Beruflich Dokumente
Kultur Dokumente
A link refers to the connectivity between two devices. It includes the type of cables
and protocols used in order for one device to be able to communicate with the other.
There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport
Layer, Session Layer, Presentation Layer and Application Layer.
4) What is a LAN?
LAN is short for Local Area Network. It refers to the connection between computers
and other network devices that are located within a small physical location.
5) What is a node?
A node refers to a point or joint where a connection takes place. It can be computer
or device that is part of a network. Two or more nodes are needed in order to form a
network connection.
Routers can connect two or more network segments. These are intelligent network
devices that store information in its routing table such as paths, hops and
bottlenecks. With this info, they are able to determine the best path for data transfer.
Routers operate at the OSI Network Layer.
Anonymous FTP is a way of granting user access to files in public servers. Users
that are allowed access to data in these servers do not need to identify themselves,
but instead log in as an anonymous guest.
A subnet mask is combined with an IP address in order to identify two parts: the
extended network address and the host address. Like an IP address, a subnet mask
is made up of 32 bits.
A single segment of UTP cable has an allowable length of 90 to 100 meters. This
limitation can be overcome by using repeaters and switches.
Network Topology refers to the layout of a computer network. It shows how devices
and cables are physically laid out, as well as how they connect to one another.
VPN means Virtual Private Network, a technology that allows a secure tunnel to be
created across a network such as the Internet. For example, VPNs allow you to
establish a secure dial-up connection to a remote server.
NAT is Network Address Translation. This is a protocol that provides a way for
multiple computers on a common network to share single connection to the Internet.
15) What is the job of the Network Layer under the OSI reference model?
The Network layer is responsible for data routing, packet switching and control of
network congestion. Routers operate under this layer.
16) How does a network topology affect your decision in setting up a network?
Network topology dictates what media you must use to interconnect devices. It also
serves as basis on what materials, connector and terminations that is applicable for
the setup.
RIP, short for Routing Information Protocol is used by routers to send data from one
network to another. It efficiently manages routing data by broadcasting its routing
table to all other routers within the network. It determines the network distance in
units of hops.
There are several ways to do this. Install reliable and updated anti-virus program on
all computers. Make sure firewalls are setup and configured properly. User
authentication will also help a lot. All of these combined would make a highly
secured network.
NIC is short for Network Interface Card. This is a peripheral card that is attached to a
PC in order to connect to a network. Every NIC has its own MAC address that
identifies the PC on the network.
The physical layer does the conversion from data bits to electrical signal, and vice
versa. This is where network devices and cable types are considered and setup.
There are four layers: the Network Layer, Internet Layer, Transport Layer and
Application Layer.
23) What are proxy servers and how do they protect computer networks?
Proxy servers primarily prevent external users who identifying the IP addresses of an
internal network. Without knowledge of the correct IP address, even the physical
location of the network cannot be identified. Proxy servers can make a network
virtually invisible to external users.
This layer provides the protocols and means for two devices on the network to
communicate with each other by holding a session. This includes setting up the
session, managing information exchange during the session, and tear-down process
upon termination of the session.
25) What is the importance of implementing a Fault Tolerance System? Are
there limitations?
The 10 refers to the data transfer rate, in this case is 10Mbps. The word Base refers
to base band, as oppose to broad band. T means twisted pair, which is the cable
used for that network.
Private IP addresses are assigned for use on intranets. These addresses are used
for internal networks and are not routable on external public networks. These
ensures that no conflicts are present among internal networks while at the same time
the same range of private IP addresses are reusable for multiple intranets since they
do not see each other.
31) What is the purpose of cables being shielded and having twisted pairs?
MAC, or Media Access Control, uniquely identifies a device on the network. It is also
known as physical address or Ethernet address. A MAC address is made up of 6-
byte parts.
34) What is the equivalent layer or layers of the TCP/IP Application layer in
terms of OSI reference model?
The TCP/IP Application layer actually has three counterparts on the OSI model: the
Session layer, Presentation Layer and Application Layer.
By looking at the first octet of any given IP address, you can identify whether its
Class A, B or C. If the first octet begins with a 0 bit, that address is Class A. If it
begins with bits 10 then that address is a Class B address. If it begins with 110, then
its a Class C network.
OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing
tables to determine the best possible path for data exchange.
Firewalls serve to protect an internal network from external attacks. These external
threats can be hackers who want to steal data or computer viruses that can wipe out
data in an instant. It also prevents other users from external networks from gaining
access to the private network.
Star topology consists of a central hub that connects to nodes. This is one of the
easiest to setup and maintain.
One major disadvantage of star topology is that once the central hub or switch get
damaged, the entire network becomes unusable.
SLIP, or Serial Line Interface Protocol, is actually an old protocol developed during
the early UNIX days. This is one of the protocols that are used for remote access.
Tracert is a Windows utility program that can used to trace the route taken by data
from the router to the destination network. It also shows the number of hops taken
during the entire transmission route.
A network administrator has many responsibilities that can be summarize into 3 key
functions: installation of a network, configuration of network settings, and
maintenance/troubleshooting of networks.
When you are accessing the resources that are shared by one of the workstations on
the network, that workstation takes a performance hit.
A hybrid network is a network setup that makes use of both client-server and peer-
to-peer architecture.
DHCP is short for Dynamic Host Configuration Protocol. Its main task is to
automatically assign an IP address to devices across the network. It first checks for
the next available address not yet taken by any device, then assigns this to a
network device.
The main task of ARP or Address Resolution Protocol is to map a known IP address
to a MAC layer address.
TCP/IP is short for Transmission Control Protocol / Internet Protocol. This is a set of
protocol layers that is designed to make data exchange possible on different types of
computer networks, also known as heterogeneous network.
Routers have built in console that lets you configure different settings, like security
and data logging. You can assign restrictions to computers, such as what resources
it is allowed access, or what particular time of the day they can browse the internet.
You can even put restrictions on what websites are not viewable across the entire
network.
51) What protocol can be applied when you want to transfer files between
different platforms, such between UNIX systems and Windows servers?
Use FTP (File Transfer Protocol) for file transfers between such different servers.
This is possible because FTP is platform independent.
Default gateways provide means for the local networks to connect to the external
network. The default gateway for connecting to the external network is usually the
address of the external router port.
53) One way of securing a network is through the use of passwords. What can
be considered as good passwords?
Good passwords are made up of not just letters, but by combining letters and
numbers. A password that combines uppercase and lowercase letters is favorable
than one that uses all upper case or all lower case letters. Passwords must be not
words that can easily be guessed by hackers, such as dates, names, favorites, etc.
Longer passwords are also better than short ones.
The proper termination for unshielded twisted pair network cable is 100 ohms.
Netstat is a command line utility program. It provides useful information about the
current TCP/IP settings of a connection.
For a Class C network, the number of usable Network ID bits is 21. The number of
possible network IDs is 2 raised to 21 or 2,097,152. The number of host IDs per
network ID is 2 raised to 8 minus 2, or 254.
57) What happens when you use cables longer than the prescribed length?
Cables that are too long would result in signal loss. This means that data
transmission and reception would be affected, because the signal degrades over
length.
Ping is a utility program that allows you to check connectivity between network
devices on the network. You can ping a device by using its IP address or device
name, such as a computer name.
Peer to peer are networks that does not reply on a server. All PCs on this network
act as individual workstations.
DNS is Domain Name System. The main function of this network service is to
provide host names to TCP/IP address resolution.
63) What advantages does fiber optics have over other media?
A hub acts as a multiport repeater. However, as more and more devices connect to
it, it would not be able to efficiently manage the volume of traffic that passes through
it. A switch provides a better alternative that can improve the performance especially
when high traffic volume is expected across all ports.
65) What are the different network protocols that are supported by Windows
RRAS services?
There are three main network protocols supported: NetBEUI, TCP/IP, and IPX.
66) What are the maximum networks and hosts in a class A, B and C network?
For Class A, there are 126 possible networks and 16,777,214 hosts
For Class B, there are 16,384 possible networks and 65,534 hosts
For Class C, there are 2,097,152 possible networks and 254 hosts
68) What protocols fall under the Application layer of the TCP/IP stack?
The following are the protocols under TCP/IP Application layer: FTP, TFTP, Telnet
and SMTP.
69) You need to connect two computers for file sharing. Is it possible to do this
without using a hub or router?
Yes, you can connect two computers together using only one cable. A crossover
type cable can be use in this scenario. In this setup, the data transmit pin of one
cable is connected to the data receive pin of the other cable, and vice versa.
70) What is ipconfig?
Networking refers to the inter connection between computers and peripherals for
data communication. Networking can be done using wired cabling or through
wireless link.
74) When you move the NIC cards from one PC to another PC, does the MAC
address gets transferred as well?
Yes, thats because MAC addresses are hard-wired into the NIC circuitry, not the
PC. This also means that a PC can have a different MAC address when the NIC
card was replace by another one.
76) In a network that contains two servers and twenty workstations, where is
the best place to install an Anti-virus program?
Ethernet is one of the popular networking technologies used these days. It was
developed during the early 1970s and is based on specifications as stated in the
IEEE. Ethernet is used in local area networks.
78) What are some drawbacks of implementing a ring topology?
In case one workstation on the network suffers a malfunction, it can bring down the
entire network. Another drawback is that when there are adjustments and
reconfigurations needed to be performed on a particular part of the network, the
entire network has to be temporarily brought down as well.
SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all Internal
mail, and provides the necessary mail delivery services on the TCP/IP protocol
stack.
IP addresses are displayed as a series of four decimal numbers that are separated
by period or dots. Another term for this arrangement is the dotted decimal format. An
example is 192.168.101.2
Authentication is the process of verifying a users credentials before he can log into
the network. It is normally performed using a username and password. This provides
a secure means of limiting the access from unwanted intruders on the network.
This is a mode of data exchange wherein two communicating computers do not use
IPSec themselves. Instead, the gateway that is connecting their LANs to the transit
network creates a virtual tunnel that uses the IPSec protocol to secure all
communication that passes through it.
86) What are the different technologies involved in establishing WAN links?
In the event that one link fails, there will always be another available. Mesh topology
is actually one of the most fault-tolerant network topology.
A common way of dealing with such a problem is to use repeaters and hub, because
it will help regenerate the signal and therefore prevent signal loss. Checking if cables
are properly terminated is also a must.
Instead of having to visit each client computer to configure a static IP address, the
network administrator can apply dynamic host configuration protocol to create a pool
of IP addresses known as scopes that can be dynamically assigned to clients.
Profiles are the configuration settings made for each user. A profile may be created
that puts a user in a group, for example.
There are 4 protocols that are being managed by this layer. These are ICMP, IGMP,
IP and ARP.
Rights refer to the authorized permission to perform specific actions on the network.
Each user on the network can be assigned individual rights, depending on what must
be allowed for that user.
96) What is one basic requirement for establishing VLANs?
A VLAN is required because at switch level there is only one broadcast domain, it
means whenever new user is connected to switch this information is spread
throughout the network. VLAN on switch helps to create separate broadcast domain
at switch level. It is used for security purpose.
IPv6 , or Internet Protocol version 6, was developed to replace IPv4. At present, IPv4
is being used to control internet traffic, butis expected to get saturated in the near
future. IPv6 was designed to overcome this limitation.
Mesh topology is a setup wherein each device is connected directly to every other
device on the network. Consequently, it requires that each device have at least two
network connections.
The maximum allowable length for a network segment using 100Base-FX is 412
meters. The maximum length for the entire network is 5 kilometers.
St1. What are the two types of transmission technology available?
(i) Broadcast and (ii) point-to-point
2. What is subnet?
A generic term for section of a large networks usually separated by a bridge
or router.
4. What is SAP?
Series of interface points that allow other computers to communicate with
the other layers of network protocol stack.
7. What is Brouter?
Hybrid devices that combine the features of both bridges and routers.
17. What are the data units at different layers of the TCP / IP protocol suite?
The data unit created at the application layer is called a message, at the
transport layer the data unit created is called either a segment or an user
datagram, at the network layer the data unit created is called the datagram,
at the data link layer the datagram is encapsulated in to a frame and finally
transmitted as signals along the transmission media.
19. What is the minimum and maximum length of the header in the TCP
segment and IP datagram?
The header should have a minimum length of 20 bytes and can have a
maximum length of 60 bytes.
21. What is the difference between TFTP and FTP application layer
protocols?
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files
from a remote host but does not provide reliability or security. It uses the
fundamental packet delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by
TCP / IP for copying a file from one host to another. It uses the services offer
by TCP and so is reliable and secure. It establishes two connections (virtual
circuits) between the hosts, one for data transfer and another for control
information.
Firewalls
A network firewall guards a computer against unauthorized network access.
Firewalls are one of the essential elements of a safe home or business
network.
OSI model
Transport additional connection below the session layer TCP, ARP, RARP; Gateway
manages the flow control of data between parties SPX Advanced Cable
packets; flow
across the network Tester
control & error- NWLink
divides streams of data into chunks or packets; the Brouter
handling NetBIOS / NetBEUI
transport layer of the receiving computer
reassembles the message from packets
ATP
"train" is a good analogy => the data is divided into
identical units
provides error-checking to guarantee error-free
data delivery, with on losses or duplications
provides acknowledgment of successful
transmissions; requests retransmission if some
packets dont arrive error-free
provides flow control and error-handling
Network translates logical network address and names to IP; ARP; RARP, ICMP; Brouter
their physical address (e.g. computername ==> RIP; OSFP; Router
addressing; MAC address)
IGMP; Frame Relay
routing responsible for
IPX Device
o addressing
o determining routes for sending
NWLink ATM Switch
o managing network problems such as NetBEUI Advanced Cable
packet switching, data congestion and OSI Tester
routing
if router cant send data frame as large as the DDP
source computer sends, the network layer DECnet
compensates by breaking the data into smaller
units. At the receiving end, the network layer
reassembles the data
think of this layer stamping the addresses on each
train car
Data Link turns packets into raw bits 100101 and at the Logical Link Control Bridge
receiving end turns bits into packets. error correction and flow Switch
data frames to bits
handles data frames between the Network and control
ISDN Router
Physical layers manages link control and
the receiving end packages raw data from the defines SAPs Intelligent Hub
Physical layer into data frames for delivery to the
802.1 OSI Model NIC
Network layer
responsible for error-free transfer of frames to other 802.2 Logical Link Control Advanced Cable
computer via the Physical Layer Tester
this layer defines the methods used to transmit and
receive data on the network. It consists of the
wiring, the devices use to connect the NIC to the
wiring, the signaling involved to transmit / receive
data and the ability to detect signaling errors on
the network media
Physical transmits raw bit stream over physical cable IEEE 802 Repeater
defines cables, cards, and physical aspects IEEE 802.2 Multiplexer
hardware; raw bit
stream defines NIC attachments to hardware, how cable is ISO 2110 Hubs
attached to NIC
ISDN Passive
defines techniques to transfer bit stream to cable
Active
TDR
Oscilloscope
Amplifier
Layer 1 - Physical
Physical layer defines the cable or physical medium itself, e.g., thinnet,
thicknet, unshielded twisted pairs (UTP). All media are functionally
equivalent. The main difference is in convenience and cost of installation and
maintenance. Converters from one media to another operate at this level.
Layer 2 - Data Link
Data Link layer defines the format of data on the network. A network data
frame, aka packet, includes checksum, source and destination address, and
data. The largest packet that can be sent through a data link layer defines
the Maximum Transmission Unit (MTU). The data link layer handles the
physical and logical connections to the packet's destination, using a network
interface. A host connected to an Ethernet would have an Ethernet interface
to handle connections to the outside world, and a loopback interface to send
packets to itself.
Ethernet addresses a host using a unique, 48-bit address called its Ethernet
address or Media Access Control (MAC) address. MAC addresses are
usually represented as six colon-separated pairs of hex digits, e.g.,
8:0:20:11:ac:85. This number is unique and is associated with a particular
Ethernet device. Hosts with multiple network interfaces should use the same
MAC address on each. The data link layer's protocol-specific header
specifies the MAC address of the packet's source and destination. When a
packet is sent to all hosts (broadcast), a special MAC address (ff:ff:ff:ff:ff:ff)
is used.
Layer 3 - Network
NFS uses Internetwork Protocol (IP) as its network layer interface. IP is
responsible for routing, directing datagrams from one network to another.
The network layer may have to break large datagrams, larger than MTU, into
smaller packets and host receiving the packet will have to reassemble the
fragmented datagram. The Internetwork Protocol identifies each host with a
32-bit IP address. IP addresses are written as four dot-separated decimal
numbers between 0 and 255, e.g., 129.79.16.40. The leading 1-3 bytes of
the IP identify the network and the remaining bytes identifies the host on that
network. The network portion of the IP is assigned by InterNIC Registration
Services, under the contract to the National Science Foundation, and the
host portion of the IP is assigned by the local network administrators. For
large sites, the first two bytes represents the network portion of the IP, and
the third and fourth bytes identify the subnet and host respectively.
Even though IP packets are addressed using IP addresses, hardware
addresses must be used to actually transport data from one host to another.
The Address Resolution Protocol (ARP) is used to map the IP address to it
hardware address.
Layer 4 - Transport
Transport layer subdivides user-buffer into network-buffer sized datagrams
and enforces desired transmission control. Two transport protocols,
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP),
sits at the transport layer. Reliability and speed are the primary difference
between these two protocols. TCP establishes connections between two
hosts on the network through 'sockets' which are determined by the IP
address and port number. TCP keeps track of the packet delivery order and
the packets that must be resent. Maintaining this information for each
connection makes TCP a stateful protocol. UDP on the other hand provides
a low overhead transmission service, but with less error checking. NFS is
built on top of UDP because of its speed and statelessness. Statelessness
simplifies the crash recovery.
Layer 5 - Session
The session protocol defines the format of the data sent over the
connections. The NFS uses the Remote Procedure Call (RPC) for its session
protocol. RPC may be built on either TCP or UDP. Login sessions uses TCP
whereas NFS and broadcast use UDP.
Layer 6 - Presentation
External Data Representation (XDR) sits at the presentation level. It converts
local representation of data to its canonical form and vice versa. The
canonical uses a standard byte ordering and structure packing convention,
independent of the host.
Layer 7 - Application
Provides network services to the end-users. Mail, ftp, telnet, DNS, NIS, NFS
are examples of network applications.
The OSI Model Stack
The OSI model divides the complex task of computer-to-computer
communications, traditionally called internetworking, into a series of stages
known as layers. Layers in the OSI model are ordered from lowest level to
highest. Together, these layers comprise the OSI stack. The stack contains
seven layers in two groups:
Upper layers 7. application 6. presentation 5. session
Lower layers - 4. transport 3. network 2. data link 1. physical
Benefits of the OSI Model
By separating the network communications into logical smaller pieces, the
OSI model simplifies how network protocols are designed. The OSI model
was designed to ensure different types of equipment (such as
network adapters, hubs, and routers) would all be compatible even if built by
different manufacturers. A product from one network equipment vendor that
implements OSI Layer 2 functionality, for example, will be much more likely
to interoperate with another vendor's OSI Layer 3 product because both
vendors are following the same model.
The OSI model also makes network designs more extensible as new
protocols and other network services are generally easier to add to a layered
architecture than to a monolithic one.
What Is a MAC Address?
The MAC address is a unique value associated with a network adapter. MAC
addresses are also known as hardware addresses or physical addresses.
They uniquely identify an adapter on a LAN.
MAC addresses are 12-digit hexadecimal numbers (48 bits in length). By
convention, MAC addresses are usually written in one of the following two
formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
The first half of a MAC address contains the ID number of the adapter
manufacturer. These IDs are regulated by an Internet standards body (see
sidebar). The second half of a MAC address represents the serial number
assigned to the adapter by the manufacturer. In the example,
00:A0:C9:14:C8:29
The prefix
00A0C9
indicates the manufacturer is Intel Corporation.
MAC vs. IP Addressing
Whereas MAC addressing works at the data link layer, IP addressing
functions at the network layer (layer 3). It's a slight oversimplification, but one
can think of IP addressing as supporting the software implementation and
MAC addresses as supporting the hardware implementation of the network
stack. The MAC address generally remains fixed and follows the network
device, but the IP address changes as the network device moves from one
network to another.
IP networks maintain a mapping between the IP address of a device and its
MAC address. This mapping is known as the ARP cache or ARP
table. ARP, the Address Resolution Protocol, supports the logic for obtaining
this mapping and keeping the cache up to date.
DHCP also usually relies on MAC addresses to manage the unique
assignment of IP addresses to devices.
artViva Questions
1. What are functions of different layers?
Functions of each Layer:
Physical Layer(Layer 1):This layer defines the physical and electrical
characteristics of the network. Helps to pass strings(data) of ones and zeros
down the wire.
Device:Hub, NIC, Repeater.. etc
Network Layer:
Layer 3 is the Network Layer, providing a means for communicating open
systems to establish, maintain and terminate network connections.
Device:Router
Transport Layer:
The main function of this Layer is to ensure data reliability and integrity.
Session Layer:
It provides two communicating presentation entities to exchange data with
eachother.
Presentation Layer:
Application data is either unpacked or packed only in this layer. Protocol
conversions, encryption/decryption and graphics expansion all takes place here.
Application Layer:
This is where you find your end-user and end-application protocols, such as
telnet, ftp, and mail(pop3 and smtp).
2. Differentiate between TCP/IP Layers and OSI Layers
The Session layer permits two parties to hold ongoing communications called a
session across a network.
Not found in TCP/IP model
In TCP/IP,its characteristics are provided by the TCP protocol.
(Transport Layer)
The Presentation Layer handles data format information for networked
communications. This is done by converting data into a generic format that
could be understood by both sides.
Not found in TCP/IP model
In TCP/IP, this function is provided by the Application Layer.
e.g. External Data Representation Standard (XDR)
Multipurpose Internet Mail Extensions (MIME)
The Application Layer is the top layer of the reference model. It provides a set
of interfaces for applications to obtain access to networked services as well as
access to the kinds of network services that support applications directly.
OSI- FTAM,VT,MHS,DS,CMIP
TCP/IP- FTP,SMTP,TELNET,DNS,SNMP
Although the notion of an application process is common to both, their
approaches to constructing application entities is different
TRANSPORT LAYER
OSI
It takes the information to be sent and breaks it into individual packets that are
sent and reassembled into a complete message by the Transport Layer at the
receiving node
Transport Layer protocols include the capability to acknowledge the receipt of a
packet; if no acknowledgement is received, the Transport Layer protocol can
retransmit the packet or time-out the connection and signal an error
TCP
Defines two standard transport protocols: TCP and UDP
TCP implements a reliable data-stream protocol
connection oriented
UDP implements an unreliable data-stream
connectionless
TCP is responsible for data recovery
by providing a sequence number with each packet that it sends
TCP requires ACK (ackowledgement) to ensure correct data is received
Packet can be retransmitted if error detected
NETWORK LAYER
Like all the other OSI Layers, the network layer provides both connectionless
and connection-oriented services. As for the TCP/IP architecture, the internet
layer is exclusively connectionless.
3. Why header is required?
(answer below)
4. What is the use of adding header and trailer to frames?
IP Header Length (number of 32 -bit words forming the header, usually five)
(DSCP) (usually set to 0, but may indicate particular Quality of Service needs
from the network, the DSCP defines the way routers should queue packets
while they are waiting to be forwarded).
Size of Datagram (in bytes, this is the combined length of the header and the
data)
Identification ( 16-bit number which together with the source address
whether routers are allowed to fragment a packet (i.e. the Don't Fragment,
DF, flag), and to indicate the parts of a packet to the receiver)
Fragmentation Offset (a byte count from the start of the original sent packet,
set by any router which performs IP router fragmentation)
Time To Live (Number of hops /links which the packet may be routed over,
Options (not normally used, but, when used, the IP header length will be
greater than five 32-bit words to indicate the size of the options field)
5. What is encapsulation?
Packets larger than the allowable MTU must be divided into multiple smaller
packets, or fragments, to enable them to traverse the network.
6. What is MTU?
In computer networking, the maximum transmission unit (MTU) of a
layer of a communications protocol is the size (in bytes) of the
largest protocol data unit that it can pass onwards. MTU parameters
usually appear in association with a communications interface
(NIC, serial port, etc.). The MTU may be fixed by standards (as is the
case with Ethernet) or decided at connect time (as is usually the case
with point-to-point serial links). A higher MTU brings greater efficiency
because each packet carries more user data while protocol overheads,
such as headers or underlying per-packet delays remain fixed, and
higher efficiency means a slight improvement in bulk protocol
throughput.
7. Which layer imposes MTU?
Layer 2 (Data Link Layer)
Flow control mean preventing the source from sending data that thesink
will end up dropping because it runs out of buffer space.
This is fairly easy with a sliding window protocol--just make surethe
source's window is no larger than the free space in the sink's buffer. TCP
does this by letting the sink advertise its free buffer
space in the window field of the acks.
In a connection-oriented network:
In a connectionless network:
6 Presentation
XDR, ASN.1, SMB, AFP, NCP, MIDI, HTML, GIF, TIFF, JPEG,
ASCII, EBCDIC
5 Session
TLS, SSH, X.225, RPC, NetBIOS, ASP, Winsock, BSD
4 Transport
TCP, UDP, RTP, SCTP, SPX, ATP
Gateway, Advanced Cable Tester, Brouter
3 Network
IP, ICMP, IGMP, BGP, OSPF, RIP, IGRP, EIGRP, ARP, RARP,
X.25, NETBEUI
Brouter, Router, Frame Relay Device, ATM Switch, Advanced
Cable Tester, DDP
2 Data Link
Ethernet, Token ring, StarLAN, HDLC, Frame relay, ISDN, ATM,
802.11 WiFi, FDDI, PPP, Bridge, Switch, ISDN Router, Intelligent
Hub, NIC, Advanced Cable Tester, ARCNET, LocalTalk, FDDI,
ATM. NIC Drivers: Open Datalink Interface (ODI), Network
Independent Interface Specification (NDIS)
1 Physical
NIC, Twisted Pair, Coax, Fiber Optic, Wireless Media, Repeater,
Multiplexer, Hubs, (Passive/Active), TDR, Oscilloscope,
Amplifier, Carrier pigeon
TCP LAYERS
4 Application (OSI - Layers5 through 7)
HTTP, FTP, DNS
(Routing protocols like BGP and RIP, which for a variety of
reasons run over TCP and UDP respectively, may also be
considered part of the Internetwork layer)
Connection Oriented
Connection-Oriented means that when devices communicate, they perform
handshaking to set up an end-to-end connection. The handshaking process may be
as simple as syncrhonization such as in the transport layer protocol TCP, or as
complex as negotiating communications parameters as with a modem.
Connection-Oriented systems can only work in bi-directional communications
environments. To negotiate a connection, both sides must be able to communicate
with each other. This will not work in a unidirectional environment.
Connectionless
Connectionless means that no effort is made to set up a dedicated end-to-end
connection.
Connectionless communication is usually achieved by transmitting information in
one direction, from source to destination without checking to see if the destination
is still there, or if it is prepared to receive the information. When there is little
interferance, and plenty of speed available, these systems work fine. In
environments where there is difficulty transmitting to the destination, information
may have to be re-transmitted several times before the complete message is
received.
Walkie-talkies, or Citizens Band radios are a good examples of connectionless
communication. You speak into the mike, and the radio transmitter sends out your
signal. If the person receiving you doesn't understand you, there's nothing his radio
can do to correct things, the receiver must send you a message back to repeat your
last message.
IP, UDP, ICMP, DNS, TFTP and SNMP are examples of connectionless protocols
in use on the Internet.
ssize_t send(int socket, const void *buffer, size_t length, int flags);
The send() function shall initiate transmission of a message from the
specified socket to its peer. The send() function shall send a message
only when the socket is connected (including when the peer of a
connectionless socket has been set via connect()).
System calls for low level file I/O <map name="boxmap-p8"> <area
shape="RECT" coords="14, 200, 103, 207"
href="http://rcm.amazon.com/e/cm/privacy-policy.html?o=1"> <area
coords="0,0,10000,10000"
href="http://www.amazon.com/exec/obidos/redirect-
home/ref=nikolaibezroukov"> </map> <img src="http://rcm-
images.amazon.com/images/G/01/rcm/120x240.gif" width="120"
height="240" border="0" usemap="#boxmap-p8" alt="Shop at
Amazon.com">
System calls for low level file I/O
o creat(name, permissions)
o open(name, mode)
o close(fd)
o unlink(fd)
o read(fd, buffer, n_to_read)
o write(fd, buffer, n_to_write)
o lseek(fd, offest, whence)
System Calls for process control
o fork()
o wait()
o exit()
o signal(sig, handler)
o kill(sig, pid)
o dup(fd)
FC Fire codes
BCH Bose-Chaudhuri-Hocquenghem
RS Reed-Solomon
HC Hamming codes
Turbo Codes
Golay
35. What is difference between CRC and Hamming code?
Prim always joins a "new" vertex to an "old" vertex, so that every stage
is a tree. Kruskal's allows both "new" to "new" and "old" to "old" to get
connected, so it risks creating a circuit and must check for them every
time. So Kruskal's has a larger complexity than Prim.
43. What are Routing algorithms?
Routers use routing algorithms to find the best route to a
destination. Routing (or routeing) is the process of selecting paths in a
network along which to send network traffic.
44. How do you classify routing algorithms? Give examples
for each.
View: global or local
global: graph of entire network (routers, links). [link state]. eg.
Dijkstra shortest path algorithm.
local: partial knowledge of remote parts of network. [distance
vector approach] eg.Bellman-Ford routing algorithms and Ford-
Fulkerson routing algorithms
Centralized or decentralized
Centralized:one node maintains view, and distributes routes to
other nodes
Decetralized:all nodes maintain view
Static or dynamic?
Static: infrequent route changes,infrequent view update; static link
costs (e.g. up/down)
Partial solutions
RIP uses Split Horizon with Poison Reverse technique to reduce the
chance of forming loops and use a maximum number of hops to counter
the count-to-infinity problem. These measures avoid the formation of
routing loops in some, but not all, cases. The addition of a hold time
(refusing route updates for a few minutes after a route retraction) avoids
loop formation in virtually all cases, but causes a significant increase in
convergence times.
A number of loop-free distance vector protocols, such as EIGRP and
DSDV, have been developed. These avoid loop formation in all cases,
but suffer from increased complexity, and their deployment has been
slowed down by the success of link-state protocols such as OSPF.
48. What is cryptography?
Cryptography can be defined as the conversion of data into a scrambled
code that can be deciphered and sent across a public or private network.
Cryptography uses two main styles or forms of encrypting data;
symmetrical and asymmetrical. Symmetric encryptions, or algorithms,
use the same key for encryption as they do for decryption. Other names
for this type of encryption are secret-key, shared-key, and private-key.
The encryption key can be loosely related to the decryption key; it does
not necessarily need to be an exact copy.
Symmetric cryptography is susceptible to plain text attacks and linear
cryptanalysis meaning that they are hackable and at times simple to
decode. With careful planning of the coding and functions of the
cryptographic process these threats can be greatly reduced. Asymmetric
cryptography uses different encryption keys for encryption and
decryption. In this case an end user on a network, public or private, has
a pair of keys; one for encryption and one for decryption. These keys are
labeled or known as a public and a private key; in this instance the
private key cannot be derived from the public key.
The asymmetrical cryptography method has been proven to be secure
against computationally limited intruders. The security is a mathematical
definition based upon the application of said encryption. Essentially,
asymmetric encryption is as good as its applied use; this is defined by
the method in which the data is encrypted and for what use. The most
common form of asymmetrical encryption is in the application of sending
messages where the sender encodes and the receiving party decodes
the message by using a random key generated by the public key of the
sender.
49. How do you classify cryptographic algorithms?
(refer above)
50. What is public key?
The key used to encrypt a message is not the same as the key used
to decrypt it. Each user has a pair of cryptographic keys a public
key and a private key. The private key is kept secret, whilst the public
key may be widely distributed. Messages are encrypted with the
recipient's public key and can only be decrypted with the corresponding
private key. The keys are related mathematically, but the private key
cannot be feasibly (ie, in actual or projected practice) derived from the
public key.
This is used in asymmetric cryptography.
Coordinator
The Coordinator program has the following four tasks: 1) processing the
commands
sent from Dispatcher; 2) forking (creating) a simulation engine process
to perform
a simulation; 3) reporting the status of the created simulation engine
process to
the Dispatcher program; and 4) collecting the simulation results
produced by its
created simulation engine process and sending them to the GUI
program. Before
starting any simulation on a simulation server, one should first run up a
Coordinator
program on it.
nctunsclient
NCTUns provides a front-end GUI program (called nctunsclientin its
package),
which provides useful facilities for users to efficiently create simulation
and
emulation cases. According to users common needs, it groups the
operations
of generating a simulation/emulation case into four modes, which are
briefly
introduced here.
a) The Draw Topology mode:
In this mode, one can insert network nodes, create network links, and
specify
the locations and moving paths of mobile nodes. In addition, the GUI
program
provides a complete tool kit for users to construct road networks, which
is fundamental to wireless vehicular network simulations, where many
P2P
researchers are proposing to run P2P applications.
b) The Edit Property mode:
In this mode, one can double-click the icon of a network node to
configure its
properties (e.g., the network protocol stack used in this node, the
applications
to be run on this node during simulation, and other parameters).
c) The Run Simulation mode:
In this mode, the GUI program provides users with a complete set of
commands to start/pause/stop a simulation. One can easily control the
progress of a simulation by simply pressing a button on the GUI control
panel.
d) The Play Back mode:
After a simulation is finished, the GUI program will automatically switch
itself
into the Play Back mode and read the packet trace file generated
during the
simulation. In this mode, one can use the GUI program to replay a
nodes
packet transmission/reception operations in an animated manner.
75. Which address gets affected if a system moves from one
place to another place?
ipaddress
76. What is ICMP? What are uses of ICMP? Name few.
The Internet Control Message Protocol (ICMP) is one of the core
protocols of the Internet Protocol Suite. It is chiefly used by networked
computers' operating systems to send error messagesindicating, for
instance, that a requested service is not available or that a host or router
could not be reached.
ICMP[1] relies on IP to perform its tasks, and it is an integral part of IP. It
differs in purpose from transport protocols such as TCP and UDP in that
it is typically not used to send and receive data between end systems. It
is usually not used directly by user network applications, with some
notable exceptions being the ping tool and traceroute.
79. Which layer implements security for data?
Transport Layer:
The main function of this Layer is to ensure data reliability and integrity.
Presentation Layer:
Application data is either unpacked or packed only in this layer. Protocol
conversions, encryption/decryption and graphics expansion all takes place here.