert`) command?
The traceroute
(on Linux/macOS) or tracert
(on Windows) command is a network diagnostic tool used to display the routing path (the sequence of routers) and measure the transit delays of packets across an IP network.
It works by sending a sequence of packets towards the destination with an incrementally increasing Time-to-Live (TTL) value. The TTL is a mechanism that limits the lifespan of data in a network.
This allows you to see every 'hop' a packet takes on its way to the destination and helps identify points of failure or high latency in the path.
What is `ipconfig` (or `ifconfig`)?
ipconfig
(on Windows) and ifconfig
(on Linux/macOS, though now often replaced by `ip addr`) are command-line utilities used to display the current TCP/IP network configuration values of a computer.
They can show you critical information for each network adapter, including:
They can also be used to perform certain administrative tasks, such as releasing and renewing a DHCP-assigned IP address (e.g., ipconfig /release
and ipconfig /renew
on Windows).
What is Wi-Fi and what are some common standards?
Wi-Fi is a wireless networking technology that allows devices like computers, mobile phones, and other equipment to connect to the Internet or communicate with one another wirelessly within a particular area.
Wi-Fi technologies are based on the IEEE 802.11 set of standards. Some common standards include:
What are public and private IP addresses?
IP addresses are divided into two main categories: public and private.
Private IP Addresses:
10.0.0.0
to 10.255.255.255
(Class A)172.16.0.0
to 172.31.255.255
(Class B)192.168.0.0
to 192.168.255.255
(Class C)Public IP Addresses:
What is CIDR notation?
CIDR (Classless Inter-Domain Routing) notation is a method for representing an IP address and its associated subnet mask in a more compact way.
It is written as the IP address followed by a forward slash ('/') and then a number. This number represents the number of leading '1' bits in the subnet mask (i.e., the length of the network prefix).
Example:
192.168.1.0
with a subnet mask of 255.255.255.0
.11111111.11111111.11111111.00000000
.192.168.1.0/24
.CIDR replaced the older, inflexible classful networking system (Class A, B, C) and allows for much more flexible allocation of IP addresses.
What is a VLAN?
A VLAN (Virtual Local Area Network) is a technology that allows you to logically segment a single physical LAN into multiple, separate virtual LANs.
Devices within a VLAN can communicate with each other as if they were on their own dedicated physical network, even if they are physically connected to the same switch as devices in other VLANs.
Benefits of VLANs:
What is PoE (Power over Ethernet)?
PoE (Power over Ethernet) is a technology that allows network cables (specifically, twisted-pair Ethernet cables) to carry electrical power along with data.
This means a single cable can provide both a data connection and electrical power to devices. This is extremely useful for devices that are installed in locations where a separate power outlet is inconvenient, expensive, or not feasible to install.
Common devices that use PoE include:
What is a Denial-of-Service (DoS) attack?
A Denial-of-Service (DoS) attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
This is typically accomplished by flooding the target with a huge volume of traffic or sending it malformed requests that cause it to crash or become overwhelmed. The goal is not to steal information, but to prevent legitimate users from accessing the service.
A DDoS (Distributed Denial-of-Service) attack is a variant where the attack traffic comes from many different sources (often a botnet of compromised computers), making it much harder to block.