Networks and System Administration related stuff. Linux and Windows servers administration material and tutorials.
Thursday, August 6, 2009
Common Networking Terms and Qustions
10Base2—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments.
10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad); signaling, with 5 continuous segments not exceeding 100meters per segment.
10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.
2. Explain the difference between an unspecified passive open and a fully specified passive open
An unspecified passive open has the server waiting for a connection request from a client. A fully specified passive open has the server waiting for a connection from a pecific client.
3. Explain the function of Transmission Control Block
A TCB is a complex data structure that contains a considerable amount of information about each connection.
4. Explain a Management Information Base (MIB)
A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device's status, its erformance, connections, and configuration. The MIB is queried by SNMP.
5. Explain anonymous FTP and why would you use it
Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the assword usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.
6. Explain a pseudo tty
A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no connection can take place.
7. Explain REX
What advantage does REX offer other similar utilities
8. What does the Mount protocol do
The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request.
9. Explain External Data Representation
External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent.
10. Explain the Network Time Protocol ?
11. BOOTP helps a diskless workstation boot. How does it get a message to the network looking for its IP address and the location of its operating system boot files
BOOTP sends a UDP message with a subnetwork broadcast address and waits for a reply from a server that gives it the IP address. The same message might contain the name of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server.
12. Explain a DNS resource record
A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution nformation. Resource records are maintained as ASCII files.
13. What protocol is used by DNS name servers
DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.
14. Explain the difference between interior and exterior neighbor gateways
Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.
15. Explain the HELLO protocol used for
The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol.
16. What are the advantages and disadvantages of the three types of routing tables
The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be manually modified every time there is a change. A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine's table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network
administrator, although the table's contents can change without the administrator being aware of the change.
17. Explain a TCP connection table
18. Explain source route
It is a sequence of IP addresses identifying the route a datagram must follow. A source route may
optionally be included in an IP datagram header.
19. Explain RIP (Routing Information Protocol)
It is a simple protocol used to exchange information between router.
20. Explain SLIP (Serial Line Interface Protocol)
It is a very simple protocol used for transmission of IP datagrams across a serial line.
21. Explain Proxy ARP
It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router.
22. Explain OSPF
It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions.
23. Explain Kerberos
It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.
24. Explain a Multi-homed Host
It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host.
25. Explain NVT (Network Virtual Terminal)
It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.
26. Explain Gateway-to-Gateway protocol
It is a protocol formerly used to exchange routing information between Internet core routers.
27. Explain BGP (Border Gateway Protocol)
It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol).
28. Explain autonomous system
It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.
29. Explain EGP (Exterior Gateway Protocol)
It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached
within or via each autonomous system.
30. Explain IGP (Interior Gateway Protocol)
It is any routing protocol used within an autonomous system.
31. Explain Mail Gateway
It is a system that performs a protocol translation between different electronic mail delivery protocols.
32. Explain wide-mouth frog
Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.
33. What are Digrams and Trigrams
The most common two letter combinations are called as digrams. e.g. th, in, er, re and an. The most common three letter combinations are called as trigrams. e.g. the, ing, and, and ion.
34. Explain silly window syndrome
It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.
35. Explain region
When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.
36. Explain multicast routing
Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.
37. Explain traffic shaping
One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.
38. Explain packet filter
Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.
39. Explain virtual path
Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.
40. Explain virtual channel
Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.
41. Explain logical link control
One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.
42. Why should you care about the OSI Reference Model
It provides a framework for discussing network operations and design.
43. Explain the difference between routable and non- routable protocols
Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router
44. Explain MAU
In token Ring , hub is called Multistation Access Unit(MAU).
45. Explain 5-4-3 rule
In a Ethernet network, between any two points on the network, there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated.
46. Explain the difference between TFTP and FTP application layer protocols
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.
47. Explain the range of addresses in the classes of internet addresses
Class A 0.0.0.0 - 127.255.255.255
Class B 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 - 223.255.255.255
Class D 224.0.0.0 - 239.255.255.255
Class E 240.0.0.0 - 247.255.255.255
48. Explain the minimum and maximum length of the header in the TCP segment and IP datagram
The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.
49. Explain difference between ARP and RARP
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.
50. Explain ICMP
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.
51. What are the data units at different layers of the TCP / IP protocol suite
The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and
finally transmitted as signals along the transmission media.
52. Explain Project 802
It is a project started by IEEE to set standards that enable intercommunication between equipment from a variety of manufacturers. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LAN protocols.
It consists of the following:
802.1 is an internetworking standard for compatibility of different LANs and MANs across protocols.
802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is non-architecture-specific, that is remains the same for all IEEE-defined LANs.
Media access control (MAC) is the lower sublayer of the data link layer that contains some distinct modules each carrying proprietary information specific to the LAN product being used. The modules are Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5).
802.6 is distributed queue dual bus (DQDB) designed to be used in MANs.
53. Explain Bandwidth
Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.
54. Difference between bit rate and baud rate.
Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits. baud rate = bit rate / N where N is no-of-bits represented by each signal shift.
55. Explain MAC address
The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.
56. Explain attenuation
The degeneration of a signal over distance on a network cable is called attenuation.
57. Explain cladding
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
58. Explain RAID
A method for providing fault tolerance by using multiple hard disk drives.
59. Explain NETBIOS and NETBEUI
NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.
60. Explain redirector
Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer.
61. Explain Beaconing
The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.
62. Explain terminal emulation, in which layer it comes
Telnet is also called as terminal emulation. It belongs to application layer.
63. Explain frame relay, in which layer it comes
Frame relay is a packet switching technology. It will operate in the data link layer.
64. What do you meant by "triple X" in Networks
The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X"
65. Explain SAP
Series of interface points that allow other computers to communicate with the other layers of network protocol stack.
66. Explain subnet
A generic term for section of a large networks usually separated by a bridge or router.
67. Explain Brouter
Hybrid devices that combine the features of both bridges and routers.
68. How Gateway is different from Routers
A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats.
69. What are the different type of networking / internetworking devices
Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.
Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion.
Routers: They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission.
Gateways:
They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.
70. Explain mesh network
A network in which there are multiple network links between computers to provide multiple paths for data to travel.
71. Explain passive topology
When the computers on the network simply listen and receive the signal, they are referred to as passive because they don’t amplify the signal in any way. Example for passive topology - linear bus.
72. What are the important topologies for networks
BUS topology: :in this each computer is directly connected to primary network cable in a single line.
Advantages: Inexpensive, easy to install, simple to understand, easy to extend.
STAR topology: In this all computers are connected using a central hub.
Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.
RING topology:In this all computers are connected in loop.
Advantages: ll computers have equal access to network media, installation can be simple, and signal does not degrade as much as
in other topologies because each computer regenerates it.
73. What are major types of networks and explain
Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources.
Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration
74. Explain Protocol Data Unit
The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a
unnumbered frame (U - frame).
75. Explain difference between baseband and broadband transmission
In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.
76. What are the possible ways of data exchange
(i) Simplex (ii) Half-duplex (iii) Full-duplex.
77. What are the types of Transmission media
Signals are usually transmitted over some transmission media that are broadly classified in to two categories.
Guided Media:
These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept
and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light.
Unguided Media:
This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony.
78. Explain point-to-point protocol
A communications protocol used to connect computers to remote networking services including Internet service providers.
79. What are the two types of transmission technology available
(i) Broadcast and (ii) point-to-point
80. Difference between the communication and transmission.
Transmission is a physical movement of information and concern issues like bit polarity, synchronization, clock etc. Communication means the meaning full exchange of information between two communication media.
Courtesy: http://www.pdftutorials.com/
Testing and Quality Assurance
What is Testing?
The process of exercising software to verify that it satisfies specified requirements and to detect errors.
The process of analyzing a software item to detect the differences between existing and required conditions (that is, bugs), and to evaluate the features of the software item (Ref. IEEE Std 829).
The process of operating a system or component under specified conditions, observing or recording the results, and making an evaluation of some aspect of the system or component.
What is Test Automation? It is the same as Automated Testing.
What is Acceptance Testing?
Testing conducted to enable a user/customer to determine whether to accept a software product. Normally performed to validate the software meets a set of agreed acceptance criteria.
What is Accessibility Testing?
Verifying a product is accessible to the people having disabilities (deaf, blind, mentally disabled etc.).
What is Ad Hoc Testing?
A testing phase where the tester tries to 'break' the system by randomly trying the system's functionality. Can include negative testing as well. See also Monkey Testing.
What is Agile Testing?
Testing practice for projects using agile methodologies, treating development as the customer of testing and emphasizing a test-first design paradigm. See also Test Driven Development.
What is Application Binary Interface (ABI)?
A specification defining requirements for portability of applications in binary forms across defferent system platforms and environments.
What is Application Programming Interface (API)?
A formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services.
What is Automated Software Quality (ASQ)?
The use of software tools, such as automated testing tools, to improve software quality.
What is Automated Testing?
Testing employing software tools which execute tests without manual intervention. Can be applied in GUI, performance, API, etc. testing.
The use of software to control the execution of tests, the comparison of actual outcomes to predicted outcomes, the setting up of test preconditions, and other test control and test reporting functions.
What is Backus-Naur Form?
A metalanguage used to formally describe the syntax of a language.
What is Basic Block?
A sequence of one or more consecutive, executable statements containing no branches.
What is Basis Path Testing?
A white box test case design technique that uses the algorithmic flow of the program to design tests.
What is Basis Set?
The set of tests derived using basis path testing.
What is Baseline?
The point at which some deliverable produced during the software engineering process is put under formal change control.
What you will do during the first day of job?
What would you like to do five years from now?
Tell me about the worst boss you've ever had.
What are your greatest weaknesses?
What are your strengths?
What is a successful product?
What do you like about Windows?
What is good code?
What are basic, core, practices for a QA specialist?
What do you like about QA?
What has not worked well in your previous QA experience and what would you change?
How you will begin to improve the QA process?
What is the difference between QA and QC?
What is UML and how to use it for testing?
What is Beta Testing?
Testing of a rerelease of a software product conducted by customers.
What is Binary Portability Testing?
Testing an executable application for portability across system platforms and environments, usually for conformation to an ABI specification.
What is Black Box Testing?
Testing based on an analysis of the specification of a piece of software without reference to its internal workings. The goal is to test how well the component conforms to the published requirements for the component.
What is Bottom Up Testing?
An approach to integration testing where the lowest level components are tested first, then used to facilitate the testing of higher level components. The process is repeated until the component at the top of the hierarchy is tested.
What is Boundary Testing?
Test which focus on the boundary or limit conditions of the software being tested. (Some of these tests are stress tests).
What is Bug?
A fault in a program which causes the program to perform in an unintended or unanticipated manner.
What is Boundary Value Analysis?
BVA is similar to Equivalence Partitioning but focuses on "corner cases" or values that are usually out of range as defined by the specification. his means that if a function expects all values in range of negative 100 to positive 1000, test inputs would include negative 101 and positive 1001.
What is Branch Testing?
Testing in which all branches in the program source code are tested at least once.
What is Breadth Testing?
A test suite that exercises the full functionality of a product but does not test features in detail.
What is CAST?
Computer Aided Software Testing.
What is CMMI?
What do you like about computers?
Do you have a favourite QA book? More than one? Which ones? And why.
What is the responsibility of programmers vs QA?
What are the properties of a good requirement?
Ho to do test if we have minimal or no documentation about the product?
What are all the basic elements in a defect report?
Is an "A fast database retrieval rate" a testable requirement?
What is software quality assurance?
What is the value of a testing group? How do you justify your work and budget?
What is the role of the test group vis-à-vis documentation, tech support, and so forth?
How much interaction with users should testers have, and why?
How should you learn about problems discovered in the field, and what should you learn from those problems?
What are the roles of glass-box and black-box testing tools?
What issues come up in test automation, and how do you manage them?
What is Capture/Replay Tool?
A test tool that records test input as it is sent to the software under test. The input cases stored can then be used to reproduce the test at a later time. Most commonly applied to GUI test tools.
What is CMM?
The Capability Maturity Model for Software (CMM or SW-CMM) is a model for judging the maturity of the software processes of an organization and for identifying the key practices that are required to increase the maturity of these processes.
What is Cause Effect Graph?
A graphical representation of inputs and the associated outputs effects which can be used to design test cases.
What is Code Complete?
Phase of development where functionality is implemented in entirety; bug fixes are all that are left. All functions found in the Functional Specifications have been implemented.
What is Code Coverage?
An analysis method that determines which parts of the software have been executed (covered) by the test case suite and which parts have not been executed and therefore may require additional attention.
What is Code Inspection?
A formal testing technique where the programmer reviews source code with a group who ask questions analyzing the program logic, analyzing the code with respect to a checklist of historically common programming errors, and analyzing its compliance with coding standards.
What is Code Walkthrough?
A formal testing technique where source code is traced by a group with a small set of test cases, while the state of program variables is manually monitored, to analyze the programmer's logic and assumptions.
What is Coding?
The generation of source code.
What is Compatibility Testing?
Testing whether software is compatible with other elements of a system with which it should operate, e.g. browsers, Operating Systems, or hardware.
What is Component?
A minimal software item for which a separate specification is available.
What is Component Testing?
See the question what is Unit Testing.
What is Concurrency Testing?
Multi-user testing geared towards determining the effects of accessing the same application code, module or database records. Identifies and measures the level of locking, deadlocking and use of single-threaded code and locking semaphores.
What is Conformance Testing?
The process of testing that an implementation conforms to the specification on which it is based. Usually applied to testing conformance to a formal standard.
What is Context Driven Testing?
The context-driven school of software testing is flavor of Agile Testing that advocates continuous and creative evaluation of testing opportunities in light of the potential information revealed and the value of that information to the organization right now.
What development model should programmers and the test group use?
How do you get programmers to build testability support into their code?
What is the role of a bug tracking system?
What are the key challenges of testing?
Have you ever completely tested any part of a product? How?
Have you done exploratory or specification-driven testing?
Should every business test its software the same way?
Discuss the economics of automation and the role of metrics in testing.
Describe components of a typical test plan, such as tools for interactive products and for database products, as well as cause-and-effect graphs and data-flow diagrams.
When have you had to focus on data intergrity?
What are some of the typical bugs you encountered in your last assignment?
How do you prioritize testing tasks within a project?
How do you develop a test plan and schedule? Describe bottom-up and top-down approaches.
When should you begin test planning?
When should you begin testing?
What is Conversion Testing?
Testing of programs or procedures used to convert data from existing systems for use in replacement systems.
What is Cyclomatic Complexity?
A measure of the logical complexity of an algorithm, used in white-box testing.
What is Data Dictionary?
A database that contains definitions of all data items defined during analysis.
What is Data Flow Diagram?
A modeling notation that represents a functional decomposition of a system.
What is Data Driven Testing?
Testing in which the action of a test case is parameterized by externally defined data values, maintained as a file or spreadsheet. A common technique in Automated Testing.
What is Debugging?
The process of finding and removing the causes of software failures.
What is Defect?
Nonconformance to requirements or functional / program specification
What is Dependency Testing?
Examines an application's requirements for pre-existing software, initial states and configuration in order to maintain proper functionality.
What is Depth Testing?
A test that exercises a feature of a product in full detail.
What is Dynamic Testing?
Testing software through executing it. See also Static Testing.
What is Emulator?
A device, computer program, or system that accepts the same inputs and produces the same outputs as a given system.
What is Endurance Testing?
Checks for memory leaks or other problems that may occur with prolonged execution.
What is End-to-End testing?
Testing a complete application environment in a situation that mimics real-world use, such as interacting with a database, using network communications, or interacting with other hardware, applications, or systems if appropriate.
What is Equivalence Class?
A portion of a component's input or output domains for which the component's behaviour is assumed to be the same from the component's specification.
What is Equivalence Partitioning?
A test case design technique for a component in which test cases are designed to execute representatives from equivalence classes.
What is Exhaustive Testing?
Testing which covers all combinations of input values and preconditions for an element of the software under test.
What is Functional Decomposition?
A technique used during planning, analysis and design; creates a functional hierarchy for the software.
What is Functional Specification?
A document that describes in detail the characteristics of the product with regard to its intended features.
What is Functional Testing?
Testing the features and operational behavior of a product to ensure they correspond to its specifications.
Testing that ignores the internal mechanism of a system or component and focuses solely on the outputs generated in response to selected inputs and execution conditions.
See also What is Black Box Testing.
What is Glass Box Testing?
A synonym for White Box Testing.
Do you know of metrics that help you estimate the size of the testing effort?
How do you scope out the size of the testing effort?
How many hours a week should a tester work?
How should your staff be managed? How about your overtime?
How do you estimate staff requirements?
What do you do (with the project tasks) when the schedule fails?
How do you handle conflict with programmers?
How do you know when the product is tested well enough?
What characteristics would you seek in a candidate for test-group manager?
What do you think the role of test-group manager should be? Relative to senior management? Relative to other technical groups in the company? Relative to your staff?
How do your characteristics compare to the profile of the ideal manager that you just described?
How does your preferred work style work with the ideal test-manager role that you just described? What is different between the way you work and the role you described?
Who should you hire in a testing group and why?
What is Gorilla Testing?
Testing one particular module, functionality heavily.
What is Gray Box Testing?
A combination of Black Box and White Box testing methodologies? testing a piece of software against its specification but using some knowledge of its internal workings.
What is High Order Tests?
Black-box tests conducted once the software has been integrated.
What is Independent Test Group (ITG)?
A group of people whose primary responsibility is software testing,
What is Inspection?
A group review quality improvement process for written material. It consists of two aspects; product (document itself) improvement and process improvement (of both document production and inspection).
What is Integration Testing?
Testing of combined parts of an application to determine if they function together correctly. Usually performed after unit and functional testing. This type of testing is especially relevant to client/server and distributed systems.
What is Installation Testing?
Confirms that the application under test recovers from expected or unexpected events without loss of data or functionality. Events can include shortage of disk space, unexpected loss of communication, or power out conditions.
What is Load Testing?
See performance testing.
What is Localization Testing?
This term refers to making software specifically designed for a specific locality.
What is Loop Testing?
A white box testing technique that exercises program loops.
What is Metric?
A standard of measurement. Software metrics are the statistics describing the structure or content of a program. A metric should be a real objective measurement of something such as number of bugs per lines of code.
What is Monkey Testing?
Testing a system or an Application on the fly, i.e just few tests here and there to ensure the system or an application does not crash out.
What is Negative Testing?
Testing aimed at showing software does not work. Also known as "test to fail". See also Positive Testing.
What is Path Testing?
Testing in which all paths in the program source code are tested at least once.
What is Performance Testing?
Testing conducted to evaluate the compliance of a system or component with specified performance requirements. Often this is performed using an automated test tool to simulate large number of users. Also know as "Load Testing".
What is Positive Testing?
Testing aimed at showing software works. Also known as "test to pass". See also Negative Testing.
What is Quality Assurance?
All those planned or systematic actions necessary to provide adequate confidence that a product or service is of the type and quality needed and expected by the customer.
What is Quality audit?
A systematic and independent examination to determine whether quality activities and related results comply with planned arrangements and whether these arrangements are implemented effectively and are suitable to achieve objectives.
What is Quality Circle?
A group of individuals with related interests that meet at regular intervals to consider problems or other matters related to the quality of outputs of a process and to the correction of problems or to the improvement of quality.
What is Quality Control?
The operational techniques and the activities used to fulfill and verify requirements of quality.
What is Quality Management?
That aspect of the overall management function that determines and implements the quality policy.
What is Quality Policy?
The overall intentions and direction of an organization as regards quality as formally expressed by top management.
What is Quality System?
The organizational structure, responsibilities, procedures, processes, and resources for implementing quality management.
What is Race Condition?
A cause of concurrency problems. Multiple accesses to a shared resource, at least one of which is a write, with no mechanism used by either to moderate simultaneous access.
What is Ramp Testing?
Continuously raising an input signal until the system breaks down.
What is Recovery Testing?
Confirms that the program recovers from expected or unexpected events without loss of data or functionality. Events can include shortage of disk space, unexpected loss of communication, or power out conditions.
What is Regression Testing?
Retesting a previously tested program following modification to ensure that faults have not been introduced or uncovered as a result of the changes made.
What is Release Candidate?
A pre-release version, which contains the desired functionality of the final version, but which needs to be tested for bugs (which ideally should be removed before the final version is released).
What is Sanity Testing?
Brief test of major functional elements of a piece of software to determine if its basically operational. See also Smoke Testing.
What is Scalability Testing?
Performance testing focused on ensuring the application under test gracefully handles increases in work load.
What is the role of metrics in comparing staff performance in human resources management?
How do you estimate staff requirements?
What do you do (with the project staff) when the schedule fails?
Describe some staff conflicts youÂ’ve handled.
Why did you ever become involved in QA/testing?
What is the difference between testing and Quality Assurance?
What was a problem you had in your previous assignment (testing if possible)? How did you resolve it?
What are two of your strengths that you will bring to our QA/testing team?
What do you like most about Quality Assurance/Testing?
What do you like least about Quality Assurance/Testing?
What is the Waterfall Development Method and do you agree with all the steps?
What is the V-Model Development Method and do you agree with this model?
What is Security Testing?
Testing which confirms that the program can restrict access to authorized personnel and that the authorized personnel can access the functions available to their security level.
What is Smoke Testing?
A quick-and-dirty test that the major functions of a piece of software work. Originated in the hardware testing practice of turning on a new piece of hardware for the first time and considering it a success if it does not catch on fire.
What is Soak Testing?
Running a system at high load for a prolonged period of time. For example, running several times more transactions in an entire day (or night) than would be expected in a busy day, to identify and performance problems that appear after a large number of transactions have been executed.
What is Software Requirements Specification?
A deliverable that describes all data, functional and behavioral requirements, all constraints, and all validation requirements for software/
What is Software Testing?
A set of activities conducted with the intent of finding errors in software.
What is Static Analysis?
Analysis of a program carried out without executing the program.
What is Static Analyzer?
A tool that carries out static analysis.
What is Static Testing?
Analysis of a program carried out without executing the program.
What is Storage Testing?
Testing that verifies the program under test stores data files in the correct directories and that it reserves sufficient space to prevent unexpected termination resulting from lack of space. This is external storage as opposed to internal storage.
What is Stress Testing?
Testing conducted to evaluate a system or component at or beyond the limits of its specified requirements to determine the load under which it fails and how. Often this is performance testing using a very high level of simulated load.
What is Structural Testing?
Testing based on an analysis of internal workings and structure of a piece of software. See also White Box Testing.
What is System Testing?
Testing that attempts to discover defects that are properties of the entire system rather than of its individual components.
What is Testability?
The degree to which a system or component facilitates the establishment of test criteria and the performance of tests to determine whether those criteria have been met.
What is Test Bed?
An execution environment configured for testing. May consist of specific hardware, OS, network topology, configuration of the product under test, other application or system software, etc. The Test Plan for a project should enumerated the test beds(s) to be used.
What is Test Case?
Test Case is a commonly used term for a specific test. This is usually the smallest unit of testing. A Test Case will consist of information such as requirements testing, test steps, verification steps, prerequisites, outputs, test environment, etc.
A set of inputs, execution preconditions, and expected outcomes developed for a particular objective, such as to exercise a particular program path or to verify compliance with a specific requirement.
Test Driven Development? Testing methodology associated with Agile Programming in which every chunk of code is covered by unit tests, which must all pass all the time, in an effort to eliminate unit-level and regression bugs during development. Practitioners of TDD write a lot of tests, i.e. an equal number of lines of test code to the size of the production code.
What is Test Driver?
A program or test tool used to execute a tests. Also known as a Test Harness.
What is Test Environment?
The hardware and software environment in which tests will be run, and any other software with which the software under test interacts when under test including stubs and test drivers.
What is Test First Design?
Test-first design is one of the mandatory practices of Extreme Programming (XP).It requires that programmers do not write any production code until they have first written a unit test.
What is a "Good Tester"?
Could you tell me two things you did in your previous assignment (QA/Testing related hopefully) that you are proud of?
List 5 words that best describe your strengths.
What are two of your weaknesses?
What methodologies have you used to develop test cases?
In an application currently in production, one module of code is being modified. Is it necessary to re- test the whole application or is it enough to just test functionality associated with that module?
How do you go about going into a new organization? How do you assimilate?
Define the following and explain their usefulness:change management, Configuration Management, Version Control, and Defect Tracking.
What is ISO 9000? Have you ever been in an ISO shop?
When are you done testing?
What is the difference between a test strategy and a test plan?
What is ISO 9003? Why is it important
What is Test Harness?
A program or test tool used to execute a tests. Also known as a Test Driver.
What is Test Plan?
A document describing the scope, approach, resources, and schedule of intended testing activities. It identifies test items, the features to be tested, the testing tasks, who will do each task, and any risks requiring contingency planning. Ref IEEE Std 829.
What is Test Procedure?
A document providing detailed instructions for the execution of one or more test cases.
What is Test Script?
Commonly used to refer to the instructions for a particular test that will be carried out by an automated test tool.
What is Test Specification?
A document specifying the test approach for a software feature or combination or features and the inputs, predicted results and execution conditions for the associated tests.
What is Test Suite?
A collection of tests used to validate the behavior of a product. The scope of a Test Suite varies from organization to organization. There may be several Test Suites for a particular product for example. In most cases however a Test Suite is a high level concept, grouping together hundreds or thousands of tests related by what they are intended to test.
What is Test Tools?
Computer programs used in the testing of a system, a component of the system, or its documentation.
What is Thread Testing?
A variation of top-down testing where the progressive integration of components follows the implementation of subsets of the requirements, as opposed to the integration of components by successively lower levels.
What is Top Down Testing?
An approach to integration testing where the component at the top of the component hierarchy is tested first, with lower level components being simulated by stubs. Tested components are then used to test lower level components. The process is repeated until the lowest level components have been tested.
What is Total Quality Management?
A company commitment to develop a process that achieves high quality product and customer satisfaction.
What is Traceability Matrix?
A document showing the relationship between Test Requirements and Test Cases.
What is Usability Testing?
Testing the ease with which users can learn and use a product.
What is Use Case?
The specification of tests that are conducted from the end-user perspective. Use cases tend to focus on operating software as an end-user would conduct their day-to-day activities.
What is Unit Testing?
Testing of individual software components.
What is Validation?
The process of evaluating software at the end of the software development process to ensure compliance with software requirements. The techniques for validation is testing, inspection and reviewing
What is Verification?
The process of determining whether of not the products of a given phase of the software development cycle meet the implementation steps and can be traced to the incoming objectives established during the previous phase. The techniques for verification are testing, inspection and reviewing.
What is Volume Testing?
Testing which confirms that any values that may become large over time (such as accumulated counts, logs, and data files), can be accommodated by the program and will not cause the program to stop working or degrade its operation in any manner.
What is Walkthrough?
A review of requirements, designs or code characterized by the author of the material under review guiding the progression of the review.
What is White Box Testing?
Testing based on an analysis of internal workings and structure of a piece of software. Includes techniques such as Branch Testing and Path Testing. Also known as Structural Testing and Glass Box Testing. Contrast with Black Box Testing.
What is Workflow Testing?
Scripted end-to-end testing which duplicates specific workflows which are expected to be utilized by the end-user.
What are ISO standards? Why are they important?
What is IEEE 829? (This standard is important for Software Test Documentation-Why?)
What is IEEE? Why is it important?
Do you support automated testing? Why?
We have a testing assignment that is time-driven. Do you think automated tests are the best solution?
What is your experience with change control? Our development team has only 10 members. Do you think managing change is such a big deal for us?
Are reusable test cases a big plus of automated testing and explain why.
Can you build a good audit trail using Compuware's QACenter products. Explain why.
How important is Change Management in today's computing environments?
Do you think tools are required for managing change. Explain and please list some tools/practices which can help you managing change.
We believe in ad-hoc software processes for projects. Do you agree with this? Please explain your answer.
When is a good time for system testing?
Are regression tests required or do you feel there is a better use for resources?
Our software designers use UML for modeling applications. Based on their use cases, we would like to plan a test strategy. Do you agree with this approach or would this mean more effort for the testers.
Tell me about a difficult time you had at work and how you worked through it.
Give me an example of something you tried at work but did not work out so you had to go at things another way.
How can one file compare future dated output files from a program which has change, against the baseline run which used current date for input. The client does not want to mask dates on the output files to allow compares
Test Automation
What automating testing tools are you familiar with?
How did you use automating testing tools in your job?
Describe some problem that you had with automating testing tool.
How do you plan test automation?
Can test automation improve test effectiveness?
What is data - driven automation?
What are the main attributes of test automation?
Does automation replace manual testing?
How will you choose a tool for test automation?
How you will evaluate the tool for test automation?
What are main benefits of test automation?
What could go wrong with test automation?
How you will describe testing activities?
What testing activities you may want to automate?
Networking+ Acronyms
NETWORK+ ACRONYMS
AAA Authentication Authorization and Accounting
ACL Access Control List
ADF Automatic Document Feeder
ADSL Asymmetric Digital Subscriber Line
AES Advanced Encryption Standard
AEP American Electric Power
AFP AppleTalk Filing Protocol
AH Authentication Header
AM Amplitude Modulation
AMI Alternate Mark Inversion
APIPA Automatic Private Internet Protocol Addressing
ARIN American Registry for Internet Numbers
ARP Address Resolution Protocol
ASP Application Service Provider
ATM Asynchronous Transfer Mode
BDF Building Distribution Frame
BERT Bit-Error Rate Test
BGP Border Gateway Protocol
BNC British Naval Connector / Bayonet Niell-Concelman
BootP Boot Protocol /Bootstrap Protocol
BPDU Bridge Protocol Data Unit
BRI Basic Rate Interface
CHAP Challenge Handshake Authentication Protocol
CIDR Classless inter domain routing
CNAME Canonical Name
CRAM-MD5 Challenge-Response Authentication Mechanism – Message Digest 5
CSMA / CA Carrier Sense Multiple Access / Collision Avoidance
CSMA / CD Carrier Sense Multiple Access / Collision Detection
CSU Channel Service Unit
dB decibels
DHCP Dynamic Host Configuration Protocol
DLC Data Link Control
DMZ Demilitarized Zone
DNS Domain Name Service / Domain Name Server / Domain Name System
DOCSIS Data-Over-Cable Service Interface Specification
DoS Denial of Service
DDoS Distributed Denial of Service
DSL Digital Subscriber Line
DSU Data Service Unit
DWDM Dense Wavelength Division Multiplexing
E1 E-Carrier Level 1
EAP Extensible Authentication Protocol
EGP Exterior Gateway Protocol
EIGRP Enhanced Interior Gateway Routing Protocol
EMI Electromagnetic Interference
ESD Electrostatic Discharge
ESSID Enhanced Service Set Identifier
ESP Encapsulated security packets
FDDI Fiber Distributed Data Interface
FDM Frequency Division Multiplexing
FHSS Frequency Hopping Spread Spectrum
FM Frequency Modulation
FQDN Fully Qualified Domain Name / Fully Qualified Distinguished Name
FTP File Transfer Protocol
GBIC Gigabit Interface Converter
Gbps Giga bits per second
HDLC High-Level Data Link Control
HSRP Hot Standby Router Protocol
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol Secure
Hz Hertz
IANA Internet Assigned Numbers Authority
ICA Independent Computer Architecture
ICANN Internet Corporation for Assigned Names and Numbers
ICMP Internet Control Message Protocol
ICS Internet Connection Sharing
IDF Intermediate Distribution Frame
IDS Intrusion Detection System
IEEE Institute of Electrical and Electronics Engineers
IGMP Internet Group Multicast Protocol
IGP Interior Gateway Protocol
IIS Internet Information Services
IKE Internet Key Exchange
IMAP4 Internet Message Access Protocol version 4
InterNIC Internet Network Information Center
IP Internet Protocol
IPS Intrusion Prevention System
IPSec Internet Protocol Security
IPv4 Internet Protocol version 4
IPv6 Internet Protocol version 6
IPX Internetwork Packet Exchange
ISDN Integrated Services Digital Network
IS-IS Intermediate System - Intermediate system
ISP Internet Service Provider
IT Information Technology
Kbps Kilobits per second
L2F Layer 2 Forwarding
L2TP Layer 2 Tunneling Protocol
LACP Link aggregation control protocol
LAN Local Area Network
LC Local Connector
LDAP Lightweight Directory Access Protocol
LEC Local Exchange Carrier
LED Light Emitting Diode
LLC Logical Link Control
LPR Line Printer Request
MAC Media Access Control / Medium Access Control
Mbps Megabits per second
MBps Megabytes per second
MDF Main Distribution Frame
MDI Media Dependent Interface
MDIX Media Dependent Interface Crossover
MIB Management Information Base
MMF Multimode Fiber
MPLS Multi-Protocol Label Switching
MS-CHAP Microsoft Challenge Handshake Authentication Protocol
MT-RJ Mechanical Transfer-Registered Jack
MX Mail Exchanger
NAC Network Access Control
NAT Network Address Translation
NCP Network Control Protocol
NetBEUI Network Basic Input / Output Extended User Interface
NetBIOS Network Basic Input / Output System
NFS Network File Service
NIC Network Interface Card
nm Nanometer
NNTP Network News Transport Protocol
NTP Network Time Protocol
NWLINK Microsoft IPX/SPX Protocol
OCx Optical Carrier
OS Operating Systems
OSI Open Systems Interconnect
OSPF Open Shortest Path First
OTDR Optical Time Domain Reflectometer
PAP Password Authentication Protocol
PAT Port Address Translation
PC Personal Computer
PKI Public Key Infrastructure
PoE Power over Ethernet
POP3 Post Office Protocol version 3
POTS Plain Old Telephone System
PPP Point-to-Point Protocol
PPPoE Point-to-Point Protocol over Ethernet
PPTP Point-to-Point Tunneling Protocol
PRI Primary Rate Interface
PSTN Public Switched Telephone Network
PVC Permanent Virtual Circuit
QoS Quality of Service
RADIUS Remote Authentication Dial-In User Service
RARP Reverse Address Resolution Protocol
RAS Remote Access Service
RDP Remote Desktop Protocol
RFI Radio Frequency Interface
RG Radio Guide
RIP Routing Internet Protocol
RJ Registered Jack
RSA Rivest, Shamir, Adelman
RSH Remote Shell
RTP Real Time Protocol
SC Standard Connector / Subscriber Connector
SCP Secure Copy Protocol
SDSL Symmetrical Digital Subscriber Line
SFTP Secure File Transfer Protocol
SIP Session Initiation Protocol
SLIP Serial Line Internet Protocol
SMF Single Mode Fiber
SMTP Simple Mail Transfer Protocol
SNAT Static Network Address Translation
SNMP Simple Network Management Protocol
SOA Start of Authority
SOHO Small Office / Home Office
SONET Synchronous Optical Network
SPS Standby Power Supply
SPX Sequenced Packet Exchange
SSH Secure Shell
SSID Service Set Identifier
SSL Secure Sockets Layer
ST Straight Tip
STP Shielded Twisted Pair
T1 T-Carrier Level 1
TA Terminal Adaptor
TACACS+ Terminal Access Control Access Control System+
TCP Transmission Control Protocol
TCP / IP Transmission Control Protocol / Internet Protocol
tcsh Turbo C shell
TDM Time Division Multiplexing
TDR Time Domain Reflectometer
Telco Telephone Company
TFTP Trivial File Transfer Protocol
TKIP Temporal Key Integrity Protocol
TLS Transport Layer Security
TTL Time to Live
UDP User Datagram Protocol
UNC Universal Naming Convention
UPS Uninterruptible Power Supply
URL Uniform Resource Locator
USB Universal Serial Bus
UTP Unshielded Twisted Pair
VDSL Variable Digital Subscriber Line
VLAN Virtual Local Area Network
VNC Virtual Network Connection
VoIP Voice over IP
VPN Virtual Private Network
VTP Virtual Trunk Protocol
WAN Wide Area Network
WAP Wireless Application Protocol / Wireless Access Point
WEP Wired Equivalent Privacy
WINS Window Internet Name Service
WPA Wi-Fi Protected Access
www World Wide Web
X.25 CCITT Packet Switching Protocol
XML eXtensible Markup Language
XDSL Extended Digital Subscriber Line
Zeroconf Zero Configuration
Tuesday, June 9, 2009
Setting reverse DNS in Bind in Debian
Step 1: Add Reverse zone entery in /etc/bind/named.conf
// add local zone definitions here
zone "0.168.192.in-addr.arpa" {
type master;
file "/etc/bind/yourdomain.rev";
zone "yourdomain.com" {
type master;
file "/etc/bind/yourdomain.com";
allow-query { any; };
Step 2: Create the /etc/bind/yourdomain.rev file
$TTL 3000
@ IN SOA ns.yourdomain.com. postmaster.yourdomain.com. (
1312 ; Serial
300 ; Refresh
150 ; Retry
4W ; Expire
1H ) ; Negative Cache TTL
;
; NS
;
IN NS ns.yourdomain.com.
1 IN PTR www.yourdomain.com.
2 IN PTR mail.yourdomain.com.
Step 3: Reload the configuration
/etc/init.d/bind force-reload
Step 4: Test the Reverse lookup
before doing that make sure your DNS is right one in /etc/resolve.conf file,
#dnslookup
> mail.yourdomain.com
Server: 192.168.0.1
Address: 192.168.0.1#53
Non-authoritative answer:
Name: mail.yourdomain.com
Address: 192.168.0.2
> 192.168.0.2
Server: 192.168.0.1
Address: 192.168.0.1#53
2.0.168.192.in-addr.arpa name = mail.yourdomain.com.
http://www.debuntu.org/2006/08/05/85-how-to-setting-up-a-dns-zone-with-bind9/2
Allow TFTP traffic Through IPCOP Firewall
imran@imran-laptop:~$ ssh root@192.168.0.1 -p 222
root@10.47.0.1's password:
Last login: Mon Jun 8 16:21:12 2009 from imran-laptop.owera.com
root@firewall:~ # nano /etc/rc.d/rc.network
## add following for TFTP traffic
modprobe ip_conntrack_tftp
modprobe ip_nat_tftp
Reboot the Firewall to take effect or enter the above command in command line.
Further Info:
http://keystoneit.wordpress.com/2007/11/25/tftp-through-ipcop-or-other-iptables-firewalls/
Thursday, May 14, 2009
Increase the responce time/improve performace of GNOME Desktop in Ubunu
Step 1: Open the Configuration Editor
Alt+F2 then type gconf-editor
Step2: Go to apps->metacity->general
Step3: Check (true) to reduced_resource.
This will increase the response time, you will notice the difference.
Wednesday, May 13, 2009
PPPoE Server Under Ubuntu/Debian
Operating System: Ubuntu Desktop(8.04)
1) Installation of Softwares:
Server Side
a) ppp
apt-get install ppp
b) pppoe
apt-get install pppoe
c) rp-pppoe (I used rp-pppoe-3.10.tar.gz)
RP PPPoE; can be obtained from,
http://www.roaringpenguin.com/products/pppoe
After download
Move it to some place e.g /var/tmp, unpack and change permission
root@pppoe:/var/tmp# mv /home/imran/Desktop/rp-pppoe-3.10.tar.gz /var/tmp/
root@pppoe:/var/tmp# tar -xvf rp-pppoe-3.10.tar.gz
root@pppoe:/var/tmp# chown imran:imran rp-pppoe-3.10
root@pppoe:/var/tmp# ls -l
total 220
drwxr-xr-x 8 imran imran 4096 2008-06-30 16:00 rp-pppoe-3.10
-rw-r--r-- 1 imran imran 215288 2009-10-19 10:31 rp-pppoe-3.10.tar.gz
root@pppoe:/var/tmp#
Open README file and go through it.There are 3 methods I shall go for first one, QuickStart method.
QUICKSTART Method: "If you're lucky, the "quickstart" method will work. After unpackingthe archive, become root and type"
root@pppoe:/var/tmp# cd rp-pppoe-3.10/
root@pppoe:/var/tmp/rp-pppoe-3.10# ./go
I got some gcc error, fixed it by installing "build-essential", This will install gcc and a some other files that need to build something from source.
sudo aptitude install build-essentialroot@pppoe:/var/tmp/rp-pppoe-3.10# ./go
** Summary of what you entered **
Ethernet Interface: eth1
User name: test
Activate-on-demand: No
Primary DNS: 82.196.201.43
Secondary DNS: 82.196.193.143
Firewalling: NONE
>>> Accept these settings and adjust configuration files (y/n)? y
Adjusting /etc/ppp/pppoe.conf
Adjusting /etc/resolv.conf
(But first backing it up to /etc/resolv.conf-bak)
Adjusting /etc/ppp/pap-secrets and /etc/ppp/chap-secrets
(But first backing it up to /etc/ppp/pap-secrets-bak)
(But first backing it up to /etc/ppp/chap-secrets-bak)
You will get messeg, "Congratulations, it should be all set up!"
Type 'pppoe-start' to bring up your PPPoE link and 'pppoe-stop' to bring
it down. Type 'pppoe-status' to see the link status.
Client Side :
# apt-get install pppoeconf
This will use to connect the pppoe server.
2) Configuration
Server side: Go the to /etc/ppp,
root@pppoe:/var/tmp# cd /etc/pppMany files, but interested are , pppoe-server-options, pppoe.conf, options,pap-secrets,chap-secrets
root@pppoe:/etc/ppp# ls
chap-secrets ip-down.d options pppoe.conf-bak
chap-secrets-bak ip-up pap-secrets pppoe_on_boot
firewall-masq ip-up.d pap-secrets-bak pppoe-server-options
firewall-masq-3.10 ipv6-down peers pppoe-server-options-example
firewall-standalone ipv6-down.d plugins pppoe-up
firewall-standalone-3.10 ipv6-up pppoe.conf resolv
ip-down ipv6-up.d pppoe.conf-3.10
root@pppoe:/etc/ppp#
PAP is default authentication method, I let it.
root@pppoe:/etc/ppp# nano pap-secrets
#You can change the authenticaion method from follwing file
# /etc/ppp/pap-secrets
#
# INBOUND connections
# Every regular user can use PPP and has to use passwords from /etc/passwd
* hostname "" *
# UserIDs that cannot use PPP at all. Check your /etc/passwd and add any
# other accounts that should not be able to use pppd!
guest hostname "*" -
master hostname "*" -
root hostname "*" -
support hostname "*" -
stats hostname "*" -
# OUTBOUND connections
# Here you should add your userid password to connect to your providers via
# PAP. The * means that the password is to be used for ANY host you connect
# to. Thus you do not have to worry about the foreign machine name. Just
# replace password with your password.
# If you have different providers with different passwords then you better
# remove the following line.
# * password
"test" * "test"
root@pppoe:/etc/ppp# nano pppoe-server-options
# PPP options for the PPPoE server
# LIC: GPL
require-pap
#require-chap
login
lcp-echo-interval 10
lcp-echo-failure 2
a) Change following in /etc/ppp/options file, some to them already uncommented.
In case of chap as authentication, the file looks like
root@pppoe:/etc/ppp# nano chap-secrets
# Secrets for authentication using CHAP
# client server secret IP addresses
"test" * "test" *
"test1" * "test" *
"test2" * "test" 10.10.220.3
"test3" * "test" 10.10.220.4
Script that start the PPPoE server with NAT option
Create a script pppoe-up and chmod to 755.
root@pppoe:/etc/ppp# nano pppoe-up
root@pppoe:/etc/ppp# chmod 755 pppoe-up
#!/bin/bash
# ----------------------------------------------------
# Starts the PPPoE server and turns on NAT
# ----------------------------------------------------
# MAX is the maximum number of addresses your server
# is allowed to hand out.
PROV=pppoe
MAX=5
# BASE is the lowest IP address your server is allowed
# to hand out.
#BASE=192.168.1.238
#PLA=192.168.1.0/24
BASE=10.10.220.2
PLA=10.10.220.0/8
# NAT is the set of addresses which your server will
# NAT behind it. Other addresses behind your server
# WILL NOT be NATed.
#NAT=10.10.220.0/8
# MYIP is the public IP address of this server.
MYIP=10.10.220.1
##########################################
# Here is where the script actually starts executing.
##########################################
# Disable IP spoofing on the external interface.
#/sbin/iptables -A INPUT -i eth0 -s $NAT -j DROP
# Enable NAT for the private addresses we hand out.
#/sbin/iptables -t nat -A POSTROUTING -s $NAT -j $NAT --to-source $MYIP
# Launch the server.
/usr/sbin/pppoe-server pty -T 60 -I eth1 -L $MYIP -N $MAX -C $PROV -S $PROV -R $PLA
#echo "1" > "/proc/sys/net/ipv4/ip_forward"
Client side
Install pppoeconf, which may be already installed.
apt-get install pppoeconf
Run the Server
Execute the pppoe-up script in server.
root@pppoe:/etc/ppp# ./pppoe-up
Connection of client
Run pppoeconf in client's console,
client# pppoeconf
It will search for pppoe server on ethernet server. Once it found on, in this case in eth0 it will prompt for user name: test and passwd: test
Testing and Troubleshooting
Open the /var/log/syslog in server and monitor,
da:72:54 (10.10.220.1) on eth1 using Service-Name ''There are some problems which need to fix
Oct 19 12:58:11 pppoe pppd[6248]: pppd 2.4.4 started by root, uid 0
Oct 19 12:58:11 pppoe pppd[6248]: Using interface ppp0
Oct 19 12:58:11 pppoe pppd[6248]: Connect: ppp0 <--> /dev/pts/2
Oct 19 12:58:17 pppoe pppd[6248]: PAP peer authentication failed for test
Oct 19 12:58:17 pppoe pppd[6248]: Connection terminated.
Oct 19 12:58:17 pppoe pppoe[6250]: read (asyncReadFromPPP): Session 2: Input/output error
Oct 19 12:58:17 pppoe pppd[6248]: Exit.
Oct 19 12:58:17 pppoe pppoe-server[5908]: Session 2 closed for client 00:1e:37:da:72:54 (10.10.220.1) on eth1
Oct 19 12:58:17 pppoe pppoe-server[5908]: Sent PADT
After fixing the issue, reconnect the client and monitor the log on server.
client# pppoeconf
Oct 19 13:19:18 pppoe pppd[8724]: pppd 2.4.4 started by root, uid 0
Oct 19 13:19:18 pppoe pppd[8724]: Using interface ppp0
Oct 19 13:19:18 pppoe pppd[8724]: Connect: ppp0 <--> /dev/pts/2
Oct 19 13:19:21 pppoe pppd[8724]: Cannot determine ethernet address for proxy ARP
Oct 19 13:19:21 pppoe pppd[8724]: local IP address 10.10.220.1
Oct 19 13:19:21 pppoe pppd[8724]: remote IP address 10.10.220.2
It setted up ultimatley, I spent some time, checking the script carefully, running and testing several times before it was fixed.
Final testing, Both client and server will get the ip and they are able to ping each other.
Server side
root@pppoe:/etc/ppp# ifconfig
eth0 Link encap:Ethernet HWaddr 00:11:25:ed:fd:e2
inet addr:192.168.1.249 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::211:25ff:feed:fde2/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:8943 errors:0 dropped:0 overruns:0 frame:0
TX packets:3137 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:4222424 (4.0 MB) TX bytes:833756 (814.2 KB)
Base address:0x4000 Memory:d0080000-d00a0000
eth1 Link encap:Ethernet HWaddr 00:08:a1:be:1d:65
inet6 addr: fe80::208:a1ff:febe:1d65/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:648 errors:0 dropped:0 overruns:0 frame:0
TX packets:776 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:39320 (38.3 KB) TX bytes:50994 (49.7 KB)
Interrupt:21 Base address:0x6000
eth1:avahi Link encap:Ethernet HWaddr 00:08:a1:be:1d:65
inet addr:169.254.5.242 Bcast:169.254.255.255 Mask:255.255.0.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Interrupt:21 Base address:0x6000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:2215 errors:0 dropped:0 overruns:0 frame:0
TX packets:2215 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:113003 (110.3 KB) TX bytes:113003 (110.3 KB)
ppp0 Link encap:Point-to-Point Protocol
inet addr:10.10.220.1 P-t-P:10.10.220.2 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1492 Metric:1
RX packets:12 errors:0 dropped:0 overruns:0 frame:0
TX packets:8 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:3
RX bytes:724 (724.0 B) TX bytes:382 (382.0 B)
Ping from srver to client
root@pppoe:/etc/ppp# ping 10.10.220.2
PING 10.10.220.2 (10.10.220.2) 56(84) bytes of data.
64 bytes from 10.10.220.2: icmp_seq=1 ttl=64 time=0.599 ms
64 bytes from 10.10.220.2: icmp_seq=2 ttl=64 time=0.718 ms
64 bytes from 10.10.220.2: icmp_seq=3 ttl=64 time=1.09 ms
Documentation:
http://roaringpenguin.com/products/pppoe
http://neworder.box.sk/newsread.php?newsid=18797
http://www.freeantennas.com/PPPoE-Server-HOWTO.html
Tuesday, March 3, 2009
How to enable/disable apache module in Debian/Ubuntu
root@fizaan:/etc/apache2# a2enmod
Which module would you like to enable?
Your choices are: actions alias asis auth_basic auth_digest authn_alias authn_anon authn_dbd authn_dbm authn_default authn_file authnz_ldap authz_dbm authz_default authz_groupfile authz_host authz_owner authz_user autoindex cache cern_meta cgid cgi charset_lite dav_fs dav dav_lock dbd deflate dir disk_cache dump_io env expires ext_filter file_cache filter headers ident imagemap include info ldap log_forensic mem_cache mime mime_magic negotiation php5 proxy_ajp proxy_balancer proxy_connect proxy_ftp proxy_http proxy rewrite setenvif speling ssl status substitute suexec unique_id userdir usertrack version vhost_alias
Module name? ssl
Module ssl installed; run /etc/init.d/apache2 force-reload to enable.
Reload the configuration
root@fizaan:/etc/apache2# /etc/init.d/apache2 force-reload
* Reloading web server config apache2root@fizaan:/etc/apache2#
Restart the apach2 web server
root@fizaan:/etc/apache2# /etc/init.d/apache2 restart
To Disable the module use a2dismod command
root@fizaan:/etc/apache2# a2dismod
Which module would you like to disable?
Your choices are: alias auth_basic authn_file authz_default authz_groupfile authz_host authz_user autoindex cgid dir env mime negotiation setenvif ssl status
Module name?
Rest of steps are same,force reload and restart apache2.
Wednesday, February 25, 2009
Testing Throughput of Gateway/CPE with Jperf
PC1 is attached to LAN side and PC2 attached on WAN side
Step 2: Assign addresses to devices.
LAN side PC, PC1 will get the address from the DHCP server insed the DUT.
configure the stative IPs on
PC2: 10.10.10.100
WAN side of DUT 10.10.10.10
Step 3: Check and confirm the connectivity by pinging PC2 from PC1
Step 4: Run the Jperf Application on PC1 and PC2
PC2 will act as server, click the server option and run it
PC1 will act as client, enter the IP of server, 10.10.10.100 and run it.
You will see the LAN-WAN throtuput of your device.
References
http://code.google.com/p/xjperf/
http://openmaniak.com/iperf.php
http://www.smallnetbuilder.com/content/view/30408/235/
http://www.smallnetbuilder.com/content/view/30418/235/
http://www.smallnetbuilder.com/content/view/30388/235/
Thursday, February 19, 2009
Network Monitoring using Nagios on Debian
nagios:/etc/nagios#apt-get install nagios-text
Step 2: Configuration
EDIT /etc/nagios/contacts.cfg AND ADD FOLLOWING
define contact{
contact_name imran
alias imran
service_notification_period 24x7
host_notification_period 24x7
service_notification_options w,u,c,r
host_notification_options d,u,r
service_notification_commands notify-by-email
host_notification_commands host-notify-by-email
email imran@fizaan.com
}
EDIT /etc/nagios/contactgroups.cfg AND ADD FOLLOWING
define contactgroup{
contactgroup_name server-admin
alias Systems Administrators
members imran
}
EDIT /etc/nagios/hosts.cfg AND ADD YOUR HOSTS WHICH YOU WANT TO MONITOR
define host{
use generic-host
host_name www.fizaan.com
alias website
address 192.168.0.10
check_command check-host-alive
max_check_attempts 20
notification_interval 240
notification_period 24x7
notification_options d,u,r
}
define host{
use generic-host
host_name mail.fizaan.com
alias mail
address 192.168.0.20
check_command check-host-alive
max_check_attempts 20
notification_interval 240
notification_period 24x7
notification_options d,u,r
}
EDIT /etc/nagios/hostgroups.cfg AND ADD FOLLOWING
define hostgroup{
hostgroup_name Linux Servers
alias Servers
contact_groups server-admin
members www.fizaan.com,mail.fizaan.com
}
EDIT /etc/nagios/services AND ADD YOUR SERVICES, e.g
You cand define more than 1 service for each host.
# Service definition
define service{
use generic-service ; Name of service template to use
host_name mail.FIZAAN.com
service_description Total Processes
is_volatile 0
check_period 24x7
max_check_attempts 3
normal_check_interval 5
retry_check_interval 2
contact_groups server-admin
notification_interval 240
notification_period 24x7
notification_options w,u,c,r
check_command check_procs!150!200!RSZDT
}
# Service definition
define service{
use generic-service ; Name of service template to use
host_name www.fizaan.com
service_description HTTP
is_volatile 0
check_period 24x7
max_check_attempts 3
normal_check_interval 5
retry_check_interval 1
contact_groups server-admin
notification_interval 120
notification_period 24x7
notification_options w,u,c,r
check_command check_http
}
Step 3: Check the syntex error, if every thing ok, it will show following.
nagios:/etc/nagios# nagios -v /etc/nagios/nagios.cfg
.
.
Total Warnings: 0
Total Errors: 0
Things look okay - No serious problems were detected during the pre-flight check
Step 4: Restart the Nagios
nagios:/etc/nagios#/etc/init.d/nagios restart
Step 5: Open the Site and login
http://192.168.0.5/nagios/
or
http://nagios.fizaan.com/nagios/
username: nagiosadmin
password: provided during installation
Pluging Directory
Following are default plugins installed with Nagios.
nagios:/usr/lib/nagios# cd plugins/
nagios:/usr/lib/nagios/plugins# ls
check_apt check_file_age check_imap check_mrtgtraf check_oracle check_simap check_ups
check_breeze check_flexlm check-imap check_mysql check_overcr check_smtp check_users
check_by_ssh check_fping check_ircd check_mysql_query check_pgsql check_snmp check_wave
check_clamd check_ftp check_jabber check_nagios check_ping check_spop eventhandlers
check_dhcp check_game check_ldap check_nagios_db check_pop check_ssh negate
check_dig check_hpjd check_ldaps check_nntp check_procs check_ssmtp urlize
check_disk check_http check_load check_nntps check_radius check_swap utils.pm
check_disk_smb check_icmp check_log check_nt check_real check_tcp utils.sh
check_dns check_ifoperstatus check_mailq check_ntp check_rpc check_time
check_dummy check_ifstatus check_mrtg check_nwstat check_sensors check_udp
nagios:/usr/lib/nagios/plugins#
Note: Comment out the /etc/nagios/esclations.cfg file
Wednesday, February 18, 2009
Restoring Joomla Site Admin Password
Step 2: Select the Database
You can find you data base name, user name and password on database from configuration.php file of joomla.
Step 3: Select the Users table "jos_users", on left side of panel from the database.
Step 4: Select the Browse in middle window and edit the user name Administration, id e.g 62 by clicking the edit mark "pencil" in this case.
Step 5: In the password field, insert this value "226776f356d7ecf58b60bab12a05d38f" (without quotes), this is hashed value of joomla, new password of admin user. Be careful do not change field type.
Step 6: Press Go, make sure the save option is selected in the bottom of window.
Congratulation you new password joomla is set.
Do not forget to change the password of admin when you login.
Monday, February 16, 2009
Installation of SSL Certificates (self signed) in Debian
apt-get install openssl
Step 2: Install the self signed certificate
root@web:mkdir /etc/apach2/ssl
root@web:/etc/apache2/ssl# openssl req -new -x509 -days 365 -nodes -out /etc/apache2/ssl/certificate.pem -keyout /etc/apache2/ssl/certificate.pem
Generating a 1024 bit RSA private key
..............................++++++
.................................++++++
writing new private key to '/etc/apache2/ssl/certificate.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:NO
State or Province Name (full name) [Some-State]:Oslo
Locality Name (eg, city) []:Oslo
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Fizaan
Organizational Unit Name (eg, section) []:IT
Common Name (eg, YOUR name) []:www.fizaan.com
Email Address []:postmaster@fizaan.com
root@web:/etc/apache2/ssl# ls
certificate.pem
Step 3: Provide path to certificate in apach2 configuration file /etc/apache2/sites-available/default
ServerAdmin postmaster@fizaan.com
ServerName www.fizaan.com
ServerAlias www
DocumentRoot /var/www/site
SSLEngine on
SSLCertificateFile ssl/certificate.pem
Ste 4: Restart the apache2 and test the site
root@web:/etc/init.d/apache2 stop
root@web:/etc/init.d/apache2 start
Open browser and visit the site name www.fizaan.com, view the certificate.
These certificate the good for demo site or intranet but for commercial you should buy.
Buying Certificate from Third party
Step 1: Provide your CSR
openssl req -nodes -newkey rsa:2048 -keyout myserver.key -out server.csr
Step 2: provide the details to third company e.g COMODO SSL, VeriSign
Step 3: After processing the third comapny shall give you back the file and place it in the path of ssl in apache2 virtualhost file.
References
http://www.debuntu.org/how-to-create-a-self-signed-certificate
https://secure.instantssl.com/products/SSLIdASignup1a
http://www.verisign.com/ssl/buy-ssl-certificates/
Friday, February 13, 2009
Installation of tasks (DNS, Print Server...)in Debian/Ubunt
# sudo -s
Enter passwd
# tasksel
Thursday, February 12, 2009
Redirecting URL Permanently in Apache
You must have apache installed and running.
apt-get install apache2
Step 2: Just add following lines to /etc/apache2/sites-available/default file,
NameVirtualHost *
ServerName domainname.com
ServerAlias www.domainname.com
Redirect permanent / http://www.newdomainname.com/
Where 192.168.0.1 is IP of machine running apache2,
servername is name of machine
Alias can the other name of the machine.
Redirct permanent will redirect to the new domain.
Step 3: Restart the apache
/etc/init.d/apache2 restart
Step 4: Test the site
References
http://www.yolinux.com/TUTORIALS/ApacheRedirect.html
Sunday, January 18, 2009
Installation of Spamassassin in Exim4 Debian
deb http://volatile.debian.net/debian-volatile sarge/volatile main contrib
Step 2: Install Spamassassin via apt-get
apt-get install spamassassin
Step 3: Enable spamassassin
edit /etc/default/spamassassin and enable spamd
Installation or updating using CPAN
perl -MCPAN -e shell
install Mail::SpamAssassin
reload CPAN
quit
Restart the spamassassin
/etc/init.d/spamassassin restart
Check the version of spamassassin -V
Updating the rules
sa-update -D
Tuning the Spamassassin
/etc/mai/spamassassin/local.cf
# These should be safe assumptions and allow for simple visual sifting
# without risking lost emails.
required_hits 4.0
report_safe 1
rewrite_header Subject *****[SPAM](_SCORE_)*****
use_bayes 1
auto_learn 1
ok_locales en
Useful Links
http://koivi.com/exim4-config/
http://www.linuxsupport.org.uk/sa/index.html
Installation of Virtual Box in Ubuntu 8.10
Step 1: Add following address in /etc/apt/sources.list
deb http://download.virtualbox.org/virtualbox/debian intrepid non-free
Step 2: Add public key
wget -q http://download.virtualbox.org/virtualbox/debian/sun_vbox.asc -O- | sudo apt-key add -
Step 3: Update and Install necessery package
sudo apt-get update
sudo apt-get install dkms
Step 4: Install the virtual box
sudo apt-get install virtualbox-2.1
It will start the to install and will add the network interfaces.
Open the Virtual Machine Application and create the machines.