🌐

Top 100 Networking Interview Questions

Top 100 Networking interview questions covering OSI model, TCP/IP, IP addressing, DNS, routing, switching, security, and cloud networking.

100 Questions
Filter:

A computer network is a system of interconnected computing devices (computers, servers, smartphones, printers, routers) that communicate with each other to share resources, data, and services. Networks can be classified by size: PAN (Personal Area Network — Bluetooth, USB, a few meters), LAN (Local Area Network — a building or campus), MAN (Metropolitan Area Network — a city), and WAN (Wide Area Network — countries/global, e.g., the Internet). Networks enable resource sharing (printers, storage), communication (email, VoIP), centralized management, and cost savings. The Internet is the world's largest public WAN, connecting billions of devices globally.

Beginner

The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a communication system into 7 layers, allowing different systems and vendors to communicate. From top to bottom: Layer 7 — Application (HTTP, FTP, SMTP, DNS — user-facing services), Layer 6 — Presentation (data format translation, encryption, compression), Layer 5 — Session (managing sessions/connections between applications), Layer 4 — Transport (TCP/UDP, end-to-end communication, port numbers), Layer 3 — Network (IP addressing, routing), Layer 2 — Data Link (MAC addresses, framing, switches), Layer 1 — Physical (cables, signals, bits). Mnemonic: "All People Seem To Need Data Processing" (top to bottom).

Beginner

The TCP/IP model (also called the Internet model) is a practical 4-layer framework that describes how data is transmitted over the Internet. It is the basis of all modern networking. The layers are: Application Layer (corresponds to OSI layers 5-7 — HTTP, HTTPS, FTP, SMTP, DNS, SSH), Transport Layer (corresponds to OSI layer 4 — TCP and UDP, port numbers), Internet Layer (corresponds to OSI layer 3 — IP, ICMP, routing), and Network Access Layer (corresponds to OSI layers 1-2 — Ethernet, Wi-Fi, MAC addresses). Unlike OSI, TCP/IP is not just a theoretical model — it was built from the protocols that actually power the Internet, developed by DARPA in the 1970s.

Beginner

TCP (Transmission Control Protocol) is a connection-oriented protocol that guarantees reliable, ordered, and error-checked delivery of data. It establishes a connection via a 3-way handshake (SYN → SYN-ACK → ACK), ensures packets arrive in order, retransmits lost packets, and uses flow control and congestion control. It is slower due to this overhead. Use TCP for: web browsing (HTTP/HTTPS), email (SMTP), file transfers (FTP), SSH. UDP (User Datagram Protocol) is connectionless — it sends data without establishing a connection, with no guarantee of delivery, ordering, or error recovery. Much faster and lower overhead. Use UDP for: video streaming, online gaming, VoIP, DNS queries, DHCP — applications where speed matters more than perfect reliability, or that have their own error-handling logic.

Beginner

An IP (Internet Protocol) address is a unique numerical label assigned to every device on a network, enabling identification and location. IPv4 addresses are 32-bit numbers written in dotted-decimal notation: four octets (0-255) separated by dots (e.g., 192.168.1.100). IPv4 has about 4.3 billion possible addresses, which are nearly exhausted. IPv6 addresses are 128-bit, written as eight groups of four hexadecimal digits separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334), providing approximately 340 undecillion addresses. IPs can be public (globally routable, assigned by ISPs) or private (used inside local networks: 10.x.x.x, 172.16-31.x.x, 192.168.x.x).

Beginner

A subnet mask is a 32-bit number that divides an IP address into the network portion (identifying the network) and the host portion (identifying the individual device on that network). It uses 1s for network bits and 0s for host bits. Example: 255.255.255.0 (or /24) means the first 24 bits are the network address and the last 8 bits identify hosts — allowing 254 usable host addresses (2^8 - 2, excluding network and broadcast addresses). The network address is found by ANDing the IP with the subnet mask. CIDR notation: 192.168.1.0/24. Understanding subnet masks is fundamental to IP routing — routers use them to determine if a destination is on the local network or must be sent to a gateway.

Beginner

CIDR (Classless Inter-Domain Routing) notation is a compact way to represent an IP address and its associated subnet mask. A slash followed by a number indicates how many bits are used for the network portion: 192.168.1.0/24 means 24 bits for network (leaving 8 bits for hosts = 256 addresses, 254 usable). Common CIDR values: /8 — 16.7M hosts (Class A range), /16 — 65,534 hosts (Class B range), /24 — 254 hosts (Class C range), /30 — 2 usable hosts (point-to-point links), /32 — single host. CIDR replaced the old classful (A/B/C) addressing system, allowing more efficient allocation of IP space by using variable-length subnet masks (VLSM) instead of fixed class boundaries.

Beginner

These are three different network devices operating at different OSI layers. A Hub (Layer 1) is a simple device that broadcasts all incoming traffic to every port — no intelligence, creates collisions, inefficient. Largely obsolete. A Switch (Layer 2) learns the MAC addresses of connected devices and forwards frames only to the correct destination port, reducing collisions and improving performance. Switches operate within a single network (LAN). A Router (Layer 3) connects different networks and makes forwarding decisions based on IP addresses. It routes packets between networks (e.g., your LAN to the Internet), performs NAT (Network Address Translation), and maintains a routing table. Home "routers" are actually a combination of router, switch, and wireless access point in one device.

Beginner

A MAC (Media Access Control) address is a unique hardware identifier assigned to a network interface card (NIC) by the manufacturer. It is a 48-bit (6-byte) address written in hexadecimal: 00:1A:2B:3C:4D:5E. The first 3 bytes (OUI) identify the manufacturer; the last 3 bytes are the device-specific identifier. MAC addresses operate at Layer 2 (Data Link) and are used for communication within a local network segment. Unlike IP addresses, MAC addresses are permanent (burned into hardware) and do not change when a device moves to a different network — though they can be spoofed in software. Switches use MAC address tables to forward frames to the correct port. ARP (Address Resolution Protocol) maps IP addresses to MAC addresses on a local network.

Beginner

DNS (Domain Name System) is the Internet's "phone book" — it translates human-readable domain names (like google.com) into machine-readable IP addresses (like 142.250.80.46). Without DNS, users would need to memorize IP addresses for every website. DNS is a distributed, hierarchical system. When you type a URL, your computer first checks its local cache, then queries a Recursive Resolver (typically your ISP's), which then queries Root Servers (13 clusters), then TLD servers (.com, .org), then Authoritative Name Servers for the specific domain. The result is cached for a duration set by the TTL (Time to Live). DNS records include: A (IPv4 address), AAAA (IPv6), CNAME (alias), MX (mail server), TXT (text, used for SPF, DKIM), NS (name server).

Beginner

DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses and other network configuration parameters to devices on a network, eliminating the need for manual IP configuration. When a device connects to a network, it broadcasts a DHCP Discover message. A DHCP server responds with an Offer containing an available IP address. The client sends a Request, and the server sends an Acknowledgment confirming the lease. This process is known as DORA (Discover, Offer, Request, Acknowledge). DHCP assigns: IP address, subnet mask, default gateway, and DNS server addresses. Leases are temporary — the client must renew before expiry. DHCP is running on your home router, giving each device a local IP from the 192.168.x.x range automatically.

Beginner

NAT (Network Address Translation) is a technique that modifies IP address information in packet headers while in transit through a router. It allows multiple devices on a private network to share a single public IP address when communicating with the Internet. Your home router has one public IP from your ISP but assigns private IPs (192.168.x.x) to all your devices. When you access a website, the router replaces your private IP with its public IP in the outgoing packet (and remembers the mapping in a NAT table). When the reply comes back, the router translates the public IP back to the correct private IP. PAT (Port Address Translation), also called NAPT, extends NAT by using port numbers to distinguish between multiple simultaneous connections sharing one public IP — this is what virtually all home routers use.

Beginner

A firewall is a network security device (hardware or software) that monitors and controls incoming and outgoing network traffic based on predefined security rules. It acts as a barrier between a trusted internal network and untrusted external networks (like the Internet). Types: Packet filtering firewalls inspect individual packets based on IP, port, and protocol rules — fast but limited visibility. Stateful inspection firewalls track the state of active connections and only allow packets that belong to an established connection — more secure. Application layer (proxy) firewalls understand application protocols (HTTP, FTP) and can filter based on content. Next-Generation Firewalls (NGFW) combine all the above with deep packet inspection, intrusion prevention, SSL decryption, and application awareness. Firewalls are a fundamental component of network security architecture.

Beginner

HTTP (HyperText Transfer Protocol) is the foundation of data communication on the Web — it transmits data in plaintext between a browser and a web server. Anyone intercepting the traffic (man-in-the-middle attack) can read or modify the data. HTTPS (HTTP Secure) encrypts the HTTP traffic using TLS (Transport Layer Security), previously SSL. TLS provides: encryption (data cannot be read in transit), authentication (SSL certificate proves the server is who it claims to be, issued by a Certificate Authority), and data integrity (tampered data is detected). HTTPS uses port 443; HTTP uses port 80. Since 2018, browsers mark all HTTP sites as "Not Secure." HTTPS is now the standard — nearly all websites and APIs use it. TLS 1.3 (current version) is faster and more secure than previous versions.

Beginner

A VPN (Virtual Private Network) creates an encrypted tunnel between your device and a remote server over the public Internet, making your traffic private and secure. It serves two main purposes. Remote access VPN: allows employees to securely connect to a company's internal network from home or while traveling — their device joins the corporate network as if physically present. Site-to-site VPN: connects two or more office networks securely over the Internet, replacing expensive dedicated leased lines. Consumer VPNs mask your real IP address and encrypt your Internet traffic from your ISP. VPN protocols: OpenVPN (open-source, very secure), WireGuard (modern, fast), IPsec/IKEv2 (used by many enterprise VPNs), L2TP/IPsec. VPNs do not make you completely anonymous — the VPN provider can see your traffic.

Beginner

Public IP addresses are globally routable addresses assigned by Internet Service Providers (ISPs), unique across the entire Internet. Any device with a public IP can be directly reached from anywhere on the Internet. Private IP addresses are reserved ranges used inside local networks (LANs) that are not routed on the Internet. RFC 1918 defines three private ranges: 10.0.0.0/8 (10.0.0.0 – 10.255.255.255, ~16.7M addresses), 172.16.0.0/12 (172.16.0.0 – 172.31.255.255, ~1M addresses), 192.168.0.0/16 (192.168.0.0 – 192.168.255.255, 65,534 addresses). Devices with private IPs access the Internet through NAT on the router, which translates their private address to the router's public IP. Other special addresses: 127.0.0.1 (loopback/localhost), 169.254.x.x (APIPA — assigned when DHCP fails).

Beginner

Bandwidth is the maximum amount of data that can be transmitted over a network link per unit of time, measured in bits per second (bps, Mbps, Gbps). It is the "width of the pipe" — a 100 Mbps connection can theoretically transfer 100 megabits every second. Throughput is the actual data transfer rate achieved in practice, always lower than bandwidth due to overhead, congestion, and errors. Latency (also called delay or ping) is the time it takes for a packet to travel from source to destination, measured in milliseconds (ms). Low latency is critical for real-time applications (gaming, VoIP, video calls). High bandwidth but high latency is called a "fat pipe" — great for bulk transfers but poor for interactive applications. Together they define network performance: a fast download requires high bandwidth; a smooth video call requires low latency.

Beginner

The TCP 3-way handshake is the process by which a TCP connection is established between a client and server before any data is exchanged. Step 1: SYN — the client sends a segment with the SYN (synchronize) flag set and a random Initial Sequence Number (ISN). Step 2: SYN-ACK — the server responds with both SYN and ACK flags set, its own ISN, and an acknowledgment of the client's ISN + 1. Step 3: ACK — the client sends an ACK acknowledging the server's ISN + 1. After this, the connection is established and bidirectional data transfer can begin. TCP connection termination uses a 4-way handshake (FIN → FIN-ACK → FIN → FIN-ACK). The handshake establishes sequence numbers for ordered delivery and confirms both sides can send and receive — this is why TCP is reliable but has higher setup latency than UDP.

Beginner

Port numbers identify specific applications or services on a device (0–65535). Well-known ports (0–1023) are assigned by IANA to common services: 20/21 — FTP (data/control), 22 — SSH, 23 — Telnet (insecure, avoid), 25 — SMTP (email sending), 53 — DNS, 67/68 — DHCP (server/client), 80 — HTTP, 110 — POP3, 143 — IMAP, 443 — HTTPS, 3389 — RDP, 3306 — MySQL, 5432 — PostgreSQL, 6379 — Redis, 27017 — MongoDB. Registered ports (1024–49151) are assigned to applications. Dynamic/ephemeral ports (49152–65535) are assigned by the OS to client-side connections. A socket is a combination of IP address and port number (e.g., 192.168.1.1:443).

Beginner

ARP (Address Resolution Protocol) resolves an IP address to a MAC address within a local network. When a device wants to send data to another device on the same LAN, it knows the destination IP but needs the MAC address for the Ethernet frame. It broadcasts an ARP Request: "Who has IP 192.168.1.5? Tell 192.168.1.1." The device with that IP responds with an ARP Reply containing its MAC address. The mapping is cached in the ARP table (cache) for future use. ARP is vulnerable to ARP spoofing/poisoning — a malicious device sends fake ARP replies to associate its MAC with another device's IP, enabling man-in-the-middle attacks. Gratuitous ARP is an unsolicited ARP broadcast used to announce an IP-to-MAC mapping or detect IP conflicts. arp -a (Windows/Linux) shows the local ARP cache.

Beginner

ICMP (Internet Control Message Protocol) is a supporting protocol used by network devices to send error messages and operational information — not for data transmission. It operates at the Network layer (Layer 3) and is encapsulated in IP packets. Ping uses ICMP Echo Request and Echo Reply messages to test connectivity: ping google.com sends ICMP Echo Requests to Google's server; Google responds with Echo Replies. Ping reports round-trip time (latency) and packet loss. Traceroute (tracert on Windows) uses ICMP (or UDP) with increasing TTL values to discover each hop along the path to a destination. Each router decrements the TTL by 1; when TTL reaches 0, the router sends an ICMP "Time Exceeded" message, revealing its IP. Common ICMP messages: Type 0 (Echo Reply), Type 3 (Destination Unreachable), Type 8 (Echo Request), Type 11 (Time Exceeded).

Beginner

The default gateway is the router that a device sends packets to when the destination IP address is not on the local network. It is the "exit door" of the local network — the device uses its subnet mask to determine if the destination is local or not. If not local, it forwards the packet to the default gateway, which then routes it toward the destination. In a typical home network, the default gateway is the router's IP address (commonly 192.168.1.1 or 192.168.0.1). When no default gateway is configured, a device can only communicate with other devices on its local subnet. The default gateway must be on the same subnet as the device using it. Check your default gateway: route print (Windows), ip route (Linux), netstat -rn (macOS/Linux).

Beginner

The loopback address is a special IP address (127.0.0.1 for IPv4, ::1 for IPv6) that routes back to the same device without going through the network. It is used to test the network stack of a device itself. The entire 127.0.0.0/8 block is reserved for loopback, but 127.0.0.1 is the standard. The hostname localhost resolves to 127.0.0.1 (or ::1). Common uses: testing web servers during development (accessing http://localhost:8080), inter-process communication on the same machine, and verifying the TCP/IP stack is functioning correctly. Traffic sent to the loopback address never leaves the host — it is processed entirely within the OS networking stack, making it faster than actual network communication.

Beginner

A broadcast address is a special IP address that sends a packet to all devices on a network simultaneously, rather than to a specific host. Limited broadcast (255.255.255.255) sends to all hosts on the local network segment — not forwarded by routers. Directed broadcast uses the host portion all set to 1s for a specific subnet: for 192.168.1.0/24, the broadcast address is 192.168.1.255. ARP requests and DHCP Discovers use broadcasts. The broadcast address is always the last address in a subnet (cannot be assigned to a host). Modern networks disable directed broadcast forwarding to prevent Smurf attacks (ICMP flood amplified by broadcast). IPv6 does not use broadcasts — it replaces them with multicast and anycast addresses, which are more efficient.

Beginner

A network protocol is a set of rules and conventions that govern how devices communicate over a network. Protocols define the format of messages, the sequence of exchanges, error handling, and how to establish and terminate connections. Without protocols, devices from different manufacturers could not communicate. Protocols exist at every OSI layer: Physical (Ethernet, Wi-Fi), Data Link (Ethernet 802.3, PPP), Network (IP, ICMP, OSPF, BGP), Transport (TCP, UDP), Application (HTTP, FTP, SMTP, DNS, SSH). Protocols are typically defined in RFCs (Request for Comments) published by IETF (Internet Engineering Task Force). Standardization allows interoperability — your MacBook can browse a website on a Windows server because both follow the same HTTP, TCP, and IP protocols.

Beginner

FTP (File Transfer Protocol) is an application-layer protocol for transferring files between a client and server. It uses two TCP connections: port 21 (control connection — commands and responses) and port 20 (data connection — actual file transfer). FTP has two modes: Active (server connects to client for data) and Passive (client initiates both connections — better through NAT/firewalls). FTP transmits credentials and data in plaintext — a significant security risk. Modern alternatives: SFTP (SSH File Transfer Protocol, port 22 — encrypted, completely different protocol from FTP), FTPS (FTP with TLS encryption), and SCP (Secure Copy, also over SSH). SFTP is now the recommended approach for secure file transfer. For web hosting and development, Git and SFTP have largely replaced plain FTP.

Beginner

SSH (Secure Shell) is a cryptographic network protocol for securely operating network services over an unsecured network — primarily used for remote command-line access to servers. It replaced the insecure Telnet and rsh protocols. SSH uses port 22 and encrypts all traffic including passwords, commands, and file transfers. Key features: Remote shell access (ssh user@server), file transfer (SFTP and SCP), port forwarding/tunneling (forward local ports through the encrypted tunnel), and X11 forwarding (forward graphical applications). Authentication methods: password (less secure) and public key (more secure — private key on client, public key on server in ~/.ssh/authorized_keys). SSH key pairs are generated with ssh-keygen. OpenSSH is the most widely used implementation. Always disable root SSH login and password authentication in production servers.

Beginner

These are email protocols. SMTP (Simple Mail Transfer Protocol) is used to send emails from a mail client to a mail server, and between mail servers. Port 25 (server-to-server), port 587 (client submission, with STARTTLS), port 465 (SMTPS — SMTP over SSL). POP3 (Post Office Protocol v3) is used to retrieve emails from a server to a local client (port 110, or 995 with SSL). POP3 downloads and typically deletes emails from the server — emails are only on one device. IMAP (Internet Message Access Protocol) also retrieves emails (port 143, or 993 with SSL) but keeps them on the server, synchronizing across multiple devices. Changes (read, delete, folder moves) sync everywhere. IMAP is the modern choice — use it when you access email from multiple devices (phone, laptop, browser).

Beginner

A VLAN (Virtual Local Area Network) is a logical segmentation of a physical network into separate broadcast domains, as if they were completely separate physical networks. VLANs are configured on managed switches. Devices in different VLANs cannot communicate without going through a router (or Layer 3 switch). Benefits: security (separate sensitive traffic — e.g., management VLAN from user VLAN), traffic management (reduce broadcast domain size), flexibility (group devices by function regardless of physical location), and cost (one physical switch replaces multiple). VLAN tagging uses IEEE 802.1Q — a 4-byte tag is added to Ethernet frames to identify which VLAN the traffic belongs to. Trunk ports carry traffic from multiple VLANs between switches; access ports connect to end devices and belong to a single VLAN.

Beginner

IPv4 uses 32-bit addresses (4 billion total) written as dotted decimal (e.g., 192.168.1.1). We are essentially out of public IPv4 addresses — NAT was a workaround. IPv6 uses 128-bit addresses providing ~340 undecillion addresses (enough to assign trillions to every person on Earth), written as colon-separated hex (e.g., 2001:db8::1). Key IPv6 improvements: no NAT needed (every device gets a unique global address), no broadcast (uses multicast/anycast), built-in IPsec, stateless address autoconfiguration (SLAAC) — devices configure themselves without DHCP, simpler header for faster routing, and better support for mobility. IPv6 header has no checksum (handled at transport layer) and no fragmentation at routers. Dual-stack deployment runs both IPv4 and IPv6 simultaneously during the transition.

Beginner

A network topology describes the physical or logical arrangement of devices and connections in a network. Bus topology: all devices connect to a single shared cable — simple but a single break disrupts the entire network. Star topology: all devices connect to a central switch/hub — most common today; one device failure does not affect others, but the central switch is a single point of failure. Ring topology: devices connect in a circular chain — data travels in one direction; failure of one device can disrupt the network (dual-ring adds redundancy). Mesh topology: every device connects to every other — maximum redundancy but expensive; used in critical infrastructure and WANs. Tree (hierarchical) topology: star networks connected to a central backbone — scalable for enterprises. Hybrid topology: combination of topologies. Most enterprise networks use a hierarchical star topology.

Beginner

A packet is the fundamental unit of data transmission in a packet-switched network (like the Internet). Large messages are broken into smaller packets for transmission. Each packet contains: a header (source and destination IP, packet length, protocol, TTL, checksum) and a payload (the actual data). Packets from the same message may travel different routes through the network and arrive out of order — TCP reassembles them in the correct sequence at the destination. This approach offers advantages over circuit switching: more efficient use of network resources, fault tolerance (packets route around failures), and the ability to share bandwidth among multiple communications simultaneously. The maximum packet size is the MTU (Maximum Transmission Unit) — typically 1500 bytes on Ethernet. Larger packets are fragmented.

Beginner

TTL (Time to Live) is an 8-bit field in an IP packet header that limits the lifetime of a packet to prevent it from circulating indefinitely in routing loops. Each time a router forwards the packet, it decrements the TTL by 1. When TTL reaches 0, the router discards the packet and sends an ICMP "Time Exceeded" message back to the source. The initial TTL value varies by OS: typically 64 for Linux/macOS and 128 for Windows. By examining the TTL of received packets, you can sometimes guess the OS of the sending device. Traceroute exploits TTL by sending packets with TTL=1, 2, 3... each intermediate router discards the packet when TTL hits 0 and sends a Time Exceeded response, revealing that router's IP. In DNS, TTL controls how long a record is cached — a short TTL means faster propagation of changes but more DNS lookups.

Beginner

A Layer 2 switch operates at the Data Link layer — it forwards Ethernet frames based on MAC addresses. It learns which MAC addresses are on which ports and builds a MAC address table (CAM table). Layer 2 switches cannot route between different networks/subnets — all connected devices must be in the same IP subnet (unless VLANs with a router are used). A Layer 3 switch (also called a multilayer switch) adds routing capabilities — it can route packets between different VLANs and IP subnets based on IP addresses, like a router. Layer 3 switches use specialized hardware (ASICs) for high-speed routing — much faster than software-based routers for inter-VLAN routing in large enterprise networks. Most enterprise core and distribution layer switches are Layer 3. Simplified: Layer 2 = switching by MAC; Layer 3 = switching AND routing by IP.

Beginner

Wi-Fi is a wireless networking technology based on the IEEE 802.11 standard family that allows devices to connect to a LAN via radio waves. A wireless access point (WAP) connects to the wired network and broadcasts a Wi-Fi signal in a coverage area. Devices discover networks via their SSID (Service Set Identifier) — the network name. Security protocols: WEP (deprecated, easily cracked), WPA/WPA2 (current standard, WPA2-AES is recommended), WPA3 (latest, stronger encryption). Wi-Fi generations: 802.11ac (Wi-Fi 5) — up to 3.5 Gbps, 5 GHz. 802.11ax (Wi-Fi 6/6E) — up to 9.6 Gbps, better in congested environments. 2.4 GHz band: longer range, lower speed, more interference. 5 GHz band: shorter range, higher speed, less interference.

Beginner

A proxy server is an intermediary server that sits between clients and destination servers, forwarding requests on behalf of clients. Forward proxy: used by clients to access the Internet — it hides the client's IP, enables caching (faster access to frequently visited sites), applies access controls, and can bypass geo-restrictions. Common in corporate networks to filter employee Internet access. Reverse proxy: sits in front of web servers, hiding their identities from clients. Used for load balancing (distributing traffic across multiple servers), SSL termination (offloading HTTPS from backend servers), caching, compression, and as a WAF (Web Application Firewall). Examples: Nginx, HAProxy, Cloudflare (reverse proxy/CDN). Transparent proxies intercept traffic without client configuration. Proxies operate at Layer 7 (Application layer), unlike NAT which works at Layer 3.

Beginner

A CDN (Content Delivery Network) is a geographically distributed network of servers that caches and delivers content to users from the server closest to them, reducing latency and improving performance. When you visit a CDN-backed website, a DNS query routes you to the nearest edge server (PoP — Point of Presence) rather than the origin server. Edge servers cache: static files (images, CSS, JavaScript, videos), entire web pages, and API responses. Benefits: faster loading times (content served from nearby servers), reduced origin server load, DDoS protection (absorbs attack traffic at the edge), high availability (redundant servers globally). Major CDN providers: Cloudflare, AWS CloudFront, Akamai, Fastly. CDNs are essential for large-scale web applications — nearly every major website uses a CDN.

Beginner

A network topology diagram is a visual representation of a network's structure showing how devices are connected. It comes in two forms: Physical topology shows the actual physical layout — where cables run, where devices are located in the building. Logical topology shows how data flows through the network — the logical connections, IP addressing, VLANs, and routing paths regardless of physical layout. Network diagrams use standard symbols: cloud (internet/external network), cylinder (router), rectangle with multiple ports (switch), monitor (workstation), server icon (server). Tools: Cisco Packet Tracer, GNS3 (network simulators), Microsoft Visio, draw.io, Lucidchart. Network diagrams are essential documentation for network administrators — they help with troubleshooting, planning upgrades, and training. Keeping diagrams up-to-date is a best practice that many organizations neglect.

Beginner

Network troubleshooting is the systematic process of diagnosing and resolving network problems. Common tools: ping (test connectivity and measure latency), traceroute/tracert (trace the path and identify where packets are being dropped), nslookup/dig (query DNS records), ipconfig/ifconfig/ip addr (view IP configuration), netstat/ss (show active connections and listening ports), nmap (network scanning, open port discovery), Wireshark (packet capture and deep analysis), mtr (combines ping and traceroute), tcpdump (command-line packet capture). Systematic approach: work through the OSI model from bottom to top — verify physical connectivity first, then check IP configuration, default gateway, DNS, and finally application-level issues. Document problems and solutions for future reference.

Beginner

Half-duplex communication allows data to flow in both directions but only one direction at a time — like a walkie-talkie. One party transmits while the other listens, then they switch. Ethernet hubs operate in half-duplex — only one device can transmit at a time on a segment, and collisions can occur (managed by CSMA/CD). Full-duplex allows simultaneous transmission in both directions — like a telephone. Modern Ethernet switches operate in full-duplex, eliminating collisions because each switch port has a dedicated path. Full-duplex effectively doubles the available bandwidth compared to half-duplex on the same link (e.g., a 100 Mbps full-duplex link can simultaneously send and receive 100 Mbps each). Modern networks almost universally use full-duplex since hubs have been replaced by switches. Duplex mismatch (one side full, other half) causes poor performance and high collision rates.

Beginner

Subnetting is the process of dividing a larger network into smaller, more manageable subnetworks. It improves security (contain broadcast traffic), performance, and IP address management. To subnet 192.168.1.0/24 into 4 subnets: borrow 2 bits from the host portion (2^2 = 4 subnets), giving /26 (26 network bits). Each subnet has 64 addresses (2^6), 62 usable hosts, and they are: 192.168.1.0/26 (hosts .1–.62, broadcast .63), 192.168.1.64/26 (hosts .65–.126, broadcast .127), 192.168.1.128/26, 192.168.1.192/26. Formula: number of subnets = 2^(borrowed bits); hosts per subnet = 2^(remaining host bits) - 2. VLSM (Variable Length Subnet Masking) allows different subnet sizes in the same network, reducing waste. For example, a point-to-point link needs only /30 (2 hosts) rather than a /24.

Intermediate

OSPF (Open Shortest Path First) is a link-state routing protocol used within a single autonomous system (interior gateway protocol). Each OSPF router maintains a complete map of the network topology (Link State Database/LSDB) and uses Dijkstra's SPF (Shortest Path First) algorithm to calculate the best path to every destination. Routers exchange Link State Advertisements (LSAs) to share topology information. OSPF is organized into areas to limit LSA flooding and reduce the size of routing tables — Area 0 is the backbone; all other areas must connect to Area 0. OSPF uses the cost metric (based on bandwidth) to determine the best path. OSPF quickly detects and responds to topology changes, converges fast, supports VLSM/CIDR, and has no hop count limit. Widely used in enterprise and ISP networks. OSPFv2 for IPv4, OSPFv3 for IPv6.

Intermediate

BGP (Border Gateway Protocol) is the routing protocol that powers the Internet — it manages how packets are routed between different autonomous systems (networks belonging to different organizations/ISPs). BGP is the only EGP (Exterior Gateway Protocol) in use today. BGP uses path vector routing — it tracks the entire path (AS_PATH) to prevent routing loops, unlike distance-vector or link-state protocols. iBGP (internal BGP) runs between routers within the same AS. eBGP (external BGP) runs between different ASes. BGP makes routing decisions based on policies and attributes: AS_PATH, LOCAL_PREF, MED, NEXT_HOP, communities. BGP is highly configurable but complex — a misconfigured BGP announcement can cause major Internet outages (BGP hijacking incidents). All major ISPs and large organizations use BGP. BGP runs over TCP port 179.

Intermediate

STP (Spanning Tree Protocol, IEEE 802.1D) prevents switching loops in networks with redundant paths between switches. Without STP, a loop would cause broadcast storms (packets circulating endlessly), rapidly consuming all bandwidth and crashing the network. STP works by electing a Root Bridge (the switch with the lowest Bridge ID = priority + MAC address). From the Root Bridge, STP calculates the shortest path to every other switch and blocks redundant paths by placing specific ports in Blocking state. Active ports are in Forwarding state; ports transition through Listening and Learning states during convergence. RSTP (Rapid STP, 802.1w) converges in seconds instead of up to 50 seconds for STP. MSTP (Multiple STP) creates separate spanning tree instances per VLAN group. Modern networks often use RSTP with portfast/BPDU guard for faster convergence on edge ports.

Intermediate

QoS (Quality of Service) is a set of techniques for managing network resources to prioritize certain types of traffic over others, ensuring critical applications receive the bandwidth and low latency they need. Without QoS, all traffic is treated equally (best-effort) — a large file download could degrade VoIP call quality. QoS components: Classification and Marking — identify traffic type (IP Precedence, DSCP values in the IP header). Queuing — prioritize packets (FIFO, Weighted Fair Queuing, Low Latency Queuing). Traffic Shaping/Policing — control bandwidth usage. Congestion Avoidance (WRED — Weighted Random Early Detection). DSCP (Differentiated Services Code Point) marks packets with a 6-bit value (0-63) in the IP header: EF (Expedited Forwarding, 46) for VoIP, AF for business data, CS0 for best-effort. QoS is critical for unified communications, video conferencing, and cloud applications over shared WAN links.

Intermediate

These are three methods of network communication based on the number of intended recipients. Unicast is one-to-one communication — a packet sent from a single source to a single specific destination. Most Internet traffic is unicast (HTTP, SSH, FTP). Broadcast is one-to-all — a packet sent to all devices in a network segment. ARP requests and DHCP Discovers use broadcast (IPv4 only — IPv6 eliminated broadcasts). Broadcasts are inefficient and can cause network performance issues if excessive. Multicast is one-to-many (or many-to-many) — a packet sent from one source to a group of interested receivers only. Uses multicast IP addresses (224.0.0.0–239.255.255.255 for IPv4). Efficient for streaming, video conferencing, and routing protocol updates (OSPF Hello packets use multicast 224.0.0.5). IGMP manages multicast group membership. Anycast (used in IPv6 and CDNs) sends to the nearest member of a group.

Intermediate

PAT (Port Address Translation), also called NAT overload or NAPT, is the most common form of NAT used in homes and businesses. It allows many private IP addresses to share a single public IP by using unique port numbers to distinguish connections. When a device (192.168.1.10) connects to a web server, the router translates the source IP to its public IP and assigns a unique source port (e.g., 54321) from the ephemeral range. The NAT table records: private IP:port → public IP:port. When the reply arrives, the router uses the destination port to look up the NAT table entry and forward to the correct internal device. This allows a home router to handle thousands of simultaneous connections from multiple devices using one public IP. The port number becomes the multiplexing key. PAT supports up to 65,535 simultaneous connections per public IP (limited by available port numbers).

Intermediate

MPLS (Multiprotocol Label Switching) is a routing technique that uses short labels attached to packets to make forwarding decisions, rather than examining the full IP header at each hop. This makes forwarding faster and allows for traffic engineering. How it works: at the ingress MPLS router (LER — Label Edge Router), a label is pushed onto the packet. Intermediate routers (LSRs — Label Switch Routers) forward based solely on the label (swap the label with the next label). At the egress LER, the label is popped and the packet is forwarded normally. MPLS creates LSPs (Label Switched Paths) — predetermined paths through the network. Benefits: traffic engineering (control paths explicitly), QoS (label-based forwarding with different treatment), VPNs (MPLS VPNs separate customer traffic using labels), and faster forwarding. Widely used by ISPs and for enterprise MPLS WAN services. Being replaced by SD-WAN in many deployments.

Intermediate

IPsec (Internet Protocol Security) is a suite of protocols for securing IP communications by authenticating and encrypting each IP packet. It operates at the Network layer (Layer 3), transparently securing all traffic regardless of the application. IPsec has two modes: Transport mode — only the payload is encrypted; original IP headers remain intact (used for end-to-end host-to-host security). Tunnel mode — the entire original IP packet is encrypted and encapsulated in a new IP packet (used for VPNs — gateway-to-gateway). Key protocols: AH (Authentication Header) — provides authentication and integrity but no encryption. ESP (Encapsulating Security Payload) — provides encryption, authentication, and integrity (most commonly used). IKE (Internet Key Exchange) — negotiates security associations (SAs) and manages key exchange. IPsec is the foundation of most site-to-site VPNs and L2TP/IPsec remote access VPNs.

Intermediate

SNMP (Simple Network Management Protocol) is an application-layer protocol for collecting and organizing information about managed devices on a network — routers, switches, servers, printers — and for modifying device behavior. Components: SNMP Manager (network management system that polls devices), SNMP Agent (software on the managed device that responds to queries), and MIB (Management Information Base) (database of OIDs — Object Identifiers — defining manageable parameters). SNMP operations: GET (retrieve a value), SET (modify a value), TRAP (unsolicited alert from agent to manager). Versions: SNMPv1/v2c use community strings for authentication (transmitted in plaintext — insecure). SNMPv3 adds authentication (MD5/SHA) and encryption (DES/AES). Common SNMP ports: 161 (agent), 162 (traps). Tools: Nagios, Zabbix, PRTG, SolarWinds use SNMP for network monitoring.

Intermediate

Network segmentation is the practice of dividing a network into smaller, isolated segments to improve security, performance, and manageability. Benefits: security containment — if a segment is compromised, the attacker cannot easily move laterally to other segments; reduced broadcast domain — less broadcast traffic improving performance; regulatory compliance — isolate PCI DSS (payment card data) or HIPAA (health data) systems; access control — enforce who can talk to what. Implementation methods: VLANs (Layer 2 segmentation on switches), subnets with ACLs/firewalls (Layer 3), DMZ (Demilitarized Zone) — a separate zone for public-facing servers, isolated from the internal network. Zero Trust architecture takes segmentation further — no implicit trust even inside the network; verify every access request. Segmentation is a fundamental security best practice for defense-in-depth.

Intermediate

A load balancer distributes incoming network traffic across multiple servers to ensure no single server becomes overwhelmed, improving availability and scalability. Types: Layer 4 (Transport) load balancers make decisions based on IP and TCP/UDP ports without inspecting content — fast but limited visibility. Layer 7 (Application) load balancers inspect HTTP headers, URLs, and cookies to make more intelligent routing decisions (e.g., route /api to API servers, /static to CDN). Load balancing algorithms: Round-Robin (distribute equally in rotation), Least Connections (send to server with fewest active connections), IP Hash (consistent routing based on client IP — session persistence), Weighted (servers get traffic proportional to weight). Health checks detect and route around failed servers. Examples: AWS ELB/ALB/NLB, Nginx, HAProxy, F5 BIG-IP. Load balancers are essential for high-availability web applications.

Intermediate

DNS load balancing distributes traffic by returning different IP addresses in response to the same DNS query. The simplest method is Round-Robin DNS — a domain has multiple A records (different IPs) and the DNS server cycles through them. The client connects to the first IP returned. This is simple but has no health checking — if a server fails, clients still receive its IP. DNS failover monitors server health and removes failed servers' IPs from DNS responses. Advanced DNS providers (Route 53, Cloudflare, NS1) support: weighted routing (send X% to server A, Y% to server B), geolocation routing (different servers for different regions), latency-based routing (route to lowest latency endpoint), and failover routing (primary/secondary with health checks). TTL affects failover speed — short TTLs allow faster updates but increase DNS query load.

Intermediate

A DMZ (Demilitarized Zone) is a separate, isolated network segment between the internal trusted network and the untrusted Internet, typically used to host public-facing servers (web servers, mail servers, DNS servers, API servers). The DMZ sits between two firewalls (or using a 3-legged firewall): an outer firewall allowing Internet traffic to reach DMZ servers, and an inner firewall preventing DMZ servers from accessing the internal network directly. Benefits: if a DMZ server is compromised, the attacker cannot directly reach internal systems — they must breach the inner firewall. The DMZ can host: web servers, reverse proxies, email gateways, FTP servers, and VPN concentrators. Traffic flows: Internet → outer firewall → DMZ → inner firewall → internal network. This architecture implements defense-in-depth — an attacker must compromise multiple layers. Modern implementations often use micro-segmentation and zero trust instead of a traditional DMZ.

Intermediate

Network monitoring is the continuous process of observing network performance, availability, and health to detect issues, ensure SLAs, and plan capacity. Monitoring covers: device availability (is the router/switch up?), bandwidth utilization (how much of the link capacity is used?), latency/packet loss, error rates, interface statistics, and security events. Technologies: SNMP (polling device metrics), NetFlow/sFlow/IPFIX (traffic flow analysis — who is talking to whom), Syslog (centralized log collection), ICMP monitoring (availability checks), WMI/API (Windows/cloud monitoring). Popular tools: Nagios/Icinga (open-source alerting), Zabbix (open-source, comprehensive), PRTG (user-friendly), SolarWinds NPM (enterprise), Grafana + InfluxDB (modern, time-series visualization), Wireshark (packet-level analysis). Proactive monitoring reduces MTTR (Mean Time to Resolution) and prevents outages.

Intermediate

IP Address Management (IPAM) is the practice of planning, tracking, and managing the allocation of IP addresses in a network. Without proper IPAM, networks suffer from IP conflicts, address exhaustion, and poor documentation. IPAM includes: address inventory (tracking which IPs are assigned to which devices), DNS/DHCP management (DDI — DNS, DHCP, IPAM), subnet planning (CIDR allocation, VLSM, hierarchical addressing), and audit trails. Tools: phpIPAM (open-source), NetBox (open-source, also tracks devices/cables), Infoblox (enterprise DDI), BlueCat, Microsoft IPAM (Windows Server built-in). Best practices: document all allocations, reserve ranges for servers/network equipment/DHCP, use consistent naming conventions, and implement hierarchical addressing (summarizable routes reduce routing table size). IPAM becomes critical in organizations with thousands of devices and multiple sites.

Intermediate

ACLs (Access Control Lists) are ordered lists of rules on a router or firewall that permit or deny traffic based on criteria like source/destination IP, protocol, and port. Each rule is evaluated sequentially — when a match is found, the action (permit/deny) is taken and processing stops. If no rule matches, an implicit deny-all drops the packet. Types: Standard ACLs (filter based on source IP only — simple). Extended ACLs (filter based on source/destination IP, protocol, port — more powerful). Cisco example: access-list 101 deny tcp 192.168.1.0 0.0.0.255 any eq 23 (block Telnet from subnet). ACL placement: place standard ACLs close to the destination (they only filter by source, so you do not want to block traffic too early); place extended ACLs close to the source (filter early, reduce unnecessary traffic). Modern firewalls use stateful inspection beyond simple ACLs.

Intermediate

Network redundancy eliminates single points of failure by providing backup paths and devices, ensuring the network continues operating if a component fails. Techniques: Link redundancy — multiple physical connections between switches (use STP/RSTP to prevent loops, or LAG/port-channel to aggregate bandwidth). Device redundancy — dual routers/firewalls with failover protocols (HSRP/VRRP for first-hop redundancy — one virtual gateway IP shared by two physical routers). ISP redundancy — connect to multiple ISPs with BGP for failover. Power redundancy — dual PSUs in servers and network equipment, UPS, generator backup. Path redundancy in WAN — primary MPLS with backup Internet VPN. Availability metrics: 99.9% ("three nines") = ~8.7 hours downtime/year; 99.99% ("four nines") = ~52 minutes/year. High availability design must eliminate SPOFs at every tier: access, distribution, core, data center, Internet edge.

Intermediate

HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) are First-Hop Redundancy Protocols (FHRPs) that provide a virtual default gateway IP address shared between multiple physical routers. If the active router fails, the standby router takes over within seconds, maintaining connectivity. HSRP is Cisco-proprietary. An active router and standby router share a virtual IP and virtual MAC address. Hosts use the virtual IP as their default gateway. If the active router fails, the standby becomes active after a hold timer expires. VRRP (RFC 5798) is the open standard equivalent — one master and multiple backup routers share a virtual IP. GLBP (Gateway Load Balancing Protocol) is Cisco's improvement that load-balances across multiple routers rather than having one idle standby. All three provide sub-second failover with proper tuning, making the gateway transparent to end users.

Intermediate

Port Security is a Layer 2 security feature on managed switches that restricts the MAC addresses allowed to connect to a switch port. You can set a maximum number of MAC addresses per port and specify which MACs are allowed (static or dynamically learned). If a violation occurs (unknown MAC attempts to connect or limit exceeded), the port takes an action: Shutdown (port disabled — must be manually re-enabled, most secure), Restrict (drop traffic from unknown MACs, log violation), or Protect (drop traffic from unknown MACs, no log). Port security prevents: MAC flooding attacks (attacker sends many fake MACs to fill the CAM table, causing the switch to flood all traffic), unauthorized device connections, and rogue devices. Limit port security to access ports connecting to end devices, not uplinks. Combined with 802.1X authentication for stronger security.

Intermediate

802.1X is an IEEE standard for port-based Network Access Control (NAC) that requires authentication before allowing network access. When a device connects to a switch port or Wi-Fi access point, it cannot access the network until it provides valid credentials. Components: Supplicant (the client device needing access), Authenticator (the switch or WAP enforcing access), Authentication Server (RADIUS server, e.g., Cisco ISE, FreeRADIUS, Microsoft NPS — validates credentials). The process: supplicant provides credentials (username/password, certificate, or EAP method) via EAP (Extensible Authentication Protocol). The authenticator forwards to the RADIUS server. If approved, the port is opened; if denied, traffic is blocked or placed in a guest VLAN. 802.1X provides: strong authentication (certificates), per-user/device policies (VLAN assignment based on identity), and visibility into what is on the network. Essential for enterprise network security.

Intermediate

Network tunneling encapsulates one network protocol inside another, allowing traffic to traverse networks that would otherwise not support it. Tunneling creates a virtual point-to-point connection (the tunnel) between two endpoints. Common tunneling protocols: GRE (Generic Routing Encapsulation) — encapsulates any Layer 3 protocol inside IP packets; no encryption (often combined with IPsec). IPsec tunnel mode — encrypted IP-in-IP tunneling for VPNs. L2TP (Layer 2 Tunneling Protocol) — encapsulates PPP frames, often used with IPsec for VPNs. VXLAN (Virtual Extensible LAN) — encapsulates Layer 2 Ethernet frames in UDP packets to extend VLANs across Layer 3 networks; widely used in data centers and cloud. SSH tunneling — forward TCP ports through an encrypted SSH connection. Tunneling enables: connecting networks with different protocols, bypassing firewalls (also used for evasion, which is a security concern), and creating logical overlays over physical networks.

Intermediate

NetFlow (developed by Cisco) is a network protocol that collects and monitors IP network traffic as it flows through routers and switches, providing visibility into who is talking to whom and how much bandwidth they use. A flow is a unidirectional sequence of packets sharing the same source IP, destination IP, source port, destination port, and protocol. NetFlow exports flow records to a flow collector for analysis and storage. sFlow (standards-based) samples packets statistically — less CPU intensive. IPFIX (IP Flow Information Export, RFC 7011) is the IETF standard based on NetFlow v9. Use cases: bandwidth monitoring (which users/apps use the most), security (detect DDoS, port scanning, unusual traffic patterns), capacity planning, billing. Tools: SolarWinds NTA, ntopng, Elastic Stack, Grafana + InfluxDB. NetFlow is typically enabled on routers and Layer 3 switches. It consumes router CPU and memory, so sampling is often used on high-speed links.

Intermediate

Common network attacks include: DDoS (Distributed Denial of Service) — overwhelming a target with traffic from many sources to make it unavailable. Man-in-the-Middle (MitM) — intercepting and possibly altering communications between two parties (ARP poisoning, rogue Wi-Fi AP). ARP Spoofing/Poisoning — sending fake ARP replies to associate attacker's MAC with a legitimate IP, redirecting traffic. DNS Poisoning (Cache Poisoning) — inserting malicious DNS entries to redirect users to fake websites. Port Scanning — discovering open ports and services (nmap). Packet Sniffing — capturing network traffic to extract sensitive data (Wireshark on unsecured networks). IP Spoofing — forging source IP addresses to impersonate another host. VLAN Hopping — exploiting switch misconfigurations to access traffic in other VLANs. Replay Attacks — capturing and retransmitting valid network transmissions. Mitigations: encryption (TLS, VPN), firewalls, IDS/IPS, network segmentation, DAI (Dynamic ARP Inspection), DNSSEC.

Intermediate

EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco-proprietary advanced distance-vector routing protocol that uses features of both distance-vector and link-state protocols. It is often called a "hybrid" or "balanced hybrid" protocol. EIGRP uses the DUAL (Diffusing Update Algorithm) to calculate loop-free paths and maintain backup routes (feasible successors) so it can instantly switch to a backup path without waiting for reconvergence. EIGRP sends partial, bounded updates only when the topology changes (not periodic full table updates like RIP), making it bandwidth-efficient. The composite metric uses bandwidth, delay, reliability, and load (by default only bandwidth and delay). EIGRP maintains three tables: neighbor table (adjacent routers), topology table (all learned routes), and routing table (best paths). It supports VLSM, CIDR, and supports IPv4, IPv6, and other Layer 3 protocols. EIGRP converges faster than OSPF in most scenarios and is simpler to configure for smaller networks.

Intermediate

RIP (Routing Information Protocol) is one of the oldest distance-vector routing protocols, using hop count as its sole metric — the number of routers a packet must pass through to reach the destination. Maximum hop count is 15; 16 is considered unreachable. RIP is simple to configure but has significant limitations: slow convergence (uses periodic updates every 30 seconds), maximum network diameter of 15 hops, no support for VLSM in RIPv1, and susceptibility to routing loops (mitigated by split horizon, route poisoning, and holddown timers). RIPv1: classful, broadcasts updates, no authentication. RIPv2: classless (VLSM support), multicasts updates (224.0.0.9), supports authentication. RIPng: for IPv6. RIP is rarely used in production networks today — it has been replaced by OSPF and EIGRP for most enterprise deployments. It remains useful only in very small, simple networks or as a learning tool.

Intermediate

Link Aggregation (also called bonding, trunking, or port-channel) combines multiple physical network links into a single logical link, providing increased bandwidth and redundancy. If one physical link fails, the others continue carrying traffic. LACP (Link Aggregation Control Protocol, IEEE 802.3ad) is the standard protocol for negotiating link aggregation — both sides dynamically negotiate which links to aggregate. Cisco calls it EtherChannel; Linux calls it bonding. Load balancing across member links uses a hash algorithm based on: source/destination MAC, IP addresses, or port numbers — ensuring related packets take the same path (to avoid out-of-order delivery). A 4-link 1 Gbps bundle theoretically provides 4 Gbps of aggregate bandwidth. Static LAG (without LACP) can be configured but has no dynamic negotiation. Link aggregation is widely used between switches, between servers and switches, and between routers, providing both bandwidth and redundancy without spanning tree involvement.

Intermediate

WPA2 (Wi-Fi Protected Access 2) has been the standard wireless security protocol since 2004. WPA2-Personal uses a Pre-Shared Key (PSK) — everyone uses the same password; WPA2-Enterprise uses 802.1X with a RADIUS server for individual user authentication. WPA2-AES (CCMP) is secure; WPA2-TKIP is deprecated and weak. Major WPA2 vulnerability: KRACK (Key Reinstallation Attack) — allows decryption of traffic through manipulation of the 4-way handshake. WPA3 (2018) addresses WPA2 weaknesses: SAE (Simultaneous Authentication of Equals) replaces PSK — uses Dragonfly key exchange, making offline dictionary attacks against captured handshakes impossible. Forward secrecy — even if the password is later compromised, past sessions cannot be decrypted. OWE (Opportunistic Wireless Encryption) for open networks (encrypts without passwords). WPA3-Enterprise uses 192-bit cryptographic strength. Transition mode allows WPA2 and WPA3 devices to coexist. Enable WPA3 where supported; never use WEP or WPA.

Intermediate

Traditional DNS queries are sent in plaintext over UDP/TCP port 53, making them visible to ISPs, network administrators, and attackers — enabling DNS surveillance, censorship, and DNS spoofing. DNS over TLS (DoT, RFC 7858) encrypts DNS queries using TLS on port 853. The connection is separate from HTTPS traffic, making it identifiable and easier for network administrators to monitor or block. DNS over HTTPS (DoH, RFC 8484) sends DNS queries inside HTTPS on port 443, making DNS traffic indistinguishable from regular web traffic — harder to block or monitor. Firefox and Chrome support DoH natively. Providers: Cloudflare (1.1.1.1), Google (8.8.8.8), NextDNS. Trade-offs: DoH improves user privacy from ISPs but moves trust to the DoH provider and reduces network administrators' visibility/control. Enterprise networks often block DoH to maintain DNS-based security controls. DNSSEC provides authentication; DoH/DoT provides confidentiality — both are complementary.

Intermediate

Syslog is the standard protocol for sending log messages from network devices (routers, switches, firewalls, servers) to a centralized log server for storage, analysis, and alerting. It uses UDP or TCP on port 514 (TCP on 6514 for TLS-encrypted syslog). Syslog messages have a severity level (0-7): 0 Emergency, 1 Alert, 2 Critical, 3 Error, 4 Warning, 5 Notice, 6 Informational, 7 Debug. A facility code indicates the source type (kernel, mail, security, local0-7). Cisco devices: logging host 192.168.1.100; logging trap warnings sends warnings and above to the syslog server. Centralized logging is essential for: security event monitoring (SIEM integration), troubleshooting (correlate events across devices with synchronized timestamps), compliance (retain logs for audit), and capacity planning. Tools: rsyslog (Linux), Graylog, ELK Stack, Splunk. Always use NTP to ensure timestamps are synchronized across all devices for accurate log correlation.

Intermediate

DHCP snooping is a Layer 2 security feature on switches that prevents rogue DHCP servers from assigning IP addresses to clients. A rogue DHCP server could give clients a malicious gateway IP (man-in-the-middle) or exhaust the legitimate DHCP pool. DHCP snooping works by classifying switch ports as either trusted (connected to legitimate DHCP servers or uplinks) or untrusted (connected to end devices). DHCP server messages (OFFER, ACK) are only accepted on trusted ports — untrusted ports can only send DHCP REQUEST and DISCOVER messages. The snooping binding database records: client MAC, IP, VLAN, and port — used by other security features. Enable: ip dhcp snooping; ip dhcp snooping vlan 10-20. Mark uplinks trusted: interface GigabitEthernet0/1; ip dhcp snooping trust. DHCP snooping also enables Dynamic ARP Inspection (DAI) (validates ARP packets) and IP Source Guard (validates source IP against the binding table).

Intermediate

Dynamic ARP Inspection (DAI) is a security feature that validates ARP packets in a network to prevent ARP spoofing/poisoning attacks. ARP spoofing allows attackers to associate their MAC address with the IP of another host (like the default gateway), intercepting traffic. DAI intercepts all ARP packets on untrusted ports and validates them against the DHCP snooping binding table (which records legitimate IP-MAC-port-VLAN mappings). If the ARP packet's IP-MAC binding matches the binding table, it is forwarded; otherwise, it is dropped and logged. DAI requires DHCP snooping to be enabled first (since it uses the binding table). For devices with static IPs (servers, routers), create ARP ACLs: arp access-list SERVER-ACL; permit ip host 10.0.0.1 mac host 00:11:22:33:44:55. Enable: ip arp inspection vlan 10; ip arp inspection trust on uplinks. DAI operates at Layer 2 and effectively eliminates ARP poisoning attacks from the local network.

Intermediate

Convergence is the time it takes for all routers in a network to have a consistent, accurate view of the network topology after a change (link failure, router failure, new route). Fast convergence minimizes downtime. Comparison: RIP: slowest — periodic updates every 30 seconds, holddown timers add 180+ seconds — can take minutes to converge. OSPF: fast — hello interval (10s) detects failures; SPF recalculation completes in milliseconds; converges in seconds. Tuning hello/dead intervals reduces detection time. EIGRP: very fast — maintains feasible successor routes for instant failover without recalculation; reconvergence in milliseconds for pre-calculated backup paths. BGP: slowest by design — minutes — to allow routing policy to propagate globally. BFD (Bidirectional Forwarding Detection) detects link failures in milliseconds and notifies routing protocols, dramatically improving convergence regardless of the routing protocol used. In data centers, BFD combined with OSPF or BGP achieves sub-second convergence.

Intermediate

Cloud networking provides virtual network infrastructure in cloud environments. VPC (Virtual Private Cloud) is a logically isolated section of a cloud provider's network where you control the virtual network environment: IP address ranges, subnets, routing tables, and network gateways. AWS VPC example: create a VPC with CIDR 10.0.0.0/16, divide into public subnets (10.0.1.0/24 — internet-accessible) and private subnets (10.0.2.0/24 — internal only). An Internet Gateway connects the VPC to the Internet; a NAT Gateway allows private subnet instances to access the Internet without being directly reachable. Security Groups act as stateful firewalls at the instance level; NACLs (Network Access Control Lists) are stateless firewalls at the subnet level. VPC Peering connects two VPCs; Transit Gateway connects multiple VPCs and on-premises networks. Direct Connect/ExpressRoute provides dedicated private connectivity from on-premises to the cloud.

Intermediate

Key network performance metrics for monitoring and troubleshooting: Latency — round-trip time (RTT) in milliseconds; measured with ping. Jitter — variation in latency; critical for real-time applications (VoIP, video); measured with iperf or MOS scores. Packet Loss — percentage of packets that do not reach the destination; even 1% causes significant TCP throughput degradation. Throughput — actual data transfer rate achieved; measured with iperf3. Bandwidth Utilization — percentage of link capacity in use; consistently above 70-80% indicates need for upgrade. Error Rate — CRC errors, input/output errors on interfaces (hardware issues, bad cables). CPU/Memory utilization on network devices (high CPU can indicate routing issues or attacks). Interface errors — drops (queue overflow), input errors (corrupt frames). Tools: iperf3 (throughput testing), ping/traceroute, Wireshark, SNMP-based monitoring (PRTG, Zabbix), NetFlow analysis. SLA definitions typically specify maximum acceptable latency, jitter, and packet loss for each traffic class.

Intermediate

SD-WAN (Software-Defined Wide Area Network) applies software-defined networking (SDN) principles to WAN connectivity, separating the control plane from the data plane to centrally manage and optimize WAN traffic. Traditional MPLS WANs are expensive, inflexible, and slow to provision. SD-WAN allows organizations to use multiple transport types (MPLS, broadband Internet, 4G/5G) simultaneously and intelligently route traffic based on application policies. Key capabilities: centralized management (single dashboard for all branches), application-aware routing (route Salesforce over MPLS, YouTube over cheap broadband), built-in encryption (zero-trust overlay network), WAN optimization, and cloud optimization (direct breakout to AWS/Azure instead of backhauling to HQ). Vendors: Cisco Viptela, VMware VeloCloud, Fortinet SD-WAN, Palo Alto Prisma SD-WAN. SD-WAN can reduce WAN costs 30-50% while improving performance.

Advanced

Zero Trust is a security model based on the principle "never trust, always verify" — no user, device, or network segment is trusted by default, even if inside the corporate perimeter. Traditional perimeter-based security assumes everything inside the firewall is safe — a single breach gives attackers free access to the internal network. Zero trust requires: strong identity verification (MFA, certificate-based) for every access request, device health validation (is the device patched? Has it been compromised?), least-privilege access (only access what is needed, nothing more), micro-segmentation (isolate workloads and restrict lateral movement), continuous monitoring and validation (re-verify throughout sessions). Implementation technologies: ZTNA (Zero Trust Network Access), SDP (Software Defined Perimeter), IAM, PAM, EDR, SIEM. NIST SP 800-207 defines the zero trust architecture. This approach is particularly relevant post-COVID with remote workers and cloud workloads outside traditional perimeters.

Advanced

SDN (Software-Defined Networking) decouples the network's control plane (brain — deciding where traffic goes) from the data plane (muscle — forwarding packets), centralizing control in software. Traditional networks are distributed — each router/switch makes its own decisions using distributed protocols (OSPF, STP). In SDN, a centralized controller has a global view of the network and programs forwarding rules into network devices via southbound APIs (OpenFlow being the standard protocol). Applications interact with the controller via northbound APIs. Benefits: programmability (automate network changes via code), centralized visibility (single view of the entire network), agility (rapid policy changes without touching individual devices), vendor neutrality. SDN is the foundation for: network virtualization (NSX, ACI), cloud networking (AWS VPC, Azure VNet), and network automation. OpenDaylight, ONOS, and Cisco ACI are SDN controller implementations.

Advanced

VXLAN (Virtual Extensible LAN) is a network virtualization technology that encapsulates Layer 2 Ethernet frames inside Layer 4 UDP packets, allowing Layer 2 networks to span across Layer 3 (routed) infrastructure. VXLAN solves a critical data center problem: VLANs are limited to 4094 IDs and cannot natively cross Layer 3 boundaries. VXLAN provides 16 million segment IDs (VNI — VXLAN Network Identifiers) and extends Layer 2 across the entire data center or cloud. VTEP (VXLAN Tunnel Endpoint) devices encapsulate/decapsulate VXLAN traffic. VTEPs can be software (in hypervisors — VMware vSphere, Linux kernel VXLAN) or hardware (on switches). VXLAN uses UDP port 4789. In modern cloud environments (AWS, Azure, Google Cloud), VXLAN and similar overlay technologies create virtual networks for tenants. EVPN (Ethernet VPN) is often combined with VXLAN as the control plane for MAC/IP learning.

Advanced

BGP communities are optional, transitive path attributes that tag routes with additional information, enabling flexible policy application. A community is a 32-bit value written as AS:value. Well-known communities: NO_EXPORT (do not advertise to eBGP peers), NO_ADVERTISE (do not advertise to any peer), LOCAL_AS (do not advertise outside the local confederation). Custom communities: ISPs use them to signal route preferences, triggering upstream policies. For example, attaching community 65000:100 might tell an ISP to set lower local preference for that route. BGP route filtering techniques: prefix-lists (filter by specific prefixes/ranges), AS-path filter lists (filter by regex on AS_PATH), route-maps (set/match multiple attributes, most flexible), community-lists (match by community values). Proper BGP filtering is critical for ISPs and large networks — incorrect BGP announcements can cause major Internet routing incidents.

Advanced

NFV (Network Function Virtualization) replaces dedicated hardware appliances (firewalls, load balancers, routers, IDS/IPS) with software running on standard commercial off-the-shelf (COTS) x86 servers and hypervisors. Instead of buying a dedicated Cisco ASA firewall, you run a virtual firewall (vFW) as a VM or container. ETSI defined the NFV architecture with: VNFs (Virtual Network Functions) — the virtualized network appliances, NFVI (NFV Infrastructure) — compute, storage, networking (cloud/hypervisor layer), and MANO (Management and Orchestration) — lifecycle management of VNFs (OpenStack, Kubernetes). Benefits: reduced hardware costs, faster service deployment, elastic scaling (scale up/down based on demand), vendor independence, and simplified management. NFV is used by telecom operators for 5G core networks, virtual CPE (customer premises equipment), and virtual EPC. Closely related to SDN — together they form the foundation of modern carrier networks.

Advanced

OSPF uses hierarchical area design to scale large networks. The backbone is Area 0 — all other areas must connect directly or virtually to it. Regular areas contain internal routers, receive full routing information. Stub area — does not accept external LSAs (routes redistributed into OSPF from other protocols); uses a default route instead — reduces LSDB size. Totally Stubby area (Cisco) — more restrictive; does not accept inter-area or external LSAs, uses only default route. NSSA (Not-So-Stubby Area) — like a stub area but allows limited redistribution of external routes via Type 7 LSAs (converted to Type 5 at ABR). Router types: Internal Router (all interfaces in one area), ABR (Area Border Router) (connects multiple areas), ASBR (Autonomous System Boundary Router) (redistributes routes from/to other routing domains). Good area design minimizes LSA flooding, reduces LSDB size, and limits SPF recalculations to specific areas.

Advanced

DNSSEC (DNS Security Extensions) adds cryptographic authentication to DNS to protect against DNS spoofing and cache poisoning attacks. Without DNSSEC, DNS responses can be forged — an attacker can return a fake IP for a legitimate domain. DNSSEC works by digitally signing DNS records using public-key cryptography. The zone owner signs records with their private key; clients can verify using the public key in the DNSKEY record. The chain of trust starts at the DNS root, which signs TLD zone keys (.com, .org), which sign domain zone keys. Resource records: RRSIG — digital signature for a record set, DNSKEY — public key used to verify signatures, DS (Delegation Signer) — hash of a child zone's DNSKEY, creates the chain of trust, NSEC/NSEC3 — authenticated denial of non-existence. DNSSEC validates only integrity and authenticity — it does not encrypt DNS queries (that is DNS-over-HTTPS/TLS). Adoption has been gradual — many major domains still have not fully deployed DNSSEC.

Advanced

BGP lacks built-in security — anyone can announce any prefix, leading to routing incidents. BGP hijacking occurs when a malicious or misconfigured AS announces prefixes it does not own, redirecting traffic. Famous examples: Pakistan Telecom's 2008 YouTube hijack, Amazon Route 53 BGP hijack in 2018. BGP route leaks propagate routes to peers that should not see them, disrupting routing. Mitigations: RPKI (Resource Public Key Infrastructure) — cryptographically validates that ASes have authorization to announce specific IP prefixes via ROA (Route Origin Authorization) records; ROV (Route Origin Validation) drops invalid announcements. IRR (Internet Routing Registry) filtering — filter based on published routing policies. MD5 authentication on BGP sessions — prevents session hijacking. Prefix filtering — only accept expected prefixes from each peer. MANRS (Mutually Agreed Norms for Routing Security) — industry initiative for routing security practices. RPKI adoption is growing but still not universal.

Advanced

Network monitoring is the collection and alerting on known metrics and events — you define what to watch and get alerted when thresholds are exceeded. It answers: "is this thing working?" Network observability is a broader concept — the ability to understand the internal state of a system from its external outputs (metrics, logs, traces). It answers: "why is this thing failing?" Observability consists of three pillars: Metrics (time-series numerical data — bandwidth, latency, error rates), Logs (timestamped records of events — syslog, NetFlow), and Traces (end-to-end transaction tracking across multiple hops). Modern network observability platforms combine all three: Grafana + Prometheus (metrics + visualization), ELK Stack or Splunk (log analysis), OpenTelemetry (standard observability data collection). As networks become more complex (hybrid cloud, microservices, SD-WAN), observability becomes essential — monitoring alone cannot diagnose intermittent or complex failures.

Advanced

NTP (Network Time Protocol) synchronizes clocks across network devices to a reference time source. Accurate time is critical for: log correlation (correlating events across devices, security forensics), certificate validation (TLS certificates have validity periods), authentication protocols (Kerberos requires clocks within 5 minutes), distributed databases, and financial transactions. NTP uses a hierarchical structure of time sources called strata: Stratum 0 — highly accurate reference clocks (GPS, atomic clocks). Stratum 1 — servers directly connected to Stratum 0 sources. Stratum 2 — servers synchronized to Stratum 1, and so on. NTP uses UDP port 123. PTP (Precision Time Protocol, IEEE 1588) achieves sub-microsecond accuracy for financial trading and telecom. SNTP is a simplified NTP for devices that do not need full NTP precision. Configure NTP on all network devices — clock skew causes hard-to-diagnose problems. Use at least two NTP sources for redundancy. NTPsec and Chrony are modern replacements for the legacy ntpd daemon.

Advanced

Anycast is a network addressing and routing methodology where traffic is routed to the topologically nearest node in a group of potential receivers, all sharing the same IP address. The routing infrastructure (BGP) determines which node is "closest" based on routing metrics. This differs from unicast (one-to-one), multicast (one-to-many-interested), and broadcast (one-to-all). Anycast applications: DNS root servers — there are only 13 root server IP addresses but hundreds of physical servers worldwide all sharing those IPs; queries go to the nearest server. CDN — Cloudflare and Fastly use anycast to route requests to the nearest edge PoP. DDoS mitigation — anycast distributes attack traffic across multiple PoPs. DNS anycast — Google Public DNS (8.8.8.8) and Cloudflare (1.1.1.1) use anycast to serve billions of queries with low latency globally. The main challenge: if a node fails, BGP must withdraw its announcement, which can take seconds to minutes to propagate globally.

Advanced

Network automation uses software to provision, configure, test, and operate network devices — replacing manual CLI work. Benefits: speed (minutes instead of hours/days for changes), consistency (no human error, same configuration everywhere), scalability (manage hundreds of devices as easily as one), and audit trails (track all changes via version control). Tools: Ansible (agentless, YAML playbooks, most popular for network automation — uses SSH and APIs to configure Cisco, Juniper, Arista, etc.), Python with Netmiko/NAPALM (Netmiko for SSH connections, NAPALM for multi-vendor abstraction), Terraform (infrastructure as code — provision cloud networking resources declaratively). Infrastructure as Code (IaC) treats network configurations like software — stored in Git, peer-reviewed, tested, and deployed through CI/CD pipelines. Model-driven programmability: YANG data models, NETCONF/RESTCONF protocols replace CLI for network configuration. This is the future of network operations.

Advanced

SONET (Synchronous Optical Network) and SDH (Synchronous Digital Hierarchy) are the American and international standards (respectively) for transmitting multiple digital streams over optical fiber at synchronous speeds. They define a rigid hierarchy of speeds: OC-1 (51.84 Mbps), OC-3 (155 Mbps), OC-12 (622 Mbps), OC-48 (2.5 Gbps), OC-192 (10 Gbps). SONET/SDH provide excellent operations, administration, and maintenance (OAM) capabilities and protection switching (recovery in 50ms). DWDM (Dense Wavelength Division Multiplexing) transmits multiple data streams simultaneously on a single fiber by using different wavelengths (colors) of light. Each wavelength carries an independent channel (100 Gbps or more per wavelength). 80-160 wavelengths per fiber = 8-16 Tbps per fiber pair. DWDM is the technology underlying modern long-haul and submarine fiber networks. Modern networks combine DWDM at the optical layer with OTN (Optical Transport Network) replacing legacy SONET/SDH framing, and Ethernet/IP at the packet layer.

Advanced

TCP congestion control prevents senders from overwhelming the network with more traffic than it can handle. TCP uses several mechanisms: Slow Start — begins transmission conservatively with a small congestion window (cwnd), doubling it each RTT until loss occurs or the Slow Start Threshold (ssthresh) is reached. Congestion Avoidance — once ssthresh is reached, cwnd grows linearly (1 MSS per RTT) instead of exponentially. Fast Retransmit — upon receiving 3 duplicate ACKs (indicating a gap in received data), retransmit the missing segment without waiting for a timeout. Fast Recovery — after fast retransmit, reduce ssthresh to cwnd/2 and continue congestion avoidance (do not restart slow start). Modern algorithms: TCP Cubic (default in Linux) — optimized for high-bandwidth, high-latency paths; uses cubic function for cwnd growth. TCP BBR (Google, Linux kernel) — model-based approach using measured bottleneck bandwidth and RTT rather than loss signals; significantly improves throughput on congested and long-fat networks. TCP QUIC (UDP-based) sidesteps TCP congestion limitations.

Advanced

In a full-mesh iBGP network, every router must have a BGP session with every other router — resulting in N*(N-1)/2 sessions. For 100 routers that is 4,950 sessions — unscalable. Route Reflectors (RR) solve this by relaxing the BGP split-horizon rule: normally, a router learned a route from an iBGP peer does not advertise it to other iBGP peers. A Route Reflector can re-advertise routes received from clients to other clients and non-clients. Clients only need sessions with the RR, not with each other. The RR reflects routes while preserving the original NEXT_HOP, LOCAL_PREF, and AS_PATH — client routers still make their own forwarding decisions. Cluster ID and Originator ID attributes prevent routing loops. Multiple RRs (redundancy) in a cluster: clients have sessions with multiple RRs. Hierarchical RR design scales to thousands of routers. The alternative is BGP Confederation (dividing the AS into sub-ASes) — less common but valid.

Advanced

OSPF uses different types of LSAs (Link State Advertisements) to distribute topology information. Type 1 (Router LSA): generated by every router, describes its directly connected links and states — flooded only within an area. Type 2 (Network LSA): generated by the DR (Designated Router) on broadcast/multi-access networks, lists all routers on the segment — flooded within an area. Type 3 (Summary LSA): generated by ABRs (Area Border Routers), advertises inter-area routes — flooded between areas. Type 4 (ASBR Summary LSA): generated by ABRs, tells other areas how to reach the ASBR. Type 5 (AS External LSA): generated by ASBRs, advertises external routes (from other routing protocols) — flooded through the entire OSPF domain (except stub areas). Type 7 (NSSA External LSA): used in NSSAs instead of Type 5, converted to Type 5 by ABR. Stub areas block Type 4 and 5 LSAs, reducing the LSDB size. Understanding LSA types is essential for OSPF troubleshooting and design.

Advanced

EVPN (Ethernet VPN) is a control plane technology standardized in RFC 7432 that uses BGP to distribute MAC and IP reachability information — replacing traditional flood-and-learn MAC learning. Originally designed for MPLS data planes, EVPN is now most commonly used with VXLAN as the data plane in modern data center fabrics. Benefits: MAC/IP mobility — when a VM moves, BGP withdraws the old MAC/IP route and advertises it from the new location; ARP suppression — local proxy ARP using BGP-learned MAC/IP mappings eliminates ARP flooding; Multi-homing — active-active redundancy for hosts connected to multiple switches (Ethernet Segment ID); Layer 3 routing between VXLANs using Distributed Anycast Gateway (same gateway IP/MAC on all leaf switches). EVPN is the dominant control plane for leaf-spine data center fabrics (Cisco ACI, Arista CloudVision, Juniper QFX, cumulus Linux). It enables scalable, automated network overlays for cloud-scale environments.

Advanced

The hierarchical network design model (Cisco three-tier model) organizes the network into logical layers, each with a specific role. Access layer: connects end devices (workstations, IP phones, APs) to the network — Layer 2 switches with port security, 802.1X, PoE. Focus: user connectivity and policy enforcement. Distribution layer: aggregates access layer switches and provides inter-VLAN routing, policy (ACLs, QoS), and redundancy — Layer 3 switches. Acts as the boundary between Layer 2 access and Layer 3 core. Core layer: the high-speed backbone connecting distribution layers and providing connectivity to the data center, WAN, and Internet. No complex policies — pure speed and availability (redundant Layer 3 switches or routers). Modern data centers use a leaf-spine (Clos) architecture: every leaf switch connects to every spine switch — predictable latency, no oversubscription, scales by adding spine/leaf pairs. Good design principles: modular (add capacity without redesign), hierarchical (scalable), redundant (no SPOF), summarizable (hierarchical addressing allows route summarization).

Advanced

Segment Routing (SR) is a modern source-routing paradigm where the source node (or SDN controller) specifies the entire path through the network by encoding it as an ordered list of segments (instructions) in the packet header. Each segment represents an instruction — "go to this node," "take this specific path," or "apply this service function." This eliminates the need for per-flow state in intermediate nodes (no RSVP-TE tunnel state). Two data planes: SR-MPLS — uses the existing MPLS label stack; segments are encoded as MPLS labels. SRv6 (Segment Routing over IPv6) — uses IPv6 extension headers (Segment Routing Header/SRH) with 128-bit SID (Segment Identifier) values derived from IPv6 addresses. Benefits: simplifies MPLS networks (no LDP/RSVP), enables flexible traffic engineering, supports TI-LFA (fast reroute), and integrates naturally with SDN controllers. Used by major ISPs and cloud providers for inter-datacenter traffic engineering. Cisco, Juniper, and Nokia all support Segment Routing.

Advanced

The original TCP header uses a 16-bit receive window field — maximum 65,535 bytes. On high-bandwidth, high-latency links (high BDP — Bandwidth-Delay Product), this limits throughput severely. Example: 100 Gbps link, 100ms RTT — optimal window is 100 Gbps × 0.1s = 10 GB, far exceeding the 64 KB limit. TCP Window Scaling (RFC 1323) adds a scaling factor (0-14) negotiated during the 3-way handshake, allowing windows up to 1 GB (65535 × 2^14). Enabled by default in modern OS. Large Receive Offload (LRO) and Generic Receive Offload (GRO) are NIC and OS features that aggregate multiple incoming TCP segments into a single larger packet before passing to the kernel — reducing CPU overhead for high-throughput workloads. TCP Segmentation Offload (TSO) allows the OS to send large segments; the NIC splits them into MTU-sized pieces — reducing CPU cycles. These optimizations are critical for achieving 10/40/100 Gbps network throughput on servers without saturating CPUs.

Advanced

Network automation eliminates manual CLI configuration. Python with Netmiko: Netmiko is a multi-vendor SSH library that abstracts vendor differences. Connect and configure: from netmiko import ConnectHandler; device = {"device_type": "cisco_ios", "host": "192.168.1.1", "username": "admin", "password": "pass"}; conn = ConnectHandler(**device); output = conn.send_command("show interfaces"). NAPALM (Network Automation and Programmability Abstraction Layer with Multivendor support) provides a unified API across vendors for configuration management and state retrieval. Ansible: uses YAML playbooks and network-specific modules (cisco.ios.ios_interfaces, arista.eos.eos_vlans). No agent needed on network devices — uses SSH or APIs. Example: - name: Configure VLAN; cisco.ios.ios_vlans: config: - name: Management vlan_id: 10 state: active. Nornir: Python-native automation framework (alternative to Ansible). Key tools: netconf-console (NETCONF), gnmic (gNMI for streaming telemetry), Batfish (network configuration validation). Store configs in Git for version control and peer review.

Advanced

A wireless mesh network consists of multiple wireless access points (mesh nodes) that interconnect with each other wirelessly, extending coverage without requiring Ethernet cables to every AP. Each node can communicate with any other node in range — traffic is routed through the mesh to reach the gateway. Unlike traditional Wi-Fi where all APs connect back to a controller via cable (star topology), mesh networks self-organize and self-heal — if one node fails or becomes congested, traffic automatically routes through alternate paths. Technologies: 802.11s (IEEE standard for wireless mesh), proprietary mesh protocols (Eero, Google Nest Wifi, Orbi use 802.11ac/ax with dedicated backhaul bands). Dedicated backhaul: one radio band handles mesh inter-node traffic, another handles client connections — better performance than shared backhaul. Use cases: large homes, enterprise campuses, outdoor deployments (city-wide mesh for public Wi-Fi), tactical military networks. Challenges: hop count increases latency; careful placement is needed to avoid "hidden node" problems.

Advanced

Network visibility is the ability to monitor, analyze, and manage all traffic flowing through a network — essential for security monitoring, performance management, and compliance. As networks grow and traffic volumes increase, capturing and analyzing all traffic becomes challenging. A Network Packet Broker (NPB) aggregates, filters, and distributes network traffic from multiple monitoring points (TAPs and SPAN ports) to the appropriate monitoring tools (IDS/IPS, performance monitors, forensics). Without an NPB, each monitoring tool needs its own connections to every network segment — expensive and complex. NPBs provide: traffic aggregation (combine multiple 10G feeds into one 40G or 100G tool feed), filtering/slicing (send only relevant traffic to each tool — e.g., VoIP to quality monitors, HTTP to DLP), load balancing (distribute traffic across multiple tool instances), deduplication (remove duplicate packets from multiple capture points). Network TAPs (Test Access Points) passively copy all traffic without affecting the network (unlike SPAN ports, which can drop packets under load). NPBs from Gigamon, Ixia, and APCON are used in enterprise and carrier security architectures.

Advanced

GRE (Generic Routing Encapsulation) is a simple tunneling protocol that encapsulates any Layer 3 protocol (IPv4, IPv6, IPX, MPLS) inside IPv4 packets. A GRE tunnel appears as a virtual point-to-point link between two routers. GRE header adds 24 bytes overhead. GRE itself provides no encryption or authentication — it is commonly combined with IPsec for secure GRE tunnels (GRE over IPsec). Use cases: transporting non-IP protocols over IP networks, carrying routing protocols over point-to-point links (OSPF, EIGRP over GRE tunnels in hub-and-spoke WAN), IPv6 over IPv4 (during IPv6 transition), MPLS over IP. Example Cisco config: interface Tunnel0; ip address 10.0.0.1 255.255.255.252; tunnel source 203.0.113.1; tunnel destination 198.51.100.1. mGRE (Multipoint GRE) is used in DMVPN (Dynamic Multipoint VPN) to create scalable hub-and-spoke VPN networks where spokes can communicate directly (spoke-to-spoke) after initial hub negotiation.

Advanced
Back to All Topics 100 questions total