Technical Interview Questions – Networking
(Part-2)
- What are User Classes and Vendor
Classes in DHCP?
Ans: Default Class: This DHCP class is by default
configured as soon as the DHCP server role is installed on the network
operating systems. After the successful installation of DHCP server roles,
administrators must create DHCP scopes where they must specify a range of IP
addresses along with the addresses of the DNS servers and the default gateways.
Since all DHCP client computers by default belong to default DHCP class, they
receive the set of addresses from the default class only.
User Class: This DHCP class must be created manually by
the administrators. User class is created in the environments where a
computer or a group of computers is to be redirected to the different network or
a specific computer by assigning addresses of different DNS server and/or the
default gateway. An example can be of accounts department in an organization,
computers of which need to access highly sensitive information from file
servers that are kept isolated from the rest of the organization’s network.
Since such file servers may have different IP addresses that may belong to
different network addresses or different address classes altogether, creating
User classes and specifying addresses of DNS servers and default gateways that
redirect the queries to the sensitive and isolated file servers make the
network setup quite efficient and highly secured.
Vendor Class: This DHCP class works in the same manner
as User class does, i.e. it also provides a different set of address of DNS
servers and default gateways to the DHCP client computers. However, Vendor
classes are created when a network setup has multi-platform environment and the
administrators want the DHCP client computers running non-Microsoft operating
systems to obtain a different set of DNS and default gateway addresses. For
example, in an organization some computers have Microsoft Windows 7 installed
on them and receive 192.168.11.1 as their DNS and default gateways. On the
other hand, other computers have Linux OS installed on them. A Vendor class for
Linux can be created so that all Linux clients can be assigned with different
DNS and default gateway addresses, e.g. 192.168.24.2.
- How do I configure a client
machine to use a specific User Class?
Ans: The
command to configure a client machine to use a specific user class is
ipconfig /setclassid “<Name of your Network card>” <Name of the class you created on DHCP and you want to join (Name is case sensitive)>
Eg: ipconfig /setclassid ” Local Area Network” Accounting
ipconfig /setclassid “<Name of your Network card>” <Name of the class you created on DHCP and you want to join (Name is case sensitive)>
Eg: ipconfig /setclassid ” Local Area Network” Accounting
- What is the BOOTP protocol used
for, where might you find it in Windows network infrastructure?
Ans: BootP (RFC951) provides
* a unique IP address to the requester (using port 67) similar to the DHCP request on port 68 AND
* can provide (where supported) the ability to boot a system without a hard drive (ie: a diskless client)
Apple OS X 10.* Server supports BootP (albeit) renamed as NetBoot. The facility allows the Admin to maintain a selected set of configurations as boot images and then assign sets of client systems to share(or boot from) that image. For example Accounting, Management, and Engineering departments have elements in common, but which can be unique from other departments. Performing upgrades and maintenance on three images is far more productive that working on all client systems individually. Startup is obviously network intensive, and beyond 40-50 clients, the Admin needs to carefully subnet the infrastructure, use gigabit switches, and host the images local to the clients to avoid saturating the network. This will expand the number of BootP servers and multiply the number of images, but the productivity of 1 BootP server per 50 clients is undeniable :) Sunmicro, Linux, and AIX RS/600 all support BootP. To date, Windows does not support booting “diskless clients”.
* a unique IP address to the requester (using port 67) similar to the DHCP request on port 68 AND
* can provide (where supported) the ability to boot a system without a hard drive (ie: a diskless client)
Apple OS X 10.* Server supports BootP (albeit) renamed as NetBoot. The facility allows the Admin to maintain a selected set of configurations as boot images and then assign sets of client systems to share(or boot from) that image. For example Accounting, Management, and Engineering departments have elements in common, but which can be unique from other departments. Performing upgrades and maintenance on three images is far more productive that working on all client systems individually. Startup is obviously network intensive, and beyond 40-50 clients, the Admin needs to carefully subnet the infrastructure, use gigabit switches, and host the images local to the clients to avoid saturating the network. This will expand the number of BootP servers and multiply the number of images, but the productivity of 1 BootP server per 50 clients is undeniable :) Sunmicro, Linux, and AIX RS/600 all support BootP. To date, Windows does not support booting “diskless clients”.
- DNS zones – describe the
differences between the DNS types.
Ans: The
DNS Server service provides for three types of zones:
- Primary zone
- Secondary zone
- Stub zone
The
following sections describe each of these zone types.
Primary zone
When
a zone that this DNS server hosts is a primary zone, the DNS server is the
primary source for information about this zone, and it stores the master copy
of zone data in a local file or in AD DS. When the zone is stored in a
file, by default the primary zone file is named zone_name.dns and it is
located in the %windir%\System32\Dns folder on the server.
Secondary zone
When
a zone that this DNS server hosts is a secondary zone, this DNS server is a
secondary source for information about this zone. The zone at this server must
be obtained from another remote DNS server computer that also hosts the zone.
This DNS server must have network access to the remote DNS server that supplies
this server with updated information about the zone. Because a secondary zone
is merely a copy of a primary zone that is hosted on another server, it cannot
be stored in AD DS.
Stub zone
When
a zone that this DNS server hosts is a stub zone, this DNS server is a source
only for information about the authoritative name servers for this zone. The
zone at this server must be obtained from another DNS server that hosts the
zone. This DNS server must have network access to the remote DNS server to copy
the authoritative name server information about the zone.
You
can use stub zones to:
- Keep delegated zone information current. By updating a
stub zone for one of its child zones regularly, the DNS server that hosts
both the parent zone and the stub zone will maintain a current list of
authoritative DNS servers for the child zone.
- Improve name resolution. Stub zones enable a DNS server
to perform recursion using the stub zone's list of name servers, without
having to query the Internet or an internal root server for the DNS
namespace.
- Simplify DNS administration. By using stub zones
throughout your DNS infrastructure, you can distribute a list of the
authoritative DNS servers for a zone without using secondary zones.
However, stub zones do not serve the same purpose as secondary zones, and
they are not an alternative for enhancing redundancy and load sharing.
There
are two lists of DNS servers involved in the loading and maintenance of a stub
zone:
- The list of master servers from which the DNS server
loads and updates a stub zone. A master server may be a primary or
secondary DNS server for the zone. In both cases, it will have a complete
list of the DNS servers for the zone.
- The list of the authoritative DNS servers for a zone.
This list is contained in the stub zone using name server (NS) resource records.
When
a DNS server loads a stub zone, such as widgets.tailspintoys.com, it queries
the master servers, which can be in different locations, for the necessary
resource records of the authoritative servers for the zone
widgets.tailspintoys.com. The list of master servers may contain a single
server or multiple servers, and it can be changed anytime.
- DNS record types – describe the
most important ones.
Ans: DNS Syntax Types Explained
An
“A” record, which stands for “address” is the most basic type of syntax used in
DNS records, indicating the actual IP address of the domain. The “AAAA” record
is an IPV6 address record that maps a hostname to a 128-bit Ipv6 address.
Regular DNS addresses are mapped for 32-bit IPv4 addresses.
The
“CNAME” record stands for “canonical name” and serves to make one domain an
alias of another domain. CNAME is often used to associate new subdomains with
an existing domain's DNS records.
The
“MX” record stands for “mail exchange” and is basically a list of mail exchange
servers that are to be used for the domain.
The
“PTR” record stands for “pointer record” and maps an Ipv4 address to the CNAME
on the host.
The
“NS” record stands for “name server” and indicates which Name Server is
authoritative for the domain.
An
“SOA” record stands for “State of Authority” and is easily one of the most
essential DSN records because it stores important information like when the
domain was last updated and much more.
An
“SRV” record stands for “service” and is used to define a TCP service on which
the domain operates.
A
“TXT” record lets the administrator insert any text they'd like into the DNS
record, and it is often used for denoting facts about the domain.
- Describe the process of working
with an external domain name.
Ans: Serving Sites with External Domain Name Servers,
If you host Web sites on this server and have a standalone DNS server acting as
a primary (master) name server for your sites, you may want to set up your
control panel’s DNS server to function as a secondary (slave) name server:
To make the control panel’s DNS server act as a secondary name server:
1. Go to Domains > domain name > DNS Settings (in the Web Site group).
2. Click Switch DNS Service Mode.
3. Specify the IP address of the primary (master) DNS server.
4. Click Add.
5. Repeat steps from 1 to 5 for each Web site that needs to have a secondary name server on this machine.
To make the control panel’s DNS server act as a primary for a zone:
1. Go to Domains > domain name > DNS Settings (in the Web Site group).
2. Click Switch DNS Service Mode. The original resource records for the zone will be restored.
If you host Web sites on this server and rely entirely on other machines to perform the Domain Name Service for your sites (there are two external name servers – a primary and a secondary), switch off the control panel’s DNS service for each site served by external name servers.
To switch off the control panel’s DNS service for a site served by an external name server:
1. Go to Domains > domain name > DNS Settings (in the Web Site group).
2. Click Switch Off the DNS Service in the Tools group. Turning the DNS service off for the zone will refresh the screen, so that only a list of name servers remains.
Note: The listed name server records have no effect on the system. They are only presented on the screen as clickable links to give you a chance to validate the configuration of the zone maintained on the external authoritative name servers.
1. Repeat the steps from 1 to 3 to switch off the local domain name service for each site served by external name servers. If you wish to validate the configuration of a zone maintained on authoritative name servers:
1. Go to Domains > domain name > DNS Settings (in the Web Site group).
2. Add to the list the entries pointing to the appropriate name servers that are authoritative for the zone: click Add, specify a name server, and click OK. Repeat this for each name server you would like to test. The records will appear in the list.
1. Click the records that you have just created. Parallels Plesk Panel will retrieve the zone file from a remote name server and check the resource records to make sure that domain’s resources are properly resolved. The results will be interpreted and displayed on the screen.
To make the control panel’s DNS server act as a secondary name server:
1. Go to Domains > domain name > DNS Settings (in the Web Site group).
2. Click Switch DNS Service Mode.
3. Specify the IP address of the primary (master) DNS server.
4. Click Add.
5. Repeat steps from 1 to 5 for each Web site that needs to have a secondary name server on this machine.
To make the control panel’s DNS server act as a primary for a zone:
1. Go to Domains > domain name > DNS Settings (in the Web Site group).
2. Click Switch DNS Service Mode. The original resource records for the zone will be restored.
If you host Web sites on this server and rely entirely on other machines to perform the Domain Name Service for your sites (there are two external name servers – a primary and a secondary), switch off the control panel’s DNS service for each site served by external name servers.
To switch off the control panel’s DNS service for a site served by an external name server:
1. Go to Domains > domain name > DNS Settings (in the Web Site group).
2. Click Switch Off the DNS Service in the Tools group. Turning the DNS service off for the zone will refresh the screen, so that only a list of name servers remains.
Note: The listed name server records have no effect on the system. They are only presented on the screen as clickable links to give you a chance to validate the configuration of the zone maintained on the external authoritative name servers.
1. Repeat the steps from 1 to 3 to switch off the local domain name service for each site served by external name servers. If you wish to validate the configuration of a zone maintained on authoritative name servers:
1. Go to Domains > domain name > DNS Settings (in the Web Site group).
2. Add to the list the entries pointing to the appropriate name servers that are authoritative for the zone: click Add, specify a name server, and click OK. Repeat this for each name server you would like to test. The records will appear in the list.
1. Click the records that you have just created. Parallels Plesk Panel will retrieve the zone file from a remote name server and check the resource records to make sure that domain’s resources are properly resolved. The results will be interpreted and displayed on the screen.
- Describe the importance of DNS to
AD.
Ans: When you install Active Directory on a server,
you promote the server to the role of a domain controller for a specified
domain. When completing this process, you are prompted to specify a DNS domain
name for the Active Directory domain for which you are joining and promoting
the server. If during this process, a DNS server authoritative
for the domain that you specified either cannot be located on the network or
does not support the DNS dynamic update protocol, you are prompted with the option
to install a DNS server. This option is provided because a DNS server is
required to locate this server or other domain controllers for members of an
Active Directory domain
- Describe a few methods of finding
an MX record for a remote domain on the Internet.
Ans: In
order to find MX Records for SMTP domains you can use Command-line tools such
as NSLOOKUP or DIG. You can also use online web services that allow you to
perform quick searches and display the information in a convenient manner.
- What does “Disable Recursion” in
DNS mean?
Ans: In the Windows 2000/2003 DNS console (dnsmgmt.msc), under a server’s Properties -> Forwarders
tab is the setting Do not use recursion for this domain. On the Advanced tab
you will find the confusingly similar option Disable recursion (also disables
forwarders). Recursion refers to the action of a DNS server
querying additional DNS servers (e.g. local ISP DNS or the root DNS servers) to
resolve queries that it cannot resolve from its own database.
- What could cause the Forwarders
and Root Hints to be grayed out?
Ans: Win2K configured your DNS server as a private
root server.
- What is a “Single Label domain
name” and what sort of issues can it cause?
Ans: Single-label
names consist of a single word like “contoso”.
• Single-label DNS names cannot be registered by using an Internet registrar.
• Client computers and domain controllers that joined to single-label domains require additional configuration to dynamically register DNS records in single-label DNS zones. • Client computers and domain controllers may require additional configuration to resolve DNS queries in single-label DNS zones.
• By default, Windows Server 2003-based domain members, Windows XP-based domain members, and Windows 2000-based domain members do not perform dynamic updates to single-label DNS zones.
• Some server-based applications are incompatible with single-label domain names. Application support may not exist in the initial release of an application, or support may be dropped in a future release. For example, Microsoft Exchange Server 2007 is not supported in environments in which single-label DNS is used.
• Some server-based applications are incompatible with the domain rename feature that is supported in Windows Server 2003 domain controllers and in Windows Server 2008 domain controllers. These incompatibilities either block or complicate the use of the domain rename feature when you try to rename a single-label DNS name to a fully qualified domain name.
• Single-label DNS names cannot be registered by using an Internet registrar.
• Client computers and domain controllers that joined to single-label domains require additional configuration to dynamically register DNS records in single-label DNS zones. • Client computers and domain controllers may require additional configuration to resolve DNS queries in single-label DNS zones.
• By default, Windows Server 2003-based domain members, Windows XP-based domain members, and Windows 2000-based domain members do not perform dynamic updates to single-label DNS zones.
• Some server-based applications are incompatible with single-label domain names. Application support may not exist in the initial release of an application, or support may be dropped in a future release. For example, Microsoft Exchange Server 2007 is not supported in environments in which single-label DNS is used.
• Some server-based applications are incompatible with the domain rename feature that is supported in Windows Server 2003 domain controllers and in Windows Server 2008 domain controllers. These incompatibilities either block or complicate the use of the domain rename feature when you try to rename a single-label DNS name to a fully qualified domain name.
- What is the “in-addr.arpa” zone
used for?
Ans: When creating DNS records for your hosts, A
records make sense. After all, how can the world find your mail server unless
the IP address of that server is associated with its hostname within a DNS
database? However, PTR records aren’t as easily understood. If you already have
a zone file, why does there have to be a separate in-addr.arpa zone containing PTR records matching your A
records? And who should be making those PTR records–you or your provider? Let’s
start by defining in-addr.arpa. .arpa is actually a TLD like .com or .org.
The name of the TLD comes from Address and Routing Parameter Area and it has
been designated by the IANA to be used exclusively for Internet infrastructure
purposes. In other words, it is an important zone and an integral part of the
inner workings of DNS. The RFC for DNS (RFC 1035) has an entire section on the in-addr.arpa domain. The first two paragraphs in that
section state the purpose of the domain: “The Internet uses a special domain to
support gateway location and Internet address to host mapping. Other classes
may employ a similar strategy in other domains. The intent of this domain is to
provide a guaranteed method to perform host address to host name mapping, and
to facilitate queries to locate all gateways on a particular network in the
Internet. Note that both of these services are similar to functions that could
be performed by inverse queries; the difference is that this part of the domain
name space is structured according to address, and hence can guarantee that the
appropriate data can be located without an exhaustive search of the domain
space.” In other words, this zone provides a database of all allocated networks
and the DNS reachable hosts within those networks. If your assigned network
does not appear in this zone, it appears to be unallocated. And if your hosts
don’t have a PTR record in this database, they appear to be unreachable through
DNS. Assuming an A record exists for a host, a missing PTR record may or may
not impact on the DNS reachability of that host, depending upon the
applications running on that host. For example, a mail server will definitely
be impacted as PTR records are used in mail header checks and by most anti-SPAM
mechanisms. Depending upon your web server configuration, it may also depend
upon an existing PTR record. This is why the DNS RFCs recommend that every A
record has an associated PTR record. But who should make and host those PTR
records? Twenty years ago when you could buy a full Class C network address
(i.e. 254 host addresses) the answer was easy: you. Remember, the in-addr.arpa zone is concerned with delegated network
addresses. In other words, the owner of the network address is authoritative
(i.e. responsible) for the host PTR records associated with that network address
space. If you only own one or two host addresses within a network address
space, the provider you purchased those addresses from needs to host your PTR
records as the provider is the owner of (i.e. authoritative for) the network
address. Things are a bit more interesting if you have been delegated a CIDR
block of addresses. The in-addr.arpa zone assumes a classful addressing scheme where
a Class A address is one octet (or /8), a Class B is 2 octets (or /16) and a
Class C is 3 octets (or /24). CIDR allows for delegating address space outside
of these boundaries–say a /19 or a /28. RFC 2317 provides a best current
practice for maintaining in-addr.arpa with these types of network allocations. Here
is a summary regarding PTR records: • Don’t wait until users complain about DNS
unreachability–be proactive and ensure there is an associated PTR record for
every A record. • If your provider hosts your A records, they should also host
your PTR records. • If you only have one or two assigned IP addresses, your provider
should host your PTR records as they are authoritative for the network those
hosts belong to. • If you own an entire network address (e.g. a Class C address ending in 0), you are responsible for
hosting your PTR records. • If you are configuring an internal DNS server
within the private address ranges (e.g. 10.0.0.0 or 192.168.0.0), you are
responsible for your own internal PTR records. • Remember: the key to PTR
hosting is knowing who is authoritative for the network address for your
domain. When in doubt, it probably is not you.
- What are the requirements from DNS
to support AD?
Ans: When you install Active Directory on a member
server, the member server is promoted to a domain controller. Active Directory
uses DNS as the location mechanism for domain controllers, enabling computers
on the network to obtain IP addresses of domain controllers. During the
installation of Active Directory, the service (SRV) and address (A) resource
records are dynamically registered in DNS, which are necessary for the
successful functionality of the domain controller locator (Locator) mechanism. To find domain controllers in a domain or
forest, a client queries DNS for the SRV and A DNS resource records of the
domain controller, which provide the client with the names and IP addresses of
the domain controllers. In this context, the SRV and A resource records are
referred to as Locator DNS resource records. When adding a domain controller to
a forest, you are updating a DNS zone hosted on a DNS server with the Locator
DNS resource records and identifying the domain controller. For this reason,
the DNS zone must allow dynamic updates (RFC 2136) and the DNS server hosting
that zone must support the SRV resource records (RFC 2782) to advertise the
Active Directory directory service. For more information about RFCs, see DNS
RFCs. If the DNS server hosting the authoritative DNS zone is not a server
running Windows 2000 or Windows Server 2003, contact your DNS administrator to
determine if the DNS server supports the required standards. If the server does
not support the required standards, or the authoritative DNS zone cannot be
configured to allow dynamic updates, then modification is required to your
existing DNS infrastructure.
- How do you manually create SRV
records in DNS?
Ans: This is on windows server
go to run —> dnsmgmt.msc
rightclick on the zone you want to add srv record to and choose “other new record” and choose service location(srv)…..
go to run —> dnsmgmt.msc
rightclick on the zone you want to add srv record to and choose “other new record” and choose service location(srv)…..
- Name 3 benefits of using
AD-integrated zones.
Ans: 1.
you can give easy name resolution to your clients.
2. By creating AD- integrated zone you can also trace hacker and spammer by creating reverse zone.
3. AD integrated zoned all for incremental zone transfers which on transfer changes and not the entire zone. This reduces zone transfer traffic.
2. By creating AD- integrated zone you can also trace hacker and spammer by creating reverse zone.
3. AD integrated zoned all for incremental zone transfers which on transfer changes and not the entire zone. This reduces zone transfer traffic.
4. AD Integrated zones support both secure
and dynamic updates.
5. AD integrated zones are stored as part of the active directory and support domain-wide or forest-wide replication through application partitions in AD.
5. AD integrated zones are stored as part of the active directory and support domain-wide or forest-wide replication through application partitions in AD.
- What are the benefits of using
Windows 2003 DNS when using AD-integrated zones?
Ans: DNS
supports Dynamic registration of SRV records registered by a Active Directory
server or a domain controller during promotion. With the help of SRV
records client machines can find domain controllers in the network.
1. DNS supports Secure Dynamic updates. Unauthorized access is denied.
2. Exchange server needs internal DNS or AD DNS to locate Global Catalog servers.
3. Active Directory Integrated Zone. If you have more than one domain controller (recommended) you need not worry about zone replication. Active Directory replication will take care of DNS zone replication also.
4. If your network uses DHCP with Active Directory then no other DHCP will be able to service client requests coming from different network. It is because DHCP server is authorized in AD and will be the only server to participate on network to provide IP Address information to client machines.
5. Moreover, you can use NT4 DNS with Service Pack 4 or later. It supports both SRV record registration and Dynamic Updates.
Using Microsoft DNS gives the following benefits:
If you implement networks that require secure updates.
If you want to take benefit of Active Directory replication.
If you want to integrate DHCP with DNS for Low-level clients to register their Host records in Zone database.
1. DNS supports Secure Dynamic updates. Unauthorized access is denied.
2. Exchange server needs internal DNS or AD DNS to locate Global Catalog servers.
3. Active Directory Integrated Zone. If you have more than one domain controller (recommended) you need not worry about zone replication. Active Directory replication will take care of DNS zone replication also.
4. If your network uses DHCP with Active Directory then no other DHCP will be able to service client requests coming from different network. It is because DHCP server is authorized in AD and will be the only server to participate on network to provide IP Address information to client machines.
5. Moreover, you can use NT4 DNS with Service Pack 4 or later. It supports both SRV record registration and Dynamic Updates.
Using Microsoft DNS gives the following benefits:
If you implement networks that require secure updates.
If you want to take benefit of Active Directory replication.
If you want to integrate DHCP with DNS for Low-level clients to register their Host records in Zone database.
- You installed a new AD domain and
the new (and first) DC has not registered its SRV records in DNS. Name a
few possible causes.
Ans: The machine cannot be
configured with DNS client her own
The DNS service cannot be run
The DNS service cannot be run
- What are the benefits and
scenarios of using Stub zones?
Ans: One of the new features introduced in the
Windows Server 2003-based implementation of DNS are stub zones. Its main
purpose is to provide name resolution in domains, for which a local DNS server
is not authoritative. The stub zone contains only a few records:
– Start of
Authority (SOA) record pointing to a remote DNS server that
is considered to be the best source of information about the target DNS domain,
– one or more Name Server (NS) records (including the entry associated with the
SOA record), which are authoritative for the DNS domain represented by the stub
zone, – corresponding A records for each of the NS entries (providing IP
addresses of the servers). While you can also provide name resolution for a
remote domain by either creating a secondary zone (which was a common approach
in Windows Server 2000 DNS implementation) or delegation (when dealing with a
contiguous namespace), such approach forces periodic zone transfers, which are
not needed when stub zones are used. Necessity to traverse network in order to
obtain individual records hosted on the remote Name Servers is mitigated to
some extent by caching process, which keeps them on the local server for the
duration of their Time-to-Live (TTL) parameter. In addition, records residing
in a stub zone are periodically validated and refreshed in order to avoid lame
delegations
- What are the benefits and
scenarios of using Conditional Forwarding?
Ans: Rather than having a DNS server forward all
queries it cannot resolve to forwarders, the DNS server can forward queries for
different domain names to different DNS servers according to the
specific domain names that are contained in the queries. Forwarding according
to these domain-name conditions improves conventional forwarding by adding a
second condition to the forwarding process.
- What are
the differences between Windows Clustering, Network Load Balancing and
Round Robin, and scenarios for each use?
Ans: I will make a few assumptions
here:
1) By “Windows Clustering Network
Load Balancing” you mean Windows Network Load Balancing software included in Windows Server
software a.k.a NLB., and
2) By Round Robin, you mean DNS Round Robin meaning the absence of a software or hardware load balancing device, or the concept of the Round Robin algorithm available in just about every load balancing solution.
Microsoft NLB is designed for a small number (4 – 6) of Windows Servers and a low to moderate number of new connections per second, to provide distribution of web server requests to multiple servers in a virtual resource pool. Some would call this a “cluster”, but there are subtle differences between a clustered group of devices and a more loosely configured virtual pool. From the standpoint of scalability and performance, almost all hardware load balancing solutions are superior to this and other less known software load balancing solutions [e.g. Bright Tiger circa 1998].
DNS Round Robin is an inherent load balancing method built into DNS. When you resolve an IP address that has more than one A record, DNS hands out different resolutions to different requesting local DNS servers. Although there are several factors effecting the exact resulting algorithm (e.g. DNS caching, TTL, multiple DNS servers [authoritative or cached]), I stress the term “roughly” when I say it roughly results in an even distribution of resolutions to each of the addresses specified for a particular URL. It does not however, consider availability, performance, or any other metric and is completely static. The basic RR algorithm is available in many software and hardware load balancing solutions and simply hands the next request to the next resource and starts back at the first resource when it hits the last one.
NLB is based on proprietary software, meant for small groups of Windows servers only on private networks, and is dynamic in nature (takes into account availability of a server, and in some cases performance). “Round Robin”, DNS or otherwise, is more generic, static in nature (does not take into account anything but the resource is a member of the resource pool and each member is equal), and ranges from DNS to the default static load balancing method on every hardware device in the market.
2) By Round Robin, you mean DNS Round Robin meaning the absence of a software or hardware load balancing device, or the concept of the Round Robin algorithm available in just about every load balancing solution.
Microsoft NLB is designed for a small number (4 – 6) of Windows Servers and a low to moderate number of new connections per second, to provide distribution of web server requests to multiple servers in a virtual resource pool. Some would call this a “cluster”, but there are subtle differences between a clustered group of devices and a more loosely configured virtual pool. From the standpoint of scalability and performance, almost all hardware load balancing solutions are superior to this and other less known software load balancing solutions [e.g. Bright Tiger circa 1998].
DNS Round Robin is an inherent load balancing method built into DNS. When you resolve an IP address that has more than one A record, DNS hands out different resolutions to different requesting local DNS servers. Although there are several factors effecting the exact resulting algorithm (e.g. DNS caching, TTL, multiple DNS servers [authoritative or cached]), I stress the term “roughly” when I say it roughly results in an even distribution of resolutions to each of the addresses specified for a particular URL. It does not however, consider availability, performance, or any other metric and is completely static. The basic RR algorithm is available in many software and hardware load balancing solutions and simply hands the next request to the next resource and starts back at the first resource when it hits the last one.
NLB is based on proprietary software, meant for small groups of Windows servers only on private networks, and is dynamic in nature (takes into account availability of a server, and in some cases performance). “Round Robin”, DNS or otherwise, is more generic, static in nature (does not take into account anything but the resource is a member of the resource pool and each member is equal), and ranges from DNS to the default static load balancing method on every hardware device in the market.
- How do I work with the Host name
cache on a client computer?
Ans: Use the command nbtstat.
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
-c (cache) Lists NBT's cache of remote [machine] names and their IP addresses
-n (names) Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS
-R (Reload) Purges and reloads the remote cache name table
-S (Sessions) Lists sessions table with the destination IP addresses
-s (sessions) Lists sessions table converting destination IP addresses to computer NETBIOS names.
-RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts Refresh
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
-c (cache) Lists NBT's cache of remote [machine] names and their IP addresses
-n (names) Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS
-R (Reload) Purges and reloads the remote cache name table
-S (Sessions) Lists sessions table with the destination IP addresses
-s (sessions) Lists sessions table converting destination IP addresses to computer NETBIOS names.
-RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts Refresh
- How do I clear the DNS cache on
the DNS server?
Ans: To clear the server names cache
* Using the Windows interface
* Using a command line
Using the Windows interface
1. Open DNS.
2. In the console tree, click the applicable DNS server.
Where?
* DNS/applicable DNS server
3. On the Action menu, click Clear Cache.
Notes:
* To perform this procedure, you must be a member of the Administrators group on the local computer, or you must have been delegated the appropriate authority. If the computer is joined to a domain, members of the Domain Admins group might be able to perform this procedure. As a security best practice, consider using Run as to perform this procedure.
* To open DNS, click Start, click Control Panel, double-click Administrative Tools, and then double-click DNS.
Using a command line
1. Open Command Prompt.
2. Type the following command and then press ENTER:
Dnscmd ServerName /clearcache
* Using the Windows interface
* Using a command line
Using the Windows interface
1. Open DNS.
2. In the console tree, click the applicable DNS server.
Where?
* DNS/applicable DNS server
3. On the Action menu, click Clear Cache.
Notes:
* To perform this procedure, you must be a member of the Administrators group on the local computer, or you must have been delegated the appropriate authority. If the computer is joined to a domain, members of the Domain Admins group might be able to perform this procedure. As a security best practice, consider using Run as to perform this procedure.
* To open DNS, click Start, click Control Panel, double-click Administrative Tools, and then double-click DNS.
Using a command line
1. Open Command Prompt.
2. Type the following command and then press ENTER:
Dnscmd ServerName /clearcache
- What is the 224.0.1.24 address
used for?
Ans: WINS server group
address. Used to support autodiscovery and dynamic configuration of replication
for WINS servers.
- What is WINS and when do we use
it?
Ans: In the Windows
Server family, the primary means for client computer to locate and communicate
with other computers on an Internet Protocol (IP) network is by using Domain
Name System (DNS). However, clients that use older versions of Windows, such as
Windows NT 4.0, use network basic I/O system (NetBIOS) names for network
communication. Some applications that run on Windows Server 2003 may also use
NetBIOS names for network communication. Using NetBIOS names requires a method
of resolving NetBIOS names to IP . Using a WINS server is essential for any
Windows client computer to work with other Windows computers over the Internet.
In addition, using a WINS server is essential for any Windows client computer
at Indiana University that intends to use Microsoft network resources. To use
WINS services, you must insert into your TCP/IP networking configuration the IP
address of the WINS servers you wish to use.
- Can you have a Microsoft-based
network without any WINS server on it? What are the “considerations”
regarding not using WINS?
Ans: Yes, you can. WINS
was designed to speed up information flow about the Windows workstations in a
network. It will work without it, and most networks do not utilize WINS servers
anymore because it is based on an old protocol (NetBUI) which is no longer in
common use.
Courtesy:
No comments:
Post a Comment