Академический Документы
Профессиональный Документы
Культура Документы
PVC (Permanent Virtual Circuit) PVC is a virtual circuit which is available permanently. It is a type of virtual circuit where the end points do not signal the circuit. The virtual circuit values are manual. The route through the network, link-by-link is also manual. If t he equipment happens to fail, the PVC also fails, and the physical network has t o re-route. The permanent virtual circuit is an efficient circuit for hosts which have to communicate frequently like ATMs. SVC (Switched Virtual Circuit) SVC has to re-establish the connection every time the data has to be sent. It is a circuit established by UNI. It is basically a demand connection; the connection is initiated by the user. When the switch fails, the SVC fails, and the connection needs to be re-established.
header length (which is a multiple of 4 bytes) does not match the actual length of the options. 1: No operation. It has a class of 0, the fc bit is not set, and there is no length byte or data. It can be used to align fields in the datagram. 2: Security. It has a class of 0, the fc bit is set, and there is a length byte with a value of 11 and 8 bytes of data). It is used for security information needed by U.S. 3: Loose source routing. It has a class of 0, the fc bit is set, and there is a variable length data field. 4: Internet time stamp. It has a class of 2, the fc bit is not set, and there is a variable length data field. The total length can be up to 40 bytes. We discuss this option in more detail later. 7: Record route. It has a class of 0, the fc bit is not set, and there is a variable length data field. 8: Stream ID. It has a class of 0, the fc bit is set, and there is a length byte with a value of 4 and one data byte. It is used with the SATNET system. 9: Strict source routing. It has a class of 0, the fc bit is set, and there is a variable length data field. We discuss this option in more detail later.
the same port principle. To the best possible extent, the same port numbers are used for the same services on top of UDP, TCP and ISO TP-4.
2 Server failure. The message was not processed because of a problem with the server. 3 Name error. The domain name in the query does not exist. This is only valid if the AA bit is set in the response. 4 Not implemented. The requested type of query is not implemented by name server . 5 Refused. The server refuses to respond for policy reasons. Other values are reserved for future use. QDcount: An unsigned 16-bit integer specifying the number of entries in the question section. ANcount: An unsigned 16-bit integer specifying the number of RRs in the answer section. NScount: An unsigned 16-bit integer specifying the number of name server RRs in the authority section. ARcount: An unsigned 16-bit integer specifying the number of RRs in the additional records section.
Answer :When using FTP, the user performs some or all of the following operations: i) Connect to a remote host ii) Navigate and manipulate the directory structure. iii) List files available for transfer. iv)Define the transfer mode, transfer type and data structure. v)Transfer data to or from the remote host. vi)Disconnect from the remote host. vii) Connecting to a remote host To execute a file transfer, the user begins by logging in to the remote host. This is only the primary method of implementing security within the FTP model. Additional security can be provided using SSL and TLS. Conversely, this authentication can be bypassed using anonymous FTP. There are four commands that are used: Open: Selects the remote host and initiates the login session. User: Identifies the remote user ID. Pass: Authenticates the user. Site: Sends information to the foreign host that is used to provide services specific to that host. Navigating the directory structure : After a user has been authenticated and logged on to the server, that user can navigate through the directory structure of the remote host in order to locate the file desired for retrieval, or locate the directory into which a local file will be transferred. The user can also navigate the directory structure of the clients host. After the correct local and remote directories have been accessed, users can display the contents of the remote directory. The subcommands that perform these functions are as follows: cd: Changes the directory on the remote host: A path name can be specified, but must conform to the directory structure of the remote host. In most implementations, cd .. will move one directory up within the directory structure. Lcd: Changes the directory on the local host. Similar to the cd command, a path name can be specified but must conform to the directory structure of the local host.
Ls: Lists the contents of the remote directory. The list generated by this command is treated as data, and therefore, this command requires the use of a data connection. This command is intended to create output readable by human users. Dir: Lists the contents of the remote directory. Similar to the ls command, the list generated by dir is treated as data and requires the use of a data connection. This command is intended to create output readable by programs. Controlling the data transfer Transferring data between dissimilar systems often requires transformations of the data as part of the transfer process. The user has to decide on three aspects of the data handling: i)The way the bits will be moved from one place to another ii)The different representations of data on the system s architecture iii)The file structure in which the data is to be stored Each of these is controlled by a subcommand: Mode: Specifies whether the file is treated as having a record structure in a byte stream format: B: This specifies block mode is to be used. This indicates that the logical record boundaries of the file are preserved. S: This specifies that stream mode is to be used, meaning that the file is treated as a byte stream. This is the default and provides more efficient transfer but might not produce the desired results when working with a record-based file system. Type: Specifies the character sets used in translating and representing the data : A: Indicates that both hosts are ASCII-based, or that if one is ASCII-based and the other is EBCDIC-based, that ASCII-EBCDIC translation must be performed. On many implementations, this can be invoked by issuing the ASCII command, which the PI translates into the type A Command. E: Indicates that both hosts use an EBCDIC data representation. On many implementations, this can be invoked by issuing the EBCDIC command, which the PI translates into the type E command.
Answer :SMTP is based on end-to-end delivery: An SMTP client contacts the destination host s SMTP server directly, on well-known port 25, to deliver the mail. It keeps the mail item being transmitted until it has been successfully copied to the recipient s SMTP. This is
different from the store-and-forward principle that is common in many mailing systems, where the mail item can pass through a number of intermediate hosts in the same network on its way to the destination and where successful transmission from the sender only indicates that the mail item has reached the first intermediate hop. In various implementations, it is possible to exchange mail between the TCP/IP SMTP mailing system and the locally used mailing systems. These applications are called mail gateways or mail bridges. Sending mail through a mail gateway can alter the end-to-end delivery specification, because SMTP only guarantees delivery to the mail-gateway host, not to the real destination host located beyond the TCP/IP network. When a mail gateway is used, the SMTP end-to-end transmission is host-to-gateway, gateway-to host, or gateway-to-gateway; the behavior beyond the gateway is not defined by SMTP. In SMTP, each message has: i) A header, or envelope, the structure of which is strictly defined by RFC 2822 The mail header is terminated by a null line (that is, a line with nothing preceding the <CRLF> sequence). ii)Contents: Everything after the null (or blank) line is the message body, which is a sequence of lines containing ASCII characters (that is, characters with a value less than 128 decimal). As usual, the client SMTP (referred to as the sending SMTP) is the entity that initiates the session, and the server (referred to as the receiving SMTP) is the one that responds to the session request. Because the client SMTP frequently can also act as a server for a user mailing program, it is often simpler to refer to the client as the sender SMTP and to the server as the receiver SMTP.
9. With aid of a neat block diagram explain the structure of a web browser.
Answer :Generally, a browser is referred to as an application that provides access to a Web server. Depending on the implementation, browser capabilities and thus structures vary. A Web browser, at a minimum, consists of an Hypertext Markup Language (HTML) interpreter and HTTP client that is used to retrieve HTML Web pages. Besides this basic requirement, many browsers also support FTP, NNTP, e-mail (POP and SMTP clients), among other features, with an easy-to-manage graphical interface. Above figure illustrates a basic Web browser structure. As with many other Internet facilities, the Web uses a client/server processing model. The Web browser is the client component. Examples of Web browsers include Mozilla Firefox, Netscape Navigator, and Microsoft Internet Explorer Web browsers are responsible for formatting and displaying information, interacting with the user, and invoking external functions, such as Telnet, or external viewers for data types that Web browsers do not directly support. Web browsers have become the universal client for the GUI workstation environment, in much the same way that the ability to emulate popular terminals such as the DEC VT100 or IBM
3270 allows connectivity and access to character-based applications on a wide variety of computers. Web browsers are widely available for all popular GUI workstation platforms and are inexpensive.
An SNMPv2 manager sends the following request to retrieve the sysUpTime and the complete ARP table: This response signals the end of the table to the SNMPv2 manager. Using the getNextRequest, this same result requires four iterations of queries.