What Are 10base2, 10base5 and 10BaseT Ethernet LANs 10Base2-An
What Are 10base2, 10base5 and 10BaseT Ethernet LANs 10Base2-An
What Are 10base2, 10base5 and 10BaseT Ethernet LANs 10Base2-An
2. Explain the difference between an unspecified passive open and a fully specified
passive open
An unspecified passive open has the server waiting for a connection request from
a client. A fully specified passive open has the server waiting for a connection
from a specific client.
3. Explain the function of Transmission Control Block
A TCB is a complex data structure that contains a considerable amount of
information about each connection.
4. Explain a Management Information Base (MIB)
A Management Information Base is part of every SNMP-managed device. Each
SNMP agent has the MIB database that contains information about the device's
status, its performance, connections, and configuration. The MIB is queried by
SNMP.
5. Explain anonymous FTP and why would you use it
Anonymous FTP enables users to connect to a host without using a valid login
and password. Usually, anonymous FTP
uses a login called anonymous or guest, with the
password usually requesting the user's ID for tracking purposes only. Anonymous
FTP is used to enable a large number
of users to access files on the host without having
to go to the trouble of setting up logins for them all. Anonymous FTP systems
usually have strict controls over the areas
an anonymous user can access.
6. Explain a pseudo tty
A pseudo tty or false terminal enables external machines to connect through
Telnet or rlogin. Without a pseudo tty, no
connection can take place.
7. Explain REX
What advantage does REX offer other similar utilities
11. BOOTP helps a diskless workstation boot. How does it get a message to the
network looking for its IP address and the location of its operating system boot
files
BOOTP sends a UDP message with a subnetwork broadcast address and waits for
a reply from a server that gives it the IP address. The same message might contain
the name of the machine that has the boot files on it. If the boot image location is
not specified, the workstation sends another UDP message to query the server.
14. Explain the difference between interior and exterior neighbor gateways
Interior gateways connect LANs of one organization, whereas exterior gateways
connect the organization to the outside world.
16. What are the advantages and disadvantages of the three types of routing tables
The three types of routing tables are fixed, dynamic, and fixed central. The fixed
table must be manually modified every time there is a change. A dynamic table
changes its information based on network traffic, reducing the amount of manual
maintenance. A fixed central table lets a manager modify only one table, which is
then read by other devices. The fixed central table reduces the need to update each
machine's table, as with the fixed table. Usually a dynamic table causes the fewest
problems for a network
administrator, although the table's contents can change without the administrator
being aware of the change.
48. Explain the minimum and maximum length of the header in the TCP segment
and IP datagram
The header should have a minimum length of 20 bytes and can have a maximum
length of 60 bytes.
49. Explain difference between ARP and RARP
The address resolution protocol (ARP) is used to associate the 32 bit IP address
with the 48 bit physical address, used by a host or a router to find the physical
address of another host on its network by sending a ARP query packet that
includes the IP address of the receiver. The reverse address resolution protocol
(RARP) allows a host to discover its Internet address when it knows only its
physical address.
50. Explain ICMP
ICMP is Internet Control Message Protocol, a network layer protocol of the
TCP/IP suite used by hosts and gateways to send notification of datagram
problems back to the sender. It uses the echo test / reply to test whether a
destination is reachable and responding. It also handles both control and error
messages.
51. What are the data units at different layers of the TCP / IP protocol suite
The data unit created at the application layer is called a message, at the transport
layer the data unit created is called either a segment or an user datagram, at the
network layer the data unit created is called the datagram, at the data link layer the
datagram is encapsulated in to a frame and
finally transmitted as signals along the transmission media.