Sie sind auf Seite 1von 17

NL Oral Question bank

Class : TEIT

ExpNo.1 Title:Study of Basic TCP/IP utilities and commands. (eg: ping, ifconfig, tracert, arp, tcpdump, whois, host, netsat, nslookup, ftp, telnet etc)
QExplain each command with its use and with its options.

Q.Which port number used by FTP? A. 20 and 21

Q.What is use of Ping command? A.Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the roundtrip time for messages sent from the originating host to a destination computer.

Q. What is the port number ?Give list of different port numbers of protocols A.a port is an application-specific or process-specific software construct serving as a communications endpoint. It is used by the transport protocols of the Internet Protocol Suite, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). A specific port is identified by its number, commonly known as the port number, the IP address with which it is associated, and the type of transport protocol used for communication.

21: File Transfer Protocol (FTP) 22: Secure Shell (SSH) 23: Telnet remote login service 25: Simple Mail Transfer Protocol (SMTP) 53: Domain Name System (DNS) service 80: Hypertext Transfer Protocol (HTTP) used in the World Wide Web 110: Post Office Protocol (POP) 119: Network News Transfer Protocol (NNTP) 143: Internet Message Access Protocol (IMAP)

161: Simple Network Management Protocol (SNMP) 443: HTTP Secure (HTTPS)

Ranges of ports

1.Well-known ports: 01023 2.Registered ports: 102449151 3. Dynamic, private or ephemeral ports: 4915265535

Q.Whaich protocol used by ping command A. ICMP

Q.Which command is used to find IP address of machine A.IPconfig(Windows) and ifconfig(Linux)

Q.What is use of ARPand RARP? A.Address Resolution Protocol (ARP) provides a completely different function to the network than Reverse Address Resolution Protocol (RARP). ARP is used to resolve the ethernet address of a NIC from an IP address in order to construct an ethernet packet around an IP data packet. This must happen in order to send any data across the network. Reverse address resolution protocol (RARP) is used for diskless computers to determine their IP address using the network

Q What is IP address of IT server A.172.16.9.9

Q What is IP address of proxy server A.172.16.99.99 -------------------------------------------------------------

Exp.No.2 Aim:Configure a router (Ethernet & Serial Interface) using router commands including

access lists on any network simulator (eg. packet Tracer)


Q Which layer of the OSI model router is associated with? A.Network layer

Q What is dynamic routing protocols. A Dynamic routing performs the same function as static routing except it is more robust. Static routing allows routing tables in specific routers to be set up in a static manner so network routes for packets are set. If a router on the route goes down the destination may become unreachable. Dynamic routing allows routing tables in routers to change as the possible routes change. There are several protocols used to support dynamic routing including RIP and OSPF.

Q. what is protocol? A. A network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.

Q. Which is the most widely used routing protocol in internet? A OSPF and BGP

Q.What is access list A.Access-lists are sequential listings of guidelines, which are used to provide or prevent the flow of packets within a network based on information provided within the list

Q What is the basic format of the Standard IP Access-List? A. access-list [#] [permit | deny] [source-address | keyword any] [source mask]

Q.List few mail protocols A. Mail Protocols SMTP - Simple Mail Transport Protocol is used on the internet, it is not a transport layer protocol but is an application layer protocol. POP3 - Post Office Protocol version 3 is used by clients to access an internet mail server to get mail. It is not a transport layer protocol. IMAP4 - Internet Mail Access Protocol version 4 is the replacement for POP3. MIME - Multipurpose Internet Mail Extension is the protocol that defines the way files are attached to SMTP messages.

Q.Give name of network simulator which you used for router configuration A.Packet tracer

Q. What is BOOTP and DHCP ?Which is better? A. This protocol is used to assign IP addresses to hosts or workstations on the network. Usually a DHCP server on the network performs this function. Basically it "leases" out address for specific times to the various hosts. If a host does not use a given address for some period of time, that IP address can then be assigned to another machine by the DHCP server. When assignments are made or changed, the DHCP server must update the information in the DNS server. As with BOOTP, DHCP uses the machine's or NIC ethernet (MAC) or hardware address to determine IP address assignments. The DHCP protocol is built on BOOTP and replaces BOOTP. DHCP extends the vendor specific area in BOOTP to 312 bytes from 64. RFC 1541 defines DHCP. -----------------------------------------------------------------------

Exp. No.3 Title:Network design and implementation for small network using actual physical. components with IP address scheme.
Q. Define IP address. A.An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication .An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek.

Q. List the different types of topology? A.Start,bush,Ring,mesh

Q. What is subnet mask? A.An IP address has two components, the network address and the host address. A subnet mask separates the IP address into the network and host addresses (<network><host>). Subnetting further divides the host part of an IP address into a subnet and host address (<network><subnet><host>). It is called a subnet mask because it is used to identify network address of an IP address by perfoming bitwise AND operation on the netmask.

A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s.

Q.What is CIDR?

A.CIDR is an efficient method for specifying IP addresses to Internet routers

Q.what is mac address A. Media Access Control address MAC address is a unique identifier assigned to network interfaces for communications on the physical network segment.

Q.What is computer network. A.A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users.

Q .What is use of computer network A.Computer networks can be used for several purposes: Facilitating communications. Using a network, people can communicate efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing. Sharing hardware. In a networked environment, each computer on a network may access and use hardware resources on the network, such as printing a document on a shared network printer. Sharing files, data, and information. In a network environment, authorized user may access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many networks. Sharing software. Users connected to a network may run application programs on remote computers.

Q.What are Disadvantages of Computer Networks

A. Following are some of the major disadvantages of computer networks. Security Issues: One of the major drawbacks of computer networks is the security issues involved. If a computer is a standalone, physical access becomes necessary for any kind of data theft. However, if a computer is on a network, a computer hacker can get unauthorized access by using different tools. In case of big organizations, various network security softwares are used to prevent the theft of any confidential and classified data. Rapid Spread of Computer Viruses: If any computer system in a network gets affected by computer virus, there is a possible threat of other systems getting affected too. Viruses get spread on a network easily because of the interconnectivity of workstations. Such spread can be dangerous if the computers have important database which can get corrupted by the virus. Expensive Set Up: The initial set up cost of a computer network can be high depending on the number of computers to be connected. Costly devices like routers, switches, hubs, etc., can add up to the bills of a person trying to install a computer network. He will also have to buy NICs (Network Interface Cards) for each of the workstations, in case they are not inbuilt. Dependency on the Main File Server: In case the main File Server of a computer network breaks down, the system becomes useless. In case of big networks, the File Server should be a powerful computer, which often makes it expensive.

Q.Types of cables. A.Twisted cable,COaxial,Fiber optic

Q IPaddress structure A.The IP Address Structure All IP addresses are made up of four parts (quadrants) separated by dots, like this: XXX.XXX.XXX.XXX where each XXX can be any number between 0 and 255. If you know binary, you will understand that each of these numbers are stored in 8 bits (binary digits),

and the number of possibilities you can have is 2 raised to the power of 8, which is 256 (0-255).

Class A: Class B: Class C: Class D:

0nnnnnnn hhhhhhhh hhhhhhhh hhhhhhhh 10nnnnnn nnnnnnnn hhhhhhhh hhhhhhhh 110nnnnn nnnnnnnn nnnnnnnn hhhhhhhh

netid (7bits), hostid (24 bits). netid (14 bits), hostid (16 bits). netid (21-bits), hostid (8 bits). Multicast group 28 bits.

1110mmmm mmmmmmmm mmmmmmmm mmmmmmmm

Class E addresses are reserved for future use.

Q.Which components used for crimping? A. 1) 2) 3) 4) 5) The following are the equipment required for crimping cables: CAT-6(Category 6) cable RJ-45 connector Cable cutter Crimping tool Cable tester

Q.Explain crimping procedure A 1. The correct type of cable must be selected and this must be stranded CAT-6 for a patch cable.

2. 3. 4.

A suitable length of cable is cut. At least 2 cm of the cable sheath has to be stripped to expose the inner pairs. Then the pair of cables has to be untwisted.

5. The colored wires should be placed in the correct order using the wiring diagram, according to the standered color coding or EIA/TIA standards. 6. The inner wires should be cut such that they are exactly the same length and just long enough to reach the RJ45 connector, with the bridge positioned over the cable sheath. 7. The connectors has to be positioned with the spring lever at the bottom

Q.When to use cross over cable. A.When two same devices connect --------------------------------------------------------------------------------------------------------------------

Exp.No.4 Aim:Network design & implementation for medium, large network using any networksimulator with IP address scheme (CIDR). Eg VLAN Implementation

Q.Which layer of OSI and TCP/IP model switch is associated with? A.Data link layer

Q. What are VLANs? A.VLANs (Virtual Local Area Networks) are a way to structure a network logically, put simply a VLAN is a collection of nodes which are grouped together in a

single broadcast domain (address range) that is based on something other than physical location.

Q.Use of VLAN A. Security - Separating systems that have sensitive data from the rest of the network.

Projects/Special applications - Managing a project can be simplified by the use of a VLAN that brings all of the required nodes together. Performance/Bandwidth - Allows the network administrator to create VLANs that reduce the number of router hops and increase bandwidth.

Departments/Specific job types - Companies may want VLANs set up for departments that are heavy network users (such as multimedia or engineering), or a VLAN across departments that is dedicated to specific types of employees (such as management or sales).

Q. What is the difference between VLAN and VPN? A..VPN is a method of creating a smaller sub network on top of an existing bigger network while VLAN is a subcategory of VPN 2.A VLAN is used to group computers that are not usually within same geography into the same broadcast domain while VPN is most commonly related to remote access to a companys network

Q. What is the difference between L3 switch and a router? A.a Layer-3 switch (routing switch) is primarily a switch (a Layer-2 device) that has been enhanced or taught some routing (Layer 3) capabilities. A router is a Layer-3 device that simply do routing only. In the case of a switching router, it is primarily a router that may use switching technology (high-speed ASICs) for speed and performance (as well as also supporting Layer-2 bridging functions).

--------------------------------------------------------------------------------------Exp.No.5 Aim: Network Analysis as well as packet header study with the help of Wireshark Network protocol analyzer
Q What is Wireshark? A. Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. You could think of a network packet analyzer as a measuring device used to examine what's going on inside a network cable, just like a voltmeter is used by an electrician to examine what's going on inside an electric cable

Q.What is use of wire shark? Purposes network administrators use it to troubleshoot network problems network security engineers use it to examine security problems developers use it to debug protocol implementations people use it to learn network protocol internals

Q.What are features of wireshark? A.The following are some of the many features Wireshark provides:

Available for UNIX and Windows. Capture live packet data from a network interface. Display packets with very detailed protocol information. Open and Save packet data captured. Import and Export packet data from and to a lot of other capture programs. Filter packets on many criteria. Search for packets on many criteria. Colorize packet display based on filters. Create various statistics.

Q.

What Wireshark does not provide

Wireshark isn't an intrusion detection system. It will not warn you when someone does strange things on your network that he/she isn't allowed to do.

However, if strange things happen, Wireshark might help you figure out what is really going on. Wireshark will not manipulate things on the network, it will only "measure" things from it. Wireshark doesn't send packets on the network or do other active things (except for name resolutions, but even that can be disabled).

Q.Can the contents of the message be seen on the analyzer? A.Yes

Q.Which protocols wireshark supports A.Telnet , tcp,icmp,FTP,HTTP

Exp. No.6 Aim: Installation of ns-2. Test network animation on Network Simulator2 (ns2).

Q. What is NS2? A. ns (from network simulator) is a name for series of discrete event network simulators, specifically ns-1, ns-2 and ns-3. These simulators are used in the simulation of routing protocols, among others, and are heavily used in ad-hoc networking research, and support popular network protocols, offering simulation results for wired and wireless networks alike.

Q. On what all platforms the NS can run? A.It runs on Linux, FreeBSD, Solaris, Mac OS X ansd on Windows using Cygwin

Q. Which scripting language NS2 uses? A.OTCL

Q.Expalin NS2 installation steps. A.Installation steps for RED HAT Enterprise Linux version 5.0 Users must logon as root

Userid Password

root yourpassword

To download the ns source file go to the following web address

http://www.isi.edu/nsnam/dist/ns-allinone-2.26.tar.gz and Use a browser to download the allinone source file

Ns-allinone-2.26.tar.gz

Place this file in the directory

/usr/local

Open a terminal window and move to the /usr/local directory

cd /usr/local

Unpack this file using the command

tar -xvzf ns-allinone-2.26.tar.gz

This will unpack the files and create a new subdirectory

/usr/local/ns-allinone-2.26

Move into the new directory

cd ns-allinone-2.26

Check that you are in the correct directory

Ls Ls -lr

or for a more detailed listing

To compile the source files enter (dot slash install).The dot means use the current directory

./install To validate that the install has worked type (dot slash validate)

./validate This completes the installation process. The executable files may be inspected in directory

/usr/local/ns-allinone-2.26/bin

Q.What are other netwok simulators A.OPNET and NetSim

------------------------------------------------------------------------------------------------------

Exp. No.7

AIMAim: Socket Programming in C Language on Linux.


a) TCP Client, TCP Server b) UDP Client, UDP Server

Q What is a socket? A.socket is an endpoint of a bidirectional inter-process communication flow across an Internet Protocolbased computer network, such as the Internet.

Q. What are the types of sockets? A.There are several Internet socket types available: 1. Datagram sockets, also known as connectionless sockets, which use User Datagram Protocol (UDP)
2. Stream sockets, also known as connection-oriented sockets, which use Transmission Control

Protocol (TCP) or Stream Control Transmission Protocol (SCTP).

3. Raw sockets (or Raw IP sockets), typically available in routers and other network equipment. Here

the transport layer is bypassed, and the packet headers are not stripped off, but are accessible to the application. Application examples are Internet Control Message Protocol (ICMP, best known for the Ping suboperation), Internet Group Management Protocol (IGMP), and Open Shortest Path First (OSPF).

Q. What is socket address? A.A socket address is the combination of an IP address (the location of the computer) and a port (which is mapped to the application program process) into a single identity, much like one end of a telephone connection is the combination of a phone number and a particular extension

Q. List the socket primitives for TCP. TCP Socket Primitives Primitive Meaning SOCKET Create new communication end point in program BIND Attach a local port address to a socket LISTEN Open socket to connection requests and define number of queued connections ACCEPT Block execution until a connection request arrives; server CONNECT Attempt to establish connection (e.g. to a program blocked at an ACCEPT); client SEND Send data over a connection (encapsulated within an TCP segment) RECEIVE Receive data over a connection. CLOSE Opposite of ACCEPT and CONNECT Q. What is difference between TCP socket and UDP socket? A.

TCP UDP Reliability: TCP is connection-oriented Reliability: UDP is connectionless protocol. When a file or message send protocol. When you a send a data or it will get delivered unless connections message, you don't know if it'll get fails. If connection lost, the server will there, it could get lost on the way. request the lost part. There is no There may be corruption while corruption while transferring a transferring a message. message. Ordered: If you send two messages Ordered: If you send two messages out, along a connection, one after the other, you don't know what order they'll arrive you know the first message will get in i.e. no ordered there first. You don't have to worry about data arriving in the wrong order. Heavyweight: - when the low level Lightweight: No ordering of messages, parts of the TCP "stream" arrive in the no tracking connections, etc. It's just wrong order, resend requests have to fire and forget! This means it's a lot be sent, and all the out of sequence quicker, and the network card / OS parts have to be put back together, so have to do very little work to translate requires a bit of work to piece together. the data back from the packets. Streaming: Data is read as a "stream," Datagrams: Packets are sent with nothing distinguishing where one individually and are guaranteed to be packet ends and another begins. There whole if they arrive. One packet per may be multiple packets per read call. one read call. Examples: World Wide Web (Apache Examples: Domain Name System TCP port 80), e-mail (SMTP TCP port (DNS UDP port 53), streaming media 25 Postfix MTA), File Transfer applications such as IPTV or movies, Protocol (FTP port 21) and Secure Voice over IP (VoIP), Trivial File Shell (OpenSSH port 22) etc. Transfer Protocol (TFTP) and online multiplayer games etc Q. A. Typical flow of events for a connection-less socket: 1. The socket() function creates an endpoint for communications and returns a socket descriptor that represents the endpoint. 2. When an application has a socket descriptor, it can bind a unique name to the socket. Servers must bind a name to be accessible from the network. 3. When a connection is established between stream sockets (between client and server), you can use any of the socket API data transfer functions. Clients and servers have many data transfer functions from which to choose, such as send(), recv(), read(), write(), and others. 4. When a server or client wants to cease operations, it issues a close() function to release any system resources acquired by the socket. --------------------------------------------------------------------------------------------

Exp.No.8 Aim.Server Configuration-FTP,Telnet,IIS


Q.Why does an FTP service require two ports to connect to server?

A.One for data and other for control connection c

Q. What is SSH? A.Secure Shell (SSH) is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network

Q. What is a web server? Name a few. A.Web server can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver content that can be accessed through the Internet.The most common use of web servers is to host web sites but there are other uses like data storage or for running enterprise applications Examples- IIs and Apache

Q. FTP Commands. Ans. Command Description ! Preceding a command with the exclamation point will cause the command to execute on the local system instead of the remote system. ? Request assistance or information about the FTP commands. This command does not require a connection to a remote system. ascii Set the file transfer mode to ASCII (Note: this is the default mode for most FTP programs). bell Turns bell mode on / off. This command does not require a connection to a remote system. binary Set the file transfer mode to binary (Note: the binary mode transfers all eight bits per byte and must be used to transfer non-ASCII files). bye Exit the FTP environment (same as quit). This command does not require a connection to a remote system. cd Change directory on the remote system. close Terminate a session with another system. debug Sets debugging on/off. This command does not require a connection to a remote system. delete Delete (remove) a file in the current remote directory (same as rm in UNIX). dir Lists the contents of the remote directory.The asterisk (*) and the question mark (?) may be used as wild cards. For example: get WIP help Request a list of all available FTP commands. This command does not require a connection to a remote system. lcd Change directory on your local system (same as CD in UNIX). ls List the names of the files in the current remote directory. mget WIP mkdir Make a new directory within the current remote directory. mput Copy multiple files from the local system to the remote system. (Note: You will be prompted for a "y/n" response before copying each file).

open put pwd quit rmdir trace

Open a connection with another system. Copy a file from the local system to the remote system. Find out the pathname of the current directory on the remote system. Exit the FTP environment (same as "bye"). This command does not require a connection to a remote system. Remove (delete) a directory in the current remote directory. Toggles packet tracing. This command does not require a connection to a remote system.

Q. Differnce between FTP and TFTP A. FTP is a complete, session-oriented, general purpose file transfer protocol. TFTP is used as a bare-bones special purpose file transfer protocol. FTP can be used interactively. TFTP allows only unidirectional transfer of files. FTP depends on TCP, is connection oriented, and provides reliable control. TFTP depends on UDP, requires less overhead, and provides virtually no control. FTP provides user authentication. TFTP does not. FTP uses well-known TCP port numbers: 20 for data and 21 for connection dialog. TFTP uses UDP port number 69 for its file transfer activity. The Windows NT FTP server service does not support TFTP because TFTP does not support authentication. Windows 95 and TCP/IP-32 for Windows for Workgroups do not include a TFTP client program.

Q. difference between ftp and telnet A. 1. FTP is a protocol used specifically for transferring files to a remote location, while Telnet allows a user to issue commands remotely. 2. FTP can be used with a command line, a dedicated application, and even with most web browsers, while Telnet is restricted to the command line. 3. There are ways to use FTP in a secure environment, while Telnet will always be unsecured. 4. FTP is a well-known and reliable method of uploading files to web servers, while Telnet is now commonly used in diagnosing network services Q.Telnet commands close open quit set close current connection connect to a site exit telnet set options (type 'set ?' for a list) NTLM Turn ON NTLM Authentication. LOCAL_ECHO Turn ON LOCAL_ECHO. TERM x (where x is ANSI, VT100, VT52, or VTNT)

display display operating parameters

CRLF status unset

Send both CR and LF

print status information unset options (type 'unset ?' for a list) NTLM Turn OFF NTLM Authentication. LOCAL_ECHO Turn OFF LOCAL_ECHO. CRLF Send only CR (no LF is sent)

?/help

print help information

Exp.No.9 Case study of existing network:

Q. What topology is used in your lab ? A.Star topology

Q.What is modem A.A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information2

Q.What is proxy server A.a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules.

Q.What is access point A An access point is different from a wireless router, in that it does not have a firewall and therefore is not appropriate to protectyour local network against threats from the Internet. A basic wireless setup may not have an access point, but just a router (or a modem) and an adapter. An access point extends the coverage within your network it's put in a "dead spot", a place that's distant from the router, perhaps in a different room, or on a different floor.

Q. What is a leased line? A.A leased line is a service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric telecommunications line connecting two or more locations in exchange for a monthly rent (hence the term lease

Q. What is broadband? A.Broadband Internet access, often shortened to just "broadband", is a high data rate connection to the Internet typically contrasted with dial-up access using a 56 kbit/s modem.

Q. What is backbone cable? Backbone cabling is the inter-building and intra-building cable connections in structured cabling between entrance facilities, equipment rooms and telecommunications closets. Backbone cabling consists of the transmission media, main and intermediate cross-connects and terminations at these locations. This system is mostly used in data centers. Q.Differnce between router and switch A router is a more sophisticated network device than either a switch or a hub. Like hubs and switches, network routers are typically small, box-like pieces of equipment that multiple computers can connect to. Switch are basically layer2 device and it works on Hardware technology with map the mac addresses and it works with switch table. Router is known as layer3 device and works alos on hardware technology and map the mac addresses. it basically connects two different networks or netids to each other.it works with routing table

Das könnte Ihnen auch gefallen