Networking Faqs
Networking Faqs
iType=420
Page 1
What are the networking protocol options for the Windows clients if for some
reason you do not want to use TCP/IP?
TCP stands for transmission control protocol. It is a protocol that is used by internet to
transmit data between computer.IP stands for internet protocol . it is a method of data is
sent from one computer to another.TCP/IP is the family of protocol that provide the
soliution to the problem of how to compute attach to same intra-net but belonging to
different physical network can exchange data.TCP/IP can work any hardware or
operating system.some protols use in TCP/IP:-
TCP/IP is a protocol stack used for data transmission from source to destination.
In the physical layer all the physical connections like LAN cards, cables etc will b there
which will send data in the form of bits. layer 2 operates with frames where the switches
comes into picture.
in the network layer which operates on packets.routing takes places, routers are the
devices used for this.
transport layer is above the network layer and it uses mainly TCP/ UDP for transport of
data.
the application layers is on top of this layer.
application layer
|
transport layer[tcp/udp]
|
network layer[routers]
|
datalink layer[switches]
|
physical layer[Network Interface card, cables etc]
for any transfer of data between 2 systems this TCP/IP stack comes into picture, whether
it is file transfer or uploading something,sending an email etc. any application based on
web will use TCP/IP
Tcp/ip is most uses protocol for sending and receiving data process. because tcp/ip is
work of identifier on the network. tcp is first time determind that destination port is
availabe on the network yes or no and seconde time determind that destination port is
active and receive request from sender side. tcp is send aknowledgment of destination
and receive aknoledgment from receiver side.then tcp conform that reciver side is ready
for date accept from sender side. i cannot know destination without tcp/ip
What is TCP/IP
TCP/IP is a name given to the collection (or suite) of networking protocols that have been
used to construct the global Internet. The protocols are also referred to as the DoD (dee-
oh-dee) or Arpanet protocol suite because their early development was funded by the
Advanced Research Projects Agency (ARPA) of the US Department of Defense (DoD).
Network layer.
What is IP?
internet Protocol (IP) is the central, unifying protocol in the
TCP/IP suite. It provides the basic delivery mechanism for packets
of data sent between all systems on an internet, regardless of
whether the systems are in the same room or on opposite sides of
the world. All other protocols in the TCP/IP suite depend on IP to
carry out the fundamental function of moving packets across the
internet.
Ip is just a protocol which used to carry data,packets over the network in the manner
which the n/w components can understand.
ip is a identity of n/w devices .
PDU for Network Layer is: "Packet" and PDU for Data Link Layer is :"Frame"
RFC 1918 is the official document on which IP addresses are to be used in a non-
connected or "private" network. There are 3 blocks of numbers set aside specifically for
this purpose.
The Internet Assigned Numbers Authority (IANA) has reserved the
following three blocks of the IP address space for private networks:
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
We will refer to the first block as "24-bit block", the second as "20-bit
block", and the third as "16-bit" block". Note that the first block is
nothing but a single class A network number, while the second block is a set
of 16 continuous class B network numbers, and the third block is a set of 255
continuous class C network numbers.
For the record, my preference is to use the 192.168.0.0 network with a 255.255.255.0
Class-C subnet mask and thus this HOWTO reflects this. Any of the above private
networks are valid, but just be SURE to use the correct subnet-mask.
So, if you're using a Class-C network, you should number your TCP/IP enabled machines
as 192.168.0.1, 192.168.0.2, 192.168.0.3, .., 192.168.0.x
192.168.0.1 is usually set as the internal gateway or Linux MASQ machine which
reaches the external network. Please note that 192.168.0.0 and 192.168.0.255 are the
Network and Broadcast address respectively (these addresses are RESERVED). Avoid
using these addresses on yourmachines or your network will not function properly.
For pvt network ones can use pvt ip address which are
classA 10.0.0.0 to 10.255.255.255
Class B 172.16.0.0 to 172.31.255.255
Class C 192.168.0.0 to 192.168.255.255
with overload NAT or PAT both are same.
most of time class A address are used cause it provide lots of room
for expantion.
What is IPsec?
IPsec stands for "IP Security". The IPsec working group of the
IETF is developing standards for cryptographic authentication and
for encryption within IP. The base specifications are defined in
RFC's 1825, 1826 and 1827. Products that implement these are
beginning to appear.
Answers:
IPsec stands for "IP Security". The IPsec working group of the
IETF is developing standards for cryptographic authentication and
for encryption within IP. The base specifications are defined in
RFC's 1825, 1826 and 1827. Products that implement these are
beginning to appear.
Short for IP Security, a set of protocols developed by the IETF to support secure
exchange of packets at the IP layer. IPsec has been deployed widely to implement Virtual
Private Networks (VPNs). IPsec supports two encryption modes: Transport and Tunnel.
IPsec to work, the sending and receiving devices must share a public key.
Internet Protocol security (IPsec) is a framework of open standards for ensuring private,
secure communications over Internet Protocol (IP) networks, through the use of
cryptographic security services. The Internet Engineering Task Force (IETF) IPsec
working group defines the IPsec standards.
IPsec is the long-term direction for secure networking. It provides aggressive protection
against private network and Internet attacks through end-to-end security. The only
computers that must know about IPsec protection are the sender and receiver in the
communication. IPsec provides the ability to protect communication between
workgroups, local area network computers, domain clients and servers, branch offices
(which might be physically remote), extranets, and roving clients.
The Windows Vista, Windows Server 2008, Windows XP, Windows Server 2003, and
Windows 2000 implementations of IPsec are IETF standards-based.
IPsec is the long-term direction for secure networking. It provides aggressive protection
against private network and Internet attacks through end-to-end security. The only
computers that must know about IPsec protection are the sender and receiver in the
communication. IPsec provides the ability to protect communication between
workgroups, local area network computers, domain clients and servers, branch offices
(which might be physically remote), extranets, and roving clients.
The Windows Vista, Windows Server 2008, Windows XP, Windows Server 2003, and
Windows 2000 implementations of IPsec are IETF standards
They are really two different technologies. IPSec secures the TCP/IP communication and
protects the integrity of the packets. Certificate-based security ensures the validity of
authenticated clients and servers.
Question :
Should we deploy IPSEC-based security or certificate-based security?
Answers:
They are really two different technologies. IPSec secures the TCP/IP communication and
protects the integrity of the packets. Certificate-based security ensures the validity of
authenticated clients and servers.
DNS uses both TCP or UDP or both. UDP can handle only 512bytes. If data size is
withing 512 bytes UDP is used, otherwise, TCP is used.
DNS uses TCP and UDP both. But we can use UDP those time, when data size is within
512 bytes, otherwise we use TCP.
whether it is TCP or UDP ftp(data)uses the port no is 20 and for ftp the port number is
21.here for TCP and UDP have same port numbers
Transport layer.
Contact amit
transport layer provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data
transfer
Posted by: priya nath
end to end communication refers to host to host communication which is done at the
networking layer.The process to process communcation is done at the transport layer!!
You are in home. But you need to access the office server router. How can you do
that?
By using "Telnet"
By using "Telnet" or "SSH"
Contact wraza
Contact prince
If you have public ip, then you can access from your home.But you have a net connection
first.
Using the IP layer the correct destination of the packet is identified and delivered. The
Transport layer protocols(TCP/UDP/SCTP) check if the data delivered are correct using
Check sum mechanism. However if the destination IP is not alive, the packet is hopped
by decrementing the TTL field and when it becomes zero, the packet is lost and
undelivered. If the Transport layer is UDP the source doesn't know of the failure in
delivery of the packet.
OSI has: physical layer, data link layer, network layer, transport layer, session layer,
presentation layer and application layer TCP/IP has : Network layer, Internet layer,
transport layer and application layer.
OSI model came fist and the protocols are defined later based on the model and it is
generic model for any network.
The TCP/IP is derived from OSI model.
In TCP/IP model the protocols came first and the TCP/IP model is defined just for
decription for that defined protocols
5 layers: Network layer, Internet layer, Transport layer and Application layer.
Four Layers namely,
Physical Layer,
Internet or Network Layer,
Transport Layer and
Application Layer....
How can I detect that the other end of a TCP connection has crashed? Can I use
"keepalives" for this?
Detecting crashed systems over TCP/IP is difficult. TCP doesn't require any transmission
over a connection if the application isn't sending anything, and many of the media over
which TCP/IP is used (e.g. Ethernet) don't provide a reliable way to determine whether a
particular host is up. If a server doesn't hear from a client, it could be because it has
nothing to say, some network between the server and client may be down, the server or
client's network interface may be disconnected, or the client may have crashed. Network
failures are often temporary (a thin Ethernet will appear down while someone is adding a
link to the daisy chain, and it often takes a few minutes for new routes to stabilize when a
router goes down) and TCP connections shouldn't be dropped as a result.
How does TCP try to avoid network meltdown?
using telnet we can take command mode in the system , it work's under port no 23
TCP/IP model is an implementation of OSI reference model. It has five layers. They are:
Network layer, Internet layer, Transport layer and Application layer.
LAN cards
Internet
What is "Segment"?
This varies by operating system. There is a program that works on many Unices (though
not Linux or Solaris), called netconfig, that allows one to do this and documents many of
the variables.
TCP:
-> Guaranteed delivery by using 3 way handshake
-> Error Detection via using sequence & Ack No's
-> Windowing
-> Connection Oriented
UDP:
-> Best effort delivery but no guaranteed
-> No error Detection
-> No Windowing
-> Connectionless
Layer 4
What are the differences among router, switch, bridge and hub?
All of them are devices and are used in network. Their differences are:
* Router: Layer 3 device, can work on physical, data and network layer.
* Switch: Layer 2 device, can work on data link layer
* Bridge: Layer 2 device, can work on data link layer.
* Hub: Layer 1device, just a multi-port repeater and works on physical layer
ARP stands for Address Resolution Protocol. It helps to find the hardware address or
MAC address when IP address is known.
Why we have to use router?
To communicate several networks, routers are used. Routers have both broadcast domain
and collision domain.
router is used to :-
-for path determination
-for forwarding information
-for call set up messages
Contact lamesgin
1.packet switching
2.packet filtering
3.provide internetworking
4.make sure b/c not to go into other n/w
OSI model is a reference model containing 7 layers such as physical layer, data link
layer, network layer, transport layer, session layer, presentation layer and application
layer.
Normal switch operates at Layer 2 i.e. data link layer and Intelligent switch operates at
Layer 3 i.e. network layer.
Segment
In fact, Data Link layer has 2 sublayes: MAC sublayer & LLC sublayer.
What is IPSec?
Flow control: adjust and confirm data flow rate for successful transmission.
* Error Control: a way to recover corrupted data
Mark one of the most important difference between TCP and UDP.
* Logical addressing
* Best effort delivery
1]routing
2]provides logical addressing
3]path determination