Networking Question Papers1 by PM
Networking Question Papers1 by PM
IPv4 produces 4 billion addresses, and the developers think that these addresses are
enough, but they were wrong. IPv6 is the next generation of IP addresses. The main
difference between IPv4 and IPv6 is the address size of IP addresses. The IPv4 is a 32-bit
address, whereas IPv6 is a 128-bit hexadecimal address. IPv6 provides a large address
space, and it contains a simple header as compared to IPv4.
This hexadecimal address contains both numbers and alphabets. Due to the usage of
both the numbers and alphabets, IPv6 is capable of producing over 340 undecillion
(3.4*1038) addresses.
--->
1. The version field in IPv6 is a 4-bit field in the IPv6 header that
specifies the version of the IP protocol being used. The value of the
version field for IPv6 is "0110" in binary or "6" in decimal. This value
distinguishes IPv6 packets from IPv4 packets, which use a value of
"0100" in binary or "4" in decimal for their version field. The version
field is a fundamental component of the IPv6 header, as it enables
network devices to properly identify and process IPv6 packets .
2. The Traffic Class field in IPv6 is an 8-bit field in the IPv6 header that is
used to classify packets based on their priority or type of service. It is
used to differentiate traffic flows and can be used to provide quality
of service (QoS) guarantees for different types of traffic. The Traffic
Class field can be used for traffic shaping, traffic policing, or other
traffic management techniques.
3. The Flow Label field in IPv6 is a 20-bit field in the IPv6 header that is
used to identify packets that belong to the same flow or session. The
Flow Label field is used to provide a way to identify packets that are
part of the same communication session and to provide a hint to
routers to perform certain optimizations for that flow, such as
reserving resources or providing priority treatment.
4. The Payload Length field in IPv6 is a 16-bit field in the IPv6 header
that specifies the length of the payload or data portion of the IPv6
packet, in octets. The Payload Length field is used to enable network
devices to correctly identify the length of the data portion of the
packet, so that they can properly handle and process the packet. The
maximum value of the Payload Length field is 65,535 octets. If the
value of the Payload Length field is set to zero, it indicates that the
IPv6 packet contains no payload data.
5.The Next Header field in IPv6 is an 8-bit field in the IPv6 header that
specifies the type of the next header or extension header that follows the
IPv6 header. The Next Header field is used to identify the protocol or
extension header that is carried in the packet and to enable network
devices to correctly identify and process the packet. The value of the Next
Header field determines the format and content of the extension header, if
present, or the transport layer protocol that follows the IPv6 header. Some
possible values of the Next Header field include TCP, UDP, ICMPv6, Hop-
by-Hop Options, Routing, Fragment, and Destination Options.
6.The Hop Limit field in IPv6 is an 8-bit field in the IPv6 header that
specifies the maximum number of routers or network devices that a packet
can pass through before it is discarded. The Hop Limit field is used to
prevent packets from circulating indefinitely on the network, and to limit
the scope of the packet to a specific area of the network. Each router that
processes the packet decrements the value of the Hop Limit field by 1, and
when the Hop Limit field reaches zero, the packet is discarded.
8.The Destination Address field in IPv6 is a 128-bit field in the IPv6 header
that specifies the IPv6 address of the intended recipient of the packet. The
Destination Address field is used to enable network devices to properly
identify the destination of the packet and to route the packet to the correct
recipient. The IPv6 address in the Destination Address field uniquely
identifies the recipient of the packet on the network and provides a means
for network devices to deliver the packet to the intended destination. The
Destination Address field is a critical component of the IPv6 header, as it
enables network devices to properly handle and process IPv6 packets, and
to deliver packets to the correct recipient.
2.Compare IVP4 and IPV6?
--->IPv4 and IPv6 are internet protocol version 4 and internet protocol version
6, IP version 6 is the new version of Internet Protocol, which is way better than
IP version 4 in terms of complexity and efficiency.
Difference Between IPv4 and IPv6:
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It can generate 4.29×109 address Address space of IPv6 is quite large it can produce
space 3.4×1038 address space
The Security feature is dependent IPSEC is an inbuilt security feature in the IPv6
on application protocol
Fragmentation performed by
Sender and forwarding routers In IPv6 fragmentation performed only by the sender
In IPv4 Packet flow identification In IPv6 packet flow identification are Available and
is not available uses the flow label field in the header
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consist of 4 fields which are IPv6 consist of 8 fields, which are separated by colon
separated by dot (.) (:)
Example of IPv6:
Example of IPv4: 66.94.29.13 2001:0000:3238:DFE1:0063:0000:0000:FEFB
o Connections
o When I speak of a connection in HTTP, I refer to a TCP connection. As illustrated
in Figure 3.1, a TCP connection requires three separate messages.
o SYN and ACK are two flags within the TCP segment of a packet. Because TCP is
such a common transport layer protocol to be used in conjunction with IP, the
combined packet of an IP packet containing a TCP segment is sometimes called
a TCP/IP packet, even though it would best be described as a packet within a
packet. By this example, you can see that a connection is unlike what you might
otherwise expect. After this exchange, both computers simply consider
themselves connected. In terms of HTTP, this simply means the server is ready
to receive requests from this specific client. There is no real active connection in
the traditional sense. It is better described as an understanding between the two
computers that they are connected.
o An example of this type of connection is a two-way radio. If you and a friend both
have two-way radios, you can establish a similar method for ensuring that you
are both able to send and receive messages properly. To do this, you can send a
message (by talking into the radio) asking to establish a connection. Your friend
sends back a confirmation message acknowledging your request and agreeing to
the connection. At this point, you feel confident that each of you can both send
and receive messages, but your friend cannot be assured of this without knowing
whether you received the confirmation. You send back a final message
acknowledging the receipt of your friend's confirmation. At this point, you both
have confidence in your ability to communicate with these radios. This series of
events is very similar to a TCP connection.
o NOTE
o To handle an HTTP response, you can check the response code to see if the
request was successful, and use the response body to extract the information you
need.
o Here's an example of how to check the response code and handle the response
body:
o // check the response code
o int responseCode = con.getResponseCode();
o if (responseCode == HttpURLConnection.HTTP_OK) {
o // read the response body
o BufferedReader in = new BufferedReader(new
InputStreamReader(con.getInputStream()));
o String inputLine;
o StringBuffer response = new StringBuffer();
o while ((inputLine = in.readLine()) != null) {
o response.append(inputLine);
o }
o in.close();
o
o // do something with the response
o System.out.println(response.toString());
o } else {
o System.out.println("HTTP request failed: " +
responseCode);
o }
The majority of the response is HTML (omitted for brevity). Only the first few lines
are HTTP. Thus, as intended, HTTP does not have much overhead. Lower-level
protocols such as TCP and IP have even less overhead than HTTP, however,
due mostly to the fact that HTTP is intentionally readable. This makes it easy to
study and comprehend.
o Example Transaction
o A good example transaction to review is a search on Google. Being one of the
most popular sites on the Web, most people have interacted with this site at one
time or another. When performing a search on HTTP (see Figure 3.2), you enter
HTTP into the form field and click the button labeled Google Search.
o When using my Web browser to perform this search, the following HTTP request
is sent when I click the button:
o GET /search?hl=en&q=HTTP&btnG=Google+Search HTTP/1.1
o Host: http://www.google.com
o Accept:
text/xml,application/xml,application/xhtml+xml,text/html;q=
0.9,
o text/plain;q=0.8,video/x-
mng,image/png,image/jpeg,image/gif;q=0.2,
o text/css,*/*;q=0.1
o Accept-Language: en
o Keep-Alive: 300
o Connection: keep-alive
Email protocols are a collection of protocols that are used to send and receive
emails properly. The email protocols provide the ability for the client to transmit
the mail to or from the intended mail server. Email protocols are a set of
commands for sharing mails between two computers. Email protocols establish
communication between the sender and receiver for the transmission of email.
Email forwarding includes components like two computers sending and
receiving emails and the mail server. There are three basic types of email
protocols.
Three basic types of email protocols involved for sending and receiving mails
are:
• SMTP
• POP3
• IMAP
Post Office Protocol is used to retrieve email for a single client. POP3 version is
the current version of POP used. It is an application layer protocol. It allows to
access mail offline and thus, needs less internet time. To access the message it
has to be downloaded. POP allows only a single mailbox to be created on the
mail server. POP does not allow search facilities
Some of the POP commands are LOG IN, STAT, LIST, RETR, DELE, RSET,
and QUIT. For more details please refer to the POP Full-Form article.
Internet Message Access Protocol is used to retrieve mails for multiple clients.
There are several IMAP versions: IMAP, IMAP2, IMAP3, IMAP4, etc. IMAP is
an application layer protocol. IMAP allows to access email without downloading
them and also supports email download. The emails are maintained by the
remote server. It enables all email operations such as creating, manipulating,
delete the email without reading it. IMAP allows you to search emails. It allows
multiple mailboxes to be created on multiple mail servers and allows concurrent
access. Some of the IMAP commands are: IMAP_LOGIN, CREATE, DELETE,
RENAME, SELECT, EXAMINE, and LOGOUT.
For more details please refer to the Internet Message Access Protocol
(IMAP) article.
MIME(Multipurpose Internet Mail Extension Protocol):
RIP stands for Routing Information Protocol. RIP is an intra-domain routing protocol
used within an autonomous system. Here, intra-domain means routing the packets in a
defined domain, for example, web browsing within an institutional area. To understand
the RIP protocol, our main focus is to know the structure of the packet, how many fields
it contains, and how these fields determine the routing table.
Before understanding the structure of the packet, we first look at the following
points:
o RIP is based on the distance vector-based strategy, so we consider the entire structure as
a graph where nodes are the routers, and the links are the networks.
o In a routing table, the first column is the destination, or we can say that it is a network
address.
o The cost metric is the number of hops to reach the destination. The number of hops
available in a network would be the cost. The hop count is the number of networks
required to reach the destination.
o In RIP, infinity is defined as 16, which means that the RIP is useful for smaller networks or
small autonomous systems. The maximum number of hops that RIP can contain is 15
hops, i.e., it should not have more than 15 hops as 16 is infinity.
o The next column contains the address of the router to which the packet is to be sent to
reach the destination.
Pause
Unmute
Duration 18:10
Loaded: 4.04%
Fullscreen
Suppose R1 wants to send the data to R4. There are two possible routes to send data
from r1 to r2. As both the routes contain the same number of hops, i.e., 3, so RIP will
send the data to both the routes simultaneously. This way, it manages the load
balancing, and data reach the destination a bit faster.
Disadvantages of RIP
The following are the disadvantages of RIP:
o In RIP, the route is chosen based on the hop count metric. If another route of better
bandwidth is available, then that route would not be chosen. Let's understand this
scenario through an example.
We can observe that Route 2 is chosen in the above figure as it has the least hop count.
The Route 1 is free and data can be reached more faster; instead of this, data is sent to
the Route 2 that makes the Route 2 slower due to the heavy traffic. This is one of the
biggest disadvantages of RIP.
o The RIP is a classful routing protocol, so it does not support the VLSM (Variable Length
Subnet Mask). The classful routing protocol is a protocol that does not include the
subnet mask information in the routing updates.
o It broadcasts the routing updates to the entire network that creates a lot of traffic. In RIP,
the routing table updates every 30 seconds. Whenever the updates occur, it sends the
copy of the update to all the neighbors except the one that has caused the update. The
sending of updates to all the neighbors creates a lot of traffic. This rule is known as a
split-horizon rule.
o It faces a problem of Slow convergence. Whenever the router or link fails, then it often
takes minutes to stabilize or take an alternative route; This problem is known as Slow
convergence.
o RIP supports maximum 15 hops which means that the maximum 16 hops can be
configured in a RIP
o The Administrative distance value is 120 (Ad value). If the Ad value is less, then the
protocol is more reliable than the protocol with more Ad value.
o The RIP protocol has the highest Ad value, so it is not as reliable as the other routing
protocols.
Advantages of RIP
The following are the advantages of a RIP protocol:
o It is easy to configure
o It has less complexity
o The CPU utilization is less.
7.
DHCP can be implemented on local networks as well as large enterprise networks. DHCP
is the default protocol used by the most routers and networking equipment. DHCP is
also called RFC (Request for comments) 2131.
DHCP is also used to configure the proper subnet mask, default gateway and DNS server
information on the node or device.
There are many versions of DCHP are available for use in IPV4 (Internet Protocol Version 4)
and IPV6 (Internet Protocol Version 6).
Play Video
DHCP is based on client-server protocol in which servers manage a pool of unique IP addresses,
as well as information about client configuration parameters, and assign addresses out of those
address pools.
o DHCP Server: DHCP server is a networked device running the DCHP service that
holds IP addresses and related configuration information. This is typically a server
or a router but could be anything that acts as a host, such as an SD-WAN
appliance.
o DHCP client: DHCP client is the endpoint that receives configuration information
from a DHCP server. This can be any device like computer, laptop, IoT endpoint
or anything else that requires connectivity to the network. Most of the devices
are configured to receive DHCP information by default.
o IP address pool: IP address pool is the range of addresses that are available to
DHCP clients. IP addresses are typically handed out sequentially from lowest to
the highest.
o Subnet: Subnet is the partitioned segments of the IP networks. Subnet is used to
keep networks manageable.
o Lease: Lease is the length of time for which a DHCP client holds the IP address
information. When a lease expires, the client has to renew it.
o DHCP relay: A host or router that listens for client messages being broadcast on
that network and then forwards them to a configured server. The server then
sends responses back to the relay agent that passes them along to the client.
DHCP relay can be used to centralize DHCP servers instead of having a server on
each subnet.
Benefits of DHCP
There are following benefits of DHCP:
Dynamic host configuration: DHCP automates the host configuration process and eliminates
the need to manually configure individual host. When TCP/IP (Transmission control
protocol/Internet protocol) is first deployed or when IP infrastructure changes are required.
Seamless IP host configuration: The use of DHCP ensures that DHCP clients get accurate
and timely IP configuration IP configuration parameter such as IP address, subnet mask, default
gateway, IP address of DND server and so on without user intervention.
Flexibility and scalability: Using DHCP gives the administrator increased flexibility,
allowing the administrator to move easily change IP configuration when the
infrastructure changes.
An attack is an action that exploits a vulnerability or enacts a threat. Examples of attacks include
sending malicious input to an
Masquerade Attack
Modification of messages –
It means that some portion of a message is altered or that message is delayed
or reordered to produce an unauthorized effect. Modification is an attack on the
integrity of the original data. It basically means that unauthorized parties not
only gain access to data but also spoof the data by triggering denial-of-service
attacks, such as altering transmitted data packets or flooding the network with
fake data. Manufacturing is an attack on authentication. For example, a
message meaning “Allow JOHN to read confidential file X” is modified as “Allow
Smith to read confidential file X”.
Modification of messages
Repudiation –
This attack occurs when the network is not completely secured or the login
control has been tampered with. With this attack, the author’s information can
be changed by actions of a malicious user in order to save false data in log
files, up to the general manipulation of data on behalf of others, similar to the
spoofing of e-mail messages.
Replay –
It involves the passive capture of a message and its subsequent transmission to
produce an authorized effect. In this attack, the basic aim of the attacker is to
save a copy of the data originally present on that particular network and later on
use this data for personal uses. Once the data is corrupted or leaked it is
insecure and unsafe for the users.
Replay
Denial of Service –
It prevents the normal use of communication facilities. This attack may have a
specific target. For example, an entity may suppress all messages directed to a
particular destination. Another form of service denial is the disruption of an
entire network either by disabling the network or by overloading it with
messages so as to degrade performance.
Denial of Service
• Java
import java.net.*;
import java.io.*;
import java.util.*;
import java.net.InetAddress;
(localhost.getHostAddress()).trim());
try
BufferedReader sc =
new BufferedReader(new
InputStreamReader(url_name.openStream()));
catch (Exception e)
Output:
System IP Address : 10.0.8.204
Public IP Address : 35.166.48.97
9.Write PCB server socket program which accept request from client to capitalize
string and sending the response in the form of capitalizes sentence block to client.
--> This article describes a very basic one-way Client and Server setup where a
Client connects, sends messages to the server and the server shows them
using a socket connection. There’s a lot of low-level stuff that needs to happen
for these things to work but the Java API networking package (java.net) takes
care of all of that, making network programming very easy for programmers.
Client-Side Programming
Establish a Socket Connection
To connect to another machine we need a socket connection. A socket
connection means the two machines have information about each other’s
network location (IP Address) and TCP port. The java.net.Socket class
represents a Socket. To open a socket:
Socket socket = new Socket(“127.0.0.1”, 5000)
• The first argument – IP address of Server. ( 127.0.0.1 is the IP address of
localhost, where code will run on the single stand-alone machine).
• The second argument – TCP Port. (Just a number representing which
application to run on a server. For example, HTTP runs on port 80. Port
number can be from 0 to 65535)
Communication
To communicate over a socket connection, streams are used to both input and
output the data.
Closing the connection
The socket connection is closed explicitly once the message to the server is
sent.
In the program, the Client keeps reading input from a user and sends it to the
server until “Over” is typed.
Java Implementation
• Java
import java.io.*;
import java.net.*;
// establish a connection
try {
System.out.println("Connected");
socket.getOutputStream());
catch (UnknownHostException u) {
System.out.println(u);
return;
catch (IOException i) {
System.out.println(i);
return;
while (!line.equals("Over")) {
try {
line = input.readLine();
out.writeUTF(line);
catch (IOException i) {
System.out.println(i);
}
}
try {
input.close();
out.close();
socket.close();
catch (IOException i) {
System.out.println(i);
Server Programming
Establish a Socket Connection
To write a server application two sockets are needed.
• A ServerSocket which waits for the client requests (when a client makes a
new Socket())
• A plain old Socket to use for communication with the client.
Communication
getOutputStream() method is used to send the output through the socket.
Close the Connection
After finishing, it is important to close the connection by closing the socket as
well as input/output streams.
• Java
import java.net.*;
import java.io.*;
try
System.out.println("Server started");
socket = server.accept();
System.out.println("Client accepted");
in = new DataInputStream(
new
BufferedInputStream(socket.getInputStream()));
while (!line.equals("Over"))
try
line = in.readUTF();
System.out.println(line);
catch(IOException i)
System.out.println(i);
System.out.println("Closing connection");
// close connection
socket.close();
in.close();
}
catch(IOException i)
System.out.println(i);
Important Points
• Server application makes a ServerSocket on a specific port which is 5000.
This starts our Server listening for client requests coming in for port 5000.
• Then Server makes a new Socket to communicate with the client.
socket = server.accept()
• The accept() method blocks(just sits there) until a client connects to the
server.
• Then we take input from the socket using getInputStream() method. Our
Server keeps receiving messages until the Client sends “Over”.
• After we’re done we close the connection by closing the socket and the input
stream.
• To run the Client and Server application on your machine, compile both of
them. Then first run the server application and then run the Client
application.
To run on Terminal or Command Prompt
Open two windows one for Server and another for Client
1. First run the Server application as,
$ java Server
Server started
Waiting for a client …
2. Then run the Client application on another terminal as,
$ java Client
It will show – Connected and the server accepts the client and shows,
Client accepted
3. Then you can start typing messages in the Client window. Here is a sample
input to the Client
Hello
I made my first socket connection
Over
Which the Server simultaneously receives and shows,
Hello
I made my first socket connection
Over
Closing connection
Notice that sending “Over” closes the connection between the Client and the
Server just like said before.
If you’re using Eclipse or likes of such-
1. Compile both of them on two different terminals or tabs
2. Run the Server program first
3. Then run the Client program
4. Type messages in the Client Window which will be received and shown by
the Server Window simultaneously.
5. Type Over to end.
This article is contributed by Souradeep Barua. If you like GeeksforGeeks and
would like to contribute, you can also write an article and mail your article to
[email protected]. See your article appearing on the
GeeksforGeeks main page and help other Geeks.
10.Describe TCP/IP protocol surf in detail.
TCP/IP model
o The TCP/IP model was developed prior to the OSI model.
o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer, transport layer, network
layer, data link layer and physical layer.
o The first four layers provide physical standards, network interface, internetworking, and
transport functions that correspond to the first four layers of the OSI model and these
four layers are represented in TCP/IP model by a single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and each of them
provides specific functionality.
Here, hierarchical means that each upper-layer protocol is supported by two or more
lower-level protocols.
Internet Layer
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the
entire TCP/IP suite.
ARP Protocol
Play Video
ICMP Protocol
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data
which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
Application Layer
o HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the
data over the world wide web. It transfers the data in the form of plain text, audio, video.
It is known as a Hypertext transfer protocol as it has the efficiency to use in a hypertext
environment where there are rapid jumps from one document to another.
o SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used
for managing the devices on the internet by using the TCP/IP protocol suite.
o SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that supports
the e-mail is known as a Simple mail transfer protocol. This protocol is used to send the
data to another e-mail address.
o DNS: DNS stands for Domain Name System. An IP address is used to identify the
connection of a host to the internet uniquely. But, people prefer to use the names
instead of addresses. Therefore, the system that maps the name to the address is known
as Domain Name System.
o TELNET: It is an abbreviation for Terminal Network. It establishes the connection
between the local computer and remote computer in such a way that the local terminal
appears to be a terminal at the remote system.
o FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for
transmitting the files from one computer to another computer.
Question 1 complete
11.Explain IPV4 address classes and IPV6 addressing .How they can exist
same time?
IPv4 addresses are 32-bit addresses and are divided into five classes: A, B, C, D, and E.
These classes are determined by the value of the first octet of the IP address, which is
used to identify the network portion of the address and the host portion of the address.
The classes are as follows:
• Class A addresses are used for large networks and have the first octet reserved for the
network portion of the address, while the remaining three octets are used for the host
portion. The range of Class A addresses is from 1.0.0.0 to 126.0.0.0.
•
• Class B addresses are used for medium-sized networks and have the first two octets
reserved for the network portion of the address, while the remaining two octets are
used for the host portion. The range of Class B addresses is from 128.0.0.0 to
191.255.0.0.
•
• Class C addresses are used for small networks and have the first three octets reserved
for the network portion of the address, while the remaining octet is used for the host
portion. The range of Class C addresses is from 192.0.0.0 to 223.255.255.0.
•
• Class D addresses are used for multicast addresses and have the first four bits of the first
octet set to 1. The range of Class D addresses is from 224.0.0.0 to 239.255.255.255.
• Class E addresses are reserved for experimental use and have the first four bits of the
first octet set to 1. The range of Class E addresses is from 240.0.0.0 to 255.255.255.255.
IPV6 addressing:
IPv6 addresses are represented using hexadecimal notation and are divided
into eight groups of four hexadecimal digits separated by colons, like this:
2001:0db8:85a3:0000:0000:8a2e:0370:7334
However, since IPv6 addresses can contain long sequences of zeros, there are
several ways to abbreviate the address. One common method is to use double
colons to replace one or more groups of consecutive zeros, like this:
2001:0db8:85a3::8a2e:0370:7334
1. Unicast Addresses: These are unique addresses that identify a single interface
on a network. There are three types of unicast addresses:
• Global unicast addresses: These are public addresses that are used for
communication over the Internet. They are similar to IPv4 public addresses.
• Link-local addresses: These addresses are used for communication within a
single network segment, such as a LAN. They are similar to IPv4 APIPA
addresses.
• Site-local addresses: These addresses are used for communication within a
specific organization or site. They are similar to IPv4 private addresses.
•
2. Multicast Addresses: These addresses are used for one-to-many
communication, where a single packet is sent to multiple interfaces on a
network. Multicast addresses start with the prefix ff00::/8.
IPv4 and IPv6 addresses can exist at the same time because they are
different protocols used to assign unique numerical identifiers to devices
on a network. While IPv4 addresses are still widely used, IPv6 addresses
are becoming more common as the number of devices connected to the
internet increases and the need for a larger address space grows. Many
modern operating systems and networking equipment support both IPv4
and IPv6 protocols, which allows devices using either protocol to
communicate with each other on the same network. In some cases,
network administrators may use a mechanism called dual-stack, which
enables a device to support both IPv4 and IPv6 addresses simultaneously.
IP Routing:
IP routing is the process that defines the shortest path through which data
travels to reach from source to destination. It determines the shortest path to
send the data from one computer to another computer in the same or different
network. Routing uses different protocols for the different networks to find the
path that data follows. It defines the path through which data travel across
multiple networks from one computer to other. Forwarding the packets from
source to destination via different routers is called routing. The routing decision
is taken by the routers.
IP Routing
Terminologies:
Open Shortest Path First (OSPF) is a link-state routing protocol that is used to
find the best path between the source and the destination router using its own
Shortest Path First). OSPF is developed by Internet Engineering Task Force
(IETF) as one of the Interior Gateway Protocol (IGP), i.e, the protocol which
aims at moving the packet within a large autonomous system or routing domain.
It is a network layer protocol which works on protocol number 89 and uses AD
value 110. OSPF uses multicast address 224.0.0.5 for normal communication
and 224.0.0.6 for update to designated router(DR)/Backup Designated Router
(BDR).
OSPF terms –
1. Router I’d – It is the highest active IP address present on the router. First,
the highest loopback address is considered. If no loopback is configured
then the highest active IP address on the interface of the router is
considered.
DR and BDR election – DR and BDR election takes place in the broadcast
network or multi-access network. Here are the criteria for the election:
2. If there is a tie in router priority then the highest router I’d be considered.
First, the highest loopback address is considered. If no loopback is
configured then the highest active IP address on the interface of the router is
considered.
OSPF states – The device operating OSPF goes through certain states. These
states are:
1. Down – In this state, no hello packets have been received on the interface.
Note – The Downstate doesn’t mean that the interface is physically down.
Here, it means that the OSPF adjacency process has not started yet.
2. INIT – In this state, the hello packets have been received from the other
router.
3. 2WAY – In the 2WAY state, both the routers have received the hello packets
from other routers. Bidirectional connectivity has been established.
Note – In between the 2WAY state and Exstart state, the DR and BDR
election takes place.
4. Exstart – In this state, NULL DBD are exchanged. In this state, the master
and slave elections take place. The router having the higher router I’d
become the master while the other becomes the slave. This election decides
Which router will send its DBD first (routers who have formed neighbourship
will take part in this election).
6. Loading – In this state, LSR, LSU, and LSA (Link State Acknowledgement)
are exchanged.
Important – When a router receives DBD from other router, it compares its
own DBD with the other router DBD. If the received DBD is more updated
than its own DBD then the router will send LSR to the other router stating
what links are needed. The other router replies with the LSU containing the
updates that are needed. In return to this, the router replies with the Link
State Acknowledgement.
7. Full – In this state, synchronization of all the information takes place. OSPF
routing can begin only after the Full state.
13.Explain various threats in Network Security.
1. Infection Methods
2. Malware Actions
Malware on the basis of Infection Method are following:
1. Virus – They have the ability to replicate themselves by hooking them to the
program on the host computer like songs, videos etc and then they travel all
over the Internet. The Creeper Virus was first detected on ARPANET.
Examples include File Virus, Macro Virus, Boot Sector Virus, Stealth Virus
etc.
2. Worms – Worms are also self-replicating in nature but they don’t hook
themselves to the program on host computer. Biggest difference between
virus and worms is that worms are network-aware. They can easily travel
from one computer to another if network is available and on the target
machine they will not do much harm, they will, for example, consume hard
disk space thus slowing down the computer.
3. Trojan – The Concept of Trojan is completely different from the viruses and
worms. The name Trojan is derived from the ‘Trojan Horse’ tale in Greek
mythology, which explains how the Greeks were able to enter the fortified
city of Troy by hiding their soldiers in a big wooden horse given to the
Trojans as a gift. The Trojans were very fond of horses and trusted the gift
blindly. In the night, the soldiers emerged and attacked the city from the
inside.
Their purpose is to conceal themselves inside the software that seem
legitimate and when that software is executed they will do their task of either
stealing information or any other purpose for which they are designed.
They often provide backdoor gateway for malicious programs or malevolent
users to enter your system and steal your valuable data without your
knowledge and permission. Examples include FTP Trojans, Proxy Trojans,
Remote Access Trojans etc.
1. Adware – Adware is not exactly malicious but they do breach privacy of the
users. They display ads on a computer’s desktop or inside individual
programs. They come attached with free-to-use software, thus main source
of revenue for such developers. They monitor your interests and display
relevant ads. An attacker can embed malicious code inside the software and
adware can monitor your system activities and can even compromise your
machine.
2. Spyware – It is a program or we can say software that monitors your
activities on computer and reveal collected information to an interested
party. Spyware are generally dropped by Trojans, viruses or worms. Once
dropped they install themselves and sits silently to avoid detection.
One of the most common example of spyware is KEYLOGGER. The basic
job of keylogger is to record user keystrokes with timestamp. Thus capturing
interesting information like username, passwords, credit card details etc.
3. Ransomware – It is type of malware that will either encrypt your files or will
lock your computer making it inaccessible either partially or wholly. Then a
screen will be displayed asking for money i.e. ransom in exchange.
4. Scareware – It masquerades as a tool to help fix your system but when the
software is executed it will infect your system or completely destroy it. The
software will display a message to frighten you and force to take some action
like pay them to fix your system.
5. Rootkits – are designed to gain root access or we can say administrative
privileges in the user system. Once gained the root access, the exploiter can
do anything from stealing private files to private data.
6. Zombies – They work similar to Spyware. Infection mechanism is same but
they don’t spy and steal information rather they wait for the command from
hackers.
14.Explain various Topologies used in networking.
The arrangement of a network that comprises nodes and connecting lines via
sender and receiver is referred to as network topology. The various network
topologies are:
Mesh Topology:
In a mesh topology, every device is connected to another device via a particular
channel. In Mesh Topology, the protocols used are AHCP (Ad Hoc
Configuration Protocols), DHCP (Dynamic Host Configuration Protocol), etc.
• Suppose, the N number of devices are connected with each other in a mesh
topology, the total number of ports that are required by each device is N-1.
In Figure 1, there are 5 devices connected to each other, hence the total
number of ports required by each device is 4. The total number of ports
required=N*(N-1).
• Suppose, N number of devices are connected with each other in a mesh
topology, then the total number of dedicated links required to connect them
is NC2 i.e. N(N-1)/2. In Figure 1, there are 5 devices connected to each other,
hence the total number of links required is 5*4/2 = 10.
Advantages of this topology:
• Communication is very fast between the nodes.
• It is robust.
• The fault is diagnosed easily. Data is reliable because data is transferred
among the devices through dedicated channels or links.
• Provides security and privacy.
Problems with this topology:
• Installation and configuration are difficult.
• The cost of cables is high as bulk wiring is required, hence suitable for less
number of devices.
• The cost of maintenance is high.
Star Topology:
In star topology, all the devices are connected to a single hub through a cable.
This hub is the central node and all other nodes are connected to the central
node. The hub can be passive in nature i.e., not an intelligent hub such as
broadcasting devices, at the same time the hub can be intelligent known as an
active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables
are used to connect the computers. In Star Topology, many popular Ethernet
LAN protocols are used as CD(Collision Detection), CSMA (Carrier Sense
Multiple Access), etc.
Figure 3: A bus topology with shared backbone cable. The nodes are
connected to the channel via drop lines.
Advantages of this topology:
• If N devices are connected to each other in a bus topology, then the number
of cables required to connect them is 1, known as backbone cable, and N
drop lines are required.
• Coaxial or twisted pair cables are mainly used in bus-based networks that
support up to 10 Mbps.
• The cost of the cable is less compared to other topologies, but it is used to
build small networks.
• Bus topology is familiar technology as installation and troubleshooting
techniques are well known.
Problems with this topology:
• A bus topology is quite simpler, but still, it requires a lot of cabling.
• If the common cable fails, then the whole system will crash down.
• If the network traffic is heavy, it increases collisions in the network. To avoid
this, various protocols are used in the MAC layer known as Pure Aloha,
Slotted Aloha, CSMA/CD, etc.
• Adding new devices to the network would slow down networks.
• Security is very low.
Ring Topology:
In this topology, it forms a ring connecting devices with exactly two neighboring
devices.
A number of repeaters are used for Ring topology with a large number of
nodes, because if someone wants to send some data to the last node in the
ring topology with 100 nodes, then the data will have to pass through 99 nodes
to reach the 100th node. Hence to prevent data loss repeaters are used in the
network.
The data flows in one direction, i.e.., it is unidirectional, but it can be made
bidirectional by having 2 connections between each Network Node, it is
called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol
is used by the workstations to transmit the data.
Figure 5: In this, the various secondary hubs are connected to the central hub
which contains the repeater. This data flow from top to bottom i.e. from the
central hub to the secondary and then to the devices or from bottom to top i.e.
devices to the secondary hub and then to the central hub. It is a multi-point
connection and a non-robust topology because if the backbone fails the
topology crashes.
Advantages of this topology :
• It allows more devices to be attached to a single central hub thus it
decreases the distance that is traveled by the signal to come to the devices.
• It allows the network to get isolated and also prioritize from different
computers.
• We can add new devices to the existing network.
• Error detection and error correction are very easy in a tree topology.
Problems with this topology :
• If the central hub gets fails the entire system fails.
• The cost is high because of the cabling.
• If new devices are added, it becomes difficult to reconfigure.
Hybrid Topology :
This topological technology is the combination of all the various types of
topologies we have studied above. It is used when the nodes are free to take
any form. It means these can be individuals such as Ring or Star topology or
can be a combination of various types of topologies seen above. Each
individual topology uses the protocol that has been discussed earlier.
Hybrid Topology
Figure 6: The above figure shows the structure of the Hybrid topology. As seen
it contains a combination of all different types of networks.
Advantages of this topology :
• This topology is very flexible.
• The size of the network can be easily expanded by adding new devices.
Problems with this topology :
• It is challenging to design the architecture of the Hybrid Network.
• Hubs used in this topology are very expensive.
• The infrastructure cost is very high as a hybrid network requires a lot of
cabling and network devices.
1)HDLC
A high-level data link control defines rules for transmitting data between
network points. Data in an HDLC is organized into units called frames and is
sent across networks to specified destinations. HDLC also manages the pace
at which data is transmitted. HDLC is commonly used in the open systems
interconnection (OSI) model's layer 2.
• Flag
• Address
• Control information
• Frame check sequence
3)Telnet:
o The main task of the internet is to provide services to users. For example, users
want to run different application programs at the remote site and transfers a
result to the local site. This requires a client-server program such as FTP, SMTP.
But this would not allow us to create a specific program for each demand.
o The better solution is to provide a general client-server program that lets the user
access any application program on a remote computer. Therefore, a program that
allows a user to log on to a remote computer. A popular client-server program
Telnet is used to meet such demands. Telnet is an abbreviation for Terminal
Network.
o Telnet provides a connection to the remote computer in such a way that a local
terminal appears to be at the remote side.
4) WiMax:
WiMAX is one of the hottest broadband wireless technologies around today. WiMAX
systems are expected to deliver broadband access services to residential and
enterprise customers in an economical way.
Loosely, WiMax is a standardized wireless version of Ethernet intended primarily as an
alternative to wire technologies (such as Cable Modems, DSL and T1/E1 links) to
provide broadband access to customer premises.
More strictly, WiMAX is an industry trade organization formed by leading
communications, component, and equipment companies to promote and certify
compatibility and interoperability of broadband wireless access equipment that conforms
to the IEEE 802.16 and ETSI HIPERMAN standards.
WiMAX would operate similar to WiFi, but at higher speeds over greater distances and
for a greater number of users. WiMAX has the ability to provide service even in areas
that are difficult for wired infrastructure to reach and the ability to overcome the physical
limitations of traditional wired infrastructure.
WiMAX was formed in April 2001, in anticipation of the publication of the original 10-66
GHz IEEE 802.16 specifications. WiMAX is to 802.16 as the WiFi Alliance is to 802.11.
5)Firewall:
A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization’s previously established
security policies. At its most basic, a firewall is essentially the barrier that sits
between a private internal network and the public Internet. A firewall’s main
purpose is to allow non-threatening traffic in and to keep dangerous traffic out.
Types of Firewalls
• Packet filtering
• Proxy service
• Stateful inspection
16.Generate CRC code for the data word 1010001011 using the divisor 11101.
17.Define the subnet mask to be used in Class-B addressing to support 30 subnets
and also find the most hosts possible in each subnet.
18.Define HTTP. What are the features of HTTP. What are the different types of
HTTP request? Explain each of them.
HTTP is TCP/IP based communication protocol, which is used to deliver the data like
image files, query results, HTML files etc on the World Wide Web (WWW) with the
default port is TCP 80. It provides the standardized way for computers to communicate
with each other.
There are three fundamental features that make the HTTP a simple and powerful
protocol used for communication:
o HTTP is media independent: It specifies that any type of media content can be
sent by HTTP as long as both the server and the client can handle the data
content.
o HTTP is connectionless: It is a connectionless approach in which HTTP client i.e.,
a browser initiates the HTTP request and after the request is sent the client
disconnects from server and waits for the response.
o HTTP is stateless: The client and server are aware of each other during a current
request only. Afterwards, both of them forget each other. Due to the stateless
nature of protocol, neither the client nor the server can retain the information
about different request across the web pages.
o GET: GET request is used to read/retrieve data from a web server. GET
returns an HTTP status code of 200 (OK) if the data is successfully
retrieved from the server.
o POST: POST request is used to send data (file, form data, etc.) to the
server. On successful creation, it returns an HTTP status code of 201.
o PUT: A PUT request is used to modify the data on the server. It replaces
the entire content at a particular location with data that is passed in the
body payload. If there are no resources that match the request, it will
generate one.
o PATCH: PATCH is similar to PUT request, but the only difference is, it
modifies a part of the data. It will only replace the content that you want to
update.
o DELETE: A DELETE request is used to delete the data on the server at a
specified location.
19.What are the options of DHCP ? What are the advantages of DHCP? List and
Explain the characteristics of DHCP.
Here is the list of the most common DHCP options exchanged with clients:
• DHCP option 1: subnet mask to be applied on the interface asking for an IP address
• DHCP option 3: default router or last resort gateway for this interface
• DHCP option 6: which DNS (Domain Name Server) to include in the IP configuration for name
resolution
• DHCP option 51: lease time for this IP address
20. Explain with example the function of SMTP and POP. What are the
advantages of IMAP.
Working-
Examples:
• Carrier hotels :
These buildings are extremely secure with size averaging around 54, 000
square feet. These hotels offer hardware and software installation, updation
and several other services.
• Meet-me rooms :
Meet-Me Rooms (MMRs) are small space inside carrier hotels, averaging
around 5, 000 square feet. These small rooms house interconnects
networking equipment owned by many telecommunication companies.
Figure – Post Office Protocol (POP)
POP3 Advantages IMAP Advantages
-Does not have multiple variations, making it -Supports storage of mail on the server, locally, or
easier to support both
-More software vendors support POP3 across -Supports multiple mailboxes and mailbox
different platforms operations
-By default, messages are deleted from the -Through online access, multiple clients can
server, once they are stored locally. access the same mailbox
-Can be used to access non-mail documents
-The IMAP offline mode conserves server
resources (bandwidth and disk space)
- Can manipulate persistent message status flags
such as 'seen', 'deleted', 'answered' and user-
defined
1. Block algorithms. Set lengths of bits are encrypted in blocks of electronic data with
the use of a specific secret key. As the data is being encrypted, the system holds the
data in its memory as it waits for complete blocks.
2. Stream algorithms. Data is encrypted as it streams instead of being retained in the
system’s memory.
Some examples of symmetric encryption algorithms include:
AES, DES, IDEA, Blowfish, RC5 and RC6 are block ciphers. RC4 is stream cipher.
DES
In “modern” computing, DES was the first standardized cipher for securing electronic
communications, and is used in variations (e.g. 2-key or 3-key 3DES). The original
DES is not used anymore as it is considered too “weak”, due to the processing power
of modern computers. Even 3DES is not recommended by NIST and PCI DSS 3.2, as
well as all 64-bit ciphers. However, 3DES is still widely used in EMV chip cards
because of legacy applications that do not have a crypto-agile infrastructure.
AES
The most commonly used symmetric algorithm is the Advanced Encryption Standard
(AES), which was originally known as Rijndael. This is the standard set by the U.S.
National Institute of Standards and Technology in 2001 for the encryption of
electronic data announced in U.S. FIPS PUB 197. This standard supersedes DES,
which had been in use since 1977. Under NIST, the AES cipher has a block size of
128 bits, but can have three different key lengths as shown with AES-128, AES-192
and AES-256.
Overall, digital signatures offer a secure and efficient way to sign, send, and
receive electronic documents and messages, ensuring their authenticity,
integrity, and non-repudiation.
a)Wireless LAN:
Wireless LAN stands for Wireless Local Area Network. It is also called LAWN (Local
Area Wireless Network). WLAN is one in which a mobile user can connect to a Local
Area Network (LAN) through a wireless connection.
The IEEE 802.11 group of standards defines the technologies for wireless LANs. For path
sharing, 802.11 standard uses the Ethernet protocol and CSMA/CA (carrier sense
multiple access with collision avoidance). It also uses an encryption method i.e. wired
equivalent privacy algorithm.
Wireless LANs provide high speed data communication in small areas such as building
or an office. WLANs allow users to move around in a confined area while they are still
connected to the network.
In some instance wireless LAN technology is used to save costs and avoid laying cable,
while in other cases, it is the only option for providing high-speed internet access to the
public. Whatever the reason, wireless solutions are popping up everywhere.
Examples of WLANs that are available today are NCR's waveLAN and Motorola's ALTAIR.
Advantages of WLANs
Disadvantages of WLANs
b)Loop-back addressing:
TCP/IP protocol manages all the loopback addresses in the operating system. It
mocks the TCP/IP server or TCP/IP client on the same system. These loopback
addresses are always accessible so that the user can use them anytime for
troubleshooting TCP/IP.
Whenever a protocol or program sends any data from a computer with any
loopback IP address, that traffic is processed by a TCP/IP protocol stack within
itself, i.e., without transmitting it to the network. That is, if a user is pinging a
loopback address, they’ll get the reply from the same TCP/IP stack running on
their computer. So, all the data transmitted to any of the loopback addresses
as the destination address will not pop up on the network.
127.0.0.1 is the most commonly used loopback address; generally, 127.0.0.1
and localhost are functionally similar, i.e., the loopback address 127.0.0.1 and
the hostname localhost; are internally mapped. Though, other loopback
addresses are also accessible and can be used.
IPv4 and IPv6 Loopback Addresses:
• The IPv4 loopback address is 127.0.0.0/8 and the most commonly used
loopback address is 127.0.0.1.
• The IPv6 loopback address is ::1
How to use the “ping” Command:
• To use the “ping” command go to the windows start menu.
• Search for “Command prompt”.
• Type in “ping” followed by the loopback address. and,
• Hit enter.
For example, as can be seen below, the outputs of four different IPv4 loopback
addresses (127.0.0.0, 127.0.0.1, 127.15.90.69, and 127.255.255.255) the
network and broadcast addresses are unreachable loopback addresses and
IPv6 loopback address ::1.
ping output for 127.0.0.0 (Network address).
C:\Users\bklad>ping 127.0.0.0
-->
IP v6 was developed by Internet Engineering Task Force (IETF) to deal with the problem
of IP v4 exhaustion. IP v6 is a 128-bits address having an address space of 2^128, which
is way bigger than IPv4. In IPv6 we use Colon-Hexa representation. There are 8 groups
and each group represents 2 Bytes.
d)Telnet:
Telnet
o The main task of the internet is to provide services to users. For example, users want to
run different application programs at the remote site and transfers a result to the local
site. This requires a client-server program such as FTP, SMTP. But this would not allow us
to create a specific program for each demand.
o The better solution is to provide a general client-server program that lets the user access
any application program on a remote computer. Therefore, a program that allows a user
to log on to a remote computer. A popular client-server program Telnet is used to meet
such demands. Telnet is an abbreviation for Terminal Network.
o Telnet provides a connection to the remote computer in such a way that a local terminal
appears to be at the remote side.
o When a user logs into a local computer, then it is known as local login.
o When the workstation running terminal emulator, the keystrokes entered by
the user are accepted by the terminal driver. The terminal driver then passes
these characters to the operating system which in turn, invokes the desired
application program.
Remote login
e)IEEE 802.11:
→ IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and
specifications of wireless LANs (WLANs). WiFi or WLAN uses high-frequency radio
waves instead of cables for connecting the devices in LAN. Users connected by
WLANs can move around within the area of network coverage.
--> DNS stands for Domain Name System. It is a decentralized system that
translates domain names (e.g., www.example.com) into IP addresses (e.g.,
93.184.216.34) that are used to identify and locate web servers on the Internet.
The purpose of DNS is to make it easier for humans to access websites and
other resources on the Internet by providing a hierarchical naming system that
maps domain names to IP addresses. Without DNS, we would have to
remember the IP addresses of every website we wanted to visit, which would
be impractical and confusing.
Name Resolution:
Inverse Resolution:
Partially Qualified:
A fully qualified domain name (FQDN) is a domain name that specifies the
full path to a resource on the internet, including the TLD and the root
domain. An FQDN is used to uniquely identify a specific resource on the
internet, such as a website or an email server. For example,
"mailserver.example.com" is a fully qualified domain name, as it specifies
the TLD ".com" and the root domain "example.com".
25 .What are the purpose of ARP,RARP,ICMP and IGMP of IP layer? Explain each
of them.
ARP :ARP stands for Address Resolution Protocol, and its purpose is to map
a network address (such as an IP address) to a physical address (such as a
MAC address) in a local network. This allows devices to communicate with
each other using higher-level network protocols, which use network
addresses, while using the physical addresses that are required for actual
data transmission.
RARP:
RARP stands for Reverse Address Resolution Protocol, and its purpose is to
map a physical address (such as a MAC address) to a network address (such
as an IP address) in a local network. This is the reverse process of what ARP
does.
ICMP :
The types of information that can be obtained through a passive attack can
be sensitive and may include login credentials, personal information,
financial data, or other confidential information. Passive attacks can be used
to gather information that can be used to launch further attacks or exploit
vulnerabilities.
Passive attacks are typically less harmful than active attacks because they
do not directly interfere with network communications or data. However,
they can still be dangerous because they can be used to gather sensitive
information that can be used to launch further attacks or exploit
vulnerabilities. To protect against passive attacks, organizations should use
encryption, access control, network monitoring, and intrusion detection
systems (IDS) to detect and prevent eavesdropping and unauthorized
access to network data.
Active Attack:
Active attacks can take many forms, and they can be executed through various
means. Some common examples of active attacks include:
Active attacks are typically more dangerous than passive attacks because they
can cause immediate damage or disruption to network operations or data.
Active attacks can be used to steal sensitive data, disrupt business operations,
or even destroy data or network infrastructure.
To protect against active attacks, organizations should use a combination of
security measures such as firewalls, intrusion detection and prevention
systems (IDPS), and access control systems. These measures can help detect
and prevent unauthorized access to the network, detect malicious activity, and
minimize the impact of an attack if one occurs. Organizations should also keep
their security systems up to date with the latest security patches and regularly
educate their staff about how to avoid falling victim to common active attacks
such as phishing or social engineering.
--> MIME stands for Multipurpose Internet Mail Extensions. It is used to extend the
capabilities of Internet e-mail protocols such as SMTP. The MIME protocol allows the
users to exchange various types of digital content such as pictures, audio, video, and
various types of documents and files in the e-mail. MIME was created in 1991 by a
computer scientist named Nathan Borenstein at a company called Bell Communications.
MIME is an e-mail extension protocol, i.e., it does not operate independently, but it
helps to extend the capabilities of e-mail in collaboration with other protocols such
as SMTP. Since MIME was able to transfer only text written file in a limited size English
language with the help of the internet. At present, it is used by almost all e-mail related
service companies such as Gmail, Yahoo-mail, Hotmail.
1. The MIME protocol supports multiple languages in e-mail, such as Hindi, French,
Japanese, Chinese, etc.
2. Simple protocols can reject mail that exceeds a certain size, but there is no word limit in
MIME.
3. Images, audio, and video cannot be sent using simple e-mail protocols such as SMTP.
These require MIME protocol.
4. Many times, emails are designed using code such as HTML and CSS, they are mainly
used by companies for marketing their product. This type of code uses MIME to send
email created from HTML and CSS.
MIME Header
MIME adds five additional fields to the header portion of the actual e-mail to extend the
properties of the simple email protocol. These fields are as follows:
Play Video
1. MIME Version
2. Content Type
3. Content Type Encoding
4. Content Id
5. Content description
1. MIME Version
It defines the version of the MIME protocol. This header usually has a parameter value
1.0, indicating that the message is formatted using MIME.
2. Content Type
It describes the type and subtype of information to be sent in the message. These
messages can be of many types such as Text, Image, Audio, Video, and they also have
many subtypes such that the subtype of the image can be png or jpeg. Similarly, the
subtype of Video can be WEBM, MP4 etc.
In this field, it is told which method has been used to convert mail information into
ASCII or Binary number, such as 7-bit encoding, 8-bit encoding, etc.
4. Content Id
In this field, a unique "Content Id" number is appended to all email messages so that
they can be uniquely identified.
5. Content description
This field contains a brief description of the content within the email. This means that
information about whatever is being sent in the mail is clearly in the "Content
Description". This field also provides the information of name, creation date, and
modification date of the file.
a) X.25
--> X.25:
X.25 is a protocol suite defined by ITU-T for packet switched communications over
WAN (Wide Area Network). It was originally designed for use in the 1970s and became
very popular in 1980s. Presently, it is used for networks for ATMs and credit card
verification. It allows multiple logical channels to use the same physical line. It also
permits data exchange between terminals with different communication speeds.
X.25 has three protocol layers
• Physical Layer: It lays out the physical, electrical and functional characteristics
that interface between the computer terminal and the link to the packet switched
node. X.21 physical implementer is commonly used for the linking.
• Data Link Layer: It comprises the link access procedures for exchanging data
over the link. Here, control information for transmission over the link is attached to
the packets from the packet layer to form the LAPB frame (Link Access
Procedure Balanced). This service ensures a bit-oriented, error-free, and ordered
delivery of frames.
• Packet Layer: This layer defines the format of data packets and the procedures
for control and transmission of the data packets. It provides external virtual circuit
service. Virtual circuits may be of two types: virtual call and permanent virtual
circuit. The virtual call is established dynamically when needed through call set up
procedure, and the circuit is relinquished through call clearing procedure.
Permanent virtual circuit, on the other hand, is fixed and network assigned.
b) LAN access technique:
• Star Topology
• Bus Topology
• Ring Topology
• Mesh Topology
• Hybrid Topology
• Tree Topology
Ethernet:-
Ethernet is the most widely used LAN technology, which is defined under IEEE
standards 802.3. The reason behind its wide usability is Ethernet is easy to
understand, implement, maintain, and allows low-cost network implementation.
Also, Ethernet offers flexibility in terms of topologies that are allowed. Ethernet
generally uses Bus Topology. Ethernet operates in two layers of the OSI model,
Physical Layer, and Data Link Layer. For Ethernet, the protocol data unit is
Frame since we mainly deal with DLL. In order to handle collision, the Access
control mechanism used in Ethernet is CSMA/CD.
Manchester Encoding Technique is used in Ethernet.
Since we are talking about IEEE 802.3 standard Ethernet, therefore, 0 is
expressed by a high-to-low transition, a 1 by the low-to-high transition. In both
Manchester Encoding and Differential Manchester, the Encoding Baud rate is
double of bit rate.
Advantages of Ethernet:
Speed: When compared to a wireless connection, Ethernet provides
significantly more speed. Because Ethernet is a one-to-one connection, this is
the case. As a result, speeds of up to 10 Gigabits per second (Gbps) or even
100 Gigabits per second (Gbps) are possible.
Efficiency: An Ethernet cable, such as Cat6, consumes less electricity, even
less than a wifi connection. As a result, these ethernet cables are thought to be
the most energy-efficient.
Good data transfer quality: Because it is resistant to noise, the information
transferred is of high quality.
c) VSAT:
VSAT
Characteristics of VSAT:
• The end user of the set requires a box that acts as an interface between the
user and its system.
• The box consists of an antenna and a transceiver.
• The work of this transceiver is to send and receive signals to and from the
transponder located in space.
• Every workstation works like a hub. The satellite sends or receives a signal
from it.
• Each user is connected to each of the interconnected hub stations and
operates in the form of a Star Topology (There is a server in between and all
the nodes are connected to it, forming a star-like figure).
• With this medium, we can transmit data, voice, and video signals.
Advantages of VSAT:
• Audio, Video, and data signals can be transmitted and received efficiently.
• Internet Access: A VSAT Network also serves to provide internet access in
addition to pointing to a WAN link.
• Information from remote locations can be accessed using satellites.
• It is more used for connectivity in rural areas, ships, and coastal regions.
• Mobile access is another conventional strength of satellite networks. For
example, we can do online surfing, watch TV, use applications, and much
more.
• VSAT Networks are not affected by earthquakes, Cyclones, and other
natural calamities.
• VSAT Networks, with a low-cost architecture and extra powerful systems,
share digital information.
Disadvantages of VSAT:
d) IP routing:
IP routing is one of the important topics in computer networks. IP routing is
performed on the data which describes the path that data follows to reach from
source to destination in the network. Through IP routing only the shortest path
for the data is determined to reach the destination which decreases cost and
data is sent in minimum time. IP routing uses different protocols and
technologies for different networks. For IP routing we require some basics of IP
addresses, routers, and different networks.
IP Routing:
IP routing is the process that defines the shortest path through which data
travels to reach from source to destination. It determines the shortest path to
send the data from one computer to another computer in the same or different
network. Routing uses different protocols for the different networks to find the
path that data follows. It defines the path through which data travel across
multiple networks from one computer to other. Forwarding the packets from
source to destination via different routers is called routing. The routing decision
is taken by the routers.
IP Routing
Terminologies:
When the data is sent from the source to the destination the TCP and other
protocols of the source work and form an IP packet that is sent to the network.
When an IP packet is sent to the network from the source it has to pass through
multiple routers to reach the destination. The router in the network gets the
destination address from the packet and through its routing table identifies the
next router information to which the data packet has to be passed. The routing
table of the router includes various information about the next router, its cost,
and other necessary information. The router takes the routing decision with the
help of routing protocols and a routing table to which next router the packet has
to be sent to find the best route to reach the destination. Different packets can
be sent through different paths but all the packets reach their intended
destination. When the packets reach the destination through different routers it
sends them to the TCP for further processing.
e)SNAP:
--> SNAP stands for Sub-Network Access Protocol, which is a protocol used
in computer networking to extend the capability of the Ethernet protocol.
The Ethernet protocol has a maximum frame size of 1518 bytes, which
limits the size of the network that can be addressed. To overcome this
limitation, SNAP was introduced to enable Ethernet frames to carry larger
network layer packets.
SNAP works by adding a header to the Ethernet frame that contains
additional information about the network layer protocol being used. This
header includes a protocol identifier (PID) field that specifies the type of
protocol being carried in the frame. The header also includes an
organizationally unique identifier (OUI) field, which is used to identify the
manufacturer or organization that created the protocol.
29.What are Ethernet standards. Explain Ethernet 802.3 frame format in detail.
1. 10BASE-T: This was the original Ethernet standard, introduced in the 1980s.
It used twisted-pair copper cables to transmit data at a rate of 10 megabits
per second (Mbps). 10BASE-T is now largely obsolete, but some legacy
systems may still use it.
5. Ethernet over fiber: Ethernet can also be transmitted over fiber optic cables,
which offer higher data transfer rates and longer distances than twisted-
pair copper cables. There are a number of Ethernet standards for fiber optic
networks, including 1000BASE-SX, 1000BASE-LX, and 10GBASE-SR.
• Destination Address – This is 6-Byte field which contains the MAC address
of machine for which data is destined.
• Source Address – This is a 6-Byte field which contains the MAC address of
source machine. As Source Address is always an individual address
(Unicast), the least significant bit of first byte is always 0.
• Data – This is the place where actual data is inserted, also known
as Payload. Both IP header and data will be inserted here if Internet
Protocol is used over Ethernet. The maximum data present may be as long
as 1500 Bytes. In case data length is less than minimum length i.e. 46 bytes,
then padding 0’s is added to meet the minimum possible length.
• Cyclic Redundancy Check (CRC) – CRC is 4 Byte field. This field contains
a 32-bits hash code of data, which is generated over the Destination
Address, Source Address, Length, and Data field. If the checksum computed
by destination is not the same as sent checksum value, data received is
corrupted.
3. BCC: It refers to blind carbon copy. It is very similar to Cc. The only
difference between Cc and Bcc is that it allow user to send copy to the third
party without primary and secondary recipient knowing about this.
6. Received : It refers to identity of sender’s, data and also time message was
received. It also contains the information which is used to find bugs in
routing system.
Header Meaning
Message-Id: It refers to the unique number for referencing this message later.
Features of MIME –
1. It is able to send multiple attachments with a single message.
2. Unlimited message length.
3. Binary attachments (executables, images, audio, or video files) may be
divided if needed.
4. MIME provided support for varying content types and multi-part messages.
Working of MIME –
Suppose a user wants to send an email through a user agent and it is in a non-
ASCII format so there is a MIME protocol that converts it into 7-bit NVT ASCII
format. The message is transferred through the e-mail system to the other side
in the 7-bit format now MIME protocol again converts it back into non-ASCII
code and now the user agent of the receiver side reads it and then information
is finally read by the receiver. MIME header is basically inserted at the
beginning of any e-mail transfer.
1. MIME-Version – Defines the version of the MIME protocol. It must have the
parameter Value 1.0, which indicates that message is formatted using MIME.
2. Content-Type – Type of data used in the body of the message. They are of
different types like text data (plain, HTML), audio content, or video content.
a) HTTP:
b) NIC:
c) Peer-to-Peer Network?
In a P2P network, each device on the network can share its own resources,
such as files, data, processing power, and bandwidth, with other devices on
the network. This enables P2P networks to be highly scalable and resilient,
as there is no single point of failure that could bring down the entire
network. Instead, individual nodes can come and go without disrupting the
overall functionality of the network.
P2P networks can be used for a wide range of applications, such as file
sharing, online gaming, video conferencing, and distributed computing.
They can be implemented using a variety of different protocols and
technologies, such as BitTorrent, Skype, and Bitcoin.
d) Unguided Media
Unguided media, also known as wireless media, refers to any type of
communication medium that does not rely on a physical connection or a
fixed path to transmit data between devices. In other words, it allows data
to be transmitted through the air, using radio waves or other wireless
signals.
There are several types of unguided media that are commonly used for
wireless communication, including radio waves, microwaves, and infrared.
Each of these types of wireless signals has its own unique characteristics
and limitations.
Radio waves, for example, are used for a wide range of wireless
applications, including AM and FM radio, Wi-Fi, and Bluetooth. They are
able to penetrate walls and other solid objects, which allows them to be
used for wireless communication over long distances.
a) Router:
b) Unguided media, also known as wireless media, refers to any type of
communication medium that does not rely on a physical connection or a
fixed path to transmit data between devices. In other words, it allows
data to be transmitted through the air, using radio waves or other
wireless signals.
c) There are several types of unguided media that are commonly used for
wireless communication, including radio waves, microwaves, and
infrared. Each of these types of wireless signals has its own unique
characteristics and limitations.
d) Radio waves, for example, are used for a wide range of wireless
applications, including AM and FM radio, Wi-Fi, and Bluetooth. They are
able to penetrate walls and other solid objects, which allows them to be
used for wireless communication over long distances.
e) Microwaves, on the other hand, are used for higher frequency
communication, such as satellite and microwave radio. They are able to
transmit large amounts of data over long distances, but are also subject
to interference from other sources.
RCP operates on top of the Remote Procedure Call (RPC) protocol and uses
the client-server model for communication. The client sends a request to
the server to execute a command or transfer a file, and the server responds
with the appropriate action. RCP can also be used to manage remote
processes and to monitor system performance.
One of the key advantages of RCP is its simplicity and ease of use. It is built
into many Unix-based operating systems, making it a convenient tool for
administrators and developers who need to manage remote systems. RCP
also supports authentication and encryption, which helps to ensure the
security of data transmission over the network.
However, RCP is also known for its security weaknesses and is considered to
be an insecure protocol. It is vulnerable to attacks such as eavesdropping,
data tampering, and password cracking. For this reason, it is recommended
that RCP be used only in trusted environments, and that more secure
protocols such as SSH or SFTP be used for remote access and file transfer in
untrusted environments.