Showing posts with label linux. Show all posts
Showing posts with label linux. Show all posts

Saturday, September 17, 2011

Linux Admin Related Questions & Answers

What is Linux and why is it so popular?

Linux is an operating system that uses UNIX like Operating system. However, unlike UNIX, Linux is an open source and free software. Linux was originally created by Linus Torvalds and commonly used in servers.

Popularity of Linux is because of the following reason

●     It is free and open source. We can download Linux for free and customize it as per our needs.

●     It is very robust and adaptable.

●     Immense amount of libraries and utilities

What is LILO?

LILO stands for Linux Loader which is a bootstrap program. LILO is a code snippet which loads PC BIOS into the main memory at the time of starting the computer system. LILO handles the following tasks:

-Locating Linux kernel
-Identifying other supporting programs and loading them in the memory
-Staring Kernel

The selection of various kernel images and boot routines is supported by LILO. For this reason, LILO is known as boot manager.

What is the difference between home directory and working directory?

Answer
Home directory is the default working directory when a user logs in. On the other hand, working directory is the user’s current directory. Working directory can be changed. It can be changed using cd command.

Home directory in Linux contains user’s personal data, configuration files, settings of a software etc. The content of home directory is private and the user has a complete control of it.  

What is LILO?

LILO stands for Linux Loader which is a bootstrap program. LILO is a code snippet which loads PC BIOS into the main memory at the time of starting the computer system. LILO handles the following tasks:

-Locating Linux kernel
-Identifying other supporting programs and loading them in the memory
-Staring Kernel

The selection of various kernel images and boot routines is supported by LILO. For this reason, LILO is known as boot manager.

What is the difference between internal and external commands?

The commands that are directly executed by the shell are known as internal commands. No separate process is there to run these commands.

The commands that are executed by the kernel are knows as external commands. Each command has its unique process id.

What is the file server in Linux server?

File server is used for file sharing. It enables the processes required fro sharing. All the files can be stored at a centralized location. Linux uses Samba to view the files on the server. Files on this server are backed up on a regular basis. Rights can be also assigned for the files on a file server.

What is NFS? What is its purpose?

NFS is Network File system. It is a file system used for sharing of files over a network. Other resources like printers and storage devices can also be shared. This means that using NFS files can be accessed remotely. Nfs command in linux can be used to achieve this.  

Purpose of NFS:

●     NFS can be used for sharing of files remotely.

●     Data can be stored on a single machine and still remain accessible to others over the network.

●     Reduction of the number of removable media drives throughout the network since they can be shared.

How do I send email with linux?

Email can be sent in Linux using the mail command.

Mail [options] [users]

Options include: -s for subject, -c for carbon copy, -b for blind carbon copy

E.g. mail user_name –s “hello”  

Explain RPM (Red Hat Package Manager) features.

RPM is a package managing system (collection of tools to manage software packages).

Features:

●     RPM can verify software packages.

●     RPM can be served as a powerful search engine to search for software’s.

●     Components, software’s etc can be upgraded using RPM without having to reinstall them

●     Installing, reinstalling can be done with ease using RPM

●     During updates RPM handles configuration files carefully, so that the customization is not lost. 

What is Kernel? Explain the task it performs.

Kernel is used in UNIX like systems and is considered to be the heart of the operating system. It is responsible for communication between hardware and software components. It is primarily used for managing the systems resources as well.

Kernel Activities:
●     The Kernel task manager allows tasks to run concurrently.
●     Managing the computer resources: Kernel allows the other programs to run and use the resources. Resources include i/o devices, CPU, memory.
●     Kernel is responsible for Process management. It allows multiple processes to run simultaneously allowing user to multitask.
●     Kernel has an access to the systems memory and allows the processes to access the memory when required.
●     Processes may also need to access the devices attached to the system. Kernel assists the processes in doing so.
●     For the processes to access and make use of these services, system calls are used.  

What is Linux Shell? What is Shell Script?

Linux shell is a user interface used for executing the commands. Shell is a program the user uses for executing the commands. In UNIX, any program can be the users shell. Shell categories in Linux are: 

Bourne shell compatible, C shell compatible, nontraditional, and historical.

A shell script, as the name suggests, is a script written for the shell. Script here means a programming language used to control the application. The shell script allows different commands entered in the shell to be executed. Shell script is easy to debug, quicker as compared to writing big programs. However the execution speed is slow because it launches a new process for every shell command executed. Examples of commands are cp, cn, cd

What are Pipes? Explain use of pipes.

A pipe is a chain of processes so that output of one process (stdout) is fed an input (stdin) to another. UNIX shell has a special syntax for creation of pipelines. The commands are written in sequence separated by |. Different filters are used for Pipes like AWK, GREP.

e.g. sort file | lpr ( sort the file and send it to printer)

Uses of Pipes

●     Several powerful functions can be in a single statement

●     Streams of processes can be redirected to user specified locations using

Explain trap command; shift Command, getopts command of linux.

trap command is used to catch a signal that is sent to a process. An action is taken based on the signal by using the action which is defined in the trap command instead of taking the default effect on the process.

Example:

$ trap “echo ‘interrupt signal received’ “ INT.

shift command is used to replace the parameters that were sent from command line. For example

$ shift will replace $1 by $2

getopts command is used for the purpose of parsing positional parameters.

What Stateless Linux server? What feature it offers?


A stateless Linux server is a centralized server in which no state exists on the single workstations. There may be scenarios when a state of a partilcuar system is meaningful (A snap shot is taken then) and the user wants all the other machines to be in that state. This is where the stateless Linux server comes into picture.

Features:

●     It stores the prototypes of every machine

●     It stores snapshots taken for those systems

●     It stores home directories for those systems

●     Uses LDAP containing information of all systems to assist in finding out which snapshot (of state) should be running on which system. 

What does nslookup do? Explain its two modes.

Nslookup is a program used to find information about internet Domain Name server.

The two modes of nslookup are: Interactive and non-interactive.

Using ‘interactive mode’ user can query the name servers for the information pertaining to hosts and domains.

Using ‘non-interactive mode’ the user can just print the name and requested information of a host.

What is Bash Shell?

Bash stands for "Bourne Again Shell”. A shell is the user interface. Bash is more convenient shell for users among others. The scripts written in Bash are portable among machines, distributions and even operating systems.

Explain some Network-Monitoring Tools in Linux: ping, traceroute, tcpdump, ntop

Network monitoring tools are used to monitor the network, systems present on the network, traffic etc.

Ping: Ping command is used to check if the system is in the network or not. To check if the host is operating.  

e.g. ping ip_address

When the command is executed, it returns a detailed summary of the host. Packets sent, received, lost by estimating the round trip time.

Traceroute: the command is used to trace the path taken by the packet across a network. Tracing the path here means finding out the hosts visited by the packet to reach its destination. This information is useful in debugging. Roundtrip time in ms is shown for every visit to a host.

Tcpdump: commonly used to monitor network traffic. Tcdump captures and displays packet headers and matching them against criteria or all. It interprets Boolean operators and accepts host names, ip address, network names as arguments.

Ntop: Network top shows the network usage. It displays summary of network usage by machines on the network in a format as of UNIX top utility. It can also be run in web mode, which allows the display to be browsed with a web browser. It can display network traffic statistics, identify host etc. Interfaces are available to view such information.

Explain file system of linux. The root "/" filesystem, /usr filesystem, /var filesystem, /home filesystem, /proc filesystem.
Answer
Root "/" file system: The kernel needs a root file system to mount at start up. The root file system is generally small and should not be changed often as it may interrupt in booting. The root directory usually does not have the critical files. Instead sub directories are created. E.g. /bin (commands needed during bootup), /etc (config files) , /lib(shared libraries).

/usr filesystem : this file system is generally large as it contains the executable files to be shared amongst different machines. Files are usually the ones installed while installing Linux. This makes it possible to update the system from a new version of the distribution, or even a completely new distribution, without having to install all programs again. Sub directories include /bin, /include, /lib, /local (for local executables)

/var filesystem : this file system is specific to local systems. It is called as var because the data keeps changing. The sub directories include /cache/man (A cache for man pages), /games (any variable data belong to games), /lib (files that change), /log (log from different programs), /tmp (for temporary files)

/home filesystem: - this file system differs from host to host. User specific configuration files for applications are stored in the user's home directory in a file. UNIX creates directories for all users directory. E.g /home/my_name. Once the user is logged in ; he is placed in his home directory.

/proc filesystem : this file system does not exist on the hard disk. It is created by the kernel in its memory to provide information about the system. This information is usually about the processes. Contains a hierarchy of special files which represent the current state of the kernel .Few of the Directories include /1 (directory with information about process num 1, where 1 is the identification number), /cpuinfo (information about cpu), /devices (information about devices installed), /filesystem (file systems configured), /net (information about network protocols), /mem (memory usage)

How does the Linux file system work?

At the time of installation of Linux, a file system is assigned and persists in the hard disk. This file system structure resembles a tree.
A file can be a list of names and numbers or executable programs. Linux treats every program as a file. Linux treats directories and computer components also as files.
A file could be a list of names and numbers, a cheesecake recipe, or an executable program. But under Linux, everything is a file. In addition to data and executable files, Linux treats directories and even the various components of your computer as files. It could be a keyboard, console, and printer, RAM or ROM. These are referred as special files known as devices. These files are available in /dev directory. Linux performs the communication with these devices by simply reading from or writing to these special files.

What are the process states in Linux?

Process states in Linux:

●     Running: Process is either running or ready to run

●     Interruptible: a Blocked state of a process and waiting for an event or signal from another process

●     Uninterruptible: a blocked state. Process waits for a hardware condition and cannot handle any signal

●     Stopped: Process is stopped or halted and can be restarted by some other process

●     Zombie: process terminated, but information is still there in the process table. 

What is a zombie?

Zombie is a process state when the child dies before the parent process. In this case the structural information of the process is still in the process table. Since this process is not alive, it cannot react to signals. Zombie state can finish when the parent dies. All resources of the zombie state process are cleared by the kernel

Explain each system calls used for process management in linux.

System calls used for Process management:

●     Fork () :- Used to create a new process

●     Exec() :- Execute a new program

●     Wait():- wait until the process finishes execution

●     Exit():- Exit from the process

●     Getpid():- get the unique process id of the process

●     Getppid():- get the parent process unique id

●     Nice():- to bias the existing property of process 

Describe initial process sequence while the system boots up.

1) BIOS
2) Master Boot Record (MBR)
3) LILO or GRUB
4) Kernel
5) init
6) Run Levels

1) BIOS: Loads the boot sector from the storage media. The order of booting can be changed using BIOS.

2) (DOS) Master Boot Record (MBR): DOS option includes MS-DOS, Windows. The first 512 bytes off the disk i.e., /dev/had will be executed by BIOS. The standard MBR looks for the primary partition i.e., /dev.hda1-4 which is marked bootable.

3) LILO: The kernel image is to be loaded as it does not understand the file system code. The kernel image is persisted as raw disk offsets using BIOS routines to load the sequence. Typically the menu code is available in /boot/boot.b and prompts for the partition or kernel for image (Linux) or other (DOS) to load first 512 bytes of the partition.

4) Kernel: Initializes devices, loads ‘initrd’ optionally, mounts root file system that is specified by lilo or loadin with root=parameter. Runs /sbin/init which has the process number 1(PID = 1) and prints the version number.

5) /sbin/init: Reads the /etc/inittab. Executes the boot scripts debian in turn runs /etc/rcS.d/S* scripts, runs the programs available in /etc/inittab.

6) Run Levels: The default level is defined in /etc/inittab. Ex: id: 3: initdefault: The other levels are:

0 halt
1 single user
2 Full Multi-User modes (default)
3-5 Same as 2
6 Reboot 

What is a shell? What are shell variables?

A shell us an interface to the user of any operating system. The users instruct an operation to the computer by typing commands as text for the execution.

Shell variables are special variables. They are name and value pairs created and maintained by the concerned shell. For example: PATH, HOME, MAIL, TERM etc. 

Explain how the inode maps to data block of a file.

There are 13 block addresses in inode. The file descriptions – type of file, access rights, and owners, time stamps of the files, size, and pointers to data blocks – are contained in each inode.

The first 10 block addresses are called direct block addresses which are the data blocks for the first 10 in the file.

The 11th, 12th and 13th addresses are pointed to a one-level index block and two-level index block and three-level index blocks respectively.

Describe how a parent and child process communicates each other.

The inter communication between a child process and a parent process can be done through normal communication schemes such as pipes, sockets, message queues, shared memories. There are special ways to inter communicate which has advantage of the relationships.

One of the most obvious advantages is that the exit status of the child process can be obtained by the parent process.

By communicating with unnamed pipes, the creation on pipe should be done before the creation of child. This process is called forking. Soon after forking, the parent properties will be inherited by child, also the pipe. The communication between parent and child is done with this pipe

What is a Daemon?
Daemon is the short form for Disk and Execution Monitor. A daemon is a background process which answers requests for services in a long-running mode. In UNIX, the names of daemons are end with‘d’ conventionally. Some of the daemons are “inetd, httpd, nfsd, sshd, named, and lpd “.

What is 'ps' command for?

The shortage for “process status” is ps. This command is used to display the currently running processes on Linux/Unix systems. It is like task manager in Windows. To stop the currently running process for the purpose of gaining the system speed, and find out the processes that are running on the remote system, the ps command is a tool. Stopping of a process can be done by kill command.

How the Swapper works?

Moving the information from fast access memory and slow access memory and vice versa is known as swapping. The physical RAM is divided into chunks of memory known as pages. A page of memory is copied to the preconfigured space on the hard disk, for the purpose of freeing up that page of memory.

To perform swapping, the commands swapon and swapoff are used in linux/unix. The swapon is to enable the swapping and the swapoff is to disable swapping.

What is ex and vi? Explain their purposes.

ex – the line editor mode of ‘vi’ editor. It allows to

      - write LISP programs
      - list all the files saved as the result of an editor or system crash
      -prevent the accidental overwriting of files
      -encrypt and decrypt the files

vi – screen oriented visual editor. It performs almost all the operations that are supported by ex. It has the additional features to edit, save lines and files. It provides the cursor movement options, editing options. Useful to write shell scripting in Linux/Unix

What is kill()? Explain its possible return values.

kill() is a system call which stops a process. The return values of kill() are:

-      0 – Process is existing with the given PID, and signals can be sent to it.
-      -1 – The ‘errno == ESRCH’ is true. This implies the non-existence of a process with a given PID or causing the denial of system by security enhancements for its existence.
-      -1 – The ‘errno == EPERM’ is true. This implies that the kill proess will not be allowed by the system with the given PID, which implies that the process exists or the enhancements are present by draconian security.
-      -1 – At times some other values returned by ‘errno’.

Explain the steps that a shell follows while processing a command.

The sequence of executing commands by shell are as follows:

Parsing: The command is broke into words, by using the spaces as delimiters unless quoted. The tabs are replaced by a single space.

Evaluation of a variable: The words with $ as preceding character will be evaluted unless quoted.

Command Substitution: The commands surrounded by backquotes will be executed by the shell. Later these will be replaced into standard output of the command into command line.

Wild card interpretation: Finally, the shell identifies all the wild cards(?,*) in the command line and replaces the wild card with sorted list of file names which maches the pattern.

PATH evaluation: Ultimately shell looks for the PATH variable for the purpose of determining the sequence of directories to search for the files or commands.

What is the use of ‘grep’ command? Provide an example

Grep stands for regular expression. ‘grep’ command is used to find the patterns in a text file provided by the user. It returns true if the pattern is found in the file, otherwise false.

Examples:

grep Lin file1 file2 file3
searches the files file1, file2, file3 for the lines which contains the string Lin.

grep ‘Linux learning is great ’ file1 file2 file3
searches the files file1, file2, file3 for the lines which contains the string ‘Linux learning is great’.

grep -c Linux operatinsystems
displays only the number of times that the pattern is matched in the file but not the lines.

grep -r 'Linus Torvalds' *
searches for the files in current and all the sub directories for the pattern (Linus Torvalds).


Difference between cat and more command.

The file contents are displayed by ‘cat’ command. The contents will scroll off the screeen, when the file contents are more than one screen page.

The file contents are displayed page by page with the use of ‘more’ command.

Examples

cat linux.txt
displays the contents of the file linux.txt
ls –l | more

displays the file and directory names. Halts once the screen page is full and prompts to press a key to continue


Linux - What is ‘du’ command? What is its use? - June 09, 2009 at 21:00 pm by Vidya Sagar

What is ‘du’ command? What is its use?

The du (disk usage) command is used to report the size of directory trees. These include the contents and the size of all files.

It is useful to use du command for the purpose of tracking down the space hogs. A hog is an excessive or large space occupied by the files and directories on a secondary storage media.

The command du is mostly employed by the system administrators. They use du as a supplement to the automated monitoring system programs which help to prevent the key directories and partitions from being full.

Explain the various prompts that are available in a UNIX system.

UNIX supports 4 prompts:
PS1: default prompt
PS2: for the purpose of multi-line input
PS3: for printing the select command
PS4: for printing before the output if –x is set.

Describe how the kernel differentiates device files and ordinary files.

There are 2 device files. They are character device file and block device file. To distinguish these two, specify b – for block device file and c – for character device file in the inode structure of the file.

An ordinary file does not require these fields.

Explain how to switch to a super user status to gain privileges.

The command ?su? is used to get super user status. The operating system prompts for the password and when valid, the user can gain the super user / administrator privileges.

Sunday, August 14, 2011

Desktop Support Interview Related Q&A


I launch IE and i get a message telling me that my active x controls are disabled. How do i re enable them?
Answer: IE tools from menu bar -> internet options - advanced tab - >security --->
Follow on question > if the button to customize the active x control is grayed out, why may this be? Answer: There may be a local machine or domain policy in place to disable any active x controls or insufficient permission to change.
Where do you enter the details for automatic config scripts in IE?
Answer:  IE tools from menu bar -> options -> connections tab-> settings *my excel starts up, starts loading the plug-ins and freezes.
How would you go about fixing this?
Answer: press windows key + r to bring up the run dialog - or start then -> run type: excel /safe if excel starts in safe mode, then you can go through the administrative parts of the program to try and make necessary changes remove or disable plugins causing problem. Once done, exit excel and reboot the system then try running excel normally. Here is a good web site for excel i found helpful - > bo's excel tips & tricks page 6
If my blackberry stopped receiving emails, how would you go about resolving this?
Question to person asking question? Are we using the redirector or blackberry enterprise server or is there another service being used to relay messages? Possible answers: if redirector - verify the service is started on the machine that is setup to forward messages to the clients if black berry enterprise server - verify all services on the for the black berry enterprise server are started and running - verify also all other clients are not getting messages - the server may just need to be restarted or rebooted... If this is an outside service verify there are not service outages or problems with the outside service provider if no problems with the outside provider it could be some other changes to the account settings for the client have changed in some way.
What percentage of importance would you say customer service skills and technical skills have?
Answer: 100% all the time they are equally important and essential in customer satisfaction and job performance.
How else (other than joining a pc to the domain) can i get the machine name in the domain?
Answer:  ipconfig /all will display the host name - see explanation for - get mac address for machine.
My pst is corrupt and cannot be repaired, what do you do?
Answer:  If scanpst does not work from outlook then there are some low cost 3rd party utilities that i have used to repair a corrupted pst - I would research and use one of these utilities to fix the problem.
Name another way of joining a pc to domain?
Answer:  Right click on my computer - then properties - select the computer name tab - see: gateway support - joining a domain (for more detail)
A manager cannot print to network printer but all other users can, what do you do?
Answer:  Ask him to check of the printer is greyed out - or offline - to do this right go to start - then printers and faxes - click on printer to highlight - right click - verify printer is online and set for the default printer.
What is the printer registry file name?
Answer: printers additional answers: area used before printing actual print job? is spooler where jobs are spooled to the disk device before printing - server work spool locations can be found in the registry at hkey local machine -> system -> current control set -> control -> - print - defaultspooldirectory - this is where the key can be modified to change the print spooler to another disk drive or location - if needed, for performance issues or disk space issues.
What is the service used to print the jobs?
Print spooler - if no one can print to any job - check the print spooler and verify it is running to do this go to start then run type the following in the run command line - services.msc - then look for the print spooler service - if it states running and no one can print - try stopping and restarting the service chances are it is hung up.
Name 5 reasons why a user might not be able to logon to the network?
Answers: 1:  verify tcp/ip settings are correct - computer may not have the same tcp/ip address as the current network to log on to - make sure you can ping the domain controller by name and ip address also verify that you can ping the gateway address of the router.
2: Check account could be locked out, disabled or password changed also check to be sure computer account is not disabled.
3: Verify TCP/IP stack is working - ping 127.0.0.1 also verifies network cable is plugged in and port is active.
4: verify there is not port security setup on switch this could stop a computer from logging on to the network if it was moved from one location to another.
Explain how DHCP works?
DHCP - Dynamic Host Configuration Protocol
DHCP allows a computer to join an IP-based network without having a pre-configured IP address. DHCP is a protocol that assigns unique IP addresses to devices, then releases and renews these addresses as devices leave and re-join the network.
The process of assigning the IP addresses by the DHCP server also known as DORA (Discover Offer Request and Acknowledgement).
DORA process in DHCP
DHCP (D)iscover | DHCP (O)ffer | DHCP (R)equest | DHCP (A)ck
Step 1: Your computer sends a "Discovery" request asking for its IP information from any
Listening DHCP servers.
Step 2: Any listening DHCP servers will "Offer" their configuration information to your workstation.
Step 3: You workstation chooses the best lease then "Requests" that lease from the
Corresponding  DHCP server.
Step 4: The DHCP server you requested the IP configuration information from then
"Acknowledges" your request and leases you the IP configuration information.
A user has a laptop that runs fast on the network (at work) but slow at home? Explain what could be the problem?
Answer:  The computer may be attempting to use resources or map resources that have been allocated or supplied by the domain - this could include any set policies for a machine or user. - tell the client to connect to the vpn and then see if the problem remains the same.
Explain how to share outlook calenders and the type of permissions you need to assign.
A user can log on to the network but has no internet connection? Explain what could be the problem.

A user’s application on their desktop is not working; explain what you would do to resolve this problem

What is the difference between a unc and drive mapping?

How do you import external data into an excel spreadsheet?
What is a mail merge and how does it work?

Explain what tcp/ip is and how it works?
TCP/IP stands for "Transmission Control Protocol/Internet Protocol." Without getting too technical, it's the leading method for allowing two computers to talk to each other over a network (such as the internet).

TCP/IP has four layers. Programs talk to the Application layer. On the Application layer you will find Application protocols such as SMTP (for e-mail), FTP (for file transfer) and HTTP (for web browsing). Each kind of program talks to a different Application protocol, depending on the program purpose.
After processing the program request, the protocol on the Application layer will talk to another protocol from the Transport layer, usually TCP. This layer is in charge of getting data sent by the upper layer, dividing them into packets and sending them to the layer below, Internet. Also, during data reception, this layer is in charge of putting the packets received from the network in order (because they can be received out-of-order) and also checking if the contents of the packets are intact.
On the Internet layer we have the IP (Internet Protocol), which gets the packets received from the Transport layer and adds virtual address information, i.e., adds the address of the computer that is sending data and the address of the computer that will receive this data. These virtual addresses are called IP addresses. Then the packet is sent to the lower layer, Network Interface. On this layer packets are called datagrams.
The Network Interface will get the packets sent by the Internet layer and send them over the network (or receive them from the network, if the computer is receiving data). What is inside this layer will depend on the type of network your computer is using. Nowadays almost all computers use a type of network called Ethernet (which is available in several different speed grades; wireless networks are also Ethernet networks) and thus you should find inside the Network Interface layer the Ethernet layers, which are Logic Link Control (LLC), Media Access Control (MAC) and Physical, listed from up to bottom. Packets transmitted over the network are called frames.
Laptop questions
1) A user operating his laptop from home finds it very slow, but when using the laptop at the office is very fast. What could the possible reasons be while it was slow at home?
2) A manager takes his laptop abroad and operates it with no problem using his mobile. Once he gets back the uk his modem no longer works. What could the possible reasons for this be?
What could be the cause of an error stating that ntldr is missing when trying to boot?
Answer: Check to verify the system is not attempting to boot from another device - like a floppy or cd - if this is not the case - it could be a defective boot partition, bad disk boot sector or virus has attacked the boot sector usually track 0 of the hard drive.

What is the file extension for an excel add-in file?
Answer - .xll - see : file extension .xll - excel add-in files - (for more information)
What is the difference between a .pst file and a .ost file? - (same as above: - see previous question)
How would you obtain the mac address from a machine?
Answer: go to start the run type in the command line - cmd - this will bring to a dos prompt on the dos command prompt type in the following command ipconfig /all - this will show you the mac address for the machine and some other important ip information.
A blackberry user is abroad and is not receiving e-mails, he notices that he has gprs in lowercase on his device. What can be done to fix this problem?
Answer: From what i see on research it could be the service is not working correctly or possibly blocked by a firewall, it could even be the firmware on the device needs to be upgraded. I would contact the service provider to completely verify the error on this device.
Explain how dhcp works?
answer: dhcp assigns a client an ip address from a range of selected allocated addresses configured on the dhcp server - when a pc, client or device needs an ip address on the network it sends out an dhcpdiscover broadcast to find a dchp server the dhcp server the authoritive dhcp server for the network will then sends back to the client the dhcpoffer back to the client. - (if there are more then one dhcp server on a network then it is the first offer back to the client the client accepts the ip address) to see what dhcp server assigned the dhcp address to the client - command line - ipconfig / all here is the long version - article - microsoft corporation
How does dhcp work?
Answer - below: for dhcp to work properly, you must have at least one dhcp server and one dhcp client on your network. You'll also need a range of tcp/ip addresses to assign, as well as the gateway addresses and your subnet mask. Fortunately, windows nt comes with dhcp support as part of its available services. Most of the workstations on your system probably already support dhcp. Dhcp support also comes as part of windows 95 and 98, os/2 warp 4, macos 7.x and 8.x, and linux. You can even employ dhcp support on windows 3.11 for workgroups workstations. During start-up, a dhcp client workstation gets its tcp/ip addressing information from the server. Keep in mind that this address isn't permanent; the dhcp server simply gives the client an address "lease" that can expire and must be renewed on a regular basis. Your workstation obtains and maintains its address leases through several handshaking phases known as states. The workstation dhcp states include: • initialization • selection • requesting • binding • renewal • rebinding during initialization, the client boots normally until it needs a tcp/ip address. The client then loads an empty tcp/ip address and broadcasts a dhcpdiscover packet across the network. The dhcpdiscover packet contains the workstation's name and media access control (mac) address and can also contain the last tcp/ip address the client obtained from the server. With this information, the server may be able to give the client the same address it received on its last request. When an active dhcp server hears the dhcpdiscover packet, the selection state begins. The server reserves an address from its list and broadcasts a response to the workstation. The response, called a dhcpoffer packet, contains a proposed tcp/ip address for the workstation along with the workstation's mac address, subnet mask information, length of lease, and the tcp/ip address of the dhcp server making the offer. Note: just as a workstation does with the dhcpdiscover packet, a dhcp server must broadcast over the network to reach the requesting client. Both systems must start with mass broadcasts because tcp/ip isn't configured yet on the client to allow point-to-point communication. If the client doesn't receive a dhcpoffer packet at startup, it tries up to four more times over a five-minute period. The four retries occur randomly but are based on a loose pattern. The client retries each of the four attempts at 2-, 4-, 8-, and 16-second intervals with a random time between 0 and 1000 milliseconds tacked on to each try. If the workstation never receives a response, it waits five minutes and the process begins again. After the client receives a dhcpoffer packet, the requesting state begins. The client generates a dhcprequest packet, which accepts the tcp/ip address offered by the server that issued the dhcpoffer packet. The dhcprequest packet includes the tcp/ip address of the server that provided the client address. If the client needs any additional configuration information, such as a default gateway, wins, or dns addresses, it includes the request in the packet. If you have more than one dhcp server on your network, your client may receive more than one dhcpoffer packet. If this happens, the client will choose one of the offers and discard the rest. (the client typically selects the first offer received, but this is not always the case.) to wrap up the requesting state, the client issues a mass broadcast of the dhcprequest packet. All dhcp servers on the network receive the packet and compare its server address information to their own address. If the server's address doesn't match the one in the packet, then the server releases the address it had reserved for the client in its own specific dhcpoffer packet. If a server finds its own tcp/ip address in the dhcprequest packet, it responds to the client with a dhcpack packet. This packet contains the lease for the client as well as additional information the client requested. When the client receives the dhcpack packet, it begins the binding phase by binding the assigned address to the tcp/ip protocol running on its network card and then finishes booting. At this point, the client can communicate on the network using tcp/ip. The client keeps the tcp/ip address assigned to it for the length of its lease which you can adjust, or until you manually shut it off. If you keep the client running continually, it will eventually reach the end of its lease period. When the client reaches 50 percent of its assigned lease time, it will enter the renewal phase. The client sends a dhcprequest packet directly to the server that gave it its tcp/ip address. The dhcp server renews the lease and sends back a dhcpack packet, which contains the new lease and any configuration information that may have changed since the initial lease. If the client can't communicate with the server that granted its lease, it will display an error but continue to operate normally. When 87.5 percent of the client's lease time expires, the client begins to panic and enters the rebinding phase. During the rebinding phase, the client begins broadcasting dhcprequest packets across the network to any dhcp server that will respond to it. The current dhcp server may respond with a dhcpack packet that allows the client to continue using the address it was assigned initially. Or it may send a dhcpnak packet, which forces the client to reinitialize tcp/ip and obtain a new tcp/ip address and lease. If it accepts the dhcpnak packet, the client begins the whole process again at the initialization phase. If the client can't reach a dhcp server by the time its lease expires, it must stop using its assigned tcp/ip address. At this point, it can no longer communicate with other workstations on the network using tcp/ip. However, it can enter the initialization phase again and start broadcasting dhcprequest packets in an attempt to get a new lease.
A user can log on to the network but has no internet connection? Explain what could be the problem. There could be a security policy in place to stop that user from getting access to the internet you can check the policy's applied to the computer by typing on the start run command line rsop.msc it is also possible the client machine does not have the correct gateway address configured. If you can access the internet web pages by ip and not by name it is possible dns is not working correctly, try to ping the known gateway address of the network router if successful then try to ping 4.2.2.2 this is an internet address.
How would you alter auto recovery to save every 5 mins instead of every 10?
Answer: tools / other / save if a customer’s blackberry stopped syncing their calendar wirelessly, what would you do? answer: if all other wireless services are working - ie contacts and email then check sync settings and verify calendar is set to sync if a customer deleted a mail from his blackberry, but it did delete from his mailbox, how would you resolve this?
The deputy equities manager demands access to a legal shared drive, as he does not have the correct permissions, it is late at night and you are the only one left in the office what would you do? Follow on: if the decision makers are unreachable, what would you do? If the deputy equity manager tells you a multi-million pound contract depends on him getting access to this shared drive, what would you do ? If he then gets the equities manager who starts shouting at you and threatening to get you the sack, what would you do ? Hope some of these will help you and anyone else out there.
What is DNS?
Domain Name System (DNS) is a database system that translates a computer's fully qualified domain name into an IP address.
Networked computers use IP addresses to locate and connect to each other, but IP addresses can be difficult for people to remember. For example, on the web, it's much easier to remember the domain name www.amazon.com than it is to remember its corresponding IP address (207.171.166.48). DNS allows you to connect to another networked computer or remote service by using its user-friendly domain name rather than its numerical IP address. Conversely, Reverse DNS (rDNS) translates an IP address into a domain name.
Each organization that maintains a computer network will have at least one server handling DNS queries. That server, called a name server, will hold a list of all the IP addresses within its network, plus a cache of IP addresses for recently accessed computers outside the network. Each computer on each network needs to know the location of only one name server. When your computer requests an IP address, one of three things happens, depending on whether or not the requested IP address is within your local network:

0.0.0.0. Are reserved as N/W ID.
255.255.255.255 is reserved as broadcast ID.
127.0.0.1 Is reserved as loop back ID
 OSI Layers: 
           
Think of the seven layers as the assembly line in the
computer. At each layer, certain things happen to the data that prepare it for the next layer. The seven layers, which separate into two sets, are:
  • Application Set
  •  
    • Layer 7: Application - This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or performs other network-related activities. Eg : NFS, FTP, SMTP, DNS

    • Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand.
Eg : JPEG, GIF, ASCII
    • Layer 5: Session - Layer 5 establishes, maintains and ends communication with the receiving device.
Eg: SQL, RPC, Net biosnames.
  • Transport Set
    • Layer 4: Transport - This layer maintains flow control of data and provides for error checking and recovery of data between the devices. Flow control means that the Transport layer looks to see if data is coming from more than one application and integrates each application's data into a single stream for the physical network.
                                   Eg :  TCP, UDP ,SPX
    • Layer 3: Network - The way that the data will be sent to the recipient device is determined in this layer. Logical protocols, routing and addressing are handled here.
                                       Eg : IP, IPX, Appletalk
    • Layer 2: Data - In this layer, the appropriate physical protocol is assigned to the data. Also, the type of network and the packet sequencing is defined.
                                 Eg : Frame reply , PPP, Token ring,  IEEE 802.2, IEEE 802.3
    • Layer 1: Physical - This is the level of the actual hardware. It defines the physical characteristics of the network such as connections, voltage levels and timing.
                                            Eg : Ethernet, RJ 45
https://lh4.googleusercontent.com/VqYuiyGGFEV9LmtebIj1AdpdjV4tc-OTtX6lNJn47ZaYmHHuCF_zRGilrw1pWp5BVvfOWjQhKrfoxdt9L-yKLz6iJnAFxafMCXqrq9GiGznpSNp3meQ*
The seven layers of the OSI Reference Model

The OSI Reference Model is really just a guideline. Actual protocol stacks often combine one or more of the OSI layers into a single layer.
Where do we use cross and standard cable?
Computer to computer ==> cross
Switch/hub to switch/hub ==>cross
Computer to switch/hub ==>standard

127.0.0.1 is the loopback address in IP. Packets sent to this address do not actually travel onto the network, they automatically get routed to a receive queue on the local device. The loopback address is useful for testing network software when a working network connection is not present.

TCP                                             UDP
FTP         20, 21                          DNS                 53
Telnet   23                                 DHCP               67,68
SMTP    25                                 TFTP                69
DNS       53                                 NTP 123
HTTP      80                                 SNMP             161
POP       110                        
NNTP    119                        
HTTPS   443                        

Networking devices:
Hubs, Switches, Routers and NICs.
HUB: Hub is a centralized device provides communication among systems when we have more than 2 computers we need to have a device called hub to interconnect.
Disadvantage of a Hub:
When we want to transfer some data from one system to another system.
If our network has 24 systems the data packet instead of being sent only to the destined system it is being send to all the network participants. (i.e. 24 systems.)
Hubs follow broadcasting
SWITCH: It is an advanced version over a Hub.
The main benefit of switch is Unicast. Data packets are transmitted only to the target computer instead of all.
Switch maintains a table called MIT (Mac Information Table.) which is generated as soon as we turn on the switch, which acts like an index table and easy the process of finding the networked system. MIT contains the port no, IP address and MAC address.
MAC: (Media Access Control): It is an address burnt in the NIC by the manufacturer.
MAC address is of 48 bits in the farm of Hexa decimal.
Every NIC has its own unique MAC address.
MAC address determines the physical location of a system.
ROUTER: Router is a device connects two different networks.
                Class A network with Class C network etc.
Routing is a process of communication between two different networks.
Network Topologies:
The way of cabling is called topology.
The architecture of a network is called topology
E.g.: Bus, Star, Ring, and Mesh Topologies.
Bus Topology:
Components of Bus Topology:
  1. Co-axial cable (back bone cable)
  2. T- connectors
  3. BNC (British Network Connector)
  4. Terminator
  5. Patch cable
Disadvantages of Bus:
 If anything goes wrong with backbone cable whole network is down.
Follows a serial communication.
Outdated these days.
Star Topology:
Star topology is an advanced version over bus topology. Where it uses either a hub or a switch, it uses cat5/6 cables.
It uses connecters called (Recommend Jack) - RJ45
Star topology offers faster data transfer or processing.
Ring Topology:
Ring topology is useful when we want redundancy (fault tolerance) we go with this type of topology.
Ring topology uses a device called MSAU. (Multi Station Access Unit)
It is a unit inside which a logical ring is formed. This ring ensures the availability of Network. The availability of ring ensures availability of network.
It was basically implemented in IBM networks.
AD: Is a centralized database where it contains the information about the objects like users, groups, computers, printers etc.
AD is a centralized hierarchical Directory Database.
AD is a searchable Database.
2003 O/S. when installed (gets installed as a stand alone server) to promoting to    D.C. We have to install A.D.

Domain Controller (D.C.)
A server where A.D. is installed is called D.C.
Functionality of A.D.:
Using A.D. we can organize, manage and control resources.
It provides single point of administration.
Purpose of A.D.:
  1. Provides user logon authentication services.
  2. To organize and manage user A/Cs, computers, groups and n/w resources.
  3. Enables authorized users to easily locate n/w resources.

Group Policy:
It is a feature of 2000&03 with which an administrator can have full control on users and computers. Using group policy we can implement security, policies, software deployment, folder redirection, Internet explorer maintenance.
Group policies enable the users either to access or to be denied of an object. Group policy can be implemented on computers &users.
Group Policy Object (GPO)
GPO defines polices implemental for the objects. One group policy object can be linked with multiple objects like site, domains, DCs, OUs, etc…
The order in which the group policy is applied.
Virtualization allows users to consolidate physical resources, simplify deployment and administration, and reduce power and cooling requirements.  While virtualization technology is most popular in the server world, virtualization technology is also being used in data storage such as Storage Area Networks, and inside of operating systems such as Windows Server 2008 with Hyper-V.

Virtualization Advantages:
  • Server consolidation                                                    
  • Reduced power and cooling
  • Green computing
  • Ease of deployment and administration
  • High availability and disaster recovery
Popular virtualization products include:
  • VMware
  • Microsoft Hyper-V
  • Virtual Iron
  • Xen

·         NAT: It is a service of routing provides network address translation from private to public
·         When we have 2 networks public & private in order to protect private network from public network (intruders) we need NAT.
·         NAT enables one way communication. I.e. private network can communicate with public network but not vice versa.
A virtual private network (VPN) is a secure way of connecting to a private Local Area Network at a remote location, using the Internet or any insecure public network to transport the network data packets privately, using encryption. The VPN uses authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the private network packets. The VPN can be used to send any kind of network traffic securely, including voice, video or data.
If you want to uninstall an appliction that has no uninstall program and it is not listed in the Add/Remove applet of Control Panel
(or that uninstall doesn't work), then just delete the directory/files.
Start Regedit and drill down to :

HKEY_LOCAL_MACHINE\SOFTWARE\ and
HKEY_CURRENT_USER\SOFTWARE

locating the applications entry and delete them.

Use Explorer to to remove the entries from the Start Menu in either
C:\Documents and Folders\All Users\Start Menu\Programs\ and/or
C:\Documents and Folders\(your username)\Start Menu\Programs\

If there is an entry in the Add/Remove list, start regedit go to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
locate the entry and delete it.

If the app has a service, edit:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services
and scroll down till you locate it. Then delete it.

If this app starts automatically and there is no entry in the StartUp folder(s), then use Regedt32 to edit:

HKEY_CURRENT_USER\Software\Microsoft\WindowsNT\CurrentVersion\Windows
The Windows Registry is used as a single place to store much of the information and settings for software programs, hardware devices, user preferences, operating system configurations, and much more.
In many ways, the registry can be thought of as a kind of DNA for the Windows operating system