0% found this document useful (0 votes)
170 views17 pages

Networking Faqs

TCP stands for transmission control protocol. It is a protocol that is used by Internet to transmit data between computer. IP stands for Internet protocol. It is a method of data is sent from one computer to another. Some protocols use in tcp / IP:1. Tcp :Insures conection are maintain computer. 2. IP:-handel computer software address. 3. ARP:= IT relates ip address with hardware address. 4. SNMP:It allow network administrator to connect to and manage network

Uploaded by

sydshakil
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
170 views17 pages

Networking Faqs

TCP stands for transmission control protocol. It is a protocol that is used by Internet to transmit data between computer. IP stands for Internet protocol. It is a method of data is sent from one computer to another. Some protocols use in tcp / IP:1. Tcp :Insures conection are maintain computer. 2. IP:-handel computer software address. 3. ARP:= IT relates ip address with hardware address. 4. SNMP:It allow network administrator to connect to and manage network

Uploaded by

sydshakil
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 17

http://www.coolinterview.com/type.asp?

iType=420

Page 1

What are the networking protocol options for the Windows clients if for some
reason you do not want to use TCP/IP?

NWLink (Novell), NetBEUI, AppleTalk (Apple).

NWLink (Novell), NetBEUI, AppleTalk (Apple).

TCP stands for transmission control protocol. It is a protocol that is used by internet to
transmit data between computer.IP stands for internet protocol . it is a method of data is
sent from one computer to another.TCP/IP is the family of protocol that provide the
soliution to the problem of how to compute attach to same intra-net but belonging to
different physical network can exchange data.TCP/IP can work any hardware or
operating system.some protols use in TCP/IP:-

1. tcp :- Insures conection are maintain computer.


2. IP:-handel computer software address.
3. ARP:= IT relates IP address with hardware address.
4. RIP It finds the quickest root between two computer.
5. ICMPIt handel error and send message for TCP/IP.
6. SNMP:- it allow network administrator to connect to and manage network device.
7. PPP:- It provide dial up network connection to network.
8. SMTP:-this protocol is use with Email and past the message between server on TCP/IP
network.
9. POP3:- this protocol set up ways for client to connect to server and connect e mail.

What is the Role of TCP/IP in data transmission from source to destination?

TCP/IP is a protocol stack used for data transmission from source to destination.
In the physical layer all the physical connections like LAN cards, cables etc will b there
which will send data in the form of bits. layer 2 operates with frames where the switches
comes into picture.
in the network layer which operates on packets.routing takes places, routers are the
devices used for this.
transport layer is above the network layer and it uses mainly TCP/ UDP for transport of
data.
the application layers is on top of this layer.

application layer
|
transport layer[tcp/udp]
|
network layer[routers]
|
datalink layer[switches]
|
physical layer[Network Interface card, cables etc]

for any transfer of data between 2 systems this TCP/IP stack comes into picture, whether
it is file transfer or uploading something,sending an email etc. any application based on
web will use TCP/IP

Tcp/ip is most uses protocol for sending and receiving data process. because tcp/ip is
work of identifier on the network. tcp is first time determind that destination port is
availabe on the network yes or no and seconde time determind that destination port is
active and receive request from sender side. tcp is send aknowledgment of destination
and receive aknoledgment from receiver side.then tcp conform that reciver side is ready
for date accept from sender side. i cannot know destination without tcp/ip

What is TCP/IP

TCP/IP is a name given to the collection (or suite) of networking protocols that have been
used to construct the global Internet. The protocols are also referred to as the DoD (dee-
oh-dee) or Arpanet protocol suite because their early development was funded by the
Advanced Research Projects Agency (ARPA) of the US Department of Defense (DoD).

What are sockets?

A socket is an abstraction that represents an endpoint of communication. Most


applications that consciously use TCP and UDP do so by creating a socket of the
appropriate type and then performing a series of operations on that socket. The operations
that can be performed on a socket include control operations (such as associating a port
number with the socket, initiating or accepting a connection on the socket, or destroying
the socket) data transfer operations (such as writing data through the socket to some other
application, or reading data from some other application through the socket) and status
operations (such as finding the IP address associated with the socket).

Socket is the combination of IP address and Port no. in TCP/IP network.


1-Socket is the combination of IP address and Port no. in TCP/IP network.
2-A Socket is an one end of two way communication that links between the two
programs running in the network

You have one IP: 192.168.10.29. In which layere this IP works?

Network layer.

This IP works in Network layer.

What is IP?
internet Protocol (IP) is the central, unifying protocol in the
TCP/IP suite. It provides the basic delivery mechanism for packets
of data sent between all systems on an internet, regardless of
whether the systems are in the same room or on opposite sides of
the world. All other protocols in the TCP/IP suite depend on IP to
carry out the fundamental function of moving packets across the
internet.

In terms of the OSI networking model, IP provides a Connectionless


Unacknowledged Network Service, which means that its attitude to
data packets can be characterised as "send and forget". IP does
not guarantee to actually deliver the data to the destination, nor
does it guarantee that the data will be delivered undamaged, nor
does it guarantee that data packets will be delivered to the
destination in the order in which they were sent by the source,
nor does it guarantee that only one copy of the data will be
delivered to the destination.

What is the full form of OSI and TCP/IP model?

OSI stands for = Open Systems Interconnection (OSI) model


* TCP/IP stands for = Transmission Control Protocol/ Internet Protocol

OSI - Open System Interconnection


TCP/IP - Transmission Control Protocol/ Internet Protocol

How Is IP Carried On A Network?


IP really isn't very fussy about how its packets are transported.
The details of how an IP packet is carried over a particular kind
of network are usually chosen to be convenient for the network
itself. As long as the transmitter and receiver observe some
convention that allows IP packets to be differentiated from any
other data that might be seen by the receiver, then IP can be used
to carry data between those stations.

Ip is just a protocol which used to carry data,packets over the network in the manner
which the n/w components can understand.
ip is a identity of n/w devices .

What is the PDU of "Network layer" and "Data link layer".

PDU for Network Layer is: "Packet" and PDU for Data Link Layer is :"Frame"

128 bit in tcp ip

What IP addresses should I assign to machines on a private


internet?

You shouldn't use IP addresses that have been assigned to some


other organisation, because if knowledge of your network ever gets
leaked onto the Internet they may disrupt that innocent
organisation's activity. RFC 1918 provides a solution for this
problem by allocating several IP address ranges specifically for
use on private networks. These addresses will never be assigned
to any organisation and are never supposed to appear on the
Internet.

RFC 1918 is the official document on which IP addresses are to be used in a non-
connected or "private" network. There are 3 blocks of numbers set aside specifically for
this purpose.
The Internet Assigned Numbers Authority (IANA) has reserved the
following three blocks of the IP address space for private networks:
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255

We will refer to the first block as "24-bit block", the second as "20-bit
block", and the third as "16-bit" block". Note that the first block is
nothing but a single class A network number, while the second block is a set
of 16 continuous class B network numbers, and the third block is a set of 255
continuous class C network numbers.

For the record, my preference is to use the 192.168.0.0 network with a 255.255.255.0
Class-C subnet mask and thus this HOWTO reflects this. Any of the above private
networks are valid, but just be SURE to use the correct subnet-mask.

So, if you're using a Class-C network, you should number your TCP/IP enabled machines
as 192.168.0.1, 192.168.0.2, 192.168.0.3, .., 192.168.0.x

192.168.0.1 is usually set as the internal gateway or Linux MASQ machine which
reaches the external network. Please note that 192.168.0.0 and 192.168.0.255 are the
Network and Broadcast address respectively (these addresses are RESERVED). Avoid
using these addresses on yourmachines or your network will not function properly.

Posted by: sumesh pareek

Contact sumesh pareek

For pvt network ones can use pvt ip address which are
classA 10.0.0.0 to 10.255.255.255
Class B 172.16.0.0 to 172.31.255.255
Class C 192.168.0.0 to 192.168.255.255
with overload NAT or PAT both are same.
most of time class A address are used cause it provide lots of room
for expantion.

What is IPsec?

IPsec stands for "IP Security". The IPsec working group of the
IETF is developing standards for cryptographic authentication and
for encryption within IP. The base specifications are defined in
RFC's 1825, 1826 and 1827. Products that implement these are
beginning to appear.
Answers:

IPsec stands for "IP Security". The IPsec working group of the
IETF is developing standards for cryptographic authentication and
for encryption within IP. The base specifications are defined in
RFC's 1825, 1826 and 1827. Products that implement these are
beginning to appear.

Posted by: Amit Ruhela

Contact Amit Ruhela

Short for IP Security, a set of protocols developed by the IETF to support secure
exchange of packets at the IP layer. IPsec has been deployed widely to implement Virtual
Private Networks (VPNs). IPsec supports two encryption modes: Transport and Tunnel.
IPsec to work, the sending and receiving devices must share a public key.

Posted by: sumesh pareek

Contact sumesh pareek

Internet Protocol security (IPsec) is a framework of open standards for ensuring private,
secure communications over Internet Protocol (IP) networks, through the use of
cryptographic security services. The Internet Engineering Task Force (IETF) IPsec
working group defines the IPsec standards.

IPsec is the long-term direction for secure networking. It provides aggressive protection
against private network and Internet attacks through end-to-end security. The only
computers that must know about IPsec protection are the sender and receiver in the
communication. IPsec provides the ability to protect communication between
workgroups, local area network computers, domain clients and servers, branch offices
(which might be physically remote), extranets, and roving clients.

The Windows Vista, Windows Server 2008, Windows XP, Windows Server 2003, and
Windows 2000 implementations of IPsec are IETF standards-based.

Posted by: Md. Aftab Shaukat

Contact Md. Aftab Shaukat


Internet Protocol security (IPsec) is a framework of open standards for ensuring private,
secure communications over Internet Protocol (IP) networks, through the use of
cryptographic securityservices. The Internet Engineering Task Force (IETF) IPsec
working group defines the IPsec standards.

IPsec is the long-term direction for secure networking. It provides aggressive protection
against private network and Internet attacks through end-to-end security. The only
computers that must know about IPsec protection are the sender and receiver in the
communication. IPsec provides the ability to protect communication between
workgroups, local area network computers, domain clients and servers, branch offices
(which might be physically remote), extranets, and roving clients.

The Windows Vista, Windows Server 2008, Windows XP, Windows Server 2003, and
Windows 2000 implementations of IPsec are IETF standards

Should we deploy IPSEC-based security or certificate-based security?

They are really two different technologies. IPSec secures the TCP/IP communication and
protects the integrity of the packets. Certificate-based security ensures the validity of
authenticated clients and servers.

Question :
Should we deploy IPSEC-based security or certificate-based security?
Answers:

They are really two different technologies. IPSec secures the TCP/IP communication and
protects the integrity of the packets. Certificate-based security ensures the validity of
authenticated clients and servers.

DNS uses which protocol? Why?

DNS uses both TCP or UDP or both. UDP can handle only 512bytes. If data size is
withing 512 bytes UDP is used, otherwise, TCP is used.

DNS uses TCP and UDP both. But we can use UDP those time, when data size is within
512 bytes, otherwise we use TCP.

What is the port number of ftp(data) and ftp?


ftp(data) = 20 and ftp=21

ftp(data)use port no 20 and ftp use port no 21

Posted by: sunil chaudhary

Contact sunil chaudhary

whether it is TCP or UDP ftp(data)uses the port no is 20 and for ftp the port number is
21.here for TCP and UDP have same port numbers

Which layer of OSI is responsible for end-to-end communication?

Transport layer.

end-to-end communication refer to process to process delivery which is done by


TRANSPORT LAYER through port number

Posted by: amit

Contact amit

Transport layer is responsible to end to end

Posted by: karan sharma

Contact karan sharma

transport layer provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data
transfer
Posted by: priya nath

Contact priya nath

end to end communication refers to host to host communication which is done at the
networking layer.The process to process communcation is done at the transport layer!!

Where do I find assigned port numbers?

The IANA allocates and keeps track of all kinds of arbitrary


numbers used by TCP/IP, including well-known port numbers. The
entire collection is published periodically in an RFC called the
Assigned Numbers RFC, each of which supersedes the previous one in
the series. The current Assigned Numbers RFC is RFC 1700.

The IANA allocates and keeps track of all kinds of arbitrary


numbers used by TCP/IP, including well-known port numbers. The
entire collection is published periodically in an RFC called the
Assigned Numbers RFC, each of which supersedes the previous one in
the series. The current Assigned Numbers RFC is RFC 1700

How do applications coexist over TCP and UDP?

Each application running over TCP or UDP distinguishes itself from


other applications using the service by reserving and using a
16-bit port number. Destination and source port numbers are placed
in the UDP and TCP headers by the originator of the packet before
it is given to IP, and the destination port number allows the
packet to be delivered to the intended recipient at the
destination system

Which layer is closer to the user?

Upper layer i.e. Application layer is closer to the user.

You are in home. But you need to access the office server router. How can you do
that?

By using "Telnet"
By using "Telnet" or "SSH"

Posted by: wraza

Contact wraza

virtual private n/w

Posted by: prince

Contact prince

If you have public ip, then you can access from your home.But you have a net connection
first.

Does IP Protect Data On The Network?

IP itself does not guarantee to deliver data correctly. It leaves


all issues of data protection to the transport protocol. Both TCP
and UDP have mechanisms that guarantee that the data they deliver
to an application is correct.

Using the IP layer the correct destination of the packet is identified and delivered. The
Transport layer protocols(TCP/UDP/SCTP) check if the data delivered are correct using
Check sum mechanism. However if the destination IP is not alive, the packet is hopped
by decrementing the TTL field and when it becomes zero, the packet is lost and
undelivered. If the Transport layer is UDP the source doesn't know of the failure in
delivery of the packet.

What are the differences between OSI and TCP/IP model?

mportant differences are:

OSI is a reference model and TCP/IP is an implementation of OSI model.


OSI has 7 layers whereas TCP/IP has only 4 layers The upper 3 layers of the OSI model
is combined on the TCP/IP model.

OSI has: physical layer, data link layer, network layer, transport layer, session layer,
presentation layer and application layer TCP/IP has : Network layer, Internet layer,
transport layer and application layer.

tcp/ip is prior than osi.

osi has 7 layer whereas tcp/ip has 5 layer.

OSI model came fist and the protocols are defined later based on the model and it is
generic model for any network.
The TCP/IP is derived from OSI model.
In TCP/IP model the protocols came first and the TCP/IP model is defined just for
decription for that defined protocols

How is data send by IP layer?

IP layer PDU is "packet". So, data is send as packet.

How can I measure the performance of an IP link?

You can get a quick approximation by timing how long it takes to


FTP or RCP a large file over the link, but bear in mind that that
measurement will be skewed by the time spent in dealing with the
local and remote filesystems, not simply with the network itself.
And remember to measure the time it takes to receive a file, not
the time it takes to send it; the sender can report completion
even though large amounts of data are still buffered locally by
TCP and have not yet been delivered to the destination.

Data link layer is sub-divide into how many groups?

2 sub-divided groups: MAC Layer and LLC layer


* MAC: Media Access Control/Medium Access Control
* LLC: Logical Link Control

TCP/IP has how many layers?

5 layers: Network layer, Internet layer, Transport layer and Application layer.
Four Layers namely,

Physical Layer,
Internet or Network Layer,
Transport Layer and
Application Layer....

How can I detect that the other end of a TCP connection has crashed? Can I use
"keepalives" for this?

Detecting crashed systems over TCP/IP is difficult. TCP doesn't require any transmission
over a connection if the application isn't sending anything, and many of the media over
which TCP/IP is used (e.g. Ethernet) don't provide a reliable way to determine whether a
particular host is up. If a server doesn't hear from a client, it could be because it has
nothing to say, some network between the server and client may be down, the server or
client's network interface may be disconnected, or the client may have crashed. Network
failures are often temporary (a thin Ethernet will appear down while someone is adding a
link to the daisy chain, and it often takes a few minutes for new routes to stabilize when a
router goes down) and TCP connections shouldn't be dropped as a result.
How does TCP try to avoid network meltdown?

TCP includes several mechanisms that attempt to sustain good data


transfer rates while avoiding placing excessive load on the
network. TCP's "Slow Start", "Congestion Avoidance", "Fast
Retransmit" and "Fast Recovery" algorithms are summarised in RFC
2001. TCP also mandates an algorithm that avoids "Silly Window
Syndrome" (SWS), an undesirable condition that results in very
small chunks of data being transferred between sender and
receiver. SWS Avoidance is discussed in RFC 813. The "Nagle
Algorithm", which prevents the sending side of TCP from flooding
the network with a train of small frames, is described in RFC
896.

Can I set up a gateway to the Internet that translates IP


addresses, so that I don't have to change all our internal
addresses to an official network?

This is called Network Address Translation, or NAT. In general it


is a difficult thing to do properly because many applications
embed IP addresses in the application-level data (FTP's "PORT"
command is a notable example) so NAT isn't simply a matter of
translating addresses in the IP header and recalculating header
checksums. Also, if the network number(s) you're using match those
assigned to another organisation, your gateway may not be able to
communicate with that organisation. As noted above, RFC 1918
proposes network numbers that are reserved for private use, to
avoid such conflicts, but if you're already using a different
network number this won't help you.

What is the port number of Telnet and DNS?

Telnet = 23 and DNS = 53

using telnet we can take command mode in the system , it work's under port no 23

dns means domainb name aervice ,


port no is 53

What is TCP/IP model?

TCP/IP model is an implementation of OSI reference model. It has five layers. They are:
Network layer, Internet layer, Transport layer and Application layer.

Mention one real place to use TCP/IP.

LAN cards

Internet

What is "Segment"?

"Segment" is a PDU (Protocol Data Unit) of Transport layer of OSI model.

Name 4 example of application layer?

DNS, FTP, Telnet, http

How does ARP response the request?

ARP sents the request in broadcast, response is unicast


Can the TCP keepalive timeouts be configured?

This varies by operating system. There is a program that works on many Unices (though
not Linux or Solaris), called netconfig, that allows one to do this and documents many of
the variables.

Differentiate between forward lookup and reverse lookup in DNS?

* Forward lookup is: name-to-address,


* Reverse lookup is: address-to-name.

Forward lookup is: name to IP address.


Reverse lookup is:IP address-to-name.

what are the difference between TCP and UDP?

* TCP: Connection oriented protocol, acknowledged one, Point to point communication.


* UDP: Connection less protocol, unreliable, less traffic

TCP:
-> Guaranteed delivery by using 3 way handshake
-> Error Detection via using sequence & Ack No's
-> Windowing
-> Connection Oriented

UDP:
-> Best effort delivery but no guaranteed
-> No error Detection
-> No Windowing
-> Connectionless

Error control is down in which layer?

Layer 4

How is TCP/IP defined?


All of the protocols in the TCP/IP suite are defined by documents called Requests For
Comments (RFC's). An important difference between TCP/IP RFC's and other (say, IEEE
or ITU) networking standards is that RFC's are freely available online.

What are the differences among router, switch, bridge and hub?

All of them are devices and are used in network. Their differences are:

* Router: Layer 3 device, can work on physical, data and network layer.
* Switch: Layer 2 device, can work on data link layer
* Bridge: Layer 2 device, can work on data link layer.
* Hub: Layer 1device, just a multi-port repeater and works on physical layer

ARP resolves what? Address or IP?

ARP stands for Address Resolution Protocol. It helps to find the hardware address or
MAC address when IP address is known.
Why we have to use router?

To communicate several networks, routers are used. Routers have both broadcast domain
and collision domain.

router is used to :-
-for path determination
-for forwarding information
-for call set up messages

Posted by: lamesgin

Contact lamesgin

1.packet switching
2.packet filtering
3.provide internetworking
4.make sure b/c not to go into other n/w

RARP resolves what? Address or IP?


RARP stands for Reverse Address Resolution Protocol. It helps to find the IP address
when physical or hardware or MAC address is known.

What is OSI model?

OSI model is a reference model containing 7 layers such as physical layer, data link
layer, network layer, transport layer, session layer, presentation layer and application
layer.

Switch operates on which layer of OSI model?

Normal switch operates at Layer 2 i.e. data link layer and Intelligent switch operates at
Layer 3 i.e. network layer.

What is the upper layer name of OSI layer?


Application layer.
Name the 2 sublayers of data link layer.

MAC sublayer and LLC sublayer

What is the data unit of "Transport layer"?

Segment

The data unit of transport layer is "Segment".

What are the differences of MAC sublayer and LLC sublayer?

In fact, Data Link layer has 2 sublayes: MAC sublayer & LLC sublayer.

* MAC sublayer(802.3): defines how to transmit data on physical layer


* LLC sublayer(802.2): responsible for identifying different protocol logically &
encapsulate them.

What is IPSec?

IPSec is "Internet Protocol Security". It is a suite of protocols for securing Internet


Protocol(IP) communications.

What is the way to establish a TCP connection?


By using acknowledgement.

What is the difference between flow control and error control?

Flow control: adjust and confirm data flow rate for successful transmission.
* Error Control: a way to recover corrupted data

Mark one of the most important difference between TCP and UDP.

TCP is a connection-oriented and UDP is a connection-less protocol

What is the responsibilities of Network Layer?

* Logical addressing
* Best effort delivery

1]routing
2]provides logical addressing
3]path determination

You might also like