[go: up one dir, main page]

0% found this document useful (0 votes)
111 views8 pages

Mcse Questions

Download as doc, pdf, or txt
Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1/ 8

Question

Explain IP datagram, Fragmentation and MTU.

IP datagram can be used to describe a portion of IP


data. Each IP datagram has set of fields arranged in
an order. The order is specific which helps to decode
and read the stream easily. IP datagram has fields
like Version, header length, Type of service, Total
length, checksum, flag, protocol, Time to live,
Identification, source and destination ip address,
padding, options and payload.

MTU:- Maximum Transmission Unit is the size of the


largest packet that a communication protocol can
pass. The size can be fixed by some standard or
decided at the time of connection

Fragmentation is a process of breaking the IP packets


into smaller pieces. Fragmentation is needed when
the datagram is larger than the MTU. Each fragment
becomes a datagram in itself and transmitted
independently from source. When received by
destination they are reassembled.

What is VPN?

VPN is a service that offers secure, reliable


connectivity over a shared public network infrastructure
such as the Internet. VPNs maintain the same security
and management policies as a private network. They
are the most cost effective method of establishing a
virtual point-to-point connection between remote
users and an enterprise customer's network.

VPN(VIrtual Private Network)is a service which is usd


for making connectivity of remote user with its
corporate network. VPN is point to point connection
and is used through internet.It makes pipelining
between user & network, means user can access their
secure data through internet with full safety.?VPNs
rely on tunneling to create a private network that
reaches across the Internet. Essentially, tunneling is
the process of placing an entire packet within another
packet and sending it over a network. The protocol of
the outer packet is understood by the network and
both points, called tunnel interfaces, where the packet
enters and exits the network.

Explain the 7 Layers of OSI.

Layer 1: Physical layer


It represents all the electrical and physical
specifications for devices.

Layer 2: Data link layer


It provides the functional and procedural means to
transfer data between network entities and to detect and
possibly correct errors that may occur in the Physical
layer.

Layer 3: Network layer


The Network layer provides the functional and
procedural means of transferring variable length data
sequences from a source to a destination via one or
more networks.

Layer 4: Transport layer


It provides transparent transfer of data between end
users.

Layer 5: Session layer


It controls the sessions between computers. It
connects, manages and terminates the connections
between the local and remote application.

Layer 6: Presentation layer


It transforms data to provide a standard interface for
the Application layer.

Layer 7: Application layer


It provides a means for the user to access information
on the network through an application.

What is the use of IGMP protocol?


Answers:

Internet Group Management Protocol: - It allows


internet hosts to participate in multicasting. The IGMP
messages are used to learn which hosts is part of
which multicast groups. The mechanism also allow a
host to inform its local router, that it wants to receive
messages.
Internet Group Management Protocol: - It allows
internet hosts to participate in multicasting. The IGMP
messages are used to learn which hosts is part of
which multicast groups. The mechanism also allow a
host to inform its local router, that it wants to receive
messages.

What are Ping and Tracert?


Answers:

Ping and tracert are the commands used to send


information to some remote computers to receive
some information. Information is sent and received by
packets. Ping I particularly used to check if the
system is in network or not. It also gives packet lost
information. In windows ping command is written as
ping ip_address Tracert is called as trace route. It is
used to track or trace the path the packet takes from
the computer where the command is given until the
destination. In windows ping command is written as
tracert ip_address

ping is acknowledgement to our system for


connecting to internet
ex:ping 192.168.63.233
tracert is used for how the data packets or you typed
addresses are reached destination to you .
ex:tracert www.google.com
note:perform on dos.

Explain RSVP. How does it work?


Answers:

Resource Reservation protocol is used to reserve


resources across a network. It is used for requesting a
specific Quality of Service (QoS) from the network.
This is done by carrying the request (that needs a
reservation of the resource) of the host throughout
the network. It visits each node in the network. RSVP
used two local modules for reservation of resources.
Admission control module confirms if there are
sufficient available resources while policy module
checks for the permission of making a reservation.
RSVP offers scalability. On a successful completion of
both checks RSVP uses the packet classifier and
packet scheduler for the desired Qos requested.

Explain the concept of DHCP.

Dynamic Host Configuration Protocol is used assigning


IP addresses to computers in a network. The IP
addresses are assigned dynamically. Certainly, using
DHCP, the computer will have a different IP address
every time it is connected to the network. In some
cases the IP address may change even when the
computer is in network. This means that DHCP leases
out the IP address to the computer for sometime.
Clear advantage of DHCP is that the software can be
used to manage IP address rather than the
administrator.

What are the differences between a domain and a workgroup?

Domain always required a Network OS or Server OS


for server but workgroup environment required only
client OS.

Any computer can be part or workgroup but


authenticated user or administrator can only join a
computer in Domain environment.

There is no security possible in workgroup


environment but you can secure every object in
Domain.

In small environment (around 10 computers)


workgroup is easy to maintain but not possible in
hundred or thousand computer environment. In
Domain environment you can manage n no of
computer and other objects easily.

Explain how NAT works?

Answers:

Network Address Translation translates and IP address


used in a network to another IP address known within
another network. A NAT table is maintained for global
to local and local to mapping of IP?s. NAT can be
statically defined or dynamically translate from a pool
of addresses. The NAT router is responsible for
translating traffic coming and leaving the network.
NAT prevents malicious activity initiated by outside
hosts from reaching local hosts by being dependent
on a machine on the local network to initiate any
connection to hosts on the other side of the router.

What is PPP protocol? Explain PPP packet format?


Answers:

Point to Point protocol helps communication between


2 computers over a serial cable, phone line or other
fiber optic lines. E.g. Connection between an Internet
Service Provider and a host. PPP also provides
authentication. PPP operates by sending Request
packets and waiting for Acknowledge packets that
accept, reject or try to change the request. The
protocol is also used to negotiate on network address
or compression options between the nodes.

What is IP Spoofing and how can it be prevented?


Answers:

IP spoofing is a mechanism used by attackers to gain


unauthorized access to a system. Here, the intruder
sends messages to a computer with an IP address
indicating that the message is coming from a trusted
host. This is done by forging the header so it contains
a different address and make it appear that the
packet was sent by a different machine.

Prevention:-
Packet filtering: - to allow packets with recognized
formats to enter the network
Using special routers and firewalls.
Encrypting the session

What is an application gateway?


Answers:

An application gateway is an application program that


runs on a firewall between two networks. An application
gateway is used for establishing connection between
client program and destination service. The client
negotiates with the gateway to communicate with the
service of destination. Here, gateway can be called as
a proxy. Hence, two connections are made. One
between client and proxy; other, between proxy and
destination service. Connections take place behind the
firewall

Explain Circuit Level Gateway?

A circuit level gateway is used to find if a session in


TCP handshaking is legitimate or not. It can be
considered as a layer between application layer and
transport layer. They protect the information of the
private network they protect. Circuit level gateways
do not filter packets.

What is "Gateway Of Last Resort"?

A Gateway of Last Resort or Default gateway is a


route used by the router when no other known route
exists to transmit the IP packet. Known routes are
present in the routing table. Hence, any route not
known by the routing table is forwarded to the default
route. Each router which receives this packet will treat
the packet the same way, if the route is known,
packet will be forwarded to the known route.

What is the difference Between an Intranet and the Internet?


Answers:

There's one major distinction between an intranet and


the Internet: The Internet is an open, public space,
while an intranet is designed to be a private space. An
intranet may be accessible from the Internet, but as a
rule it's protected by a password and accessible only
to employees or other authorized users.

From within a company, an intranet server may


respond much more quickly than a typical Web site.
This is because the public Internet is at the mercy of
traffic spikes, server breakdowns and other problems
that may slow the network. Within a company,
however, users have much more bandwidth and
network hardware may be more reliable. This makes
it easier to serve high-bandwidth content, such as
audio and video, over an intranet.

Define the term Protocol.


Answers:
Protocol is a standard way of communicating across a
network. A protocol is the "language" of the network.
It is a method by which two dissimilar systems can
communicate. TCP is a protocol which runs over a
network.

Define File Transfer Protocol.

Protocol (FTP), a standard Internet


File Transfer
protocol, is the simplest way to exchange files
between computers on the Internet. Like the
Hypertext Transfer Protocol (HTTP), which transfers
displayable Web pages and related files, and the
Simple Mail Transfer Protocol (SMTP), which transfers
e-mail, FTP is an application protocol that uses the
Internet's TCP/IP protocols. FTP is commonly used to
transfer Web page files from their creator to the
computer that acts as their server for everyone on the
Internet. It's also commonly used to download
programs and other files to your computer from other
servers.

What is a network? What are the different kinds of network? Explain


them.
Answers:

A network is a group of computers or nodes


connected together. They are connected with each
other by communication paths.

Types of Networks:

LAN ? Local Area Network connects a group of nodes


covering a small physical area. LAN?s are most
commonly seen in offices, building etc. LAN?s enable
higher transfer rate of data, smaller coverage of area
and hence less wiring.

WAN ? Wide Area Network connects a group of nodes


covering a wide area. WAN typically connects and
allow communication between regions or national
boundaries. The most common example of WAN is
internet.

VPN ? Virtual Private Network connects or links nodes


in some larger area by open connections or virtual
circuits in some larger network (e.g., the Internet)
instead of by physical wires. It is used for secure
communication through the public internet. VPN alone
may not support explicit security features, such as
authentication or content encryption.

Intranet? It is a set of networks under the control of a


single administrative person. It can be considered as
an internal network of an organization. If it is large,
web servers are used to provide information to the
users.

Extranet ? It is a network that restricts itself within a


single organization. It can be categorized as WAN,
MAN etc. however; it

What is multicasting?

Multicasting allows a single message to be sent to a


group of recipients. Emailing, teleconferencing, are
examples of multicasting. It uses the network
infrastructure and standards to send messages.

You might also like