Beruflich Dokumente
Kultur Dokumente
What is interrupt? - Interrupt is a signal send by external device to the processor so as to request the processor to perform a particular work.
1. What is cache memory? - Cache memory is a small high-speed memory. It is used for
temporary storage of data & information between the main memory and the CPU (center processing unit). The cache memory is only in RAM.
1. Aniket Says:
June 9th, 2006 at 6:39 am
Suggestion fo Question No. 16.: VHDL stands for Very high speed integrated circuit Hardware Discription Language. VHDL is used to design vary large scale integrated circuits. It can simulate the wave form output of the proposed circuit. Verilog is another hardware discription language but more powerful than VHDL. Verilog can be used to design analog circuits as well. VHDL has limilation of designing digital circuits only.
2. Aniket Says:
June 9th, 2006 at 6:47 am
Answer for Question 14. : There can be 2^8 combinations of bits in a byte.
3. vijay Says:
June 17th, 2006 at 2:34 am
for question no 15: = it assigns the value( of right side variable) to the left side. where as== will compare the two operands.This will be used in Descion making statements.
4. sunny Says:
August 23rd, 2006 at 5:11 am
for question num. 12 Basically there are 3 types of busses they r : 1 system bus, 2 data bus and 3 control bus in any kind of microprocessor or computer
5. sunny Says:
August 23rd, 2006 at 5:14 am
for question 6 basically cache memory is a temporary memory tat is used by microprocessor. Also i m doutful about this question
6. Potty Says:
October 13th, 2006 at 3:45 am
Question 13: Stage1: Instruction Fetch Stage2: Decode Stage 1 Stage3: Decode Stage 2 Stage4: Execute Stage5: Write back reference: Computer Organization & Architecture, Designing for performance, William Stallings
7. hackcrackvirus Says:
October 18th, 2006 at 7:40 am
For que no.6 Cache is required for temp storage due to vast difference in operating speed of processor and main memory.
8. Obaid Says:
October 24th, 2006 at 9:29 pm
***************** sunny said, Wrote on August 23, 2006 @ 5:11 am for question num. 12 Basically there are 3 types of busses they r : 1 system bus, 2 data bus and 3 control bus in any kind of microprocessor or computer ***************** System bus is just a data bus in a computer. You forgot about address bus.
9. Obaid Says:
October 24th, 2006 at 9:30 pm
Question 13: Most moder texts list the following stages of a pipeline: Instruction fetch Instruction decode and register fetch Execute Memory access Register write back
10. Obaid Says:
October 24th, 2006 at 9:32 pm
MESI represents the 4 states of cache: Modified Exclusive Shared Invalid This method is used in cache coherency and is applied in the Pentium family of processors.
12. Ashish Says:
October 31st, 2006 at 11:13 pm
What are the total number of lines written in C/C++? What is the most complicated/valuable program written in C/C++? I dont really know if there is single correct answer to this question but I feel a closer answer could be GCC. In 1985 The first version of GCC was able to compile itself. Even today I think most versions of GCC are able to compile itself. GCC as we all know is a highly respected C\C++ compiler and its contributions to open source and C\C++ is unparalleled. Another answer which I can think of is the Linux Kernel (as of now)
How many bit combinations are there in a byte? Generally collection of 8 bits is called a byte. But the number can certainly vary depending on architecture of machines. I mean there are/were machines for which a byte != 8 bits.
14. das Says:
December 7th, 2006 at 3:04 pm
Cache memory is a small high-speed memory. It is used for temporary storage of data & information between the main memory and the CPU (center processing unit). The cache memory is only in RAM
15. palani Says:
March 1st, 2007 at 7:15 am
six roles of active dirretory forest and domain 1 . domain naming operating master - forest 2 . global catloge sever - forest 3 . sehma master - forest 4 . rid relative master - domain 5 . pdc immodulat - domain 6 . infrastructure master - domain
16. Abhijit Singh Says:
March 13th, 2007 at 4:51 am
Cache memory is a small temporary memory in cpu.which has two types called level1 and level2. Level1 is used in cpu to have quick operation. But level2 is on the motherboard. if the processor check the catch memeory then get the data from where means that term is called catch hit else catch miss.
18. Bingmo Says:
May 13th, 2008 at 1:04 am
Snooping is method used in multi-core parallel processing environment to keep the data access by different caches consistence.
19. Anjaz Says:
October 14th, 2008 at 9:01 am
Q9. In Write thru Cache the write from cache to main memory(RAM) occurs at the same time when cache is modified. so here the data loss due to power failure and some critical conditions could be avoided In write back Cache the write from cache to Main memory occurs only after the cache is been updated or it requires to move the page from cache to main memory.here the advt is that time could be saved by saving two write occuring at the same time. And also remember the memory near to processor is easier to acces rather than the farther 1 and ie why caches are classifies as L1 cACHE AND L2 Cache
20. Anjaz Says:
October 14th, 2008 at 9:03 am
Q15. = is used to assign some values to a variable(a memory location) or pass values from 1 variable to other . Its basically used to assign. == is used to compare between two variables or values . it is a condition checking EQUAL TO
21. Anjaz Says:
October 14th, 2008 at 9:08 am
Q6. Processor Cache is used to increase the performance of the computer processor. more the distance of memory from processor slower the performance of the processor .
their are many techniques implemented to make the procesor acces the memory faster and the succes one is use of cache . their are many cache algorithms also implemented . Processor cannot work independently it requires program to run or execute and these programs are stored in memory so processor requires to be in touch with memory constantly so their will be consider loss of time(performance) if memory access tooks much time so this make the requiremnt of Cache to be present.
22. Anjaz Says:
October 14th, 2008 at 9:11 am
Q8. Multiprocessor cache s/m isuues: Multi processor means able to handle multitasking . So their must be an Bus arbitration rule and also a good protocol to handle the issue. cache HiT and cache MISS must be considered into account carefully
Question
What?s the maximum hard drive size for FAT16-based Windows system? 2GB
Answer
4 GB
Question
What?s the speed and device maximum specs for Firewire? IEEE 1394 (Firewire) supports the maximum of 63 connected devices with speeds up to 400 Mbps. Where?s MBR located on the disk? Main Boot Record is located in sector 0, track 0, head 0, cylinder 0 of the primary active partition.
Answer
Question
What?s the difference between L1 and L2 cache? Level 1 cache is internal to the chip, L2 is external.
Answer
In addition this L1 is faster than L2. becouse L1 is easily accesable to the CPU.
Question
Name the processor lines of two major manufacturers? High-end: Intel - Pentium (II, III, 4), AMD - Athlon. Low-end: Intel - Celeron, AMD - Duron. 64-bit: Intel - Itanium 2, AMD Opteron.
Answer
Question
How do you clear CMOS password? Since CMOS is a special chip with its own battery, the best way to clear out a CMOS chip is to disconnect it from its power supply. kindly shutdown pc remove cmos battery or jumper setting for cmos.and start pc again place cmos battry or jumper and strat pc
Answer
Date: 7/12/2007
1. By removing the CMOS battery and then replace 2. jumper settings will be in 1 n 2 connection(by default)better make it to 2 n 3 connection and check
Networking
What is WLAN? WLAN or Wireless local area network is simply a type of network that doesnt use wired Ethernet connections for networking. WLAN uses wireless network devices such as wireless routers etc. What is Subnet Mask? A subnet mask is used to determine the number of networks and the number of host computers. Every class of the IP address uses the different range of the subnet mask. Subnet masks allow the IP based networks to be divided into the sub networks for performance and security purposes. What is a MAC Address? MAC address or Media Access control is a unique identifier of a computer device. The MAC address is provided by the manufacturer of the device. MAC addresses are 12 digital hexadecimal numbers. What is an IP Address? An IP address is a unique identifier of a computer or network device on the local area network, WAN or on internet. Every host computer on the internet must have a unique IP address. IP addresses on the internet are usually assigned by the local ISPs to which users are connected. What is Wifi? Wi Fi or wireless fidelity is a base band network technology that is used for the wireless data communication. What is WiMax? Wi Fi is a next form of the Wi fi. Wi max is a very high speed broadband network technology that is designed for the corporate offices, roaming and home users. Name the Seven Layers of OSI Model The seven layers of the OSI are Application, Presentation, Sessions, Transport, Network, Data Link and Physical layer. What is LDAP?
Lightweight Directory Access Protocol is used to access the directory services from the Active directory in Windows operation systems. What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP, and FTP? SMTP 25, POP3 110, IMAP4 143, RPC 135, LDAP, FTP-21, HTTP-80 What is IPv6? IP V6 is a next generation protocol that is used as an expansion of DNS. What is UDP? UDP or user datagram protocol is a connectionless protocol that is used to transfer the data without any error handling. What is Firewall? A firewall is usually a software program that is installed on the network server or gateway. The purpose of the firewall is to protect the network resources from the intruders and unauthorized persons. What is Virtual Private Network (VPN) and how does it work? VPN or virtual private network is used to connect two networks by means internet. VPN uses PPTP (point to point tunneling protocol) and other security procedures to make a secure tunnel on internet. Define VOIP VOIP or voice over internet protocol is a technology that uses IP based networks such as internet or private networks to transmit the voice communication. Define Bluetooth Technology Bluetooth is a short range wireless technology that uses radio waves for communication. Many mobile phones, laptops, MP3 players have built in features of the Bluetooth. What is a RAS server? RAS or remote access server allows you to remote dial in through the desktop computers, laptops and GSM mobile phones. Whats a Frame Relay?
Frame relay is high speed data communication technology that operates at the physical and data link layers of the OSI model. Frame relay uses frames for data transmission in a network.
Q1. Name of seven layers in Open System Interconnection model. A. They are Application, Presentation, Session, Transport, Network, Data link, and Physical.
Networking Interview Questions and Answers : 1. What is an Object server? With an object server, the Client/Server application is written as a set of communicating objects. Client object communicate with server objects using an Object Request Broker (ORB). The client invokes a method on a remote object. The ORB locates an instance of that object server class, invokes the requested method and returns the results to the client object. Server objects must provide support for concurrency and sharing. The ORB brings it all together. 2. What is a Transaction server? With a transaction server, the client invokes remote procedures that reside on the server with an SQL database engine. These remote procedures on the server execute a group of SQL statements. The network exchange consists of a single request/reply message. The SQL statements either all succeed or fail as a unit. 3. What is a Database Server? With a database server, the client passes SQL requests as messages to the database server. The results of each SQL command are returned over the network. The server uses its own processing power to find the request data instead of passing all the records back to the
client and then getting it find its own data. The result is a much more efficient use of distributed processing power. It is also known as SQL engine.
4. What are the most typical functional units of the Client/Server applications?
Ubiquitous communications Network OS extension Binary large objects (BLOBs) Global directories and Network yellow pages Authentication and Authorization services System management Network time Database and transaction services Internet services Object- oriented services
Triggers are special user defined actions usually in the form of stored procedures, that are automatically invoked by the server based on data related events. It can perform complex actions and can use the full power of procedural languages.
A rule is a special type of trigger that is used to perform simple checks on data.
Transparency really means hiding the network and its servers from the users and even the application programmers.
TP-Lite is simply the integration of TP Monitor functions in the database engines. TP-Heavy are TP Monitors which supports the Client/Server architecture and allow PC to initiate some very complex multiserver transaction from the desktop.
This new model of Client/Server consists of thin, protable, "universal" clients that talk to superfat servers. In the simplet form, a web server returns documents when clients ask for them by name. The clients and server communicate using an RPC-like protocol called HTTP. 11. What are Super servers?
These are fully-loaded machines which includes multiprocessors, high-speed disk arrays for intervive I/O and fault tolerant features.
There is no commonly accepted definition for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".
13. TP Monitor does mainly two things extremely well. They are Process management and Transaction management.?
They were originally introduced to run classes of applications that could service hundreds and sometimes thousands of clients. TP Monitors provide an OS - on top of existing OS -
that connects in real time these thousands of humans with a pool of shared server processes.
There is a many-to-one relationship between clients and server. Clients always initiate the dialog by requesting a service. Servers are passively awaiting for requests from clients.
Location transparency Namespace transparency Logon transparency Replication transparency Local/Remote access transparency Distributed time transparency Failure transparency and Administration transparency.
The triggers are called implicitly by database generated events, while stored procedures are called explicitly by client applications.
The grouped SQL statements are called Transactions (or) A transaction is a collection of actions embused with ACID properties.
The
client
side
building
block
runs
the
client
side
of
the
application.
The server side building block runs the server side of the application.
20. The middleware buliding block runs on both the client and server sides of an application. It is broken into three categories:-
21. What are all the Base services provided by the OS?
Task preemption Task priority Semaphores Interprocess communications (IPC) Local/Remote Interprocess communication Threads Intertask protection Multiuser High performance file system Efficient memory management and Dynamically linked Run-time extensions.
SQL is an interactive query language for ad hoc database queries. SQL is a database programming language.
SQL is a data definition and data administration language. SQL is the language of networked database servers SQL helps protect the data in a multi-user networked environment. Because of these multifacted roles it plays, physicists might call SQL as "The grand unified theory of database".
SQL is a powerful set-oriented language which was developed by IBM research for the databases that adhere to the relational model. It consists of a short list of powerful, yet highly flexible, commands that can be used to manipulate information collected in tables. Through SQL, we can manipulate and control sets of records at a time.
Service Shared resources Asymmentrical protocols Transparency of location Mix-and-match Message based exchanges Encapsulation of services Scalability Integrity
Client/Server computing is the ultimate "Open platform". It gives the freedom to mix-andmatch components of almost any level. Clients and servers are loosely coupled systems that interact through a message-passing mechanism.
RPC hides the intricacies of the network by using the ordinary procedure call mechanism familiar to every programmer. A client process calls a function on a remote server and
suspends itself until it gets back the results. Parameters are passed like in any ordinary procedure. The RPC, like an ordinary procedure, is synchoronous. The process that issues the call waits until it gets the results.
Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends it to the remote server. The server receives the request, unpack the parameters, calls the procedures, and sends the reply back to the client. It is a telephonelike metaphor.
27. What are the three types of SQL database server architecture?
Process-per-client Architecture. (Example: Oracle 6, Informix ) Multithreaded Architecture. (Example: Sybase, SQL server) Hybrid Architecture (Example: Oracle 7)
1. Non-GUI
clients
that
do
not
need
multi-tasking
(Example: Automatic Teller Machines (ATM), Cell phone) 2. Non-GUI (Example: GUI OOUI clients 29. What are called Non-GUI clients, GUI Clients and OOUI Clients? clients that need multi-tasking ROBOTs) clients
Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction.
GUI Clients: These are applicatoins, where occassional requests to the server result from a human (Example: interacting Windows with 3.x, a NT GUI 3.5)
OOUI clients : These are applications, which are highly-iconic, object-oriented user interface that provides seamless access to information in very visual formats.
MOM allows general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate over networks by simply putting messages in the queues and getting messages from queues. It typically provides a very simple high level APIs to its services.
MOM's messaging and queuing allow clients and servers to communicate across a network without being linked by a private, dedicated, logical connection. The clients and server can run at different times. It is a post-office like metaphor.
Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it acts as a bridge between the clients and servers. It starts with the API set on the client side that is used to invoke a service and it covers the transmission of the request over the network and the resulting response.
It neither includes the software that provides the actual service - that is in the servers domain nor the user interface or the application login - that's in clients domain.
It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiates and runs background task activity. Keeps running. Grown bigger and faster.
It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided into threads that can run concurrently on any available processor. Any processor in the pool can run the OS kernel and execute user-written threads.
Database specific middleware OLTP specific middleware Groupware specific middleware Object specific middleware Internet specific middleware and System management specific middleware.
It includes the communication stacks, distributed directories, authentication services, network time, RPC, Queuing services along with the network OS extensions such as the distributed file and print services.
It imposses hierarchy and a division of labour among processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated to specific functions.
In the transaction server, the client component usually includes GUI and the server components usually consists of SQL transactions against a database. These applications are called OLTP (Online Transaction Processing) OLTP Applications typically,
Receive a fixed set of inputs from remote clients. Perform multiple pre-compiled SQL comments against a local database. Commit the work and Return a fixed set of results.
In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is separated from the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and flexible.
In 2-tier Client/Server systems, the application logic is either burried inside the user interface on the client or within the database on the server.
If the number of incoming clients requests exceeds the number of processes in a server class, the TP Monitor may dynamically start new ones and this is called Load balancing.
If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal software.
If the bulk of the application runs on the Server side, then it is Fat servers. It tries to minimize network interchanges by creating more abstract levels of services.
Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers.
Groupware addresses the management of semi-structured information such as text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct contact with other people.
File servers Database servers Transaction servers Groupware servers Object servers Web servers.
File servers are useful for sharing files across a network. With a file server, the client passes requests for file records over nerwork to file server.
47. What are the five major technologies that can be used to create Client/Server applications?
Clients and Servers are separate logical entities that work together over a network to accomplish a task. Many systems with very different architectures that are connected together are also called Client/Server.
49. List out the benefits obtained by using the Client/Server oriented TP Monitors?
Client/Server applications development framework. Firewalls of protection. High availability. Load balancing. MOM integration. Scalability of functions. Reduced system cost.
Extended services - These are add-on modular software components that are layered on top of base service.
BOTH
ISP Protocol
Answer Question
Install Printer in Network Environment
Subscribe
You have been given 1 printer and 1 IP Address for installing it in a Networking EnvironmentHow will you do it?
Latest Answer: Connect the printer with a lan port and go to the printer setup,
there is option of network config, press enter and go to IP config and the the given IP adress and exit with save. ...
Read Answers (1) | Asked by : shamz.ek
Answer Question
Missing NTLDR File
Subscribe
Windows crashed because NTLDR File is missing. How will you restore this file (Without using Safe Mode Option)?
Latest Answer: NTLDR is missingPress CTRL+ALT+DEL to restart. This problem
outdated, or if one or more of the following Windows boot files are missing or damaged: NtldrNtdetect.comBoot.ini To resolve ...
Read Answers (3) | Asked by : shamz.ek
Answer Question
IP V6 PING
Subscribe
How do you ping from one host to another in IPv6 without ARP?
Latest Answer: To ping other computer using ipv6 we use NetBios or host file or
DNS ...
Read Answers (1) | Asked by : kcrao
Answer Question
Default Subnet Mask for IPV6
Subscribe
multicast. Unicast addresses identify a single network device, anycast and multicast addresses identify a group of network devices. IPv6 addresses are 128 bit, compared to the 32 bit addresses of ...
Read Answers (1) | Asked by : mangala2910
Answer Question
Ping Death Packet
Subscribe
that involves sending of a larger size malicious ping to a computer. A ping is normally 64 bytes in size.Many computers can not handle larger than the maximum ip packet size, which is 65,535bytes. ...
Answer Question
VLAN and INTERVLAN
Subscribe
What is VLAN and INTERVLAN? Why do we use these techniques?What are the differences between STP, RSTP and MSTP?
Latest Answer: VLAN(Virtual Local Area Network) is a logical grouping of
network users and resources connected to administratively defined ports on a switch. VLAN's break up broadcast domains in layer 2 switch network.Virtual LANs (VLANs) divide one physical network ...
Read Answers (1) | Asked by : callnitin
Answer Question
Explain about Scan Disk ? How scan disk fixes errors ?
Subscribe
Latest Answer: It is a tool used to check and repair disk related errors like,1.
etc. ...
Answer Question
Access a File on Another Computer
Subscribe
A person would like to access a file on another computer (connected via LAN) while working with safe mode. What should he do?
Latest Answer: The User has to restart the PC and Getting into the Safe mode
What lets us access the shared network folders quickly without having to browse the entire network?
Latest Answer: Go to Start ->Run Type "\ip address" or "\computer name" ... Read Answers (1) | Asked by : kamlesh sharma
Answer Question
Pix Firewall
Subscribe
Answer Question
Routing and Routed protocol
Subscribe
the routers in the network. They distribute routing information to all the routers.Ex: BGP, IGRP. Routed protocols are those which are sent over the network which is routed already. ...
Read Answers (3) | Asked by : kesava7hills
Answer Question
RIPv1 vs. RIPv2
Subscribe
what is the difference between RIPv1 vs. RIPv ?State advantages and disadvantages in detailed. which is better to use?
Latest Answer: RIP v2 supports VLSM with a new field in the header "subnet
mask"Supports authentication with the authentication field in the headerApart from these ,the protocol still remains the same ...
Read Answers (2) | Asked by : arf_arf_arf37
Answer Question
Communication of four routers
Subscribe
A software company owns four branches and Internet connection is available at every branch what will be required to build a Virtual Private Network between them and how it will be done.
View Question | Asked by : Muhammad Ali
Answer Question
LAN Connection
Subscribe
Suppose in a LAN, if one host does not get connection, what problem could have occured?
Latest Answer: Here are some tips check LAN card driver its proper install or
not check LAN card its enable or disable (always enable) check IP address, subnet mask, machine name and work group check LAN security in O/S firewall its stated on higher you ...
Read Answers (4) | Asked by : maung
Answer Question
Domain Controller
Subscribe
that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain. ...
Answer Question
Trust relationship between two different forests
Subscribe
Answer Question
Basic difference between layer2 switch & layer3 switches
Subscribe
functionality. L3 Switches Modify the packet as the packet is passed. L3 Switches can switch based on differented services(like More reliabliability, Less delay) L3 Switches are placed in core ...
Read Answers (2) | Asked by : suneelray
Answer Question
Why the hub placed on layer1(physical layer)?
View Question | Asked by : suneelray
Subscribe
What is Natting, What is Static Natting and Dynamic Natting and how to apply on the traffic?
View Question | Asked by : s_nisarahmed
Answer Question
Latest Technology
Subscribe
Answer Question
What is the difference between simm & dimm
Subscribe
Latest Answer: SIMM Single In Line Memory moduleDIMM Dual In Line Memory
Module ...
Read Answers (1) | Asked by : ravi.kamal2007
Answer Question
Organization Unit
Subscribe
Answer Question
Subscribe
If a computer have an IP address is 10.1.1.5 and subnet mask is 255.255.255.0 then what does it mean.
If a computer have an IP address is 10.1.1.5 and subnet mask is 255.255.255.0 then what does it mean.
Read Answers (2) | Asked by : ravinder singh
Answer Question
What is the difference between IARP and RARP?
Subscribe
Latest Answer: these two are prtocolos which work on the application layer of
Answer Question
Subscribe
Can traceout command work across the firewall? If No then why? If Yes then why?
Latest Answer: Traceroute is based on ICMP type 30 under Windows and UDP
under *NIX; traceroute pacjets that would hit the firewall should be dropped similarly any echo replay coming from inside the firewall should be restricted outbound. The answer: traceroute can ...
Read Answers (2) | Asked by : arun ahuja Tags : Firewall
Answer Question
DHCP Server
Subscribe
If two computers are connected to a dhcp server , How the APIPA will assign to these computers ?.Will it be same IP for two computers? If it is different how it will vary the IP ? On what basis it will
View Question | Asked by : sri
Answer Question
What is the difference between BOOTP and RARP?
Subscribe
Network Interview Questions 1. 2. 3. 4. 5. 6. 7. 8. 9. The Answers: What is MTU? How does TCP handshake work? How does SSL handshake work? What are the different phases in VPN establishment? How does DH (deffie helman) work? What is TCP window sizing? What is the difference between passive FTP and active FTP? What is the difference between socket and session? How does network management station work?
1. How does TCP handshake work? Transmission Control Protocol/Internet Protocol. There are 3 steps. 1. Local device sends sequence number and maximum segment size. 2. Destination device responds by sending its sequence number and maximum segment size back to local device. 3. Local device acknowledges receipt of the sequence number and segment size information. 2. How does SSL handshake work? Secure Sockets Layer. There are 4 steps. 1. Browser checks the certificate to make sure that the site you are connecting to is the real site and not someone intercepting. 2. Determine encryption types that the browser and web site server can both use to understand each other. 3. Browser and Server send each other unique codes to use when scrambling (or encrypting) the information that will be sent. 4. The browser and Server start talking using the encryption, the web browser shows the encrypting icon, and web pages are processed secured. 3. What is the difference between passive FTP and active FTP? FTP is an unusual protocol in that it uses two ports, one for commands and the other for data. (This is one of the reasons it is superior to HTTP for transferring large files.) Active FTP was invented first. The
client initiates a connection on the servers command port. The server then initiates a connection with the client from its data port. In Passive FTP, the client initiates both connections with the server, which remains passive. Active FTP may cause problems if your client is behind a firewall. From the firewalls point of view, the FTP server that is trying to initiate a connection with your client looks like an intruder and is usually blocked. This is why many users have difficulty using FTP to download files from behind a firewall. Passive FTP solves this problem, but creates other problems, notably where FTP server security is concerned. The server must listen on a large number of ports. This requires the firewall to let a lot of unqualified traffic through. Most firewall administrators do not like this. As a rule, you do not need to be concerned about passive and active FTP unless you administer an FTP server or a firewall. If you experience difficulty using your FTP client from behind a firewall, this is likely the reason. Perhaps you should discuss the matter with your firewall administrator. 4. What is the difference between socket and session? 1. An SSL session is a mechanism through which connections can be established by re-using previously negotiated handshakes. 2. A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent. 5. How does network management station work? Network management stations execute management applications which monitor and control network elements. Network elements are devices such as hosts, gateways, terminal servers, and the like, which have management agents responsible for performing the network management functions requested by the network management stations. The Simple Network Management Protocol (SNMP is used to communicate management information between the network management stations and the agents in the network elements. There are a few network management features that may be used to provide network monitoring for this advisory. 1. Device Availability Monitoring 2. SNMP MIB object monitoring 3. Cisco Service Assurance Agent (Cisco SAA) 4. RMON Alarm and Events 5. Event-MIB 6. CiscoWorks RME Network Show Commands and CLI scripting
6. What are the different phases in VPN establishment? Successful VPN establishment consists of two levels of SAs known as phases. Phase 1 authentication establishes session keys. Using the Xauth feature, the client waits for a username/password challenge after the IKE Phase 1 SA has been established. When the end user responds to the challenge, the response is forwarded to the IPsec peers for an additional level of authentication completing Phase 2. 1. Phase 1 of a 2 phase VPN tunnel establishment process. Phase 1 negotiates the security parameter agreement. 2. Phase 2 of 2 phase VPN tunnel establishment process. Phase 2 uses the agreed parameters from Phase 1 to bring the tunnel up. 7. How does DH (deffie helman) work? Diffie-Hellman key agreement was invented in 1976 during a collaboration between Whitfield Diffie and Martin Hellman and was the first practical method for establishing a shared secret over an unprotected communications channel. Based on Ralph Merkles public key cryptosystem. Public key cryptography is a form of cryptography which generally allows users to communicate securely without having prior access to a shared secret key, by using a pair of cryptographic keys, designated as public key and private key, which are related mathematically. 8. What is TCP window sizing? The window size is the maximum number of bytes of data that can be transmitted in one segment. Increasing the window size for a TCP-based file transfer would increase throughput until the slowest link in the path saturates. It would be preferable to have a window size appropriate to the size of the link. There would be less buffering, the ACKs would return more quickly and more of the bandwidth would be used. Ideally you are looking for a Window Size >= Bandwidth * RTT. 9. What is MTU? Maximum Transmission Unit. The greatest amount of data or packet size that can be transferred in one physical frame on a network. This packet also contains the header and trailer information, which are like addresses for each packet that are required by the routers on the network.