Escolar Documentos
Profissional Documentos
Cultura Documentos
progress.
Mailboxes can be created only on desktop and one mail box exists on the server.
IMAP: There is no need Ior downloading all email while using another desktop PC Ior checking
email.
Unread mail identiIication is easier.
Message downloading is possible only when opened Ior display Irom its contents.
Multiple mailboxes creation is possible on the desktop PC and also on the server.
******************************************************************************
Define the term Protocol.
Protocol is a standard way oI communicating across a network. A protocol is the "language" oI
the network. It is a method by which two dissimilar systems can communicate. TCP is a protocol
which runs over a network.
******************************************************************************
hat is LAN?
LAN is a computer network that spans a relatively small area. Most LANs are conIined to a
single building or group oI buildings. However, one LAN can be connected to other LANs over
any distance via telephone lines and radio waves. A system oI LANs connected in this way is
called a wide-area network (WAN). Most LANs connect workstations and personal computers.
Each node (individual computer) in a LAN has its own CPU with which it executes programs,
but it also is able to access data and devices anywhere on the LAN. This means that many users
can share expensive devices, such as laser printers, as well as data. Users can also use the LAN
to communicate with each other, by sending e-mail or engaging in chat sessions.
******************************************************************************
hat's the difference Between an Intranet and the Internet?
There's one major distinction between an intranet and the Internet: The Internet is an open, public
space, while an intranet is designed to be a private space. An intranet may be accessible Irom the
Internet, but as a rule it's protected by a password and accessible only to employees or other
authorized users.
From within a company, an intranet server may respond much more quickly than a typical Web
site. This is because the public Internet is at the mercy oI traIIic spikes, server breakdowns and
other problems that may slow the network. Within a company, however, users have much more
bandwidth and network hardware may be more reliable. This makes it easier to serve high-
bandwidth content, such as audio and video, over an intranet.
******************************************************************************
3
hat is a network? hat are the different kinds of network? Explain them
A network is a group oI computers or nodes connected together. They are connected with each
other by communication paths.
Types of Networks:
LAN Local Area Network connects a group oI nodes covering a small physical area. LAN`s
are most commonly seen in oIIices, building etc. LAN`s enable higher transIer rate oI data,
smaller coverage oI area and hence less wiring.
AN Wide Area Network connects a group oI nodes covering a wide area. WAN typically
connects and allow communication between regions or national boundaries. The most common
example oI WAN is internet.
VPN Virtual Private Network connects or links nodes in some larger area by open connections
or virtual circuits in some larger network (e.g., the Internet) instead oI by physical wires. It is
used Ior secure communication through the public internet. VPN alone may not support explicit
security Ieatures, such as authentication or content encryption.
Intranet It is a set oI networks under the control oI a single administrative person. It can be
considered as an internal network oI an organization. II it is large, web servers are used to
provide inIormation to the users.
Extranet It is a network that restricts itselI within a single organization. It can be categorized
as WAN, MAN etc. however; it cannot have a single LAN. It must have a connection (at least
one) with external network.
******************************************************************************
hat are network topologies? Explain Ring, Bus and Star topology.
A network topology describes the layout oI a network. It describes how diIIerent nodes and
elements are connected to each other. DiIIerent types oI topology:
a. Ring:-
O All nodes connected with another in a loop.
O Each device is connected to one or more another device on either side.
b. Bus
O All nodes connected to a central and a common cable called as a back bone.
O In bus topology, the server is at one end and the clients are connected at diIIerent
positions across the network.
O Easy to manage and install.
O II the backbone Iails, the entire communication Iails.
3
c. Star
O All nodes connected to a central hub.
O The communication between the nodes is through the hub.
O Relative requires more cables as compared to BUS. However iI any node Iails, it wont
aIIect the entire LAN.
******************************************************************************
Explain IP, TCP and UDP.
TCP Transmission control Protocol is used to establish communication between nodes or
networks and exchange data packets. It guarantees delivery oI data packets in the order they were
sent. Hence it is most commonly used in all applications that require guaranteed delivery oI data.
It can handle both timeouts (iI packets were delayed) and retransmission (iI packets were lost).
The stream oI data is transmitted in segments. The segment header is 32 bit. it is a connectionless
communication protocol at the third level (network) oI the OSI model.
IP Internet protocol is used Ior transmission oI data over the internet. IP uses IP addresses to
identity each machine uniquely. Message is sent using small packets. The packet contains both
the sender and receivers address. IP does not guarantee the delivery in the same order as sent.
This is because the packets are sent via diIIerent routes. It is a connectionless communication
protocol at the third level (network) oI the OSI model.
UDP User Data Protocol is a communication protocol. It is normally used as an alternative Ior
TCP/IP. However there are a number oI diIIerences between them. UDP does not divide data
into packets. Also, UDP does not send data packets in sequence. Hence, the application program
must ensure the sequencing. UDP uses port numbers to distinguish user requests. It also has a
checksum capability to veriIy the data.
******************************************************************************
hat is multicasting?
Multicasting allows a single message to be sent to a group oI recipients. Emailing,
teleconIerencing, are examples oI multicasting. It uses the network inIrastructure and standards
to send messages.
******************************************************************************
Explain the functionality of PING.
Ping Is particularly used to check iI the system is in network or not. It also gives packet lost
inIormation. In windows ping command is written as ping ip address. The output returns the data
packets inIormation. The number oI packets sent, received and lost is returned by PING.
******************************************************************************
6
address and a destination IP address. As a device moves Irom one network to another, its IP
address changes.
Computers using the TCP/IP Ior communication are uniquely identiIied by a 32 bit address
called as an IP address. The routers use the IP address inIormation to Iorward the packet to the
destination computer.
IP addresses are categorized as:
Private address: these IP addresses are used exclusively within a private network and not Ior
public to see.
Public Address: these are registered IP addresses used Ior public.
Each IP address has a network address and a host address. IP addresses are expressed in Iour sets
oI three numbers, separated with dots. Each set is called as an octet because when converted to
binary; it denotes eight binary.
******************************************************************************
Difference between Static and Dynamic IP.
Static IP is also called as permanent address assigned to each device in a network, whereas
Dynamic IP, a temporary address assigned to the device via DHCP soItware. IP address assigned
to your service by your cable or DSL Internet provider is typically dynamic IP. In routers and
operating systems, the deIault conIiguration Ior clients is dynamic IP
******************************************************************************
hat is the difference between public and private IP?
A public IP address allows equipment accessible to everyone on the internet. A private IP
address is Ior private use within the network and allows many more PCs to be connected. II you
are using a private IP and wants VOIP, you need to change to a public IP address.
******************************************************************************
hat is Network Address Translation?
Network Address Translation acts as an agent between the Internet and a local network. It is a
dynamic method which is used to minimize Internet connectivity needs. Network address
translation describes the rewriting oI the Internet Protocol (IP) addresses oI data packets so that
multiple transmissions require only one IP address.
******************************************************************************
Define IP multicast.
IP multicast technology reduces traIIic by sending stream oI inIormation to many recipients at
one go. Video conIerencing, stock quotas are the examples based on IP multicast.
9
hat is subneting?
Subnet adds one level to the way IP address is represented. It logically organizes the network.
For instance, it can logically group computers belongs to the Iinance department
******************************************************************************
Define Address Resolution Protocol.
Address Resolution Protocol ARP, is responsible Ior mapping an IP address to its corresponding
physical network address. It is mostly seen on Ethernet network.
******************************************************************************
Explain Maximum Transfer Unit, MTU.
MTU speciIies the largest amount oI data that can be transIerred across a network.
******************************************************************************
hat is Routing Protocol?
Routing protocol is the way to send routing inIormation between any routers in an autonomous
system.
When a source sends a packet to a destination, this packet has a speciIic path or route it Iollows.
DiIIerent routing protocols are used to Iind the shortest path to the destination. The protocols
maintain routing tables. Routing tables consist oI a set oI rules used to determine where these
packets will travel. When a packet is received, a network device examines the packet and
matches it to the routing table entry providing the best match Ior its destination. The packet
keeps hopping until it reaches its destination.
******************************************************************************
Explain the structure and use of internet addresses.
Each IP address is 32 bit long. In human language the IP addresses are written in dotted decimal
notation. These are then converted to binary by the computer. Each IP address has two parts:
Network identiIier or a network ID and host ID. The current internet protocol standard is IPV4.
The IP addresses are divided into three classes: a class A network, a class B network, and a class
C network. Class A being the largest. The Iour digit numbers in an IPV4 address, each network
oI class A will have diIIerent Iirst number, and then its network will be addressed by the rest oI
the three numbers, or three bytes. The IP addresses identiIy a machine to deliver packets and
load web pages.
******************************************************************************
Define gateway
A gateway is a network point that provides entrance into another network. On the Internet, a
node or stopping point can be either a gateway node or a host (end-point) node. Both the
computers oI Internet users and the computers that serve pages to users are host nodes. The
computers that control traIIic within your company's network or at your local Internet service
provider (ISP) are gateway nodes.
******************************************************************************
hat is firewall?
A Iirewall is a hardware or soItware installed to provide security to the private networks
connected to the internet. They can be implemented in both hardware and soItware, or a
combination oI both. All data entering or leaving the Intranet passes through the Iirewall which
allows only the data meeting the administrators` rules to pass through it.
******************************************************************************
hat are the types of firewalls?
Packet Filtering Firewall:
This type oI Firewall detects packets and block unnecessary packets and makes network traIIic
release.
Screening Router Firewalls:
It's a soItware base Iirewall available in Router provides only light Iiltering.
Computer-based Firewall:
It's a Iirewall stored in server with an existing Operating System like Windows and UNIX.
Hardware base Firewall:
Its device like box allows strong security Irom public network. Mostly used by big networks.
Proxy Server:
Proxy server allows all clients to access Internet with diIIerent access limits. Proxy server has its
own Iirewall which Iilters the all packet Irom web server.
******************************************************************************
hat is Data encryption?
Data encryption ensures data saIety and very important Ior conIidential or critical data. It protect
data Irom being read, altered or Iorged while transmission.
******************************************************************************
2
O Site to Site VPN Extranet based: This type oI VPN can be used when several diIIerent
companies need to work in a shared environment. E.g. Distributors and service
companies. This network is more manageable and reliable.
******************************************************************************
hy do we need a subnet mask?
A subnet mask allows identiIication oI host part and network part oI an IP address. Subnet mask
can be used to Iind iI an IP address is present on a subnet or not.
******************************************************************************
hat are Sockets? How do Sockets ork?
A socket is used to connect an application to a network protocol. A socket enables
communication between a client and a server. The communication is started when the client is
assigned a local port number, and binds a socket to it. The client writes on the socket and gets
inIormation Irom server by reading it. The Socket class is used to communicate. It provides rich
set oI methods Ior both asynchronous and synchronous data transIer. ConnectAsynch is used to
start an asynchronous connection. SendAsynch and ReceiveAsynch are used to send and receive
data. Shutdown and close methods are used to shutdown and close the sockets.
******************************************************************************
hat is SSL?
SSL is Secured Socket Layer. SSL is used to establish a secured and an encrypted connection
between a server and the browser. SSL is most commonly seen in payment and banking web
sites. To create a SSL connection, a SSL certiIicate needs to be created. II the website has a SSL
certiIicate installed, a small icon is displayed in the tool bar to make customers conIident that the
site is secured.
******************************************************************************
hat are the two important TCP Socket classes? Explain them
The two most important socket Classes are:
O Socket Class: The Socket class provides enriched methods and properties Ior network
communications. It allows both synchronous and asynchronous data transIer. Shutdown
method should be used to end the Socket once the data transIer is complete. Using
SetSocketOption the socket can be conIigured.
Declaration:
Public Class Socket
Implements IDisposable
O Server Socket Class: The server Socket class is used to implement server sockets. Server
sockets are used to respond to requests received over the network.
7
hat are Malware? Explain different types of Malware
Malware is a soItware program which is developed to destroy a computer system. These
programs runs in victim`s computer without any inIormation to the victim, i.e. victim do not
know that someone hacked his system.
DiIIerent types oI malware are: worm, Trojans Horse, Rootkits.
Worm: Worm is a computer program which makes its copy again and again in the victim`s
computer. They damage the network by using a lot bandwidth.
Trojan Horses: Trojan horse consists oI two parts, server and client. Server is an executable Iile
which runs on victim`s computer and attacker may take the Iull control oI the victim`s computer.
Rootkits: Rootkits are used to hide the malicious processes Irom active process
******************************************************************************
Explain the services provided by IP (Internet Protocol) - Addressing, Fragmentation,
Packet timeouts and options
1. Addressing: For the purpose oI delivering datagram packets, IP needs to know about the
address oI the destination. By including the host addressing, this task is carried out by IP. As IP
operates in an internet, its systems are designed to accept the addressing oI devices which are
unique.
2. Fragmenting: The datagram packets are sent to the data link layer Ior the purpose oI
transmission on the network. The physical network Irame size that uses IP may be diIIerent. To
resolve this, IP Iragments the datagram into certain pieces. So that, each piece can be carried on
the network. The receiving systems use these pieces and reassemble the whole IP datagram
again.
3. Packet timeouts: A timeout packet is the time Ior waiting next instruction Irom the command
station. II the command is not sent by the station, it shuts down.
******************************************************************************
Define Broadcast, Unicast and Multicast.
Unicast: A term used in communication to describe a piece oI inIormation to send Irom one
point to another. There are only sender and receiver. All LANs support unicast transIer mode and
most applications that employ TCP transport protocol uses unicast messaging.
8
Broadcast: A term used Ior describing communication that is sent a piece oI inIormation Irom
one point to all other points. There is one sender and multiple receivers. All LANs support
broadcast transmission.
Multicast: A term described in communicating a piece oI inIormation sent Irom one or more
points to a set oI other points. The senders and receivers are one or more.
******************************************************************************
hat is Network Mask?
A network mask is used Ior determination oI what subnet an IP address belongs to. An IP
address has network address and the host address. The Iirst two numbers represents the network
address and the second two numbers represents the host oI the network.
******************************************************************************
Define Subnetting.
A subnet describes a set oI networked computers which have common IP address routing preIix.
Breaking the networking into smaller and more eIIicient subnets is known as subnets. Subnetting
prevents Ethernet packet collision which has excessive rates in a large network. Routers are used
to manage the traIIic and constitute borders among subnets.
******************************************************************************
hat is the User Datagram Protocol (UDP)?
User datagram protocol allows computer applications to send messages as datagram packets
Irom source to destination on an Internet Protocol, with out using prior communications Ior
setting up special transmission paths. An unreliable service is provided by UDP which makes the
datagram packets may arrive irrespective oI order. UDP is a better solution Ior time-sensitive
applications due to the reason dropping packets is preIerable to use delayed packets`. Its
stateless nature makes the server to answer smaller queries to huge number oI clients.
******************************************************************************
hat is the Domain Name System (DNS)? hat are the advantages of it?
A hierarchical naming system Ior computer systems, services or Ior that matter any resource
participating in the internet. Various inIormation with domain names is assigned to each oI the
participants. DNS translates the names oI domain into meaningIul to humans into binary
identiIiers that are associated with the equipment oI network to locate and address these devices.
9
Advantages:
More Reliable: Delivers messages to the users with zero downtime.
Faster: DNS are connected well at intersections oI internet. Any cast technology enables
requests are answered to the next closest node in the case oI maintenance or downtime.
Smarter: Automatic corrections oI typos.
******************************************************************************
hat are Ping and Tracert?
Ping and tracert are the commands used to send inIormation to some remote computers to
receive some inIormation. InIormation is sent and received by packets. Ping I particularly used to
check iI the system is in network or not. It also gives packet lost inIormation. In windows ping
command is written as ping ipaddress Tracert is called as trace route. It is used to track or trace
the path the packet takes Irom the computer where the command is given until the destination. In
windows ping command is written as tracert ipaddress
******************************************************************************
hat are the differences between a domain and a workgroup?
In a domain, one or more computer can be a server to manage the network. On the other hand in
a workgroup all computers are peers having no control on each other. In a domain, user doesn`t
need an account to logon on a speciIic computer iI an account is available on the domain. In a
work group user needs to have an account Ior every computer.
In a domain, Computers can be on diIIerent local networks. In a work group all computers needs
to be a part oI the same local network.
******************************************************************************
hat is PPP protocol? Explain PPP packet format.
Point to Point protocol helps communication between 2 computers over a serial cable, phone line
or other Iiber optic lines. E.g. Connection between an Internet Service Provider and a host. PPP
also provides authentication. PPP operates by sending Request packets and waiting Ior
Acknowledge packets that accept, reject or try to change the request. The protocol is also used to
negotiate on network address or compression options between the nodes.
Packet Iormat:-
Flag Iield: 1 byte: - Indicates Irames beginning or end
Address Iield: 1 byte: - Used Ior broadcast address (destination address)
Control Iield: 1 byte: - Used as a control byte
Protocol Iield: - 1 or 2 bytes: - Setting oI protocol in inIormation Iield (oI datagram)
InIormation: - 0 or more bytes: - Datagram (whether it contains data or control inIormation)
2
Class B:
Range: Irom 128.0.0.0 to 191.255.255.255.
LeItmost 2 bits: 10
First 16 bits: netid
Last 16 bits: the hostid
Class C:
Range: Irom 192.0.0.0 to 223.255.255.255.
Class C networks use the Iirst 24 bits to determine the netid.
LeItmost 3 bits: 110
The next 21 bits deIine network.
8 bits deIine the hostid.
Class D:
First 4 bits: 1110
The remaining 28 bits deIine multicast addresses.
No netid or hostid in a class D address.
Addresses is used Ior multicasting.
Class E:
First 4 bits: 1111
Addresses reserved Ior special use on the Internet.
There is no netid or hostid in a class E address.
******************************************************************************
hat is Subneting? Explain the advantages of using Subneting.
Subneting is dividing a network into several subnets.
This is usually done Ior the Iollowing purposes:
O 8educlngneLworkLrafflcdecreaslngLhenumerofroadcasLs
O ceedlngLhelmlLaLlonslnaocaareaneLwork
O nalngeoeLoconnecLLoLheneLworkremoLewlLhouLoenlngLheenLlreneLwork
******************************************************************************
Explain the advantages of using Subneting.
Advantages oI using Subneting:-
O aslerneLworkmanagemenLandLroueshooLlng
O 8ouLlngLae'sslzelsreducedwhlchmeansfasLerneLworkLransfers
O oesneLworkcongesLlonroemslnceLhecomeLeneLworklsdlldedlnLosmaer
neLworks
O -eLworkaddressescanedecenLralzedegLheadmlnlsLraLorofLheneLworkcanmonlLorLhe
suneL
24
******************************************************************************