Professional Documents
Culture Documents
COMPUTER NETWORKS:
Resource sharing: A network is needed because of the desire to make all programs,
data, and equipment available to anyone on the network without regard to the
physical location of the resource and the user. Load sharing is another aspect of
resource sharing.
High reliability: A network may have alternative sources of supply (e.g.,
replicated files, multiple CPUs, etc.). In case of one resource failure, the
others could be used and the system continues to operate at reduced
performance. This is a very important property for military, banking, air
Traffic control and many other applications.
Saving money: A network may consist of many powerful small computers, one per
user, with data kept on one or more shared file server machines, which offers a
much better price/performance ratio than mainframes.
File sharing: A network makes it easy for everyone to access the same file and
prevents people from accidentally creating different versions.
Printer sharing: If you use a computer, chances are you also use a printer. With a
network, several computers can share the same printer. Although you might need a
more expensive printer to handle the added workload, it's still cheaper to use a
network printer than to connect a separate printer to every
Computer in your office.
Communication and collaboration: It's hard for people to work together if no one
knows what anyone else is doing. A network allows employees to share files, view
other people's work, and exchange ideas more efficiently. In a larger office, you
can use e-mail and instant messaging tools to
Communicate quickly and to store messages for future reference.
Page 2 of 30
QUESTIONS:
38. What is the difference between routable and non- routable protocols?
39. Why should you care about the OSI Reference Model?
40. What is logical link control?
41. What is virtual channel?
42. What is virtual path?
43. What is packet filter?
44. What is traffic shaping?
45. What is multicast routing?
46. What is region?
47. What is silly window syndrome?
48. What are Digrams and Trigrams?
49. Expand IDEA.
50. What is wide-mouth frog?
51. What is Mail Gateway?
52. What is IGP (Interior Gateway Protocol)?
53. What is EGP (Exterior Gateway Protocol)?
54. What is autonomous system?
55. What is BGP (Border Gateway Protocol)?
56. What is Gateway-to-Gateway protocol?
57. What is NVT (Network Virtual Terminal)?
58. What is a Multi-homed Host?
59. What is Kerberos?
60. What is OSPF?
61. What is Proxy ARP?
62. What is SLIP (Serial Line Interface Protocol)?
63. What is RIP (Routing Information Protocol)?
64. What is source route?
65. What is (Wireless / Computer) Networking?
66. What Is the Difference Between Bits and Bytes?
67. What is a topology?
68. What are the three most common LAN architectures?
69. What is a server device?
70. What is the function of the network layer (layer3) in the OSI Reference Model?
71. Briefly discuss TCP and UDP
72. What is firewall?
73. What is the difference between TCP/IP and Ethernet?
74. How is Intranet different from the Internet?
75. Is an Intranet faster than getting data over the Internet?
76. What are the steps that you can take to develop a security policy for your
company network?
77. What is VPN technology?
78. Name one important feature of IPv6
79. How does the Ethernet Standard ensure non-simultaneous transmission?
80. What is the main function of TRANSPORT layer?
Page 4 of 30
Answer true or false to the following questions and briefly justify your
answer:
181. With the SR protocol, it is possible for the sender to receive an ACK for a
packet that falls outside of its current window.
182. With GBN, it is possible for the sender to receive an ACK for a packet that falls
outside of its current window.
183. The alternating bit protocol is the same as the SR protocol with a sender and
receiver window size of 1.
184. The alternating bit protocol is the same as the GBN protocol with a
sender and receiver window size of
Page 7 of 30
190.Which layer of the OSI model converts data into a generic format
for network transmission?
a).Transport layer b).Session layer c).presentation layer
d).Application layer
191.Which layer of the OSI model manages flow control and error
correction?
a).Transport layer b).Session layer c).Network layer d).Physical
layer
192. Whichlayer of the OSI model establishes the route between the
sending and receiving computer?
a).Transport layer b).Session layer c).Network layer d).Physical
layer
193.In which OSI model layer does the Media Access Control
sublayer reside?
a).Transport layer b).Network layer c).DataLink layer d).Physical layer
197. Both STUN and TURN can only be used for UDP and never for TCP.
(True/False)
198. Once a new client receives the IP address after the DHCPOFFER, the
client should verify no other hosts are using that IP address. (True/False)
5. Series of interface points that allow other computers to communicate with the
other layers of network protocol stack.
7. Frame relay is a packet switching technology. It will operate in the data link
layer.
10. Redirector is software that intercepts file or prints I/O requests and
translates them into network requests. This comes under presentation layer.
11. NETBIOS is a programming interface that allows I/O requests to be sent to and
received from a remote computer and it hides the networking hardware from
applications. NETBEUI is NetBIOS extended user interface. A transport protocol
designed by Microsoft and IBM for the use on small subnets.
12. A method for providing fault tolerance by using multiple hard disk drives
13. When the computers on the network simply listen and receive the signal, they
are referred to as passive because they don’t amplify the signal in any way.
Example for passive topology - linear bus.
14. Hybrid devices that combine the features of both bridges and routers.
15. A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
17. A gateway operates at the upper levels of the OSI model and translates
information between two completely different network architectures or data formats
.
19. The address for a device as it is identified at the Media Access Control (MAC)
layer in the network architecture. MAC address is usually stored in ROM on the
network adapter card and is unique.
20. Bit rate is the number of bits transmitted during one second whereas baud rate
refers to the number of signal units per second that are required to
represent those bits.
baud rate = bit rate / N where N is no-of-bits represented by each signal
shift.
21. Every line has an upper limit and a lower limit on the frequency of
signals it can carry. This limited range is called the bandwidth.
Page 10 of 30
22. Signals are usually transmitted over some transmission media that are
broadly classified in to two categories. a) Guided Media:
These are those that provide a conduit from one device to another that
include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along
any of these media is directed and is contained by the physical limits of the
medium. Twisted-pair and coaxial cable use metallic that accept and transport
signals in the form of electrical current. Optical fiber is a glass or plastic cable that
accepts and transports signals in the form of light.
b) Unguided Media:
This is the wireless media that transport electromagnetic waves without using
a physical conductor. Signals are broadcast either through air. This is done through
radio communication, satellite communication and cellular telephony.
24. The data unit in the LLC level is called the protocol data unit (PDU). The PDU
contains of four fields a destination service access point (DSAP), a source
service access point (SSAP), a control field and an information field. DSAP, SSAP are
addresses used by the LLC to identify the protocol stacks on the receiving and
sending machines that are generating and using the data. The control field
specifies whether the PDU frame is a information frame (I - frame) or a
supervisory frame (S - frame) or a unnumbered frame (U - frame).
25. Repeater:
Also called a regenerator, it is an electronic device that operates only at
physical layer. It receives the signal in the network before it becomes weak,
regenerates the original bit pattern and puts the refreshed copy back in to the link.
Bridges:
These operate both in the physical and data link layers of LANs of same
type. They divide a larger network in to smaller segments. They contain logic
that allow them to keep the traffic for each segment separate and thus are
repeaters that relay a frame only the side of the segment containing the
intended recipient and control congestion.
Routers:
They relay packets among multiple interconnected networks (i.e. LANs of
different type). They operate in the physical, data link and network layers. They
contain software that enable them to determine which of the several possible
paths is the best for a particular transmission.
Gateways:
Page 11 of 30
They relay packets among networks that have different protocols (e.g.
between a LAN and a WAN). They accept a packet formatted for one
protocol and convert it to a packet formatted for another protocol before
forwarding it. They operate in all seven layers of the OSI model.
26. ICMP is Internet Control Message Protocol, a network layer protocol of the
TCP/IP suite used by hosts and gateways to send notification of datagram
problems back to the sender. It uses the echo test / reply to test whether a
destination is reachable and responding. It also handles both
control and error messages.
27. The data unit created at the application layer is called a message, at the
transport layer the data unit created is called either a segment or an user
datagram, at the network layer the data unit created is called the datagram, at the
data link layer the datagram is encapsulated in to a frame and finally
transmitted as signals along the transmission media.
28. The address resolution protocol (ARP) is used to associate the 32 bit IP
address with the 48 bit physical address, used by a host or a router to find the
physical address of another host on its network by sending a ARP query
packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet
address when it knows only its physical address.
29. The header should have a minimum length of 20 bytes and can have a
maximum length of 60 bytes.
31. The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files
from a remote host but does not provide reliability or security. It uses the
fundamental packet delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP
for copying a file from one host to another. It uses the services offer by TCP
and so is reliable and secure. It establishes two connections (virtual circuits)
between the hosts, one for data transfer and another for control information.
33.BUS topology:
In this each computer is directly connected to primary network cable in a
single line.
Advantages:
Inexpensive, easy to install, simple to understand, easy to extend.
STAR topology:
In this all computers are connected using a central hub.
Advantages:
Can be inexpensive, easy to install and reconfigure and easy to trouble shoot
physical problems.
RING topology:
In this all computers are connected in loop.
Advantages:
All computers have equal access to network media, installation can be
simple, and signal does not degrade as much as in other topologies because each
computer regenerates it.
34. A network in which there are multiple network links between computers to
provide multiple paths for data to travel.
36. In a Ethernet network, between any two points on the network ,there can be no
more than five network segments or four repeaters, and of those five segments
only three of segments can be populated.
38. Routable protocols can work with a router and can be used to build large
networks. Non-Routable protocols are designed to work on small, local
networks and cannot be used with a router
40. One of two sub layers of the data link layer of OSI reference model, as
defined by the IEEE 802 standard. This sub layer is responsible for
maintaining the link between computers when they are sending data across the
physical network connection.
Page 13 of 30
42. Along any transmission path from a given source to a given destination, a group
of virtual circuits can be grouped together into what is called path.
43. Packet filter is a standard router equipped with some extra functionality.The
extra functionality allows every incoming or outgoing packet to be inspected.
Packets meeting some criterion are forwarded normally. Those that fail the test
are dropped.
44. One of the main causes of congestion is that traffic is often busy. If hosts could
be made to transmit at a uniform rate, congestion would be less common.
Another open loop method to help manage congestion is forcing the packet to be
transmitted at a more predictable rate. This is called traffic shaping.
46. When hierarchical routing is used, the routers are divided into what we will
call regions, with each router knowing all the details about how to route packets to
destinations within its own region, but knowing nothing about the internal structure
of other regions.
47. It is a problem that can ruin TCP performance. This problem occurs when data
are passed to the sending TCP entity in large blocks, but an interactive application
on the receiving side reads 1 byte at a time.
48. The most common two letter combinations are called as diagrams. e.g. th, in,
er, re and an. The most common three letter combinations are called as trigrams.
e.g. the, ing, and, and ion.
50. Wide-mouth frog is the simplest known key distribution center (KDC)
authentication protocol.
55. It is a protocol used to advertise the set of networks that can be reached with
in an autonomous system. BGP enables this information to be shared with the
autonomous system. This is newer than EGP (Exterior Gateway Protocol).
57. It is a set of rules defining a very simple virtual terminal interaction. The NVT is
used in the start of a Telnet session.
58. It is a host that has a multiple network interfaces and that requires
multiple IP addresses is called as a Multi-homed Host.
60. It is an Internet routing protocol that scales well, can route traffic along
multiple paths, and uses knowledge of an Internet's topology to make
accurate routing decisions.
61. It is using a router to answer ARP requests. This will be done when the
originating host believes that a destination is local, when in fact is lies
beyond router.
62. It is a very simple protocol used for transmission of IP data grams across a
serial line.
65. In the world of computers, networking is the practice of linking two or more
computing devices together for the purpose of sharing data. Networks are built with
a mix of computer hardware and computer software.
Page 15 of 30
66. A bit is a single numeric value, either '1' or '0', that encodes a single unit of
digital information. A byte is a sequence of bits; usually eight bits equal one byte.
67. A topology refers to the manner in which the cable is run to individual
workstations on the network. The dictionary defines topology as: the
configurations formed by the connections between devices on a local area
network (LAN) or between two or more LANs.
69. A server device typically stores files and databases including more
complex applications like Web sites. Server devices often feature higher-
powered central processors, more memory, and larger disk drives than clients.
70. This layer is used to establish communications with computer systems that
lie beyond the local LAN segment with its own routing addressing
architecture.
72. A firewall system replaces an IP router with a multi-homed host that does not
forward packets. by not forwarding the IP packets between networks, the firewall
efficiently sever the connection between the networks. The firewall accepts packets
that are addressed to it, and processes those packets through
Application layer. Firewall ignores packets that are not addresses to it. Firewall
are not routers because they do not forward packets, even when they are
used in place of routers.
75. If the network is totally contained within a LAN, then we do get LAN speeds.
i.e. the web server is connected via LAN to the clients. If we are connecting
remote locations, and use the Internet as our backbone / transport, then our
speed becomes dependent on the Internet itself, and the
speeds by which we connect to it. If performance is really the issue, we could
also run our Intranet over private lines, such as frame relay. Then we can actually
contract with the phone company for actual performance levels of speed. i.e. 56K,
256K, etc Approximately Intranet operates at 10mbs - 100mbs internal and
28.8k for remote access employees.
77. VPN, or Virtual Private Network, allows a company with multiple sites to have a
private network, but using a public network as a carrier. VPNs restrict traffic so
that packets can only travel between the company's sites.
78. IPv6 contains a mechanism that allows sender and receiver to establish high-
quality paths for audio and video through the underlying network, and associates
datagram with that path.
79. It requires a sending station to monitor signals on the cable. If the signal on the
cable differs from the signal that the station is sending, it means that a collision
has occurred. This is why the Ethernet standard specifies a maximum cable
length and minimum frame size .
80. The main function is to assure reliable delivery, i.e. all of the data arrive at the
destination application ant that the data arrive in the same order in which
they sent.
81. Server sockets are used by a server to accept incoming requests from a
client. A socket is one end of a bi-directional communication path between two
machines.
82. PPTP
84. Con: Too many layers may increase the communication overhead in your
program.
Pro: Layers allow you to change one part without affecting the others.
Page 17 of 30
85. Middleware server is a server program that sits between the database
server and the client software, which may provide driver or business-logic
services.
86. IP address is the 32-bit number used to identify a host in the Internet. IP
address has 3 parts: class type, network address, host address.
87. Served doesn’t need this function, but CGI need it. CGI can’t communicate with
Server while executing, so it cannot get path parameter.
Before Server executes CGI program, it needs to change the Path; this is why
HTTP needs to support "extra path information". Through this information,
server can put the changed result to environment variable, then execute CGI
program
88. Login as root or su to root, then issue #dfmounts Without arguments, the
dfmounts command displays the shared resource and clients mounting the
resource.
90. Transport Layer: Layer 4 protocol, which specify how to handle details of
reliable transfer, are among the most complex protocols.
91. SSL is short for Secure Sockets Layer, a protocol developed by Netscape for
transmitting private documents via the Internet. SSL works by using a private
key to encrypt data that's transferred over the SSL connection. Both Netscape
Navigator and Internet Explorer support SSL, and many Web sites
use the protocol to obtain confidential user information, such as credit card
numbers. By convention, Web pages that require an SSL connection start with
https: instead of http.
95. Read the, field in the packet header with to send IP or IPX protocol.
96. A network server is a computer designed to process requests and deliver data
to other (client) computers over a local network or the Internet.
97. The types are: Web servers, Proxy servers, FTP servers , Online game servers.
98. A media access method refers to the manner in which a computer gains and
controls access to the network’s physical medium (e.g., cable). Common media
access methods include the following:
CSMA/CD CSMA/CA Token Passing Demand Priority
99. A Network Interface Card (NIC), also called a Network Adapter, is used to
connect a computer to the cabling used in a local area network (LAN).
Typically, the NIC attaches to the computer’s expansion bus via an ISA slot (8-bit or
16-bit) or a PCI slot (32-bit). The NIC has one or more external ports with which
to attach the network cable.
102. The speed of a wireless network depends on several factors. First, wireless
local area networks (WLANs) feature differing levels of performance depending
on which Wi-Fi standard they support. 802.11b WLANs offer maximum
theoretical bandwidth of 11 Mbps. 802.11a and 802.11g WLANs offer
theoretical bandwidth up to 54 Mbps. (In contrast, typical wired Ethernets run
at 100 Mbps.) Finally, wireless network technology is capable of more speed
than what Wi-Fi supports today. Industry vendors continue to develop
improved technologies like 802.16 WiMAX that offer wireless communications
with faster speeds and longer range.
Page 19 of 30
103. A null modem cable connects to two standard serial ports for networking
two computers together. Null modem cables enable direct data transfer with a
minimum of setup required.
105. Ethernet is a physical and data link layer technology for local area
networks (LANs). Ethernet was invented by engineer Robert Metcalfe. Higher
level network protocols like Internet Protocol (IP) use Ethernet as their
transmission medium. Data travels over Ethernet inside protocol units called
frames. Run length of individual Ethernet cables is limited to roughly 100 meters,
but Ethernet can be bridged to easily network entire schools or office buildings.
106. IP is the primary network protocol used on the Internet, developed in the
1970s. On the Internet and many other networks, IP is often used together
with the Transport Control Protocol (TCP) and referred to interchangeably as
TCP/IP. IP supports unique addressing for computers on a network. Most networks
use the IP version 4 (IPv4) standard that features IP addresses four bytes (32 bits)
in length. The newer IP version 6 (IPv6) standard features addresses 16 bytes
(128 bits) in length.
108. Wi-Fi is the industry name for wireless LAN (WLAN) communication
technology related to the IEEE 802.11 family of wireless networking standards.
To some, the term Wi-Fi is synonymous with 802.11b, as 802.11b was the first
standard in that family to enjoy widespread popularity. Today, however, Wi-Fi can
refer to any of the established standards: 802.11a, 802.11b, 802.11g and
802.11n.
109. A lag switch is a mechanism installed on a home network that allows you to
insert delays into the flow of local traffic to the Internet. Lag switches are normally
used by unscrupulous players wanting to cheat at online video games. Lag switches
are unrelated to normal network switches.
110. The term WWW refers to the World Wide Web or simply the Web. The World
Wide Web consists of all the public Web sites connected to the Internet
Page 20 of 30
worldwide, including the client devices (such as computers and cell phones) that
access Web content. The WWW is just one of many applications of the Internet
and computer networks. The World Web is based on these technologies:
HTML - Hypertext Markup Language
HTTP - Hypertext Transfer Protocol
Web servers and Web browsers
112. Cookies are a way for a server to send some information to a client to store
and for the server to later retrieve its data from that client. Web browser
supports 20 cookies/host of 4kb each.
113. It is a unique id assigned by the server to the user when a user first
accesses a site or an application i.e. when a request is made.
114. A port is an 16-bit address within a computer. Ports for some common
Internet Application protocols.
File Transfer Protocol-21.
Telnet Protocol-23.
Simple Mail Transfer Protocol-25.
Hypertext Transfer Protocol-80.
120. An unspecified passive open has the server waiting for a connection
request from a client. A fully specified passive open has the server waiting for a
connection from a specific client.
125. The Mount protocol returns a file handle and the name of the file system in
which a requested file resides. The message is sent to the client from the server
after reception of a client's request.
Page 22 of 30
128.DNS uses UDP for communication between servers. It is a better choice than
TCP because of the improved speed a connectionless protocol offers. Of course,
transmission reliability suffers with UDP.
130.The HELLO protocol uses time instead of distance to determine optimal routing.
It is an alternative to the Routing Information Protocol.
131.The three types of routing tables are fixed, dynamic, and fixed central.The
fixed table must be manually modified every time there is a change. A dynamic
table changes its information based on network traffic, reducing the amount of
manual maintenance. A fixed central table lets a manager modify only one table,
which is then read by other devices. The fixed central table reduces the need
to update each machine's table, as with the fixed table. Usually a dynamic
table causes the fewest problems for a network administrator, although the
table's contents can change without the administrator being aware of the
change.
133. The following are the routing protocols:- IS-IS runs over the data link layer-
OSPF, IGRP, and EIGRP run directly over IP; OSPF and EIGRP have their own reliable
transmission mechanism while IGRP assumed an unreliable transport- RIP runs
over UDP- BGP .
134. classful- it wont send subnet mask in its route update. classless- it will send
subnet mask in its route update and support .
Page 23 of 30
135. (a) OSPF has two primary characteristics. The first is that the protocol is open,
which means that its specification is in the public domain. The second
principal characteristic is that OSPF is based on the SPF algorithm, which
sometimes is referred to as the Dijkstra algorithm, named for the person
credited with its creation.
(b)OSPF is a link-state routing protocol that calls for the sending of link-state
advertisements (LSAs) to all other routers within the same hierarchical area.
Information on attached interfaces, metrics used, and other variables are included
in OSPF LSAs. As OSPF routers accumulate link-state information, they use the SPF
algorithm to calculate the shortest path to each node.
138. Static and Dynamic Routing in one network. However Dynamic Routing is
used to have the best path no matter what the status of the physical links.
All routing protocols have some sort of shortest-path or lowest-cost or best-
choice algorithm to help you weigh all the options available. Static routing can
be used in a small network to reduce the work of the network administrator or to
use a particular route only to forward the packet; we need static routing.
140. See trace route works using ICMP packets. First source sends an ICMP packet
with Time to Live (TTL) field as 1 to the destination address. Now intermediate
router receives the packet and sees that TTL field has expired, so it sends a ICMP
TTL expired reply. Now the source machine again sends the ICMP packet with TTL
field as 2. This time second intermediate router replies. This process is repeated
till destination is reached. That way the source can get the entire route up to
destination.
143. Between any two points the max length is 100 meters (~328 feet). If you wish
to go beyond this, you can do so by using two cables of 100 meters or less and
placing a repeater between them. Hubs will function as repeaters .
144.Yes, most 100baseT hubs and switches support both 10Mbps and
100Mbps standards. The majority of newer hubs will adjusts to either 10Mbps
or 100Mbps speeds by port. With these systems you can freely add and remove the
older 10Mbps devices without worry. A few older hubs will
adjust the speed of every port to the lowest speed of an attached device.
With these, every system is slowed down to 10Mbps when one 10Mbps
system is attached.
145. The CAT rating tell you the frequency rating of the cable. Additionally it can
give you an idea of the typical use for it. Types:
CAT 1. Lowest grade of cable. No Frequency rating. (1Mbs)
Typical use: Alarm systems, Intercom Systems.
CAT 2. Typical phone cable. Frequency max: 1mhz (4Mbps)
Typical use: Phone systems.
CAT 3. Typical 10base-T cable. Frequency max: 16mhz (10Mbps)
Typical use: 10base-T networks, 4Mbs token ring networks
CAT 4: Typical Token ring cable. Frequency max: 20mhz (16Mbps)
Typical use: 16Mbs Token ring networks.
Cat 5: Most common type. Frequency max: 100mhz (100Mbps)
Typical use: 100base-T networks / 10base-T networks
Cat 5e/6: High Speed cable. Frequency ~350+mhz
Typical use: 1000base-T over copper. (Gigabit Ethernet)
It's fine to use a cable type greater then what you need. You could for instance use
Cat 5 cable for a phone system. It's actually good to use cable better then what you
think you will need. This leaves room for future network upgrades.
Page 25 of 30
146. NAT is short for Network Address Translation. In a nutshell, NAT allows a
group of computers to use a single IP address to communicate with the outside
world or another network. Additionally it separates External IP addresses from
Internal network IP addresses.
147. Class C is used for small network environment because the users are also
less.
148. When data goes through the server the first step is that it will check the
gateway ip address means network main router IP if this will correct then the next
process is done by router itself , where the packets have to be sent that is in
routing table what is your next destination? and after it will recognize by the next
network the same process is be done by theri network router and server.
149. (a) Ping 127.0.0.1. (b) Ping local host IP address. (c) Ping default gateway.
(d) Ping the remote server.
150.Brodcast Domain:
send the packet to all the Present Network IT may be send by the person It may
broadcast by the switch when the address not found in the Network.For
breaking broadcast domain We can Use Router .
Collision Domain:
Switch has no collision as compare to run (layer on Device)
151. 172.16.112.0
154.Four tuple of any exercise is source IP, source port no: and destination IP,
destination port no:.
for this communication the four tuple would be:
• 192.168.1.76, 1942
• 203.84.221.151, 80
Address: 192.168.1.254
Non-authoritative answer:
Name: google.com Addresses: 72.14.207.99, 64.233.167.99,
64.233.187.99
156.. The DNS root name server simply discards the packet .
157. Yes. This happens because yahoo.com is running on more than one
machine, and so different machines running yahoo.com are registered into
DNS. Due to this there are more than one resource records of type ‘A’
holding different IP address.
160. The term “bps” specifies network bandwidth in bits per second. The term
"Bps" specifies network bandwidth in bytes per second.
161. Frame relay is a packet switching technology. It will operate in the data link
layer
162. (TELetype NETwork) is a network protocol used on the Internet or local area
network (LAN) connections. It was developed in 1969 and standardized as IETF STD
8, one of the first Internet standards. It has limitations that are considered to be
security risks. The term telnet also refers to software which implements the client
part of the protocol. TELNET clients have been available on most Unix systems
for many years and are available for virtually all platforms.
163. OSI reference model consisting of 7 layers helps the data to be moved in
more optimal from source to the destination. And here the protocols are better
hidden so the further enhancement can be done easily. This reference model can be
used for both connection oriented and connectionless service.
166. To ensure that any data lost during data transfer can be retransmitted.
169. LAN Emulation used to run normal networking over ATM, it emulates the
broadcast nature of a LAN over connection oriented ATM.
170. The assumption that statistical multiplexing can be used to improve the link
utilization is that the users do not reach their peak rate values
simultaneously, but since the traffic demands are stochastic and cannot be
predicted, congestion is unavoidable. Whenever the total input rate is greater than
the output link capacity, congestion occurs. When the network becomes congested,
the queue lengths may become very large in a short time, resulting in buffer
overflows and cell loss. Congestion control is therefore necessary to ensure that
users get the negotiated Quality of Service
171. Creation of sockets is done using the socket() system call. This system call is
defined as follows:
int socket(int address_family, int socket_type, int proto_family);
address_family defines the type of addresses we want this socket to use,
andtherefor defines what kind of network protocol the socket will use. We will
concentrate on the Internet address family, cause we want to write Internet
applications.
As an example, suppose that we want to write a TCP application. This Application
needs at least one socket in order to communicate across the Internet, so it will
contain a call such as this:
int s; /* descriptor of socket */
/* Internet address family, Stream socket */
s = socket(AF_INET, SOCK_STREAM, 0);
Page 28 of 30
if (s < 0) {
perror("socket: allocation failed");
}
173. A client's main feature is giving a convenient User interface, hiding the details
of how the server ‘talks’ from the user. Today, people are trying to write mostly
graphical clients, using windows, pop-up-menus and other such fancy stuff. We will
leave this to someone else to explain, and concentrate on the networking part. The
client needs to first establish a connection with the server, given its address. After
the connection is established, The Client needs to be able to do two things:
1. Receive commands from the user, translate them to the server's language
(protocol) and send them to the server.
2. Receive messages from the server, translate them into human-readable form,
and show them to the user. Some of the messages will be dealt with by the client
automatically, and hidden from the user. This time, the Client designer's choice.
175. The Hypertext Transfer Protocol - provides a standard for Web browsers and
servers to communicate. The definition of HTTP is a technical specification of a
network protocol that software must implement. HTTP is an application layer
network protocol built on top of TCP. HTTP clients (such as Web browsers)
and servers communicate via HTTP request and response messages. The three
main HTTP message types are GET, POST, and HEAD. HTTP utilizes TCP port 80 by
default, though other ports such as 8080 can alternatively be used. The current
version of HTTP in widespread use - HTTP version 1.1 - was developed to address
some of the performance limitations of the original version - HTTP 1.0.
176. Data can be effectively transmitted through E1 leased line. But E1 leased line
is very Costly. so by using VPN ( Virtual Private Network) We send data very
effectively in less cost than E1 leased line. VPN also need internet connection to
send data from source to server.
177. Spanning tree bridges were designed with transparency as a primary goal. A
customer should be able to buy a bridge, insert it between two networks,
and have everything work correctly with no hardware, software, or configuration
changes on either hosts or existing bridges.
181. True. Consider a scenario where a first packet sent by sender doesn't
receive ACK as the timer goes down. So it will send the packet again. In that time
the ACK of first packet is received. so the sender empties it's buffer and fills buffer
with new packet. In the meantime, the ACK of second frame may be received. So
ACK can be received even if the packet falls outside the current window.
183. True. Alternating bit protocol deals with the 0 & 1 as an alternating ACK.
Here, the accumulative ACK is not possible as ACK needs to be sent after each
packet is received. So SR protocol starts behaving as Alternating bit protocol.
197. False. STUN is only for UDP, but TURN applies to both UDP and TCP.
198. False - the client must wait until DHCPACK (not DHCPOFFER) because the IP
address is not officially assigned to the new client until DHCPACK is received .