CS610.mid Subjectivecombinedbyanees
CS610.mid Subjectivecombinedbyanees
2. If 100mbps Ethernet NIC is connected to a hub which supports 10mbps, what will be the data rate
in this scenario? ( 2 marks)
Answer:-
This has two consequences. First, the hub does not necessarily create a broadcast medium. Second, there are no
collisions between traffic on 10 Mbps ports and 100 Mbps ports.
3. In connection oriented network, which type of connection identifier is used? Support your answer
with example. ( 2 marks)
Answer:- (Page 66)
ATM uses the concept of connection-oriented networking.
4. Imagine a network of 6 devices A, B, C, D, E and F. All devices are on same packet switch. If computer
A wants to send packet to computer E, How would packet switch forward this packet? ( 3 marks)
Answer:-
path between switch A and F and the total distance traveled along this path
switch A – switch D – switch E
distance = 4
5. Network administrator needs audio and video service for his network. He has to send or receive
data at same data rate. Which type of ATM quality service specification would be applied there?
Give example? ( 3 marks)
Answer:-
To facilitate the transport of audio and video data across emerging Asynchronous Transfer Mode (ATM)
networks, a simple, low cost, audio/video ATM appliance, the AVATAR, has been developed. This appliance
is capable of handling uncompressed bidirectional audio and NTSC video connections.
6. We have two satellite locations, at first location one bridge is configured and at second location 2
bridges are configured. Which location performed will be faster? Give reason. ( 3 marks)
Answer:- Click here for detail
Satellite locations with two bridges configured will performed faster. The brigade also had to provide power
to virtually all of its East Timor assets. Setting up the satellite system, for example, required supplying power
to both the communications station and the users‘ computers. A bridge that has multiple ports is known as a
networking switch. Both bridges and switches are capable of directing traffic to specific network addresses
instead of broadcasting the data to all devices on a network segment. This functionality makes the bridge or
switches a more advanced networking device over a hub or repeater.
7. There are two sites office A & B, both are using VPN. If a user of another network wants to send
some packet to A, then what will be the behavior of network A? How data is protected in VPN
environment? (05 marks)
Answer:- Click here for detail
In theory when a machine on private network A wants to send a packet to a machine on private network B the
packet is accepted by the VPN server. It is then encrypted and encapsulated within a standard IP packet that has
a destination address corresponding to the VPN server at network B.
Notice that both VPN servers have to have to be ―on the Internet‖ in the sense of having publicly accessible IP
addresses. When the packet arrives at network B‘s VPN server it extracts the encapsulated private packet,
decrypts it and sends it on its way within the local network. The machines within network A and B don't have
to have publicly accessible address - that is they don't have to be on the public Internet. This way of using the
public Internet to connect two machines that are not on the public internet is another advantage of the VPN
approach.
As far as users of network A and B are concerned the VPN is as good as a dedicated physical connection. The
idea of using public data packets to transfer embedded private data packets is often called ―tunnelling‖
because it seems to create a data tunnel between the two networks.
.
2
CS610- Computer Network
Midterm Examination - Fall 2011
1. We have two satellite locations. At first location one bridge is configured and at 2nd location twi
bridges are configured. Which location’s performance will be faster. Give reasons to support your
answer. ( 5 marks)
Answer:- rep
2. Star Textile has huge network of systems and switches. A task is given to IT Officer that if some link
goes the entire network works smoothly. Which routing method will be use? 5 marks
Answer:- Click here for detail
Distributed routing method is better for this purpose because Distributed routing relies on each node to compute
its own routing table and build the required connections with its neighbors. Ideally, the network operation,
status, and architecture of each node is transparent. Distributed routing is more flexible than centralized routing
because each node handles its own routing. The result is often improved system performance.
3. Six devices are connected in network A,B,C,D,E and F. All devices are on same packet switch.
Computer A wants to send packet to E. How will packet switch forwards the packet? 3 marks
Answer:- rep
4. Network administrator wants to build a tunnel between sites offices. How will he build using private
virtual network? 3 marks
Answer:- Click here for detail
To establishes a private network that can send data securely between these two locations or networks through a
"tunnel." A VPN tunnel connects the two PCs or networks and allows data to be transmitted over the Internet
as if it were still within those networks.
7. 100mbps Ethernet NIC is connected to control Hub which supports 10mbps. What will be Data Rate
in this scenario? 2 marks
3
CS610- Computer Network
Midterm Examination – Fall 2011
There are two sites office A & B, both are using VPN. If a user of another network wants to send some
packet to A, then what will be the behavior of network A?
Answer:- rep
ambiguity may cause the failure of any network, how parity bit check is consider in this situation
5 marks
define default route how it is different from routing 5 marks
4
CS610- Computer Network
Midterm Examination - Spring 2011
Question: Defines simplex and full duplex connection? Marks
2 Answer:- (Page 76)
Some connection-oriented technologies provide full duplex while other allow on simplex connection. To
communicate using a simplex design a pair of computers must establish two connections one from computer A
to computer B and another from computer B to A.
Question: Imagines a network for six devices: A, B, C, D, E and F. all devices are on a same packet
switch. Computer A want to send packet to computer E. how would packet switch forward this packet?
Marks 3
Answer:- rep
Question: Does ATM eliminate the varying delay times associated with different sized packets?
If yes then give reason. Marks 2
5
CS610- Computer Network
Midterm Examination - Spring 2011
What is 10base T?
Answer:- Click here for detail
One of several adaptations of the Ethernet (IEEE 802.3) standard for Local Area Networks (LANs). The
10Base-T standard (also called Twisted Pair Ethernet) uses a twisted-pair cable with maximum lengths of 100
meters.
What is Multicasting?
Answer:- (Page 35)
It works like broadcasting however it does not forward frames automatically to the CPU.
The interface hardware is programmed in advance to accept certain frames that have multicast address as the
destination address.
What is FDDI?
Answer:- (Page 31)
Fiber distributed data interconnect (FDDI) is another ring technology. Its most important features are:
It uses fiber optics between stations and transmits data at 100Mbps.
It uses pair of fibers to form two concentric rings.
Dynamic Routing:-
Dynamic routing protocols are supported by software applications running on the routing device (the router)
which dynamically learn network destinations and how to get to them and also advertise those destinations to
other routers.
6
Dijkart's Algorithm 2 Marks
Answer:- rep
Each pair of switches in the path communicates to choose a VPI/VCI for their tables. Once the connection is
established by the destination, a message is sent back to the originating computer to indicate the SVC is ready.
If any switch or the destination computer does not agree to setting up the VC, an error message is sent back and
the SVC is not established
8
CS610- Computer Network
Midterm Examination - Spring 2010
Question No: 21 ( M a r k s: 2 )
What is the difference between the physical and logical topologies?
Answer:- rep
Question No: 22 ( M a r k s: 2 )
Define Vector-Distance
Algorithm. Answer:- (Page 155)
Packet switches wait for next update message and they iterate through entries in message. If entry has shortest
path to destination, insert source as next hop to destination and record distance as distance from next hop to
destination plus distance from this switch to next hop.
Question No: 23 ( M a r k s: 3 )
What is the concept of store and forward technology?
Answer:- (Page 56)
STORE AND FORWARD:
Data delivery from one computer to another is accomplished through store and forward technology. In this
technology packet switch stores incoming packet and also forwards that packet to another switch or
computer. For this purpose packet switch has internal memory into which it can hold packet if outgoing
connection is busy. Packets for each connection held on queue
Question No: 24 ( M a r k s: 3 )
How can Switched Virtual Network be established?
Answer:- rep
Question No: 25 ( M a r k s: 5 )
How can a bridge know whether to forward frames?
Answer:- (Page 53)
The bridges configure themselves automatically to decide which bridge will forward broadcast frames and
which bridge will not.
The bridges communicate with each other on the network and use Distributed Spanning Tree (DST) algorithm
to decide which bridge will not forward frames if a cycle occurs.
9
Question No: 26 ( M a r k s: 5 )
Compare connection oriented and connectionless Service.
Answer:- Click here for detail
In connection-oriented protocol, authentication is needed while this is not case in connectionless protocol.
In connection-oriented protocol, we have to establish connection between sender and receiver while this is not case in
connectionless protocol.
Example of connection-oriented protocol is TCP and the example of connectionless protocol is UDP,Internet.
TCP is a connection-oriented protocol, it makes a connection and checks whether the data is received,
it does not guarantee delivery by first
and resends if it is not. UDP is a connectionless protocol,
connecting and checking whether data is received.
Separate transceiver allows computers to be powered off or disconnected from network without disrupting
other communication.
Transceiver may be located in an inconvenient place, so finely malfunction transceiver can be hard.
In other case, thin coax cable takes minimum of cable. Disconnecting one computer (on one loose connection)
can disrupt entire network.
Hub wiring centralizes electronics and connections. It makes management easier. Bottom line 10Base-T is most
popular because of lowest cost.
Solution:
An Ethernet standard for cable. The 10 refers to its 10 Mbps bandwidth, the
base to single channel baseband, and the T to Twisted pair. The cable uses
10BASE-T:
Twisted Pair or TP Ethernet. It replaces AUI cable with twisted pair cable
and thick coax with hub. This makes it cheaper and that ‗s why it is most
Ethernet over twisted pair refers to the use of cables that contain insulated
copper wires twisted together in pairs for the physical layer of an Ethernet
network—that is, a network in which the Ethernet protocol provides the data
link layer.
Solution:
on a network.
Solution:
The Fiber Distributed Data Interface (FDDI) specifies a 100-Mbps tokenpassing, dual-
ring LAN using fiber-optic cable. FDDI is frequently used as
primary and a secondary ring. During normal operation, the primary ring is
used for data transmission, and the secondary ring remains idle.
Solution:
the IEEEfor wireless LAN (WLAN) technology. 802.11 specifies an overthe-air interface
between a wireless client and a base station or between two
wireless clients.
802.11 WIRELESS LANs AND CSMA/CA: IEEE 802.11 is standard
wireless LAN that uses radio signals at 2.4GHz. Its data rate is 11Mbps. The
older devices use radio signals at 900MHz and data rate of 2Mbps.
Receiver responds with short message reserving slot for transmitter. The
reservation.
Solution:
path from each node to every other node. Then extract next hop information
from resulting path information and insert next hop information into routing
shortest path is then the path with lowest total weight (sum of the weight
with all edges). It should be noted that the shortest path is not necessarily
Solution:
DISADVANTAGES OF REPEATERS:
Repeaters do not recognize frame formats, they just amplify and retransmit
amplify and retransmit also the error onto the other segments.
Solution:
ATM CELLS:
To meet its goals, ATM uses small, fixed sized packets called cells. Each
CONCEPT OF ‗PACKET‘:
Network systems divide data in small blocks or junks called packets, which
Static routing:
Static routing is not really a routing protocol. Static routing is simply the process
of manually entering routes into a device's routing table via a configuration file
that is loaded when the routing device starts up
Dynamic Routing :
The concept of a weighted graph is extremely useful. The weights can be thought
of, for example, as the cost of sending a message down a particular arc. (Not
necessarily a monetary cost but some combination of time and distance for
example). Weighted graphs can be used to formulate the shortest path problem
for routing packets.
Which type of information is obtained from network sniffer and in which mode Network
sniffer operates?
Solution:
A network analyzer also called network monitor or a network sniffer is used to examine
the performance of or debug a network. It can report statistics such as capacity utilization,
distribution of frame size, collision rate or token circulation time
Most installations still use DIX Ethernet encoding in which there is no LLC/SNAP
header in the frame. A network analyzer can tell from the values in the type field (small
values are lengths, which mean an LLC/SNAP header is located in the first octets of the
data area; large values are types, which mean no LLC/SNAP header is included).
The operation of network analyzer is a computer with a network interface that receives all
frames, which is called promiscuous mode. So many desktop computers have interface
that can be configured for promiscuous mode. When combined with software computer
can examine any frame on LAN. In this way the communication across LAN is
guaranteed to be private. Computer receives and displays frames on the LAN.
Network analyzer can be configured to filter and process frames. It can count frames of
specific type of size. It displays only frames from or to specific computers.
Question No: 21 ( M - 10 )
Thick Ethernet, Thin Ethernet and Twisted pair Ethernet.
Solution:-
Thick Ethernet:
Thick Ethernet, officially known as 10 Base-5, is the oldest form of Ethernet.
One form of cabling supported by Ethernet is low-loss 50 Ohm coaxial cable as shown in
the figure below. This type of cable is 0.5" diameter (usually supplied with a yellow outer
PVC coating) and rather inflexible. It has become known in the communications industry
as "Thick Ethernet". The official name for this cable is 10 Baseband5 (10B5), indicating
that it is specified for baseband communications at 10 Mbps over distances up to 500m.
Thin Ethernet:
Thin Ethernet, officially called 10 Base-2, is a less expensive version of 10 Base-5 (Thick
Ethernet) technologies. It uses a lighter and thinner coaxial cable and dispenses with the
external transceivers used with 10 Base-5.
10 Base-2 uses an RG-58A/U coaxial cable and is wired in a bus topology. Each device
on the network is connected to the bus through a BNC "T" adapter, and each end of the
bus must have a 50 Ohm terminator attached. Each node on the bus must be a minimum
of 0.5 meters (1.5 feet) apart, and the overall length of the bus must be less than 185
meters (606 feet).
Twisted Pair Ethernet (10baseT), sometime also called "UTP" from "Unshielded Twisted
Pair", is based on using a cable similar to phone-wiring. The cable is connected via RJ-45
connectors to the network card installed in the PC.
Question # 1
Answer
LAN is small in size covers the area within a room, building or cities.
Question # 2
Answer
The term Jitter is used for variance in transmission delays. Jitter is significance for voice,
video and data. Jitter can occur when a packet is delayed because the network is busy.
Question # 3
Answer
This uses thick coax cable. AUI cable or transceiver or drop cable connects from NIC to
transceiver. AUI cable carries digital signal from NIC to transceiver. The transceiver
generates analog signal on coax cable. The wires in AUI carry digital signals power and
other control signals. Thick Ethernet also requires terminators to avoid signal reflectance.
Thin Ethernet uses thin coax cable that is cheaper and easier to install than thick Ethernet
coax. In thin Ethernet wiring scheme transceiver electronics are built into NIC and NIC
connect directly to network medium. Coax cable use connector on NIC. Coax runs
directly to back of each connected computer by T-connector. The T-connector directly
attaches to NIC.
Question # 4
Answer
Most networks offer dynamic connections that last for a relatively short time. ATM can
dynamically establish a switched virtual circuit SVC that allows it as long as necessary
and then terminate it. The computer sends a connection request to the switch to which it
is attached. Software in the switch finds a path to the destination and sends with the
connection request. Each pair of switches in the path communicates to choose a VPI/VCI
for their tables. Once the connection is established a message is given back to the
originating computer to indicate the SVC is ready.
Question # 5
Answer
ATM can provide the virtual circuits that look like traditional leased digital circuits. The
permanent virtual circuits PVC works as long as the customer pays the periodic fee for its
use. The forwarding table enter configured the terms used by Telco Provisioning requires
two steps.
To choose appropriate VPI/VCI for each step in the path and configures each adjacent
pair of switches.
Question # 7
Answer
Every LAN has a topology, or the way that the devices on a network are arranged and
how they communicate with each other.
PHYSICL TOPOLOGY:
The way that the workstations are connected to the network through the actual cables that
transmit data -- the physical structure of the network -- is called the physical topology. It
depends on the wiring scheme.
LOGICAL TOPOLOGY:
The logical topology, in contrast, is the way that the signals act on the network media, or
the way that the data passes through the network from one device to the next without
regard to the physical interconnection of the devices. We can say that it is defined by the
specific network technology.
Question # 8
Define Vector-Distance Algorithm.
Answer
Packet switches wait for next update message and they iterate through entries in message.
If entry has shortest path to destination, insert source as next hop to destination and
record distance as distance from next hop to destination plus distance from this switch to
next hop.
Question # 9
Answer
Data delivery from one computer to another is accomplished through store and forward
technology. In this technology packet switch stores incoming packet and also forwards
that packet to another switch or computer. For this purpose packet switch has internal
memory into which it can hold packet if outgoing connection is busy. Packets for each
connection held on queue.
Question # 10
Answer
Most networks offer dynamic connections, which last for a relatively short time.
To handle this, ATM can dynamically establish a switched virtual circuit (SVC), allow it
last as long as necessary and then terminate it.
The terminology comes from the Telco‘s where switching system normally refers to all
switching.
ESTABLISHING AN SVC:
Each pair of switches in the path communicates to choose a VPI/VCI for their tables.
Once the connection is established by the destination, a message is sent back to the
originating computer to indicate the SVC is ready.
If any switch or the destination computer does not agree to setting up the VC, an error
message is sent back and the SVC is not established
Question # 11
Answer
The bridge builds a list of MAC addresses on either side of the bridge. Therefore, it
knows which packets should be forwarded to the other side and which should not. Most
bridges are self-learning bridges. As soon as a frame arrives to a bridge, it extracts a
source address from its header and automatically adds it in the list for that segment. In
this way a bridge builds up address lists.
In the example of a packet that uses a MAC address not in its table it can err on the side
of caution by forwarding the packet.
Question # 12
Answer
This characteristic specifies whether conversations take place in a more or less structured
manner. When using a connection-oriented protocol, you incur the overhead of setting up
a virtual circuit (a defined communications path) between the sender and receiver, which
is maintained until the sender and receiver have completed their entire conversation.
When the conversation is completed, you incur the overhead of tearing down the virtual
circuit. Connection-oriented protocols provide guaranteed delivery of messages in the
order in which they were sent.
Contrast this with Connectionless service, which does not require establishing a session
and a virtual circuit. This can be found in the network layer or transport layer, depending
on the protocol. You can think of a connectionless protocol as being akin to mailing a
post card. You send it and hope that the receiver gets it. Common features of a
connectionless service are:
Reassembly of any packet broken into fragments during transmission must be in proper
order
No Acknowledgement is required.
Question # 13
Which type of information is obtained from network sniffer and in which mode Network
sniffer operates?
Answer:
A network analyzer also called network monitor or a network sniffer is used to examine
the performance of or debug a network. It can report statistics such as capacity utilization,
distribution of frame size, collision rate or token circulation time
Most installations still use DIX Ethernet encoding in which there is no LLC/SNAP
header in the frame. A network analyzer can tell from the values in the type field (small
values are lengths, which mean an LLC/SNAP header is located in the first octets of the
data area; large values are types, which mean no LLC/SNAP header is included).
The operation of network analyzer is a computer with a network interface that receives all
frames, which is called promiscuous mode. So many desktop computers have interface
that can be configured for promiscuous mode. When combined with software computer
can examine any frame on LAN. In this way the communication across LAN is
guaranteed to be private. Computer receives and displays frames on the LAN.
Network analyzer can be configured to filter and process frames. It can count frames of
specific type of size. It displays only frames from or to specific computers.
Question # 14
Differentiate b/w Thin Ethernet, Thick Ethernet and Twisted Pair Ethernet?
Answer
Thick Ethernet:
One form of cabling supported by Ethernet is low-loss 50 Ohm coaxial cable as shown in
the figure below. This type of cable is 0.5" diameter (usually supplied with a yellow outer
PVC coating) and rather inflexible. It has become known in the communications industry
as "Thick Ethernet". The official name for this cable is 10 Baseband5 (10B5), indicating
that it is specified for baseband communications at 10 Mbps over distances up to 500m.
Thin Ethernet:
Thin Ethernet, officially called 10 Base-2, is a less expensive version of 10 Base-5 (Thick
Ethernet) technologies. It uses a lighter and thinner coaxial cable and dispenses with the
external transceivers used with 10 Base-5.
10 Base-2 uses an RG-58A/U coaxial cable and is wired in a bus topology. Each device
on the network is connected to the bus through a BNC "T" adapter, and each end of the
bus must have a 50 Ohm terminator attached. Each node on the bus must be a minimum
of 0.5 meters (1.5 feet) apart, and the overall length of the bus must be less than 185
meters (606 feet).
Twisted Pair Ethernet (10baseT), sometime also called "UTP" from "Unshielded Twisted
Pair", is based on using a cable similar to phone-wiring. The cable is connected via RJ-45
connectors to the network card installed in the PC.
Question # 15
Answer
Question # 16
TCP uses single format for all messages. TCP uses the term segment to refer to a
message. Each message sent from TCP on one machine to TCP on another machine uses
this format including data and acknowledgement.
Question # 17
Answer
105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255
69DC: 8864: FFFF: FFFF: 0:1280:8C0A: FFFF
FF0C: 0:0:0:0:0:0:B1
FF0C::B1
Question # 18
How much data can present on original Ethernet segment at one time? To find out
compute the delay-throughput product. The original Ethernet operate at 10 mega bits per
second, and a segment was limited to 500 meters. Assume the signals propagate down the
cable at 66 percent of the speed of light?
Answer
Bandwidth=10
Question # 19
Answer
FRAME:
RING TOPOLOGY
In this topology of network the computers are connected to each other in closed loop.
STAR TOPOLOGY
In this topology, all computers are attached to a central point, which is sometimes called
the Hub
Question # 20
Answer
A bridge keeps a list for each segment that consists of physical addresses of the computer
attached to that segment. In this way a bridge knows on which segment a destination
computer is attached.
Most bridges are self learning bridges. As soon as a frame arrives to a bridge, it extracts a
source address from its header and automatically adds it in the list for that segment. In
this way a bridge builds up address lists.
A bridge is a hardware device also used to connect two LAN segments to extend a LAN.
FRAME FILTERING
The most important task a bridge performs is frame filtering. If both the source and
destination are on the same segment, it does not forward the frame to the other segment.
A frame is forwarded to the other segment, if it is destined to that segment.
Question # 21
Answer
NIC contains sufficient hardware to process data independent of system CPU. In which
some NICs contain separate microprocessor. In addition to this it also include analog
circuitry interface to system bus, buffering and processing
Question # 22
What is Parity Checking? Explain
Answer
Parity checking
To detect the error there are different schemes for which parity checking is also common
used, in parity checking, parity refers to the number of bits set to 1 in the data item. A
parity bit is an extra bit transmitted with data item chose to give the resulting bit even or
odd parity
Question # 23
Answer
Djikstra‘s algorithm
Djikstra‘s algorithm can accommodate weights on edges in graph. The shortest path is
then the path with lowest total weight.
Question # 24
Answer
A repeater is used to increase the signal strength. It amplifies the weakening signal
received from one segment and then retransmits onto another segment.
Qno.1 in LAN of 8 pcs, at low cost which wire scheme you will use. Give reasons
Answer:-
Reasons:-
Twisted pair Ethernet is the cheapest wiring that makes it so popular.
To allow changing the wiring without changing the interface hardware, NICs support
Multiple wiring schemes are not limited to Ethernet technology.
hubs (physically a star topology) to simulate a logical ring network.
The distance between devices
The amount of em-noise
REF:: Handouts Page No. 45,47
Qno.2 how many bits contains in VCI & VPI
Answer:-
Virtual Channel Indicator (16-bits)
Virtual Path Indicator (8- bit),
REF:: Handouts Page No. 67
Qno.3 we have a bridge network that has two segments. is that possible to transfer
data simultaneously through segments ?
Unlike a repeater, a bridge uses two NICs to connect two segments. It listens to all traffic and
recognizes frame format. It also forwards only correct complete frames and discards the collided
and error frames. A typical bridge has two NICs, a CPU a memory and a ROM. It only runs the
code stored in its ROM. A network bridge can be used to segment one network into two,
thereby reducing the number of devices competing for transmission privileges.
For example,
if network A has 20 devices, there is the likelihood that two or more of them will attempt to
transmit data at the same time and cause a collision. If a network bridge is added, it can split
network A into networks A and B of 10 devices each.
REF:: Handouts Page No. 50
Qno.3 is there any technology that use LAN and WAN both topologies. if yes then write its
Name
Star Topology, all computers are attached to a central point, which is sometimes called the Hub
Ring Topology network the computers are connected to each other in closed loop. In this
network first computer passes data to the second and then second passes data to third and so
on,
REF:: Handouts Page No. 25
Qno.4 why packet switch check the header frame before forwarding the packet
Answer:-
Data delivery from one computer to another is accomplished through store and forward
technology. In this technology packet switch stores incoming packet and also forwards that
packet to another switch or computer. For this purpose packet switch has internal memory into
which it can hold packet if outgoing connection is busy. Packets for each connection held on
queue.
REF:: Handouts Page No. 56
Qno.5 Why the designer of ATM technology select cells not packets? Give five reasons
Answer:-
Reason:
6. ATM multiplexed these 53-byte cells instead of packets which reduced worst-case cell
contention jitter by a factor of almost 30, reducing the need for echo cancellers.
7. Reduction of jitter (and also end-to-end round-trip delays)
8. Full-length 1500 byte (12000-bit) data packet would take 77.42 to transmit.
9. The design of ATM aimed for a low-jitter network interface
10. ATM broke up all packets, data, and voice streams into 48-byte chunks, adding a 5-byte
routing header to each one so that they could be reassembled later
REF:: Handouts Page No. 66
Qno.6 If two far away situated offices are to connect with will be appropriate LAN extension
or WAN. Give four reasons to support you answer
8. If two buildings are located far from each other, a bridge, a pair of fiber modems and an
optical fiber can be used to connect two LANs
9. LAN segments that need to be interconnected but are slightly far away, point to
point wireless solutions are available
10. They are generally kept over a tower so that line of sight is realized between
the locations, for best performance.
11. These outdoor access points are configured to operate in the point-to-point or point-to-
multipoint modes and one such access point along with antenna/tower is required in
each department/building which needs to be interconnected.
12. In certain areas, metro Ethernet might be available where the service provider has
the infrastructure to connect two locations of a same branch located in different
places at speeds of 10/100 Mbps using his public network infrastructure
Qno.7 writes three benefits of routing if source address is not included in the header
Answer:-
Benefit
It allows fast and efficient routing.
Packet switch need not hove complete information about all destinations in spite it just has next
The network can continue to function even if topology changes without notifying entire network
REF:: Handouts Page No. 58
Qno.8 How many methods are available to span a network over longer distances? Just write
their names. (2 Marks)
Answer:-
• LEASED SERIAL LINE CONNECTION:
• LEASED SATELLITE CHANNEL:
REF:: Handouts Page No. 52
Qno.9 which two identifier in ATM are used to make Virtual Circuit? (2 Marks)
Answer:-
VCI (Virtual Channel Indicator)
VPI (Virtual Path Indicator)
REF:: Handouts Page No. 67
Qno.11 Describe the procedures in steps of Telephone calling, A connection oriented service
(Marks5)
Answer:
The connection-oriented service paradigm for networking is similar to the manner in which
telephones are used. This is given as follows:
A caller dials a number of the destination. The telephone at the destination signals the arrival of
a connection request. If the called person does not answer; the caller gives up after waiting for a
timeout. If the called person does answer, then the connection is established as binary
connection identifier is given to each of the two parties to enable identification of the
connection.
REF:: Handouts Page No. 67
Qno.16 While designing the ATM technology why designer of ATM chosen cells over packets
which being used widely? Give five reasons to support your answers.(5)
Reason:
• ATM multiplexed these 53-byte cells instead of packets which reduced worst-case cell
contention jitter by a factor of almost 30, reducing the need for echo cancellers.
• Reduction of jitter (and also end-to-end round-trip delays)
• Full-length 1500 byte (12000-bit) data packet would take 77.42 to transmit.
• The design of ATM aimed for a low-jitter network interface
5. ATM broke up all packets, data, and voice streams into 48-byte chunks, adding a 5-byte routing
header to each one so that they could be reassembled later
Qno.17 Suppose star organization using repeater in its network. If frames comes from another
network then will the repeater be capable of distinguish between frames from two different
networks? Support your answer with a reason also writes down three drawbacks, this organization
may face due to use of repeater.
Answer:-
Drawbacks
24. Repeaters provide no method for isolating traffic generated on one cable segment from traffic
generated by the other cable segment
25. When network uses a repeater to connect cable segment A to segment B whether or not
there is a station in segment B that is the destination of the signal
26. Ethernet standard specifies that any two stations cannot be separated by more than four
repeaters.
27. Repeaters do not recognize frame formats; they just amplify and retransmit the electrical
signal. If a collision or error occurs in one segment, repeaters amplify and retransmit also
the error onto the other segments.
Question:
What is Broadcast?
Answer:
Question:
I can't understand it. " Instead of how a specific protocol handles congestion, we
It is very simple english and it means that for now we do not need to go into
details that how the congestion (overloading) is handles, but we are more to focus on what
is
Question:
I can't understand the basic concept of "Fixed networks". Plz explain the term
Answer:
Fixed Network includes the example of your lab network with laid network lines
and are not moved usually. On the other side mobile networks include example of your
Mobile
Question:
question is what are these different technologies? Kindly list them and also list the features
of
these technologies and why we don't have any single standard for connecting networks?.
Answer:
You do not need to go into details of the multiple networks provided by different
companies.
Some of the examples of the networking technologies are: Ethernet, Fast Ethernet,
Myrinet,
ATM, SCRAMNet, Fibre Channel, FDDI. If you need to learn about the features of these
technologies for your own knowledge, you should search for them over the internet as a
vast
other companies as well as they provide with some enhance idea with the existing
technology
Question:
Explain about routers and how different networks are connected by routers?
Answer:
router receives transmitted messages and forwards them to their correct destinations over
the
most efficient available route. On an interconnected set of local area networks (LANs)
using the
same communications protocols, a router serves the somewhat different function of acting
as a
link between LANs, enabling messages to be sent from one to another. You will read in
detail
Question:
Answer:
Latency is the time required for a signal to travel from one point on a network to
another.
Question:
How models are either so simple are either so cpmplex how can we exlpain by
Answer:
provided on the provider side or the understanding gathered on the learner (client) side. It
can be
easily understood with your own example. As it is written in very clear words in handouts
that
the complexity depends if the information provided is not prior to details or they are so
simple
that sometimes it is hard to distinguish between the details. But you have not understood it,
so
you have taken it as the complex form and don't find it that the information provided is
enough
to your understanding.
Question:
Answer:
PING stands for Packet Internet Groper. It is a protocol for testing whether a
particular computer is connected to the Internet by sending a packet to its IP address and
waiting
for a response. In any windows system , 95, 98 , XP or 2000 or any other, go to the windows
command prompt and type "ping/?", press enter and you will know if it is working in the
windows and also how can you use different options of PING command.
Question:
Question:
'traceroute' does not work in the LAN when sitting on a client computer, what
Answer:
Trace Route works on all the systems on the network. You should see if you are
not making any typing mistake or if you are using Wrindows XP then you need to type
"tracert"
Question:
PING command is only used to know the existence of a site or is there any other
Answer:
Question:
What factor determines how much byte data packed is send from the host
computer. In one of the example in Lecture 2 you determines 32 byte and in other it was
56?
What this difference means?
Answer:
It is an internal feature of the ping command that it by default work with 32 data
bytes. You simply try the ping command and you will learn its working , ping with
different
servers. In any windows system , 95, 98 , XP or 2000 or any other, go to the windows
command
prompt and type "ping/?", press enter and you will know if it is working in the windows
and also how can you use different options of PING command.
Question:
What is the difference b/w "PING and Trace Route Probing Tools".
Answer:
PING stands for Packet Internet Groper. It is a protocol for testing whether a
particular computer is connected to the Internet by sending a packet to its IP address and
waiting
for a response. In any windows system , 95, 98 , XP or 2000 or any other, go to the windows
command prompt and type "ping/?", press enter and you will know if it is working in the
windows and also how can you use different options of PING command.
Traceroute shows all the computers in the defined network path, it shows all the computers
which comes in the way of source and the destination computers. Type "tracert/?" in
command prompt in Windown XP and you will see its different functionalities.
As ping tells us about the connectivity of the host or other computer, is it uses
Answer:
Yes, it does use resources of the computer. It is an internal command and use the
network resources.
Question:
Answer:
Resource is any part of a computer system or a network, such as a disk drive, printer, or
memory,
Question:
I tried ping and tracert both with different sites but when I do it with VU website
it does not respond and messages come out to be request time out. Why is it so? As VU
website
is alive, is that because of any security reason or there is some other problem?
Answer:
It is not any security reason. Any site which is outside the secure link responds to
ping and tracert commands. The problem is the network traffic over the VU sites or the
internet
speed you are having. As VU sites holds a lots of users and these commands need a free way
for
information. I can tell you as an example, if i use ping or tracert commands for vu sites
they
work very correctly and efficiently without any time out, but while using any other site,
such as
google.com or msn.com, i have tried to use tracert command on both sites with an interval
of half
an hour, and i have come up with the result that when i used the command earlier it was
working
ok and just gave a timeout once , but the other time it is not responding at all.
Question:
Answer:
It may be due to the complexity of the network connections. Also it can be due to
the fact that the server is too busy and not been able to respond all the clients. This may
happen
Question:
Is this ping & tacing a route tools only use in XP window or other windows like
98 or 95 etc.?
Answer:
command prompt and type "ping/?", press enter and you will know if it is working in the
windows and also how can you use different options of PING command.
Question:
Data Stuffing basically involves bit stuffing and byte stuffing: Bit stuffing is the
practice of adding bits to a stream of data. Bit stuffing is required by many network and
communications protocols for the following reasons: To prevent data being interpreted as
control
information. For protocols that require a fixed-size frame, bits are sometimes inserted to
make
For protocols that required a continuous stream of data, zero bits are sometimes inserted
to
Question:
Answer:
CSMA is short for Carrier Sense Multiple Access / Collision Detection, a set of
rules determining how network devices respond when two devices attempt to use a data
channel
monitor the traffic on the line at participating stations. If no transmission is taking place at
the
time, the particular station can transmit. If two stations attempt to transmit
simultaneously, this
causes a collision, which is detected by all participating stations. After a random time
interval,
the stations that collided attempt to transmit again. If another collision occurs, the time
intervals from which the random waiting time is selected are increased step by step. This is
known as
CSMA/CD is a type of contention protocol. Networks using the CSMA/CD procedure are
simple
LAN hardware includes the network adapter and the wires used to connect these adaptors
in all
computers. This is the simplest definition of LAN hardware. What do you not understand
about
Question:
Answer:
PING stands for Packet Internet Groper. It is a protocol for testing whether a
particular computer is connected to the Internet by sending a packet to its IP address and
waiting
for a response. In any windows system , 95, 98 , XP or 2000 or any other, go to the windows
command prompt and type "ping/?", press enter and you will know if it is working in the
windows and also how can you use different options of PING command.
Traceroute shows all the computers in the defined network path, it shows all the computers
which comes in the way of source and the destination computers. Type "tracert/?" in
command prompt in Windown XP and you will see its different functionalities.
Question:
Answer:
is detected by all participating stations. After a random time interval, the stations that
collided
attempt to transmit again. If another collision occurs, the time intervals from which the
random
waiting time is selected are increased step by step. This is known as exponential back off.
Question:
Broadcast Address must be "all 1s" Pls tell me that what are the total no.of 1s in a
broadcast address. and how it can be send to other computers on the LAN?
Answer:
receive frames with this address. Normally, broadcast messages are sent for network
On IP networks, the IP address 255.255.255.255 (in binary, all 1s) is the general broadcast
address. You can't use this address to broadcast a message to every user on the Internet
because
routers block it, so all you end up doing is broadcasting it to all hosts on your own network.
The
broadcast address for a specific network includes all 1s in the host portion of the IP
address. For
example, on the class C network 192.168.1.0, the last byte indicates the host address (a 0 in
this
position doesn't refer to any host, but provides a way to refer to the entire network). The
value
255 in this position fills it with all 1s, which indicates the network broadcast address, so
packets
sent to 192.168.1.255 are sent to all hosts on the network. So the boradcast address contains
8
number of 1's.
Question:
In CSMA/CD why we use a random time from 0-d. Why we not assign a specific
Answer:
the line at participating stations. If no transmission is taking place at the time, the
particular
station can transmit. If two stations attempt to transmit simultaneously, this causes a
collision,
which is detected by all participating stations. After a random time interval, the stations
that
collided attempt to transmit again. If another collision occurs, the time intervals from
which the
random waiting time is selected are increased step by step. That is why we use random
time.
Question:
Is CRC detects balance errors or not. If not then is there any technique that can
detect balance error ?
Answer:
CRC can detect balance errors. CRC error checking uses a complex calculation to
generate a number based on the data transmitted which is same as balance errors.
Question:
What does Spatial and Temporal Locality Principles mean? Does it mean that we
are having LANs for in LANS computer are located in a close contact with eath other, and
to
eastablish a connection with nearby computer is a lot more easier than with the computers
Answer:
Spatial Locality pattern refers to the communication which is carried out between
Temporal Locality pattern means that the communicaion is carried out between same
computers
It may cause difference in peer to peer connection speed, but when it comes to LANs with
Question:
Answer:
Shift registers are a type of sequential logic circuit, mainly for storage of digital
data. They are a group of flip-flops connected in a chain so that the output from one flip-
flop
becomes the input of the next flip-flop. Most of the registers possess no characteristic
internal
sequence of states. All the flip-flops are driven by a common clock, and all are set or reset
simultaneously.
Question:
What is the difference between "ping" and "ping6" and "tracert" and "tracert6"?
Answer:
The core protocol used on the Internet is called the Internet Protocol or simply IP.
The current version of this protocol is version 4 (IPv4). This version of the protocol was
designed over 20 years ago. Since that time, a great deal about networking has been
learned and
much more still has changed. The original design has proven to work well, but in hindsight,
a
number of shortcomings with the design have been exposed. A new version of the protocol,
version 6, is being deployed by the Internet community (version 5 was used for testing and
never
widely implemented). Most systems now have IPv6 support built in and many network
operators
are beginning trials and building production networks based on the newer version of IP.
IPv4 Internet addresses are unique 32-bit identifiers used to address hosts on the Internet.
IPv6 is backward compatible with IPv4, provided that special techniques are used. For
example,
allow IPv4 addresses to be embedded within the IPv6 address structure. This method takes
regular IPv4 addresses and puts them in a special IPv6 format so they are recognized as
being
To trace a full IPv6 network path, you can use the tracert6 command.
Question:
Answer:
communicate with one another over a network. Some of the advantages of TCP/IP include:
- Platform independent
TCP/IP is really a standard which computer manufacturers have agreed will be used to
allow
computers to exchange data. TCP/IP is not just one protocol, but is actually a collection of
several. TCP and IP are the two major components, although there are several other
components
included in the entire procedure.
Question:
Answer:
two or more channels of information are transmitted over the same link by allocating a
different
time interval ("slot" or "slice") for the transmission of each channel. I.e. the channels take
turns to use the link. Some kind of periodic synchronising signal or distinguishing identifier
is usually
required so that the receiver can tell which channel is which. TDM becomes inefficient
when
traffic is intermittent because the time slot is still allocated even when the channel has no
data to transmit.
Question:
break it into packets as first turn into Kb's then we can send the file if we want to send it
quickly?
Answer:
If for example you are required to send a 5MB file over a network. If you send
the whole file as one file, it will first break into packets and then will be sent and these
packets
will reunite to for the original file. If you break it into file of size 1MB each or 500KB each
then
it will again be broken down in packets and same procedure will be carried out. But the
packets
in case of whole 5MB file, there will be many packets and so it will take a little more time
while
creating and reuniting packets as compared to the less number of packets in case of 1MB
or
Question:
via Routers. When we use "trace route" command to find the path from source to
destination, are these IP's belong to routers, or servers or both because router must also
have some address to be
uniquely identified. If both routers and server machines have some IP address then how
could we
Answer:
Routers do not have any IP address. They are the electronic devices. Routers are
single network linking many computers through a mesh of possible connections, a router
receives transmitted messages and forwards them to their correct destinations over the
most
efficient available route. On an interconnected set of local area networks (LANs) using the
same
between LANs, enabling messages to be sent from one to another. Therefore you only need
one
IP address. i,e., of server.
Question:
Answer:
regenerating a signal so that it can be transmitted onward in its original strength and form.
On a
network, a repeater connects two networks or two network segments at the physical layer
and
Question:
Plz explain what is difference between character based machines and bit orianted
machines?
Answer:
Bit stuffing is the practice of adding bits to a stream of data. Bit stuffing is required by
many
For protocols that require a fixed-size frame, bits are sometimes inserted to make the
frame size
Character Oriented Machines are based on Byte Stiffing techniques. See handouts for byte
stuffing detials.
Question:
What is the diffrence between LAN user IP and a Modem user IP ? Most of the
LAN IP's of diffrent LANs are same for example 192.168.0.43 many diffrent LAN users
have
this IP so how can i acess this IP of diffrent LAN network user which have the same IP ? Is
this
Answer:
LAN IP is the IP address given to a network (to every individual computer). This
IP address which you have mentioned is the standard of any LAN IP network address.
Modem IP
is is the IP given at the time when you are connected to the ISP (Internet Service Provider)
which
gives a different IP to all its users when they are connected. IP is basically managed by the
visit two different labs, you may find same IP address on some computer in these two labs,
but
these labs will not be interconnected to each other. Similarly the modem IP's are never the
same.
Question:
Answer:
Parity Checking is the prodecure of using parity bit to check the accuracy of
transmitted data.
CRC (cyclic redundancy check) is a procedure used in checking for errors in data
transmission.
CRC error checking uses a complex calculation to generate a number based on the data
transmitted. The sending device performs the calculation before transmission and sends its
result
to the receiving device. The receiving device repeats the same calculation after
transmission. If
both devices obtain the same result, it is assumed that the transmission was error-free. The
procedure is known as a redundancy check because each transmission includes not only
data but
Question:
Please explan the two term "Byte Stuffing" & "Bit Stuffing". What is different between
Byte Stuffing and Bit Sutffing ?
Answer:
Bit stuffing is the practice of adding bits to a stream of data. Bit stuffing is
required by many network and communications protocols for the following reasons:
For protocols that required a continuous stream of data, zero bits are sometimes inserted
to
Question:
Answer:
Question:
Answer:
data transmission. CRC error checking uses a complex calculation to generate a number
based on
the data transmitted. The sending device performs the calculation before transmission and
sends
its result to the receiving device. The receiving device repeats the same calculation after
transmission. If both devices obtain the same result, it is assumed that the transmission was
Question:
Which is the better option for comunicating (point to point) like star topology or
Answer:
It depends on the network you are using. All topologies have their advantages
and disadvantages depending on the usage. Star topology is mostly used in general
networks.
Question:
Answer:
or direct link through wires as in your lab network. Example of mobile networks are the
mobile
phones.
Semi persistent connections means those connections which are with intervals. For
example, you
might have noticed that sometimes your mobile phoes just reply to some network even
when you
are not receiving or dialing any number, it is because the network keeps on cheking the
devices
Question:
Answer:
directly with computers external to the network and vice versa. Instead, all communication
is
routed through a proxy server outside of the network, and the proxy server decides
whether it is
safe to let a particular message or file pass through to that network. ISPs usually restrict
the
protocol which allows the IP address to travel along the path to keep safe from any kind of
Question:
Answer:
Hardware fault can occur if the system crashes, its physical components cause
errors due to any reason like system halt, over heating, component failure damage. There
can be
many reasons of its occurance. Please contact your operating systems instructor for more
details.
Question:
Answer:
Question:
What is subnet?
Answer:
router.
Question:
Difference between the communication and transmission.
Answer:
polarity, synchronisation, clock etc. Communication means the meaning full exchange of
Question:
Answer:
Question:
What is SAP?
Answer:
Series of interface points that allow other computers to communicate with the
Question:
Answer:
received from a remote computer and it hides the networking hardware from applications.
Question:
What is RAID?
Answer:
A method for providing fault tolerance by using multiple hard disk drives.
Question:
Answer:
When the computers on the network simply listen and receive the signal, they are
referred to as passive because they don’t amplify the signal in any way. Example for
passive
Question:
What is Brouter?
Answer:
Hybrid devices that combine the features of both bridges and routers.
Question:
What is cladding?
Answer:
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
Question:
Answer:
A gateway operates at the upper levels of the OSI model and translates
Question:
What is attenuation?
Answer:
The degeneration of a signal over distance on a network cable is called
attenuation.
Question:
Answer:
The address for a device as it is identified at the Media Access Control (MAC)
layer in the network architecture. MAC address is usually stored in ROM on the network
adapter
Question:
Answer:
Bit rate is the number of bits transmitted during one second whereas baud rate
refers to the number of signal units per second that are required to represent those bits.
baud rate
Question:
Answer:
Signals are usually transmitted over some transmission media that are broadly
Question:
Guided Media:
Answer:
These are those that provide a conduit from one device to another that include
twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these
media is
directed and is contained by the physical limits of the medium. Twisted-pair and coaxial
cable
use metallic that accept and transport signals in the form of electrical current. Optical fiber
is a
glass or plastic cable that accepts and transports signals in the form of light.
Question:
Unguided Media:
Answer:
This is the wireless media that transport electromagnetic waves without using a
physical conductor. Signals are broadcast either through air. This is done through radio
Question:
Answer:
physical layer, the data link layer and to some extent the network layer to allow for
internetworking standard for compatibility of different LANs and MANs across protocols.
802.2
Logical link control (LLC) is the upper sublayer of the data link layer which is non-
architecture-
specific, that is remains the same for all IEEE-defined LANs. Media access control (MAC)
is the
lower sublayer of the data link layer that contains some distinct modules each carrying
proprietary information specific to the LAN product being used. The modules are Ethernet
LAN
(802.3), Token ring LAN (802.4), Token bus LAN (802.5). 802.6 is distributed queue dual
bus
Question:
Answer:
physical layer. It receives the signal in the network before it becomes weak, regenerates the
original bit pattern and puts the refreshed copy back in to the link. Bridges: These operate
both in
the physical and data link layers of LANs of same type. They divide a larger network in to
smaller segments. They contain logic that allow them to keep the traffic for each segment
separate and thus are repeaters that relay a frame only the side of the segment containing
the
intended recipent and control congestion. Routers: They relay packets among multiple
interconnected networks (i.e. LANs of different type). They operate in the physical, data
link and
network layers. They contain software that enable them to determine which of the several
possible paths is the best for a particular transmission. Gateways: They relay packets
among
networks that have different protocols (e.g. between a LAN and a WAN). They accept a
packet
formatted for one protocol and convert it to a packet formatted for another protocol before
forwarding it. They operate in all seven layers of the OSI model.
Question:
What are the data units at different layers of the TCP / IP protocol suite?
Answer:
The data unit created at the application layer is called a message, at the transport
layer the data unit created is called either a segment or an user datagram, at the network
layer the
data unit created is called the datagram, at the data link layer the datagram is
encapsulated in to a frame and finally transmitted as signals along the transmission media.
Question:
Answer:
The address resolution protocol (ARP) is used to associate the 32 bit IP address
with the 48 bit physical address, used by a host or a router to find the physical address of
another
host on its network by sending a ARP query packet that includes the IP address of the
receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet
address
Question:
What is the minimum and maximum length of the header in the TCP segment
and IP datagram?
Answer:
The header should have a minimum length of 20 bytes and can have a maximum
length of 60 bytes.
Question:
Answer:
Class A 0.0.0.0 - 127.255.255.255 Class B 128.0.0.0 - 191.255.255.255 Class C
247.255.255.255
Question:
Answer:
Peer-to-peer network, computers can act as both servers sharing resources and as
clients using the resources. Server-based networks provide centralized control of network
resources and rely on server computers to provide security and network administration
Question:
Answer:
cable in a single line. Advantages: Inexpensive, easy to install, simple to understand, easy to
extend. STAR topology: In this all computers are connected using a central hub.
Advantages:
Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical
problems.
RING topology: In this all computers are connected in loop. Advantages: All computers
have
equal access to network media, installation can be simple, and signal does not degrade as
much
Question:
Answer:
A network in which there are multiple network links between computers to
Question:
Answer:
single signal. In broadband transmission, signals are sent on multiple frequencies, allowing
Question:
Answer:
In a Ethernet network, between any two points on the network ,there can be no
more than five network segments or four repeaters, and of those five segments only three of
Question:
Answer:
Routable protocols can work with a router and can be used to build large
networks. Non-Routable protocols are designed to work on small, local networks and
cannot be
Question:
Answer:
Answer:
One of two sublayers of the data link layer of OSI reference model, as defined by
the IEEE 802 standard. This sublayer is responsible for maintaining the link between
computers
when they are sending data across the physical network connection.
Question:
Answer:
although multicast connections are also permitted. The other name for virtual channel is
virtual
circuit.
Question:
Answer:
One of the main causes of congestion is that traffic is often busy. If hosts could
be made to transmit at a uniform rate, congestion would be less common. Another open
loop
Answer:
Question:
What is region?
Answer:
When hierarchical routing is used, the routers are divided into what we will call
regions, with each router knowing all the details about how to route packets to destinations
within its own region, but knowing nothing about the internal structure of other regions.
Question:
Answer:
It is a problem that can ruin TCP performance. This problem occurs when data
are passed to the sending TCP entity in large blocks, but an interactive application on the
Question:
Answer:
Question:
Answer:
It is any routing protocol used within an autonomous system.
Question:
Answer:
the set of networks that can be reached within or via each autonomous system.
Question:
Answer:
Question:
Answer:
It is a protocol used to advertise the set of networks that can be reached with in
an autonomous system. BGP enables this information to be shared with the autonomous
system.
Question:
core routers.
Question:
Answer:
It is a set of rules defining a very simple virtual terminal interaction. The NVT is
Question:
Answer:
It is a host that has a multiple network interfaces and that requires multiple IP
Question:
What is OSPF?
Answer:
It is an Internet routing protocol that scales well, can route traffic along multiple
paths, and uses knowledge of an Internet's topology to make accurate routing decisions.
Question:
Answer:
It is using a router to answer ARP requests. This will be done when the
originating host believes that a destination is local, when in fact is lies beyond router.
Question:
Question:
LAN, MAN, CAN, and WAN: What are the differences? What is each one used
for?
Answer:
LAN, MAN, CAN, and WAN are all different types of networks used when
connecting to the internet and/or other computers. LAN is a local area network used in
small
areas such as homes or offices. LANs offer quick data transferring due to its small area and
transfer area. Additionally, LANs don't need an external telecom device in order to be
accessed.
MANs are metropolitan area networks, so they are used for larger areas, such as entire
cities.
CANs are a type of MAN meaning campus area network. As the name implies, they are
commonly used on academic campuses, but can also be used in most any moderate area.
WAN is
a wide area network and is good for a larger area. WAN are often compared to LAN
connections. They have a slower data transfer due to the wide range. WANs are commonly
used
Question:
Answer:
but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to
block
traffic, and the other which exists to permit traffic. Some firewalls place a greater emphasis
on
blocking traffic, while others emphasize permitting traffic. Probably the most important
thing to
recognize about a firewall is that it implements an access control policy. If you don't have a
good
idea of what kind of access you want to allow or to deny, a firewall really won't help you.
It's
also important to recognize that the firewall's configuration, because it is a mechanism for
enforcing policy, imposes its policy on everything behind it. Administrators for firewalls
managing the connectivity for a large number of hosts therefore have a heavy
responsibility.
Question:
Answer:
The Internet, like any other society, is plagued with the kind of jerks who enjoy
the electronic equivalent of writing on other people's walls with spraypaint, tearing their
mailboxes off, or just sitting in the street blowing their car horns. Some people try to get
real
work done over the Internet, and others have sensitive or proprietary data they must
protect.
Usually, a firewall's purpose is to keep the jerks out of your network while still letting you
get
your job done. Many traditional-style corporations and data centers have computing
security
policies and practices that must be followed. In a case where a company's policies dictate
how
data must be protected, a firewall is very important, since it is the embodiment of the
corporate
policy. Frequently, the hardest part of hooking to the Internet, if you're a large company, is
not
justifying the expense or effort, but convincing management that it's safe to do so. A
firewall
provides not only real security--it often plays an important role as a security blanket for
management.
Question:
Answer:
Some firewalls permit only email traffic through them, thereby protecting the
network against any attacks other than attacks against the email service. Other firewalls
provide
less strict protections, and block services that are known to be problems. Generally,
firewalls are
more than anything, helps prevent vandals from logging into machines on your network.
More
elaborate firewalls block traffic from the outside to the inside, but permit users on the
inside to
communicate freely with the outside. The firewall can protect you against any type of
network-
borne attack if you unplug it. Firewalls are also important since they can provide a
singlè`choke
point'' where security and audit can be imposed. Unlike in a situation where a computer
system is
being attacked by someone dialing in with a modem, the firewall can act as an
effectivè`phone
tap'' and tracing tool. Firewalls provide an important logging and auditing function; often
they
provide summaries to the administrator about what kinds and amount of traffic passed
through it,
how many attempts there were to break into it, etc. Because of this, firewall logs are
critically
important data. They can be used as evidence in a court of law in most countries. You
should
safeguard, analyze and protect yoru firewall logs accordingly. This is an important point:
providing this ``choke point'' can serve the same purpose on your network as a guarded
gate can
for your site's physical premises. That means anytime you have a change in ``zones'' or
levels of
sensitivity, such a checkpoint is appropriate. A company rarely has only an outside gate
and no
receptionist or security staff to check badges on the way in. If there are layers of security
on your site, it's reasonable to expect layers of security on your network.
Question:
Answer:
Firewalls can't protect against attacks that don't go through the firewall. Many
corporations that connect to the Internet are very concerned about proprietary data
leaking out of
the company through that route. Unfortunately for those concerned, a magnetic tape,
compact
disc, DVD, or USB flash drives can just as effectively be used to export data. Many
organizations that are terrified (at a management level) of Internet connections have no
coherent
policy about how dial-in access via modems should be protected. It's silly to build a six-foot
thick steel door when you live in a wooden house, but there are a lot of organizations out
there
buying expensive firewalls and neglecting the numerous other back-doors into their
network. For
Firewall policies must be realistic and reflect the level of security in the entire network. For
example, a site with top secret or classified data doesn't need a firewall at all: they
shouldn't be
hooking up to the Internet in the first place, or the systems with the really secret data
should be
isolated from the rest of the corporate network. Lost or stolen PDAs, laptops, cell phones,
USB
keys, external hard drives, CDs, DVDs, etc. For protection against this type of data loss,
you will
need a good policy, encryption, and some sort of enterprise auditing/enforcement. Places
that
really care about Intellectual Property (IP) and data loss prevention use USB firewalling
technology on their desktops and systems in public areas. The details are outside the scope
of
this FAQ. Badly written, pooly thought out, or non-existent organizational policy. A
firewall is
the end extension of an organization's security policy. If that policy is ill-informed, pooly
formed, or not formed at all, then the state of the firewall is likely to be similar. Executive
buy-in is key to good security practice, as is the complete and unbiased enforcement of your
policies.
Firewalls can't protect against political exceptions to the policy, so these must be
documented
and kept at a miniumum. Another thing a firewall can't really protect you against is
traitors or
idiots inside your network. While an industrial spy might export information through your
firewall, he's just as likely to export it through a telephone, FAX machine, or Compact
Disc. CDs
are a far more likely means for information to leak from your organization than a firewall.
Firewalls also cannot protect you against stupidity. Users who reveal sensitive information
over
the telephone are good targets for social engineering; an attacker may be able to break into
your
network by completely bypassing your firewall, if he can find à`helpful'' employee inside
who
can be fooled into giving access to a modem pool or desktop through a "remote support"
type portal. Before deciding this isn't a problem in your organization, ask yourself how
much trouble
a contractor has getting logged into the network or how much difficulty a user who forgot
his
password has getting it reset. If the people on the help desk believe that every call is
internal, you have a problem that can't be fixed by tightening controls on the firewalls.
Firewalls can't protect
against tunneling over most application protocols to trojaned or poorly written clients.
There are
no magic bullets and a firewall is not an excuse to not implement software controls on
internal
networks or ignore host security on servers. Tunneling ``bad'' things over HTTP, SMTP,
and
other protocols is quite simple and trivially demonstrated. Security isn't ``fire and forget' .
Lastly, firewalls can't protect against bad things being allowed through them. For instance,
many Trojan
Horses use the Internet Relay Chat (IRC) protocol to allow an attacker to control a
compromised
internal host from a public IRC server. If you allow any internal system to connect to any
external system, then your firewall will provide no protection from this vector of attack.
Question:
Answer:
of bits per second (bps). This quantity can represent either an actual data rate or a
theoretical
limit to available network bandwidth. The related units of Kbps, Mbps, Gbps represent
Question:
Answer:
computer network. Network names are typically different from names of individual
computers or
Question:
What is an intranet?
Answer:
Intranet is the generic term for a collection of private computer networks within
between people or workgroups to improve the data sharing capability and overall
knowledge
Question:
Answer:
A null modem cable connects to two standard serial ports for networking two
computers together. Null modem cables enable direct data transfer with a minimum of
setup
required. A null modem cable differs from ordinary serial cables the same way as Ethernet
crossover cables differ from ordinary Ethernet cables. Null modem cables reverse the
transmit
and receive lines on end to enable direct two-way communication. A null modem cable for
PCs
ordinarily follows the RS-232 standard and uses the same serial ports as RS-232 cables. An
RS-
232 null modem cable transfers data at the rate of 115 Kbps. The fastest null modem cable,
based
on RS-422, supports up to 450 Kbps. Today, null modem cables are used primarily by
engineers.
USB keys, Ethernet crossover cables, and general purpose network routers have effectively
made
Question:
Who invented the IP - the Internet Protocol?
Answer:
Lyndon Johnson, or any other individual. Instead, multiple people developed the key
technologies that later grew to become the Internet: Email - Long before the World Wide
Web,
email was the dominant communication method on the Internet. Ray Tomlinson developed
in
1971 the first email system that worked over the early Internet. Ethernet - The physical
David Boggs in 1973. TCP/IP - In May, 1974, the Institute of Electrical and Electronic
Engineers
(IEEE) published a paper titled "A Protocol for Packet Network Interconnection." The
paper's authors - Vinton Cerf and Robert Kahn - described a protocol called TCP that
incorporated both
Question:
Answer:
experimental packet-switched network (the ARPANET) that eventually evolved into the
Internet.
The military theorized that a distributed data network would be more fault-tolerant than a
telephone network, which could be disabled simply by attacking its central office
Question:
I have two or more computers. How do I connect them to share files and printers?
Answer:
Popular Network Types Ethernet: 10/100Mbps Home PNA 2.0 (Phone Line):
10Mbps Wireless 802.11b: 11 Mbps Wireless HomeRF 2.0: 10Mbps When choosing a
network
type (topology) for your home four things should be considered. Cost, Expandability,
Location
of Your PC's and speed. This article does not explain every networking type available, but
each
of the following network types offer a solution that is suitable for the home, has wide
industry
support and offers a good value for the money. Ethernet: The most popular network type
for both
home and business is Ethernet. Ethernet is fastest of the network types and can be the least
expensive. Ethernet networks are very stable and your network speed will never fluctuate
or be
prone to interference like other network types are. Ethernet requires special cables
running from
each computer. These cables are plugged into a central 'ethernet hub' or 'switch'. If your
computers are far apart, running cable in an existing home may be difficult. Pre-made
ethernet
cables come in sizes ranging from 3 feet to 50 feet. Ethernet adapters come in many shapes
and
sizes, but PCI Ethernet cards are both the fastest and least expensive. Ethernet can operate
at
10Mbps or 100Mbps. When shopping for ethernet equipment, be sure to look for 100Mbps
or
10/100Mbps equipment. 10Mbps equipment is older and slower than the 10/100Mbps
equipment
and the price difference has become nigligible. Note, older 10Mbps equipment will work
just
fine on 10/100Mbps networks. If only two computers are being connected, a single
CROSSOVER cable can be used instead of the standard cables + switch method.
Question:
How can one disable or enable Simple File Sharing in Windows XP?
Answer:
Simple File Sharing permits controlling both sharing and NTFS permissions at
the folder level. Network access is through a guest account. Windows XP Home Edition
always
has Simple File Sharing enabled. By default, it is turned off in Windows Professional when
it
joins a workgroup. Classic file sharing is used when Windows XP Pro joins a domain.
Windows
XP Home cannot join a domain. Simple File Sharing can be disabled in Windows XP Pro
when
accounts. To disable Simple File Sharing, click start, double-click My Computer, Tools,
Folder
Options, View tab, at the bottom of the list uncheck Use simple file sharing
(Recommended).
Question:
2000/NT)?
Answer:
Command Prompt). Enter at the command prompt enter ipconfig, e.g... C:and
SettingsF. Byard>ipconfig Windows IP Configuration Ethernet adapter Local Area
Connection name (wildcard characters * and ? allowed, see examples) Options: /? Display
this
help message /all Display full configuration information. /release Release the IP address for
the
specified adapter. /renew Renew the IP address for the specified adapter. /flushdns Purges
the
DNS Resolver cache. /registerdns Refreshes all DHCP leases and re-registers DNS names
/displaydns Display the contents of the DNS Resolver Cache. /showclassid Displays all the
dhcp
class IDs allowed for adapter. /setclassid Modifies the dhcp class id. The default is to
display
only the IP address, subnet mask and default gateway for each adapter bound to TCP/IP.
For
Release and Renew, if no adapter name is specified, then the IP address leases for all
adapters
bound to TCP/IP will be released or renewed. For Setclassid, if no ClassId is specified, then
the
ClassId is removed. Examples: > ipconfig ... Show information. > ipconfig /all ... Show
detailed information > ipconfig /renew ... renew all adapters > ipconfig /renew EL* ...
renew any
connection that has its name starting with EL > ipconfig /release *Con* ... release all
matching
connections, eg. "Local Area Connection 1" or "Local Area Connection 2" If your PC is
connected to the a device such as broadband router or cable MODEM with a DHCP server,
you
are using automatic IP addresses, and you want to test it, config /release and ipconfig
/renew to
release and renew the IP address lease. You should see it change, however, the new IP
address
Question:
What is DHCP?
Answer:
in a DHCP server and clients that use the server. Simply put, a DHCP server supplies
Internet
Protocol (IP) addresses when requested by client computers on a TCP/IP network that
have
use a range of IP addresses known as its scope. It automatically and dynamically manages
the
allocation of IP addresses within its scope. IP addresses are assigned to clients under a lease
Question:
When you have a cable MODEM from an ISP is the DHCP sitting at the ISP
site?
Answer:
Yes, one of them is. A DOCSIS (Data Over Cable Service Interface
Specification) cable MODEM also has a DHCP server which supplies a local IP address
that is
used to connect to the ISP DHCP server top obtain an IP for the Internet. Is DHCP part
part of
the Windows 2000 Server the operating system? A DHCP server is included as a service
with
Windows NT/2000 Server. Windows 2000, 98 SE/Me, etc. Internet Connection Server (ICS)
Question:
Can a Cat 6 modular plug be plugged into Cat 5 and 5e RJ-45 Jacks?
Answer:
Yes. The physical dimensions of Cat 6 RJ-45 plugs and jacks are identical to Cat
5 and 5e plugs and jacks. They are backward compatible with Cat 3, Cat 5, and Cat 5e
plugs and
jacks.
Question:
Answer:
MAC = Media Access Control. Each and every Ethernet device interface to the
network media (e.g., network adapter, port on a hub) has a unique MAC address, which is
"burned" into the hardware when it is manufactured. MAC addresses uniquely identify
each node in a network at the Media Access Control layer, the lowest network layer, the
one that directly
interfaces with the media, such as the actual wires in a twisted-pair Ethernet. In modern
Ethernets the MAC address consists of six bytes which are usually displayed in
hexadecimal;
e.g., 00-0A-CC-32-FO-FD The first three bytes (e.g., 00-0A-CC) are the manufacturer's
code
and can be used to identify the manufacturer. The last three are the unique station ID or
serial
number for the interface. One can determine the MAC address of an operating Network
Interface
Card (NIC or network adapter) in Windows 9X/Me with Start, Run, enter winipcfg, and
select
the adapter. In Windows NT, 2000, and XP it can be determined by opening a DOS
Window/Prompt (Start, Programs, Accessories...) and typing: C:ipconfig /all The MAC
address/station ID may be printed on the NIC. Many broadband routers can clone a NIC
MAC
address. That is, make the Wide Area Network (WAN) Ethernet interface going to a cable
or
DSL MODEM look like a NIC in a PC. This is useful in that many MODEMs marry
themselves
to a specific MAC address when they are first installed and it can be rather difficult to get
them
to marry themselves to a new MAC address. The WAN port MAC address on some routers
can