0% found this document useful (0 votes)
15 views7 pages

Explain OSI Layers - 2. What Is The Difference...

The document explains various networking concepts including the OSI model, differences between IP types, TCP/UDP, HTTP/HTTPS, and authentication protocols like NTLM and Kerberos. It also covers protocols such as DNS, LDAP, SMB, FTP, SFTP, and the functions of routers and switches. Additionally, it discusses network security measures like firewalls and DHCP, along with commands for checking IP addresses and using PING.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views7 pages

Explain OSI Layers - 2. What Is The Difference...

The document explains various networking concepts including the OSI model, differences between IP types, TCP/UDP, HTTP/HTTPS, and authentication protocols like NTLM and Kerberos. It also covers protocols such as DNS, LDAP, SMB, FTP, SFTP, and the functions of routers and switches. Additionally, it discusses network security measures like firewalls and DHCP, along with commands for checking IP addresses and using PING.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

1.

Explain OSI Layers

The OSI (Open Systems Interconnection) model is a conceptual framework that divides network
communication into seven distinct layers:
● Layer 7: Application: The highest layer, responsible for user interactions with applications
(e.g., web browsers, email clients).
● Layer 6: Presentation: Handles data formatting and encryption/decryption.
● Layer 5: Session: Manages and synchronizes data exchange between applications.
● Layer 4: Transport: Ensures reliable data delivery between applications (e.g., TCP, UDP).
● Layer 3: Network: Handles logical addressing (IP addresses) and routing of data packets.
● Layer 2: Data Link: Deals with physical addressing (MAC addresses) and data transfer
within a single network segment.
● Layer 1: Physical: Defines the physical connection between devices (e.g., cables, network
cards).

2. What is the Difference between Private IP & Public IP with Example


● Private IP:
○ Assigned within a private network (e.g., home, office).
○ Not routable on the public internet.
○ Examples: 192.168.x.x, 172.16.x.x, 10.x.x.x
● Public IP:
○ Assigned by an Internet Service Provider (ISP).
○ Routable on the public internet.
○ Unique and globally addressable.
○ Example: 203.0.113.1

3. What is the Difference between TCP & UDP

Feature TCP UDP

Connection-Oriented Yes No

Reliability High (guaranteed delivery) Low (best-effort delivery)

Overhead High (more complex) Low (simpler)

Speed Slower Faster


Feature TCP UDP

Applications Web browsing, file Streaming media, online


transfer, email games, DNS

4. What is the Difference between HTTP & HTTPS

Feature HTTP HTTPS

Security Unencrypted Encrypted (using


SSL/TLS)

Port 80 443

Data Transmission Plain text Encrypted data

Safety Less secure (data can be More secure (data is


intercepted) protected)

5. What is the Difference between Telnet & SSH, Port numbers

Feature Telnet SSH

Security Unencrypted Encrypted

Port 23 22

Data Transmission Plain text Encrypted data


Feature Telnet SSH

Safety Less secure (passwords More secure (passwords


can be easily intercepted) are encrypted)

6. What is DNS, Explain how DNS Works?


● DNS (Domain Name System): A hierarchical distributed naming system that translates
human-readable domain names (e.g., [invalid URL removed]) into machine-readable IP
addresses.

How DNS Works:


1. Resolution Request: When a user enters a domain name in their browser, the browser
sends a DNS query to the local DNS resolver.
2. Recursive Query: If the local resolver doesn't have the IP address, it sends a recursive
query to a root DNS server.
3. Iterative Query: The root server directs the query to the top-level domain (TLD) server
(e.g., .com).
4. Authoritative Server: The TLD server directs the query to the authoritative name server for
that domain (e.g., [invalid URL removed]).
5. IP Address Response: The authoritative server provides the IP address of the requested
domain to the local resolver.
6. IP Address to User: The local resolver returns the IP address to the user's browser.

7. What is the Difference between NTLM & Kerberos

Feature NTLM Kerberos

Type Microsoft's proprietary Open-source,


authentication protocol industry-standard protocol

Security Less secure than Kerberos More secure than NTLM

Complexity Simpler to implement More complex to


implement and manage

Cross-Platform Primarily used within More widely used across


Feature NTLM Kerberos

Compatibility Windows environments different operating systems

8. Explain TCP 3-Way Handshake Process


1. SYN (Synchronize): The client sends a SYN packet to the server, requesting a connection.
2. SYN-ACK (Synchronize-Acknowledge): The server acknowledges the client's request
and sends its own SYN packet.
3. ACK (Acknowledge): The client acknowledges the server's SYN-ACK packet, establishing
the connection.

9. Explain LDAP Protocol & Port number


● LDAP (Lightweight Directory Access Protocol): A protocol used to access and modify
directory services (e.g., Active Directory).
● Port number: 389 (standard), 636 (SSL/TLS)

10. Explain SMB Protocol & Port number


● SMB (Server Message Block): A network file sharing protocol commonly used in Windows
environments.
● Port number: 445

11. What is the Difference between FTP & SFTP

Feature FTP SFTP

Security Unencrypted Encrypted (using SSH)

Data Transmission Plain text Encrypted data

Safety Less secure (passwords More secure (passwords


and data can be and data are protected)
intercepted)

12. What is the Difference between Router & Switch


Feature Router Switch

Function Connects different Connects devices within


networks the same network

Layer Layer 3 (Network) Layer 2 (Data Link)

Addressing Uses IP addresses Uses MAC addresses

Routing Performs routing decisions Does not perform routing

13. What is use of Firewall


● Firewall: A network security system that monitors and controls incoming and outgoing
network traffic based on predefined1 security rules.
● Uses:
○ Prevents unauthorized access to internal networks.
○ Protects against malware and cyberattacks.
○ Controls network traffic based on user, application, or content.

14. What is the Difference between Layer 2 Switch (L2) & Layer 3 (L3) Switch

Feature Layer 2 Switch Layer 3 Switch

Function Forwards data based on Forwards data based on IP


MAC addresses addresses

Layer Operates at Layer 2 of the Operates at Layer 3 of the


OSI model OSI model

Routing Does not perform routing Performs routing functions

Features Basic switching, VLAN Switching, routing, VLAN


Feature Layer 2 Switch Layer 3 Switch

support support, firewall features

15. What are the DNS Records?


● A (Address): Maps a hostname to an IPv4 address.
● AAAA (Address): Maps a hostname to an IPv6 address.
● CNAME (Canonical Name): Creates an alias for another hostname.
● MX (Mail Exchanger): Specifies the mail servers for a domain.
● NS (Name Server): Specifies the authoritative name servers for a domain.
● PTR (Pointer): Maps an IP address to a hostname (reverse DNS).
● TXT (Text): Stores arbitrary text information about a domain.

16. Which command we can use to check System IP Address?


● Windows: ipconfig or ifconfig
● Linux/macOS: ifconfig or ip addr

17. What is the Use of PING Command?


● PING (Packet Internet Groper): A network diagnostic utility used to test reachability between
two devices on an IP network. It sends ICMP (Internet Control Message Protocol) echo
request packets to the target device and waits for echo reply packets.

18. What is the Use of DHCP Protocol


● DHCP (Dynamic Host Configuration Protocol): Automatically assigns IP addresses and
other network configuration parameters (e.g., subnet mask, default gateway, DNS server) to
devices on a network.

19. What is the Difference between IPV4 & IPV6

Feature IPv4 IPv6

Address Space 32-bit addresses (limited) 128-bit addresses (vastly


larger)

Address Format Dotted decimal notation Hexadecimal notation


(e.g., 192.168.1.1) (e.g., 2001:db8::1)
Feature IPv4 IPv6

Security Less secure More secure

Efficiency Less efficient More efficient

Deployment Widely deployed Gradually being deployed

Note: This information is for educational purposes and may not be exhaustive.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy