Sunteți pe pagina 1din 5

PING stands Packet Internet Gopher.

This is a utility for ensuring connectivity


between computers . ICMP protocol works behind this utility. Under it , sending
node sends packets to destination node and reply is received if there is proper
communication between two.

RAID stands for Redudant Array of Inexpensive Disk.A group of hard disks that
operate together to improve performance or provide fault tolerance and error
recovery through data striping, mirroring, and other techniques.

The three types of routing tables are fixed, dynamic, and fixed central. The fixed
table must be manually modified every time there is a change. A dynamic table
changes its information based on network traffic, reducing the amount of manual
maintenance. A fixed central table lets a manager modify only one table, which is
then read by other devices. The fixed central table reduces the need to update each
machine's table, as with the fixed table. Usually a dynamic table causes the fewest
problems for a network administrator, although the table's contents can change
without the administrator being aware of the change.

Repeater:
Also called a regenerator, it is an electronic device that operates only at physical layer. It
receives the signal in the network before it becomes weak, regenerates the original bit
pattern and puts the refreshed copy back in to the link.

Bridges:
These operate both in the physical and data link layers of LANs of same type. They
divide a larger network in to smaller segments. They contain logic that allow them to
keep the traffic for each segment separate and thus are repeaters that relay a frame only
the side of the segment containing the intended recipent and control congestion.

Routers:
They relay packets among multiple interconnected networks (i.e. LANs of different type).
They operate in the physical, data link and network layers. They contain software that
enable them to determine which of the several possible paths is the best for a particular
transmission.

Gateways:
They relay packets among networks that have different protocols (e.g. between a LAN
and a WAN). They accept a packet formatted for one protocol and convert it to a packet
formatted for another protocol before forwarding it. They operate in all seven layers of
the OSI model.

In base band transmission we transmit digital signal without converting it into


analog.here a low pass channel is used.

In broad band transmission we transmit digital signal by converting it into


analog.Here a band pass channel is used.
Transmission is a physical movement of information and concern issues like bit
polarity, synchronisation, clock etc.

Communication means the meaning full exchange of information between two


communication media.

Transmission is a one way scheme while communication is two-way scheme

The address for a device as it is identified at the Media Access Control (MAC) layer
in the network architecture. MAC address is usually stored in ROM on the network
adapter card and is unique.

Signals are usually transmitted over some transmission media that are broadly
classified in to two categories:-

Guided Media:
These are those that provide a conduit from one device to another that include
twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of
these media is directed and is contained by the physical limits of the medium.
Twisted-pair and coaxial cable use metallic that accept and transport signals in the
form of electrical current. Optical fiber is a glass or plastic cable that accepts and
transports signals in the form of light.

Unguided Media:
This is the wireless media that transport electromagnetic waves without using a
physical conductor. Signals are broadcast either through air. This is done through
radio communication, satellite communication and cellular telephony.

To establish a connection, TCP uses a 3-way handshake. Before a client attempts to


connect with a server, the server must first bind to a port to open it up for
connections: this is called a passive open. Once the passive open is established
then a client may initiate an active open. To establish a connection, the 3-way (or
3-step) handshake occurs:

The active open is performed by sending a SYN to the server.


In response, the server replies with a SYN-ACK.
Finally the client sends an ACK back to the server.
At this point, both the client and server have received an acknowledgement of the
connection.

when we want to connect to server for communication we need to establish a


connection between server and client. The procedure used for this is called 3-way
handshake...this is described as follows
1. Initillay the server is ready to accept the incoming connection by binding to local
port. This is called passive open.
2. The client now can connect to server by sending SYN J segment to server. The
server responds with SYN J+1 and ACK K
3. At the end the client sends ACK K+1 to server..
At this stage we say that client and server are connected

These are all different things in networking.


Hub:Where we connect all the the links for a networking connection.
Node:It can be identified as a one connection.
Host:is nothing than if you are going to send a request to the server the questioned system
can be know as a host.

Bit rate is the number of bits transmitted during one second whereas baud rate
refers to the number of signal units per second that are required to represent those
bits.
baud rate = bit rate / N
where N is no-of-bits represented by each signal shift.

DNS uses UDP for communication between servers. It is a better choice than TCP
because of the improved speed a connectionless protocol offers. Of course,
transmission reliability suffers with UDP.

The data unit created at the application layer is called a message, at the transport
layer the data unit created is called either a segment or an user datagram, at the
network layer the data unit created is called the datagram, at the data link layer
the datagram is encapsulated in to a frame and finally transmitted as signals along
the transmission media.

A generic term for section of a large networks usually separated by a bridge or


router.

A portion of a network that shares a common address component. On TCP/IP


networks, subnets are defined as all devices whose IP addresses have the same
prefix. For example, all devices with IP addresses that start with 100.100.100.
would be part of the same subnet. Dividing a network into subnets is useful for
both security and performance reasons. IP networks are divided using a subnet
mask.

It is a project started by IEEE to set standards that enable intercommunication


between equipment from a variety of manufacturers. It is a way for specifying
functions of the physical layer, the data link layer and to some extent the network
layer to allow for interconnectivity of major LAN protocols.

It consists of the following:

802.1 is an internetworking standard for compatibility of different LANs and MANs


across protocols.

802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is
non-architecture-specific, that is remains the same for all IEEE-defined LANs.
Media access control (MAC) is the lower sublayer of the data link layer that contains
some distinct modules each carrying proprietary information specific to the LAN
product being used. The modules are

Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5).

802.6 is distributed queue dual bus (DQDB) designed to be used in MANs.

802.1 - Network Management (Bridging)


802.2 - EthernetII (Logical Link)
802.3 - Bus topology (CSMA/CD)
802.4 - Token BUS
802.5 - Token Ring
802.6 - For MAN(DQDB -Distributed Queue Dual BUS)
802.7 - BroadBand LAN Networks
802.8 - Optical Fiber Cabling practices
802.9 - Isochronous LAN (Integrated Services LAN)
802.10 - Interoperable LAN Security
802.11 - Wireless wi-fi

DNS- Domain Name Server or Services.

WINS- Windows Internet Name Service.

DNS is resolve the web site name to IP address or you can say.

In WINS used a file name those is LMhost, this file in the System32, and when we
put the websit name and its IP address, then it resolve the particular IP address
those insert in the LMhost file.

DNS service is used to resolve website names to IP address.


WINS is used to identify computers by their computer names in a LAN. Network
Administrators can configure a WINS server in a LAN and using this server all
machines connected to the LAN can

Supernetting refers to increase host and reduce the subnet's. It mean reduce the
network bits and increase the host bits. We do use supernetting because when the
PCs in the network increase where we need the more valid IP's in the same
network.

Piggybacking is gaining access to restricted communication channel by using


session that another user has already established. Piggybacking can be defeated by
logging off before leaving a workstation or terminal or by initiating a protected
mode, such as via a screensaver, that requires re-authentication before access can
be resumed.
Piggy backing means the combinaton of dataframe and acknowledgment in stop
and wait method which is used for flow and error control mechanism

POP3 and IMAP4 are used to retrieve mails.

IMAP4 stores a copy of message on the server whereas POP3 does not.

POP3 - download emails into your PC / Outlook


IMAP - we can access email from webserver, it not store on your PC

What is IP Spoofing and how can it be prevented?

IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder
sends messages to a computer with an IP address indicating that the message is coming from a trusted
host. This is done by forging the header so it contains a different address and make it appear that the packet
was sent by a different machine.

Prevention:-
Packet filtering: - to allow packets with recognized formats to enter the network
Using special routers and firewalls.
Encrypting the session

S-ar putea să vă placă și