0% found this document useful (0 votes)
21 views7 pages

Acn Winter 19

Uploaded by

aayushsawant511
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views7 pages

Acn Winter 19

Uploaded by

aayushsawant511
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Winter :19

Explain icmp protocol Describe its header format of icmp?


Internet control message protocol is and tcp/ip network layer protocol which provide troubleshooting
error message services Icmp was most frequently used in os for network computer to transmit error
message
Icmp was designed to compensate this two Defeciences:
An ip protocol lack mechanism for host and managaement query a host sometimes need to
dertermine if a router or host is alive
Sometimes a network manager need info from another host or router

Type: The type field in header define the type of messsage


Code : This field in header define specified reason for perticular message type
Checksum: This field in header calculate over entire message
Rest of header:Specify for each message type data in error message carries information for finding
original packet that had error
Data : Data message carries extra info based on type of message

Explain the working of www?


The web is an Repository of Information in which the document called web pages are distributed all
over the world and related Document are linked together
WWW today , is distributed as client- server services in which a client using a browser can access a
services using server
These services provided is distributed to each location know as sites which contain a link that hold
one or more web pages on a same or other sites
Simple web pages has no link to other web pages
Dynamic web pages has link to one or more web pages
Each web pages is a file with a name and address
Each web pages is stored in web server each time a request arrives the corresponding document is
send to client

Explain different transition method from ipv4 to ipv6


There are mainly three types of transition method such as:
Dual stack router
Nat
Tunneling

Dual Stack :
In Dual Stack Router an router interface in attached to ipv4 and ipv6 address configured are used from
transistion from ipv4 to ipv6

In an above diagram a server with both ipv4 and ipv6 address are configure can communicate with all
host of ipv4 and ipv6 via dual stack router a dual stack give medium to all host to communicate with
each other without changing its ip address

Tunneling:
A Tunneling is a medium to communicate with transit network with different ip address

In an above diagram the different ip version such as ipv4 and ipv6 are present ipv4 network and
communicate with transit network of ipv6 with the help of tunneling it is possible to ipv6 network to
communicate with ipv4 network with the help of tunneling

Nat:
With the help help of nat technique the ipv6 and ipv4 network can communicate with each other
which not understand the address of different network
Generally and ip version doen’t understand the address of different ip address for this reason nat pat
device are used it remove header of first ipversion and places the second ip version so that they can
understand the request send by same ip version

Explain the message format of rip ?


Command : this 8 bit define the type of the message
Version: this 8 bit field define the type of the version

Family : this 16 bit field the family of protocol is used

Network Address:The address field define the address of destination network rip has allocated 14
bytes for this field so that any protocol is applicable however currently ip uses only 4 byte and rest of
address are all 0s

Distance:this 32 bit address field define the hop count from advertising router to hop count

What happen if 2 host simultaneously try to establish connection?


It is possible for two application to send syn to each other to start tcp connection although the
possibility is very rare because both send have know which port no the other side to send the process
is know as simultaneous open
In simultaneous open ,both application issue active open
This is a very rare situation in which there is no client or server communication between peer this
know as local port
Both tcp go through sys send and syn rcvd state before going to establishment state
Both processor act as client and server
The two syn+ ack segment acknowledged the syn segment and open the connection

What is dynamic routing state its advantage and disadvantages and count to infintiy problem?
Dynamic routing uses dynamic routing protocol to automatically select the best route to put into the
routing table so instead of manually entering static route in routing table Dynamic routing
automatically decide which route is best to go into routing table this intellegent approach make
routing so usefull in this modern era

Advantages:
Benefial performance and scalable network
Make fewer mistake as it reroute itself compare to other routing protocol
Disadvantages:
Require more heavy and reliable powerfull hardware
Higher maintenance as compared to static route

Count to infinity problem:


One of the important problem in distance vector is count to infinity problem
Count-to-infinity is just another name for routing loop
In distance vector routing loop usually occurs when an interface is down
It only occurs when two router send update to each other at a same time
Describe email system over non - secure channel?
Email is perhaps the most popular used system for exchanging business information over internet
The basic level email process are divided into two principle compounent
Mail server:which are host that deliver forward and store email
Mail client: An interface with user and allow user to read , compose ,send and store mail
Mail server and user workstation running mail client are frequently trageted by attacker because the
computer and networking technologies are well understood by many attacker and develop attack
method to exploit security weakness
Mail server are also get targeted because they communicated to some untrusted third parties
Additionally mail client also targeted as effective means of inserting malware into machine and of
propagating the code to another machine as a result the mail client and mail server and network
infrasturture that are supported them must be protected

Three principle that are directly applied on email security:


Confidentiality of email making sure it is protected from unauthorized access
Integrity of email involves a gurantee that it has not been modified or destroyed by unauthorized
indiviual
Availability of email involves ensuring that the mail server remain on line and able to services user
community

Construt a diagram to show the application of cookies in an scenario?


Ans:A cookies is used by an advertising agencies an advertising agencies can place banner ad on some
main website that are often visited by user the advertising agency only supply a url that give banneer
address instead of banner when user visit the website and click on the icon a request is send to
advertising agencies
The advertising agency add banner a gif cookies for example but it also include the cookies with the
ill of user
Any future use of the banner add to the database that profine the web behaviour of the user this
advertising agency has compiled the interest of the user and can sell this information to other party
this used of cookies has made them very controversial

Explain tcp connection management with the help of tcp connectiion management finite state
machine ?
To keep track of all the different event occurs during connection estabishment , connection
termination and data transfer specified in a finite state machine
Tcp state machine:
Tcp uses 3 way handshake to close connection
Singled by a fin bit in packet header

In the figure show two Fsm used by tcp client and server
Oval rectangle represent state
Transition from one state to another is show using directed line
Each line has two string seperated by a slash
The first string is an input ,what tcp receive
The second string is an output , what tcp send
The dotted line represent the transition that server normally goes through
The solid black line show the transition that a client normally goes
Sometimes in some situation a server transition through solid line or client transition through dotted
lines
State the need of dns?
Human friendly : dns can translate human friendly name into ip address which computer used to
locate each other

Enchanced security : dns include security like dnssec to very that the response is authenticate help to
prevent from dns spoofing and chaching

Flexiblity and maintaince : with dns domain owner can change the ip address with their domain point
without affecting the user

Construct a diagram to show the application of cookies in a scenario in which server uses cookies for
advertising ?
Ans: A cookies is used by an advertising agency these advertising agencies places banner or add on
some main web pages which are often visited by user these advertising agency supply a url that give
banner address instead of the banner when a user visit the website and click on icon a request is send
to advertising agencies
Any future used of banner are add to the database that profile the web behaviour of the user these
advertising agency compile the interest of the user and send the info to other party this used of
cookies are very controversial

Command : This 8 bit specifies the type of the message

Version: This 8 bit define the version

Family : this 16 bit field define the family of the protocol used

Network address: this address field define the address of destination network the rip
has allocated 14 byte for this field to be applicable to any protocol however ip
currently uses only 4 byte the rest address is field with 0s

Distance: this 32 bit field define the hop count from the advertising router to
destination network
Describe the http response message format?
Ans:

Status line : The status line is used to define the status of the response message it
consist of http version status code ,status phase

Http version : this field indicate the version of http being used the field is same as
http version field of request line

Status code: it is an three digit field similar to ftp and smtp

Status field: it is used to explain the status code in a text format

Header:
Header in response message is used for exchanging additional info between client
and server
Header can be one or multiple line the format of header line consist of header
name , colon , space and header value

Blank line : an empty line indicating the end of header field

Body:it contain an actual content this part is an optional


Explain three intra domain routing protocol?
Ans:Distance vector routing algorithm is the dynamic routing algorithm in computer
network Distance vector routing is also called as bellman ford routing algorithm
which is used to find the shortest path between nodes in graph
It was designed for small network topologies Distance vector routing method see an
as with all router and network as a graph
In distance vector routing node router construct a table containing the distance of all
other node and distribute vector to it immediate node
In distance vector routing it is assumed that each node know the cost of link to each
directly connected neighbors
Distance vector routing is like a road sign because each router must take a preffered
path decision based on a distance or metric to a network

Drawbacks:
It is slower to coverge than link state
It is at risk from count-to-infinity problem

Link state :
Link state routing is an technique in which each router share the knowledge of its
neighborhood with every other router in the inter network

Link state routing has different philosophy from that of distance vector routing in link
state routing if each node in the domain has an entire topology of domain the list of
node and link how they are connected including type ,cost and condition of the link
the node used dijiksha algorithm to build routing table

Link state routing are more like a road map because they create a topological map of
the network and each router uses this map to determine the shortest path to each
network

Router running on link state routing protocol send information about the state of its
link to other router in the routing domain

Drawbacks:
What is multicast distance vector :
Ans: Distance vector routing when extended to support multicast is called as
distance vector multicast routing protocol

The dvmr is multicast routing protocol that takes the routing decision based upon
the source address of the packet this algorithm construct the routing tree for a
network

Whenever a router receive a packet it forward it to some of its port based on the
source address of the packet the rest of the routing tree is made of the downstream
router in this way a routing tree is created from destination to source

The dvmr protocol must achieve the following task:


It must prevent the formation of loop in the network
It must prevent the formation of duplicate packet
It must ensure that the path traveled by a packet is the shortest from the source to
destination
It should provide dynamic membership

Multicast distance vector uses source based tree but router never actually make a
routing table when a router receive a multicast packet it forward the packet as it
thought consulting routing table

Explain the distance vector also state the count to infinity problem?
Advantages:
Beneficial for performance and scalable network
Make fewer mistake as it reroute itself compare to other routing protocol

Disadvantages:
Require more heavy and reliable powerful hardware
Higher maintenance as compared to static route

Cout to infinity problem:


One of the important problem In distance vector is count-to- infinity problem
Count to infinity is an another name for routing loop
In distance vector routing loop usually occurs when interface is down
It occurs when two router send update to each other at a same time .

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy