- Hidden or administrative shares are share names with a dollar sign ($) appended to their names. They do not display in the network browse list.
- The seven layers in the Open System Interconnection model are: Application, Presentation, Session, Transport, Network, Data link, and Physical.
- The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, while the reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.
Highlighted notes while studying the Course:
Advanced Computer Networks
Article: How Does the Internet Work?
By: Rus Shuler, Pomeroy IT Solutions
FS is a global leading communications hardware and project solutions provider. They are dedicated to helping build, connect, protect and optimize optical infrastructure.
Rus Shuler
Phoenix Cybersecurity
Fort Mill, South Carolina
Years of experience leading development teams and architecting custom IT solutions for clients in a consulting environment. Now a senior security engineer for the US Department of Defense with focuses in data loss prevention, automation and information security.
https://web.stanford.edu/class/msande91si/www-spr04/readings/week1/InternetWhitepaper.htm
Highlighted notes while studying the Course:
Advanced Computer Networks
Article: How Does the Internet Work?
By: Rus Shuler, Pomeroy IT Solutions
FS is a global leading communications hardware and project solutions provider. They are dedicated to helping build, connect, protect and optimize optical infrastructure.
Rus Shuler
Phoenix Cybersecurity
Fort Mill, South Carolina
Years of experience leading development teams and architecting custom IT solutions for clients in a consulting environment. Now a senior security engineer for the US Department of Defense with focuses in data loss prevention, automation and information security.
https://web.stanford.edu/class/msande91si/www-spr04/readings/week1/InternetWhitepaper.htm
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdfeyebolloptics
1)Please explain the commands ifconfig, ping, traceroute, netstat, dig, nslookup, route, host,
hostname.
2). Explain briefly about TCP/IP and its Protocol Architecture.
3) Explain the difference between TCP/IP Protocol stack and OSI model.
Solution
Answer:
1) Ipconfig
Ipconfig is an MS-DOS utility that can be used from MS-DOS and an MS-DOS shell to display
the network settings currently assigned and given by a network. This command can be utilized to
verify a network connection as well as to verify your network settings.
Ping
Ping is one of the most commonly used network commands that allows you to ping another
network IP address. Pinging another address helps determine if the network card can
communicate within the local network or outside network.
Netstat
The netstat command is used to display the TCP/IP network protocol statistics and information.
Nslookup
The nslookup MS-DOS utility that enables a user to do a reverse lookup on an IP address of a
domain or host on a network.
Route
The route MS-DOS utility enables computers to view and modify the computer\'s route table.
traceroute
The tracert command in MS-DOS and Windows (known as traceroute in Unix-like operating
systems) is a useful tool for diagnosing network issues. It allows you to view a listing of how a
network packet travels through the network and where it may fail or slow down. Using this
information you can determine the computer, router, switch or other network device possibly
causing your network issues.
host
solves a host name into an Internet Protocol (IP) address or an IP address into a host name.
the hostname command is used to show or set a computer\'s host name and domain name. It is
one of the most basic of the network administrative utilities.
A host name is a name that is assigned to a host (i.e., a computer connected to the network) that
uniquely identifies it on a network and thus allows it to be addressed without using its full IP
address. Domain names are user-friendly substitutes for numeric IP addresses.
The basic syntax for the hostname command is
hostname [options] [new_host_name]
2)TCP/IP protocols map to a four-layer conceptual model known as the DARPA model , named
after the U.S. government agency that initially developed TCP/IP. The four layers of the DARPA
model are: Application, Transport, Internet, and Network Interface. Each layer in the DARPA
model corresponds to one or more layers of the seven-layer Open Systems Interconnection (OSI)
model.
Network Interface Layer
The Network Interface layer (also called the Network Access layer) is responsible for placing
TCP/IP packets on the network medium and receiving TCP/IP packets off the network medium.
TCP/IP was designed to be independent of the network access method, frame format, and
medium. In this way, TCP/IP can be used to connect differing network types. These include
LAN technologies such as Ethernet and Token Ring and WAN technologies such as X.25 and
Frame Relay. Independence from any specific ne.
SAP BASIS ONLINE TRAINING MATERIAL by Keylabskeylabstraining
We provide SAP BASIS Online Training, SAP Security online Training, SAP Security with GRC online Training, SAP Netweaver Administration online Training,SAP Solution manager online Training, SAP Basis Training in Hyderabad, SAP BASIS training in Banglore, SAP Security Training in Hyderabad, SAP Security Training in Bangalore,Online training for all SAP modules.We are providing SAP Technical, SAP Functional and SAP Techno-functional Modules.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The Art Pastor's Guide to Sabbath | Steve Thomason
Networking question
1. Explain hidden shares. How do they work?
idden or administrative shares are share names with a dollar sign ($) appended to their names.
Administrative shares are usually created automatically for the root of each drive letter. They do
not display in the network browse list.
Name of seven layers in Open System Interconnection model.
They are Application, Presentation, Session, Transport, Network, Data link, and Physical.
What is the difference between ARP and RARP?
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit
physical address, used by a host or a router to find the physical address of another host on its
network by sending a ARP uery packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet address
when it knows only its physical address.
What is Client/Server?
Clients and Servers are separate logical entities that work together over a network to accomplish
a task. Many systems with very different architectures that are connected together are also called
Client/Server.
What is MAC address?
It is the 48 bit hardware address of LAN card. MAC address is usually stored in ROM on the
network adapter card and it is unique.
What are the perquisites to configure server?
LAN card should be connected:
Root (partition on which window is installed) should in NTFS
Server should be configured with a static IP address
How we will configure ADS?
Start ==> RUN ==> DCPROMO
How will you test LAN card?
Ping 127.0.0.1
If getting reply its fine
What are the difference between DOMAIN and WORKGROUP?
Workgroup:-
(i)Every PC is responsible for itssecurity own.
(ii)No centralizeadministration
(iii)Main aim to save hardware recourse
(iv)Best suite in school, traininginstitute, cyber café
Domain: -
(i)Server is responsible for data safety.
(ii)Centralizeadministration
(iii)Main aim isto secure data
(iv)Best suite in company environments
Which command is used to check the IP address of your system?
ipconfig
2. Which set wizard will run to do peer to peer networking in XP?
Small home andoffice setup wizard
Which command is used to check the physical connectivity between two computers?
Ping
What is map drive?
A special feature that will map networkresource to my computer.
What is Proxy Server?
Most large businesses, organizations, and universitiesthese daysuse a proxy server. Thisis a server that all computerson the local network
have to go through before accessing informationon the Internet. By using a proxy server, an organization canimprove thenetwork
performance and filter what usersconnected to the networkcan access.
Which folder contains ADS installed on server?
NTDS
What is the full form of Internet?
International Networking
Which are the bootable files of 98 and XP ?
In windows98 it iscommand.com
In XP it is NTLDR
In which partition Linux is installed ?.
Linux doesn’t support windowsfile system that contain partitionscheme. It (Linux) hasitsown file system known as ext2, an d ext3. it will
install only on it.In linux filesystem it will install on / (root) partition.
What is size of SWAP ?
It’s the hard disk space that is used as RAM for fast processing. In window it’sknown as virtual memory and could be set as per retirement
via thispath
My Computer ==> properties==> advance
In Linux it’sknown as SWAP space and generally taken the doublesize of physical RAM For exampleif you have 256(MB) DDR ph ysical
ram then swap space would be 512 MB.
What is full form of C.M.O.S ?
3. Complementary metal oxide semiconductor
How will you check ip address without using network place ?
Start ==> Run ==> Command ==>ipconfig
What is IP?
Internet Protocol (IP) isan unreliable, best effort delivery, connection-lessprotocol used for transmitting and receiving databetween hosts in
a TCP/IP network
What are the difference between hub and switch?
Hub is a layer 1 device. It will out the signal from all of its port except the one from where its
insert. It is unable to detect the collision. It works on single collision and single broadcast
domain.
Switch is layer 2 device. It maintains a CAM table that store the MAC address of devices
attached on its port. CAM table is used to make the forwarding decision. It works on per port
collision and single broadcast domain.
What is layer?
Layer is a completely logical partition of PDU (protocol data unit) process. That define how the
information is travel form one computer to other over the network.
What is TCP/IP?
It is combination of two protocols TCP and IP. It is used for reliable data transfer.
What is operating system?
An operating system (sometimes abbreviated as "OS") is the program that, after being initially
loaded into the computer by a boot program, manages all the other programs in a computer. It
provides a platform to application software.
What is package software?
The collection of mostly used software released in package Form Company. For Example Ms-
Office that contain word, power point, Excel, etc.
Full form of .co.in, .com
COM - ".com" stands for "commercial".
NET - ".net" stands for "network"
ORG - ".org" stands for "organization"
INFO - ".info" stands for "information"
BIZ - ".biz" stands for "business".
IN - 'IN' stands for India. The 'IN' is a 2-letter country code for India.
What is ring topology?
In a ring topology, deviceone connectsto devicetwo, devicetwo connectsto device three, and so on to the last device, whichconnectsback
to device one.
Which cable is used in LAN?
Generally coaxial andTP media isused in LAN networking.
4. What are Difference between STP and UTP?
STP cable is mostly used by IBM; it hasan extra cover over each pair.
UTP cable isused in star topology. It hasa single cover over all pair.
Full form of ping.
PING stand for Packet Internet Grouper
What are the minimum requirements for xp installation?
64MB RAM
1.5GB free HDD space
233MHz minimum processor.
What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
10Base2— An Ethernet term meaninga maximum transfer rate of 10 Megabitsper second that usesbaseband signaling, with a contiguous
cable segment lengthof 100 metersand a maximum of 2 segments.
10Base5—An Ethernetterm meaninga maximum transfer rate of 10 Megabitsper second that usesbaseband signaling,with 5 continuous
segmentsnot exceeding100 metersper segment.
10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabitsper second that usesbaseband signalingand twisted pair
cabling.
What is the difference between an unspecified passive open and a fully specified
passive open?
An unspecified passive openhasthe server waiting for a connectionrequest from a client.
A fully specified passive open hasthe server waiting for a connection from a specific client.
Explain the function of Transmission Control Block
A TCB is a complex datastructure that containsa considerableamountof information about each connection.
What is a Management Information Base (MIB)?
A Management Information Base ispart of every SNMP-manageddevice. EachSNMP agent hasthe MIB database that containsinformation
about the device'sstatus, its performance, connections, and configuration.TheMIB isqueriedby SNMP.
What is anonymous FTP and why would you use it?
AnonymousFTP enablesusers to connect to a host without using a valid loginand password. Usually, anonymousFTP uses a login called
anonymousor guest, with the password usually requesting theuser'sID for tracking purposesonly. AnonymousFTP isused to e nable a
large number of usersto access fileson the host without having to go to the troubleof setting uplog insfor them all.AnonymousFTP
systems usually have strict controlsover the areasan anonymoususer can access.
What is a pseudo tty?
5. A pseudo tty or false terminal enablesexternal machinesto connect through Telnet or rlogin.Without a pseudo tty, no connectioncan take
place.
What does the Mount protocol do?
The Mount protocol returnsa file handle andthe name of the filesystem in which a requested file resides. The message isse nt to the client
from the server after reception of a client'srequest
What is External Data Representation?
External Data Representationisa method of encodingdata within an RPC message, used to ensure that the data isnot system -dependent.
When were OSI model developed and why its standard called 802.XX and so on?
OSI model wasdeveloped inFebruary1980that why these also known as 802.XX Standard (Notice80 means==> 1980, 2means==>
February)
What is Full form of ADS?
Active Directory Structure
How will you register and activate windows?
If you have not activatedwindowsXP, you can do so at any time by clicking the windowsActivationiconin the system tray to initiate
activation. Once you haveactivated windowsXP, thisicon disappearsfrom the system tray.
For registration
Start ==> Run ==> regwiz /r
Where do we use cross and standard cable?
Computer to computer ==> cross
Switch/hub to switch/hub==>cross
Computer to switch/hub ==>standard
How many pins do serial ports have?
In computer it'sknown as com port and could be available in9pin or 25 pin.On router it have 60 pins.
How will check ip address on 98?
Start ==> Run ==> command ==> winipcfg
How will you make partition after installing windows?
My computer ==> right click==> manage ==> diskmanagement ==>
select free space ==> right click==> New partition
6. What is IP?
It's a unique 32 bitssoftware address of a node in a network.
What is private IP?
Three rangesof IP addresses have been reserved for private addressand they are not validfor use on the Internet. If you wa nt to access
internet with these addressyou must have to use proxy server or NAT server (on normal cases the role of proxy server is played by your
ISP.).If you do decide to implement a private IP addressrange, you can use IP addresses from any of the following classes:
Class A 10.0.0.0 10.255.255.255
Class B 172.16.0.0 172.31.255.255
Class C 192.168.0.0 192.168.255.255
What is public IP address?
A public IP addressis an address leased from an ISP that allowsor enablesdirect Internet communication.
What's the benefit of subnetting?
Reduce the size of the routing tables.
Reduce networktraffic. Broadcast traffic can be isolatedwithin a singlelogical network.
Provide a way to secure networktraffic by isolating itfrom the rest of the network.
What are the differences between static ip addressing and dynamic ip addressing?
With static IP addressing, a computer (or other device) isconfigured to alwaysuse the same IP address. With dynamic addressing, the IP
address can change periodically andismanaged by a centralized networkservice
What is APIPA?
Automatic privateIP addressing (APIPA) isa feature mainly found in Microsoft operatingsystems. APIPA enablesclientsto st ill
communicatewith other computerson the same networksegment until an IP addresscan be obtained from a DHCP server, allowingthe
machine to fully participateon the network. The range of these IP addressare the 169.254.0.1 to 169.254.255.254 witha defa ultClassB
subnet mask of 255.255.0.0.
What are the LMHOSTS files?
The LMHOSTSfile isa static method of resolving NetBIOS namesto IP addresses in the same way that the HOSTS file isa static method of
resolving domain namesinto IP addresses. An LMHOSTS file isa text file thatmapsNetBIOS namesto IP addresses; it must be manually
configured andupdated.
What is DHCP scope?
A scope is a range, or pool, of IP addresses that can be leased to DHCP clientson a given subnet.
What is FQDN?
An FQDN contains(fully qualifieddomain name) boththe hostname anda domainname. It uniquely identifiesa h ost within a DNS hierarchy
7. What is the DNS forwarder?
DNS servers often must communicatewith DNS servers outside of the local network. A forwarder is an entry that isused when a DNS server
receivesDNS queriesthat it cannot resolve locally. It then forwardsthose requeststo external DNS servers for resolution.
Which command will you use to find out the name of the pc in networks?
NSLOOKUP [192.168.0.1]
[Ip of target computer]
How will enable sound service in 2003?
By default thisservice remain disableto enablethisservice
Start ==> administrative tools==> service ==> windowsaudio ==> start up type ==> automatic
How will enable CD burning service in 2003?
By default thisservice remain disableto enablethisservice
Start ==> administrative tools==> service ==> IMAPI CD burning com service ==> start up type ==> automatic
What do you need to do that your browser will point URL www.example.com to the
internal IP address 127.99.11.01?
Make changesin the hosts file in C:WINDOWSsystem32driversetc
The Hosts file islooked at first before going out to theDNS (Domain NameService) servers. you have to put the following on new linesat the
end of hosts file:
127.99.11.01example.com
127.99.11.01www.example.com
What can you suggest to enhance testing process on windows OS?
Put shortcut to notepad.exein SendTo folder. It isspeed up work with different fileslike hosts, configuration files. Locat ion of thisfolder is
C:Documentsand SettingsDefault Usersendto.
Open it and create shortcut of notpad.exe
What is FTP?
FTP is short for File Transfer Protocol. Thisisthe protocol used for file transfer over the Internet.
How will you make XP home the client of server 2003?
XP home editionismade only for home purpose so we can’t use it as the client. And same ruleapply on windowsvista editionsalso.
Where do you take back up from?
ClickStart, point to All Programs, point to Accessories, point to System Tools, and thenclickBackup.
Bedside's it?
If OS support then Select Drive ==> properties==> backup now
8. What is router?
Router is a device that isused to connect two different networks.
How will you configure ADS?
Start ==> Run ==> DCPROMO
Or
Start==> Configure your server ==> add/Removea Role
What is ADS?
A central component of the Windowsplatform, Active Directory service providesthe meansto managethe identitiesand relationshipsthat
make up network environments.
What if this wizard (ADS) is not running?
Check the network cable it should be plugged
Check root partition it should be inNTFS
Check IP of server it should be configured statically
How will you add a client to server? /
How’s the client join a domain?
What are the client configurations?
On Server
Configure ADS (for exampleit’sconfigured withxyz.com)
On Client
Log in form local administrator account
My Computer ==> Properties==> Computer Name ==> Change
==>Domain ==>xyz.com ==> username Administrator (of xyz.com)
Password xxxxxxxxxxx (of admin of xyz.com)
Welcome to xyz.com ==> Restart the computer
Does it necessary to use administrator account to configure the client?
Not every time but you are required a properly configured user account indomain controller security policy.
ISO stand for?
International standard organization
OSI stand for?
Open System Interconnection
What is full form DHCP and how will you configure it?
9. Dynamic host configuration protocol
To configure iton Server
Configure your server ==>Add/Removea role ==>DHCP server ==>completethe wizard
Start ==> Administrative tools==> DHCP ==>New scope ==> Wizard
Now authorized thisserver and do activate it
On client
Local area network==> tcp/ip ==> obtain ipautomatically
Obtain DNS automatically
What is difference between physical and logical topology?
A physical topology describeshow devicesare physically cabledtogether.
A logical topology describeshow devicescommunicateacrossthe physical topology
How many types of topology are available?
A point-to-point topology has a single connection betweentwo devices.
In a star topology, a central devicehasmany point-to-point connectionsto other devices.
A bus topology uses a single connection or wire to connectall devices.
In a ring topology, device one connectsto device two, device two connectsto device three, and so on to the last device, which connects
back to device one.
How many times computer reboot when server 2000 install?
2 times.
How will you remove this error “ ntldr missing press any key to reboot the system” ?
Reboot the system with XP, ( apply also on server2003,) cd
On setup screen press to R to repair the window
Now provide the administrator password
C:>cd f:( your cd drive latter, f istaken as the example)
f:>cd i386
f:>copy ntldr c:
f:>exit
reboot the system
Why do we do networking?
For data sharing
To accumulate hardware resource
What are the benefits of networking?
There are lotsof advantagesfrom buildup a network, but the three big factsare-
File Sharing
From sharing filesyou can view, modify, andcopy filesstored on a different computer on the networkjust as easily as if they were stored on
your computer.
Resource Sharing
Resources such as printers, fax machines, StorageDevices(HDD, FDD and CD Drives), Webcam, Scanners, Mod em and many more
devicescan be shared.
Program Sharing
Just as you can share fileson a network, you can often also share program on a network. For example, ifyou have theright t ypeof software
license, you can have a shared copy of Microsoft Office, or some other program,and keep it on the networkserver, from where it isalso run
10. What is network?
A network is basically all of the components(hardware and software) involvedin connecting computersacross small and large distances.
What is networking?
A process that is describeshow the network will connect.
What is topology?
A topology defineshow the devicesare connected. Further it isdividedin physical andlogical topology.
What are the differences between FAT and NTFS ?
FAT
Doesn't provide local security Provide local security
Doesn't provide disk quota Providediskquota
Doesn't provide file compression Provide file compression
Doesn't provide other security feature Provide other security feature
Difference between XP home and XP professional ?
Feature that isnot available inXP homeedition
Remote Desktop
Off line fileand folder
Encrypting file system
Group policy
Roaming profile
Remote installation
Joining Domain
The featureslisted aboveare only available in XP professional
Which OSI layer does IP belong?
P belongsto the Network Layer (layer 3) in the OSI model.
What is a subnet mask?
Subnet maskis a 4 byte (32 bit) number used to identify the sub-networkID and the host ID from an IP address. All the hostsin a sub-
network will have the same subnet mask. E.g. 255.255.255.0, 255.255.127.0, 255.255.0.0
Where are the Windows NT Primary Domain Controller (PDC) and its Backup
Domain Controller (BDC) in Server 2003?
The scheme of PDC and BDC is replaced by The Active Directory in server 2000 and further.
Now all domain controllers share a multi master peer-to-peer read and write relationship that
hosts copies of the Active Directory.
How can group policy be refreshed?
1. Restart the server
2. Leave the server ideal for 90 minute
3. Run ==> gpupdate (server 2003 only)
11. What is LILO?
LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory,
and tell the system which partition and hard drive to boot from.
I can't seem to access the Internet, don't have any access to the corporate
network and on IP configuration on my address is 169.254.*.*. What happened?
The 169.254.*.* net mask is assigned to Windows machines running 98/2000/XP if the DHCP
server is not available. The name for the technology is APIPA (Automatic Private Internet
Protocol Addressing).
We've installed a new Windows-based DHCP server, however, the users do not seem
to be getting DHCP leases off of it.
The server must be authorized first with the Active Directory.
What's the difference between local, global and universal groups?
Domain local groupsassign access permissionsto domain groupsfor local domainresources. Global groupsprovide accessto re sources in
entire domains.
What's the major difference between FAT and NTFS on a local machine?
FAT and FAT32 provide no security over locally logged-on users. Only native NTFS providesextensive permission control on both remote
and local files.
What is presentation layer and how it is responsible for in the OSI model?
The presentationlayer establishesthe data formatprior to passing it along to thenetworkapplication'sinterface. TCP/IP networksperform
thistask at the applicationlayer
When were OSI model developed and why its standard called 802.XX and so on?
OSI model wasdeveloped inFebruary1980that why these also known as 802.XX Standard (Notice80 means==> 1980, 2means==>
February)
What is Full form of ADS?
Active Directory Structure
How will you register and activate windows?
If you have not activatedwindowsXP, you can do so at any time by clicking the windowsActivationiconin the system tray to initiate
activation. Once you haveactivated windowsXP, thisicon disappearsfrom the system tray.
For registration
Start ==> Run ==> regwiz /r
Where do we use cross and standard cable?
12. Computer to computer ==> cross
Switch/hub to switch/hub==>cross
Computer to switch/hub ==>standard
How many pins do serial ports have?
In computer it'sknown as com port and could be available in9pin or 25 pin.On router it have 60 pins.
How will check ip address on 98?
Start ==> Run ==> command ==> winipcfg
What is source route?
It is a sequence of IP addresses identifyingthe routea datagram must follow. A source route may optionally be included in a nIP datagram
header.
What is RIP (Routing Information Protocol)?
It is a simple protocol used to exchange information between therouters.
What is SLIP (Serial Line Interface Protocol)?
It is a simple protocol used for transmission of IP datagramsacross a serial line.
What is Proxy ARP?
It is using a router to answer ARP requests. Thiswill be donewhen the originating host believesthat a destination islocal, when infact islies
beyond router.
What is OSPF?
It is an Internet routing protocol thatscaleswell, can route traffic alongmultiple paths, and usesknowledge of an Internet'stopology to make
accurate routing decisions.
What is Kerberos?
It is an authentication service developed at the MassachusettsInstitute of Technology. Kerberosuses encryption to prevent i ntrudersfrom
discovering passwords and gaining unauthorizedaccessto files.
What is a Multi-homed Host?
It is a host that has a multiple networkinterfacesand thatrequiresmultiple IP addresses is called asa Multihomed Host.
What is NVT (Network Virtual Terminal)?
13. It is a set of rulesdefininga very simple virtual terminal interaction. The NVT isused in the start of a Telnet session.
What is Gateway-to-Gateway protocol?
It is a protocol formerly used to exchange routinginformation betweenInternet core routers.
What is BGP (Border Gateway Protocol)?
It is a protocol used to advertise the set of networks that can be reached with inan autonomoussystem. BGP enablesthisinf ormation to be
shared with the autonomoussystem. Thisisnewer than EGP (Exterior Gateway Protocol).
What is autonomous system?
It is a collectionof routersunder the control of a single administrativeauthority and thatusesa common Interior Gateway Protocol.
What is EGP (Exterior Gateway Protocol)?
t is the protocol the routersin neighboringautonomoussystems use to identify the set of networksthat can be reached withinor via each
autonomoussystem.
What is IGP (Interior Gateway Protocol)?
It is any routing protocol used within an autonomoussystem.
What is Mail Gateway?
It is a system that performsa protocol translation betweendifferentelectronic mail delivery protocols.
What is wide-mouth frog?
Wide-mouth frog isthe simplest known key distributioncenter (KDC) authentication protocol.
What is silly window syndrome?
It is a problem thatcan ruin TCPperformance. Thisproblem occurswhen data are passed to the sending TCP entity in large bl ocks, but an
interactive applicationon the receiving side reads1 byte at a time.
What is region?
When hierarchical routingisused, the routersare divided into what we call regions, with each router knowing all the detailsabout how to
route packets to destinationswithin itsown region, but knowingnothing about theinternal structure of other regions.
What is multicast routing?
14. Sending a message to a group iscalledmulticasting, and itsroutingalgorithm iscalled multicast routing.
What is traffic shaping?
One of the main causesof congestion isthat traffic isoften busy. If hostscould be made to transmitat a uniform rate, congestion would be
less common. Another open loopmethodto helpmanagecongestionisforcing the packet to be transmittedat a more predictable rate. This
is called traffic shaping.
What is packet filter?
Packet filter isa standard router equipped with some extra functionality.Theextra functionality allowsevery incoming or outgoing packet to
be inspected. Packetsmeetingsome criterion are forwardednormally. Those that fail the test are dropped.
BOOTP helps a diskless workstation boot. How does it get a message to the network
looking for its IP address and the location of its operating system boot files?
BOOTP sendsa UDP message with a subnet work broadcast address and waitsfor a reply from a server that givesit the IP addre ss. The
same message might containthe name of themachine thathasthe boot fileson it. If the boot image location isnot specified, the workstation
sends another UDP message to query the server.
What is a DNS resource record?
resource record is an entry in a name server's database. There are several typesof resource records used, includingname-to-address
resolution information.Resource recordsare maintainedasASCII files.
What protocol is used by DNS name servers?
DNS uses UDP for communicationbetweenservers. It is a better choice thanTCP because of the improved speed a connectionlessprotocol
offers. Of course, transmission reliability sufferswith UDP.
What is the difference between interior and exterior neighbor gateways?
Interior gatewaysconnect LANsof one organization, whereasexterior gatewaysconnect theorganizationto the outsideworld.
What is the HELLO protocol used for?
The HELLO protocol usestime instead of distance to determineoptimal routing. It isan altern ative to the Routing Information Protocol.
What are the three type of routing tables and What are the advantages and
disadvantages of these?
The three typesof routing tablesare fixed, dynamic, and fixed central.
A fixed table must be manually modified every time there isa change.
A dynamic tablechangesitsinformation based on networktraffic, reducing theamount of manual maintenance.
A fixed central table letsa manager modify only one table, whichisthen read by other devices. The fixed central table reducesthe need to
update each machine'stable, aswith the fixedtable. Usually a dynamic table causesthe fewest problemsfor a networkadmini strator,
althoughthe table'scontentscan change without the administrator being aware of thechange.
15. What is MAC address ?
The addressfor a device asit is identifiedat the Media Access Control (MAC) layer in the networkarchitecture. MAC addressis usually
stored in ROM on the networkadapter card and isunique.
What is attenuation?
The degenerationof a signal over distanceon a networkcable iscalled attenuation.
What is cladding?
A layer of a glass surrounding the center fiber of glassinside a fiber-optic cable.
What is RAID?
A method for providing faulttoleranceby using multiple hard disk drives.
What is NETBIOS and NETBEUI?
NETBIOS is a programming interface that allowsI/O requeststo be sent to and received from a remote computer and it hidesthe networking
hardware from applications.
NETBEUI is NetBIOS extendeduser interface.A transport protocol designed by Microsoft and IBM for the use on small subnets.
What is redirector?
Redirector is software that intercept
What is Beaconing?
The process that allowsa networkto self-repair networks problems. The stationson the networknotify the other stationson the ring when
they are not receiving thetransmissions. Beaconingisused in Token ring and FDDI networks.
What is terminal emulation, in which layer it comes?
Telnet isalso called asterminal emulation. It belongsto application layer.
What is frame relay, in which layer it comes?
Frame relay isa packet switching technology. It will operate inthe datalinklayer.
What do you meant by "triple X" in Networks?
The function of PAD (Packet Assembler Disassembler) is described in a document known asX.3. The standard protocol hasbeen defined
between the terminal andthe PAD, calledX.28; another standard protocol existsbetween hte PAD and thenetwork, called X.29. Together,
these three recommendationsare often called "triple X".
16. What is SAP?
Seriesof interface pointsthat allow other computersto communicate withthe other layersof networkprotocol stack.
What is subnet?
A generic term for section of a large networksusually separated by a bridge or router.
What is subnet mask?
It is a term that makesdistinguish betweennetworkaddressand host address in IP address. Subnet maskvalue 0 defineshost partition in IP
address and value 1 – 255 definesNetworkaddress.
Describe Various Network Type
Local Area Networks Local areanetworks(LANs) are used to connect networking devicesthat are in a very close geographic area, such as
a floor of a building,a building itself, or a campusenvironment.
Wide Area Networks Wide area networks(WANs) are used to connect LANstogether. Typically,WANsare used when the LANs that must
be connected are separated by a largedistance.
Metropolitan Area Networks A metropolitanarea network(MAN) is a hybrid betweena LAN and a WAN.
Content Networks Content networks (CNs) were developedto ease users’ access to Internet resources. Companiesdeploy basically two
types of CNs:
1.Caching downloaded Internet information
2.DistributingInternet traffic loadsacross multiple servers
Storage Area Networks Storage area networks(SANs) provide a high-speed infrastructure to movedata betweenstorage devicesand file
servers.
Advantage
Performance isfast.
Availability ishigh because of the redundancy featuresavailable.
Distances can span up to 10 kilometers.
Managementiseasy because of the centralizationof data resources.
Overhead islow (uses a thin protocol).
Disadvantage of SANsistheir cost.
Intranet An intranet isbasically a networkthat islocal to a company. In other words, users from within thiscompany can find all of their
resources without having to go outside of the company. An intranet can includeLANs, private WANsand MANs,
Extranet An extranet isan extended intranet, where certain internal servicesare made available to known external usersor external
business partners at remote locations.
Internet An internet isused when unknown external usersneed to access internal resourcesin your network. In other words, your compa ny
might have a web site that sellsvariousproducts, and you want any external user to be able to accessthisservice.
VPN A virtual privatenetwork(VPN) is a special type of secured network. A VPN is used to provide a secure connection acrossa p ublic
network, such as an internet. Extranetstypically use a VPN to provide a secure connection between a company and itsknown external users
or offices. Authentication isprovided to validatethe identitiesof the two peers. Confidentiality providesencryption of the data to keep it
private from prying eyes. Integrity isused to ensure that the data sent between thetwo devicesor sites has not been tampered with.