Академический Документы
Профессиональный Документы
Культура Документы
Magdalene, AP/CSE
D.Magdalene, AP/CSE
because of it's expanded capabilities and it's growth through recent large scale deployments. IPv6
protocol was published by the Internet Engineering Task Force (IETF) in 1998.
What is internetworking?
When two or more networks or network segments are connected using devices such as a router
that provide a common method of routing information packets between the networks then it is
called as internetworking. The resulting system of interconnected networks is called an
internetwork, or simply an internet.
What is Computer Network?
A computer network is a group of computer systems and other computing hardware devices that
are linked together through communication channels to facilitate communication and resourcesharing among a wide range of users.
What is bridge?
A bridge is a device that separates two or more network segments within one logical network
(e.g. a single IP-subnet). A bridge is usually placed between two separate groups of computers
that talk with each other, but not that much with the computers in the other group. A good
example of this is to consider a cluster of Macintoshes and a cluster of UNIX machines.
What is flow control?
Flow control is the process of managing the rate of data transmission between two nodes to
prevent a fast sender from overwhelming a slow receiver. It provides a mechanism for the
receiver to control the transmission speed, so that the receiving node is not overwhelmed with
data from transmitting node.
D.Magdalene, AP/CSE
Congestion is a situation in Communication Networks in which too many packets are present in
a part of the subnet, performance degrades. Congestion in a network may occur when the load on
the network (i.e. the number of packets sent to the network) is greater than the capacity of the
network (i.e. the number of packets a network can handle.)
What is congestion control?
Congestion Control refers to techniques and mechanisms that can either prevent congestion,
before it happens, or remove congestion, after it has happened. Congestion control mechanisms
are divided into two categories, one category prevents the congestion from happening and the
other category removes congestion after it has taken place.
What is HTTP?
HyperText Transfer Protocol defines how messages are formatted and transmitted, and what
actions Web servers andbrowsers should take in response to various commands. For example,
when you enter a URL in your browser, this actually sends an HTTP command to the Web server
directing it to fetch and transmit the requested Web page.
What is FDDI?
FDDI (Fiber Distributed Data Interface) is a set of ANSI and ISO standards for data transmission
on fiber optic lines in a local area network (LAN) that can extend in range up to 200 km (124
miles). The FDDI protocol is based on the token ring protocol. FDDI is frequently used on
the backbone for a wide area network (WAN).
What is HTML?
HTML or HyperText Markup Language is the main markup language for creating web
pages and other information that can be displayed in a web browser. HTML is written in the form
of HTML elements consisting of tags enclosed inangle brackets (like <html>), within the web
page content.
What is cryptography?
Cryptography is the practice and study of techniques for secure communication in the presence
of third parties. it is about constructing and analyzingprotocols that overcome the influence of
adversaries and which are related to various aspects in information security such as data
confidentiality, data integrity, authentication, and non-repudiation.
What is subnetting?
Subnetting is the strategy used to partition a single physical network into more than one smaller
logical sub-networks (subnets). Subnetting allows an organization to add sub-networks without
the need to acquire a new network number via the Internet service provider (ISP). Subnetting
3
D.Magdalene, AP/CSE
helps to reduce the network traffic and conceals network complexity. Subnetting is essential
when a single network number has to be allocated over numerous segments of a local area
network (LAN).
What is subnet mask?
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into
network address and host address. Subnet Mask is made by setting network bits to all "1"s and
setting host bits to all "0"s. Within a given network, two host addresses are reserved for special
purpose. The "0" address is assigned a network address and "255" is assigned to a broadcast
address, and they cannot be assigned to a host.
What is CIDR?
Classless Inter-Domain Routing is a method for allocating IP addresses and routing Internet
Protocol packets. The Internet Engineering Task Force introduced CIDR in 1993 to replace the
previous addressing architecture of classful network design in the Internet. Its goal was to slow
the growth of routing tables on routers across the Internet.
What is router?
A router is a device that forwards data packets alongnetworks. A router is connected to at least
two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are
located at gateways, the places where two or more networks connect.
What is gateway?
A gateway is a node on a network that serves as an entrance to another network. In enterprises,
the gateway is the computer that routesthe traffic from a workstation to the outside network that
is serving the Web pages. In homes, the gateway is the ISP that connects the user to the internet.
What is switch?
A switch is a small hardware device that joins multiple computers together within one local area
network (LAN). Ethernet switch devices were commonly used on home networks.
What is hub?
A hub is a device that connects PCs together. Hubs are commonly used to connect segments of
a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other
ports so that all segments of the LAN can see all packets.
What is a port?
A port is an application-specific or process-specific software construct serving as a
communications endpoint in a computer's host operating system. A port is associated with an IP
4
D.Magdalene, AP/CSE
address of the host, as well as the type of protocol used for communication. The purpose of ports
is to uniquely identify different applications or processes running on a single computer and
thereby enable them to share a single physical connection to a packet-switched network like
the Internet.
What is the purpose of subnetting?
The purpose of subnetting is
1. To divide a large network into smaller segments to reduce traffic and speed up
the sections of your network.
2. To connect networks across geographical areas.
3. To connect different topologies such as Ethernet, Token Ring, and FDDI
together via routers.
4. To avoid physical limitations such as maximum cable lengths or exceeding the
maximum number of computers on a segment.
What are the functions of ARP
The function of Address Resolution Protocol is
To obtain the MAC address of a host, and then map that MAC address to the
host's IP address.
To facilitates data exchange between computers on the same network.
What are the building blocks of network?
Client computers: The computers that end users use to access the resources of the
network.
Server computers: Computers that provide shared resources, such as disk storage and
printers, as well as network services, such as e-mail and Internet access.
Network interface: An interface sometimes called a network port thats
installed in a computer to enable the computer to communicate over a network.
D.Magdalene, AP/CSE
Cable: Computers in a network are usually physically connected to each other using
cable.
Switches: Network cable usually doesnt connect computers directly to each other.
Instead, each computer is connected by cable to a device known as a switch.
Wireless networks: In many networks, cables and switches are making way for
wireless network connections, which enable computers to communicate via radio
signals.
Network software: Although network hardware is essential, what really makes a
network work is software.
List the similarity between transport layer and DLL
Basically Data Layer provides error-free transmission across a single link ( 2
consecutive stations ) where as Transport layer ensures the communication
between source and destination. (Provide end-to-end delivery, from one
computer (host) to another.)
Thus to ensure the communication, both the layers will provide following
services;
o 1. Flow Control (Which controls the flow of data ensuring no overhead
to the destination)
o 2. Error Detection and Correction (Detect errors in the data and correct
them if possible)
What are the features of datagram networks?
Data is transmitted from source to destination without guarantee of delivery
Data is frequently divided into smaller pieces and transmitted without a defined
route or guaranteed order of delivery
A datagram supports a maximum of 65,535 bytes at a time
D.Magdalene, AP/CSE
Preservation of the order of frame transfer from one edge of the network to the other
Non-duplication of frames
Small probability of frame loss
IP Split Horizon Checking
Ping Your Own IP Address on a Multipoint Frame Relay
The Keyword broadcast
Reconfiguring a Sub interface
DLCI Limitations
IP/IPX/AT Address
RIP and IGRP
Keepalive
Serial Interfaces
OSPF and Multipoint
D.Magdalene, AP/CSE
Disadvantages
IPV4
32 bits long (4 bytes).
Used to designate network from host
Address mask
portion.
Sometimes used to designate network
Address prefix
from host portion.
Address types IPv4 addresses are categorized into
three basic types: unicast address,
multicast address, and broadcast
8
IPV6
128 bits long (16 bytes).
Not used
Used to designate the subnet prefix of
an address.
IPv6 addresses are categorized into
three basic types: unicast address,
multicast address, and anycast address.
D.Magdalene, AP/CSE
IP header
address.
Variable length of 20-60 bytes,
depending on IP options present.
A choke packet is a specialized packet that is used for congestion and flow control along
a network.
A router detects congestion by measuring the percentage of buffers in use, line utilization
and average queue lengths. When it detects congestion, it sends choke packets across the
network to all the data sources associated with the congestion. The sources respond by
reducing the amount of data they are sending.
D.Magdalene, AP/CSE
transmits with a probability p, and so on. p-persistent CSMA is used in CSMA/CA systems
including Wi-Fi and other packet radio systems.
List some QOS parameters.
Bandwidth
Latency or delay
Jitter or variations
Synchronization between multiple streams
Packet loss ratio
Packet error ratio
What are the difference between flow control and congestion control?
Flow control
Flow control is a mechanism used in
computer networks to control the flow of
data between a sender and a receiver, such
that a slow receiver will not be outran by a
fast sender.
Congestion control
Congestion control is a mechanism that
controls data flow when congestion
actually occurs.
Congestion control algorithms are
classified based on the amount of
feedback received from the network and
the aspect of performance it aims to
improve.
D.Magdalene, AP/CSE
A network bandwidth of 10MBPS can pass only an average of 12,000 frames per minute
with each frame carrying an average of 10,000 bits. What is the throughput of this
network?
Solution
We can calculate the throughput as
The example shows that a bit can go over the Atlantic Ocean in only 50 ms if there is a direct
cable between the source and the destination.
What are the propagation time and the transmission time for a 2.5-kbyte message (an email) if the bandwidth of the network is 1 Gbps? Assume that the distance between the
sender and the receiver is 12,000 km and that light travels at 2.4 108 m/s.
Solution
We can calculate the propagation and transmission time as shown:
11
D.Magdalene, AP/CSE
Note that in this case, because the message is short and the bandwidth is high, the dominant
factor is the propagation time, not the transmission time. The transmission time can be ignored.
What are the propagation time and the transmission time for a 5-Mbyte message (an
image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the
sender and the receiver is 12,000 km and that light travels at 2.4 108 m/s.
Solution
We can calculate the propagation and transmission times as shown:
Note that in this case, because the message is very long and the bandwidth is not very high, the
dominant factor is the transmission time, not the propagation time. The propagation time can be
ignored.
Differentiate ARP and RARP
ARP
RARP
ARP is a computer network protocol RARP is a networking protocol used
used to convert network layer in computer networks.
addresses to link layer addresses.
RFC 826 describes the ARP.
RARP is described in RFC 903
published by IETF.
ARP maps IP addresses to hardware RARP maps hardware addresses to IP
address
addresses
ARP is a logical address
RARP is a physical address.
12
D.Magdalene, AP/CSE
What is cipertext?
Cipher text is encrypted text. Cipher text is the result of encryption performed on plaintext using
an algorithm, called a cipher. Cipher text is also known as encrypted or encoded information
because it contains a form of the original plaintext that is unreadable by a human or computer
without the proper cipher to decrypt it.
List out the two modes of IP security.
IPsec supports two encryption modes:
Transport
Tunnel.
D.Magdalene, AP/CSE
TCP
TCP rearranges data packets in the
order specified.
The speed for TCP is slower than
UDP.
There is absolute guarantee that the
data transferred remains intact and
arrives in the same order in which it
was sent.
TCP header size is 20 bytes
TCP does error checking
Eg. HTTP, HTTPs, FTP,
SMTP Telnetetc...
It is Connection-Oriented
Transmission Speed is high but not
as high as UDP.
Define Framing.
Frames Are The Small data Units Created By Data Link Layer And The Process Of
Creating Frames By The Data Link Layer Is Known As Framing.
Network Protocol are needed because the message or data send by our network have to
reached on destination through different networks of different structure and different
platform.
14
D.Magdalene, AP/CSE
So network protocols are performing to duty to make the transmitted data well-suited to
those new networks, which come in the way to destination.
An IP address is an Internet Protocol address. It is used to identify all the different computers
and websites on the internet.
Each IP address is unique. It is what enables you to do things like send a message in a chat
program to another computer, and out of all the millions of computers in the world, it arrives
at the correct one.
The client is a process (program) that sends a message to a server process (program),
requesting that the server perform a task (service).
Client programs usually manage the user-interface portion of the application, validate data
entered by the user, dispatch requests to server programs, and sometimes execute business
logic.
Upward multiplexing
Downward multiplexing
Symmetric-key algorithms are a class of algorithms for cryptography that use the same
cryptographic keys for both encryption of plaintext and decryption of cipher text.
The keys represent a shared secret between two or more parties that can be used to maintain a
private information link.
D.Magdalene, AP/CSE
Rather than having terminals and hosts communicate using their various native languages,
all Telnet clients and servers agree to send data and commands that adhere to a fictional,
virtual terminal type call the Network Virtual Terminal (NVT).
The NVT defines a set of rules for how information is formatted and sent, such as character
set, line termination, and how information about the Telnet session itself is sent.
Disadvantages:
The receiver can jam the service if he/she has nothing to send.
Additional complexity.
D.Magdalene, AP/CSE
Authentication
o Process of verifying identity of a user
Integrity
o Data that arrives is the same as that is sent
Confidentiality
o Sensitive information should not be visible to eavesdropper - use
Encryption
Non-repudiation
o Assurance that any transaction that takes place can subsequently be proved to
have taken place
Authorization
Explain CRC
CRC (Cyclic redundancy check) is often used to detect data transmission errors. It is
transmitted together with the data and evaluated independently at the receiver side. If evaluated
and received CRCs differ, data transmission error is indicated. If both CRCs are the same, there
still exists other data provided the same CRC. Nevertheless the probability of such an error is
usually very low.
Transmitted data sequence can be interpreted as binary polynomial. E.g. the sequence
11000101 can be written as x
7+x6+x2+1.
CRC is being evaluated as a remainder after the division of data polynomial by so called
generating polynomial.
17