Anda di halaman 1dari 8

Page-1

What is meant by Asymmetrical protocols? There is a many-to-one relationship


between clients and server. Clients always initiate the dialog by requesting a service.
Servers are passively awaiting for requests from clients.

There is a many-to-one relationship between clients and server. Clients always initiate the dialog by
requesting a service. Servers are passively awaiting for requests from clients.
What is meant by 3-Tier architecture?
In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is separated
from the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and
flexible.
Example: TP monitor, Web.
What are the types of Transparencies?
The types of transparencies the NOS middleware is expected to provide are:-

* Location transparency
* Namespace transparency
* Logon transparency
* Replication transparency
* Local/Remote access transparency
* Distributed time transparency
* Failure transparency and
* Administration transparency.
What is network database?
Network database is a collection of object-oriented, network and semi structured models or as some kind of
object database.
What is a Web server? This new model of Client/Server consists of thin, protable,
"universal" clients that talk to superfat servers. In the simplet form, a web server
returns documents when clients ask for them by name. The clients and server
communicate using an RPC-like protocol called HTTP.
This new model of Client/Server consists of thin, protable, "universal" clients that talk to superfat servers. In
the simplet form, a web server returns documents when clients ask for them by name. The clients and server
communicate using an RPC-like protocol called HTTP.
What are the functions of the typical server program?
It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients
first. Initiates and runs background task activity. Keeps running. Grown bigger and faster.
What is a TP Monitor?
There is no commonly accepted definition for a TP monitor. According to Jeri Edwards' a TP Monitor is "an
OS for transaction processing".
What are Service-specific middleware?
It is needed to accomplish a particular Client/Server type of services which includes:-

* Database specific middleware


* OLTP specific middleware
* Groupware specific middleware
* Object specific middleware
* Internet specific middleware and
* System management specific middleware.
What is the difference between trigger and rule?
The triggers are called implicitly by database generated events, while stored procedures are called explicitly
by client applications.
Page-2

What is meant by Asymmetrical protocols?


There is a many-to-one relationship between clients and server. Clients always initiate the dialog by
requesting a service. Servers are passively awaiting for requests from clients.

TP Monitor does mainly two things extremely well. They are Process management
and Transaction management.?
They were originally introduced to run classes of applications that could service hundreds and sometimes
thousands of clients. TP Monitors provide an OS - on top of existing OS - that connects in real time these
thousands of humans with a pool of shared server processes.
What are the characteristics of Client/Server?
Service
* Shared resources
* Asymmentrical protocols
* Transparency of location
* Mix-and-match
* Message based exchanges
* Encapsulation of services
* Scalability
* Integrity

What is Message Oriented Middleware (MOM)?


MOM allows general purpose messages to be exchanged in a Client/Server system using message queues.
Applications communicate over networks by simply putting messages in the queues and getting messages
from queues. It typically provides a very simple high level APIs to its services.
MOM's messaging and queuing allow clients and servers to communicate across a network without being
linked by a private, dedicated, logical connection. The clients and server can run at different times. It is a
post-office like metaphor.
. What are Super servers?
These are fully-loaded machines which includes multiprocessors, high-speed disk arrays for intervive I/O
and fault tolerant features.
What is a intranet ?
An Intranet is a private network that is contained within an enterprise.It may consists of many interlinked
Local area network and also use leased lines in the wide area network. Typically an intranet includes
connections through one or more gateway computers to the outside internet. The main purpose of an intranet
is to share company information and computing resources among employees. An intranet can also be used
to facilitate working in groups and for teleconferences.
What are Triggers and Rules?
Triggers are special user defined actions usually in the form of stored procedures, that are automatically
invoked by the server based on data related events. It can perform complex actions and can use the full
power of procedural languages.
A rule is a special type of trigger that is used to perform simple checks on data.
What is a File server?
File servers are useful for sharing files across a network. With a file server, the client passes requests for file
records over nerwork to file server.
What is OLTP?
In the transaction server, the client component usually includes GUI and the server components usually
consists of SQL transactions against a database. These applications are called OLTP (Online Transaction
Processing) OLTP Applications typically,
Page-3
Receive a fixed set of inputs from remote clients. Perform multiple pre-compiled SQL comments against a
local database. Commit the work and Return a fixed set of results.

What is Load balancing?


If the number of incoming clients requests exceeds the number of processes in a server class, the TP
Monitor may dynamically start new ones and this is called Load balancing.
What is a Web server?
This new model of Client/Server consists of thin, protable, "universal" clients that talk to superfat servers. In
the simplet form, a web server returns documents when clients ask for them by name. The clients and server
communicate using an RPC-like protocol called HTTP
What is Client/Server?
Clients and Servers are separate logical entities that work together over a network to accomplish a task.
Many systems with very different architectures that are connected together are also called Client/Server.
What is Remote Procedure Call (RPC)?
RPC hides the intricacies of the network by using the ordinary procedure call mechanism familiar to every
programmer. A client process calls a function on a remote server and suspends itself until it gets back the
results. Parameters are passed like in any ordinary procedure. The RPC, like an ordinary procedure, is
synchoronous. The process that issues the call waits until it gets the results.

Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends
it to the remote server. The server receives the request, unpack the parameters, calls the procedures, and
sends the reply back to the client. It is a telephone-like metaphor.
What are the characteristics of client/server architectures ?
The basic characteristics of client/server architectures are:<br><br> 1. Combination of a client or front-end
portion that interacts with the user, and a server or back-end portion that interacts with the shared resource.
The client process contains solution-specific logic and provides the interface between the user and the rest
of the application system. The server process acts as a software engine that manages shared resources such
as databases, printers, modems, or high powered processors.<br> 2. The front-end task and back-end task
have fundamentally different requirements for computing resources such as processor speeds, memory, disk
speeds and capacities, and input/output devices.<br> 3. The environment is typically heterogeneous and
multi-vendor. The hardware platform and operating system of client and server are not usually the same.
Client and server processes communicate through a well-defined set of standard application program
interfaces (API?s) and RPC?s.<br> 4. An important characteristic of client-server systems is scalability.
They can be scaled horizontally or vertically. Horizontal scaling means adding or removing client
workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster
server machine or multiservers.<br>

What is NETBIOS and NETBEUI?


NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote
computer and it hides the networking hardware from applications.

NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the
use on small subnets.

NETBIOS: basic input and output system.It is a non-routable protocol.


NETBEUI:Netbeui is the protocol that is is responsible for data transport.does handle all the frame
formatting that is not handled by netbios.

What is RAID?
Page-4
RAID stands for Redundant Array of Independent(or Inexpensive) Disk Drives that employ two or more
drives in combination for fault tolerance and Performance.
What are the advantages and disadvantages of the three types of routing tables?
The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be manually
modified every time there is a change. A dynamic table changes its information based on network traffic,
reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table,
which is then read by other devices. The fixed central table reduces the need to update each machine's table,
as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator,
although the table's contents can change without the administrator being aware of the change.
What is difference between baseband and broadband transmission?
In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband
transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.
In base band transmission we transmit digital signal without converting it into analog.here a low pass
channel is used.

In broad band transmission we transmit digital signal by converting it into analog.Here a band pass channel
is used.

What are 10Base2, 10Base5 and 10BaseT Ethernet LANs ?


10Base2?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments.

10Base5?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling, with 5 continuous segments not exceeding 100 meters per segment.

10BaseT?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling and twisted pair cabling.
All these 3 are related to ethernet cables, where 10base2 can define as maximum rate of data tranfer is
10megabits per second ,B standa for baseband signaling and 2 is for 200 meter of lenght... this is same for
10base5 but where in 10baset T stands for twisted pair of cable

What are the different type of networking / internetworking devices?


Repeater:
Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal
in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back
in to the link.

Bridges:
These operate both in the physical and data link layers of LANs of same type. They divide a larger network
in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and
thus are repeaters that relay a frame only the side of the segment containing the intended recipent and
control congestion.

Routers:
They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in
the physical, data link and network layers. They contain software that enable them to determine which of the
several possible paths is the best for a particular transmission.

Gateways:
They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They
Page-5
accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before
forwarding it. They operate in all seven layers of the OSI model.

I Think Switches has left both layer 2 and 3. Bridges aren't used these days and it also work on data link
layer and not on physical layer.

Switches (L2)
--------
It breaks collasion domain.Uses MAC address to communicate. Faster than bridges.

Difference between the communication and transmission?


Transmission is a physical movement of information and concern issues like bit polarity, synchronisation,
clock etc.

Communication means the meaning full exchange of information between two communication media.
Transmission is a one way scheme while communication is two-way scheme
What is region?
When hierarchical routing is used, the routers are divided into what we call regions, with each router
knowing all the details about how to route packets to destinations within its own region, but knowing
nothing about the internal structure of other regions.

What is the difference between physical address and logical address?


A Physical address is a 48-bit flat address burned into the ROM of the NIC card which is a Layer1 device of
the OSI model. This iis divided into 24-bit vendor code and 24-bit serial address. This is unique for each
system and cannot be changed.

A Logical address is a 32- bit address assigned to each system in a network. This works in Layer-3 of OSI
Model. This would be generally the IP address.
What is the difference between tree and forest?
A tree start whenever you install the first domain controller and a tree may consist a single domain or
multiple domain arranged in structure called child or grand child which will inherit name from its parent.
When we install first domain controller a new domain ,anew tree and a new forest begins.In a new forest
you can have single tree or multiple tree.

What is the difference between TFTP and FTP application layer protocols?

The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not
provide reliability or security. It uses the fundamental packet delivery services offered by UDP.

The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from
one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two
connections (virtual circuits) between the hosts, one for data transfer and another for control information.

* FTP is a complete, session-oriented, general purpose file transfer protocol. TFTP is used as a bare-bones
special purpose file transfer protocol.
* FTP can be used interactively. TFTP allows only unidirectional transfer of files.
* FTP depends on TCP, is connection oriented, and provides reliable control. TFTP depends on UDP,
requires less overhead, and provides virtually no control.
* FTP provides user authentication. TFTP does not.
Page-6
* FTP uses well-known TCP port numbers: 20 for data and 21 for connection dialog. TFTP uses UDP port
number 69 for its file transfer activity.
* The Windows NT FTP server service does not support TFTP because TFTP does not support
authentication.
* Windows 95 and TCP/IP-32 for Windows for Workgroups do not include a TFTP client program.

What are the Advantages and Disadvantages of DHCP?

Advantages
All the IP configuration information gets automatically configured for your client machine by the DHCP
server.
If you move your client machine to a different subnet, the client will send out its discover message at boot
time and work as usual. However, when you first boot up there you will not be able to get back the IP
address you had at your previous location regardless of how little time has passed.
Disadvantage

Your machine name does not change when you get a new IP address. The DNS (Domain Name System)
name is associated with your IP address and therefore does change. This only presents a problem if other
clients try to access your machine by its DNS name.

Describe a 3-way TCP/IP Handshake.


To establish a connection, TCP uses a 3-way handshake. Before a client attempts to connect with a server,
the server must first bind to a port to open it up for connections: this is called a passive open. Once the
passive open is established then a client may initiate an active open. To establish a connection, the 3-way (or
3-step) handshake occurs:

The active open is performed by sending a SYN to the server.


In response, the server replies with a SYN-ACK.
Finally the client sends an ACK back to the server.
At this point, both the client and server have received an acknowledgement of the connection.
What are the difference between node,host,terminal,system,hub?
These are all different things in networking.
Hub:Where we connect all the the links for a networking connection.
Node:It can be identified as a one connection.
Host:is nothing than if you are going to send a request to the server the questioned system can be know as a
host.
node : it can be any network device
host : it represents computers/work stations
hub : network device used to increase the, reach-ability of signal re-generator it works in physical layer
What is Proxy ARP?

t is using a router to answer ARP requests. This will be done when the originating host believes that a
destination is local, when in fact is lies beyond router.

Proxy ARP (Address Resolution Protocol) is a technique by which a device on a given network answers the
ARP queries for a network address that is not on that network. The ARP Proxy is aware of the location of
the traffic's destination, and offers its own MAC address in reply, effectively saying, "send it to me, and I'll
get it to where it needs to go." Serving as an ARP Proxy for another host effectively directs LAN traffic to
Page-7
the Proxy. The "captured" traffic is then typically routed by the Proxy to the intended destination via another
interface
What is frame relay, in which layer it comes?
Frame relay is a packet switching technology. It will operate in the data link layer.
FRAME RELAY is packet-switching protocol for connecting devices on a Wide Area Network (WAN).
Frame Relay networks in the U.S. support data transfer rates at T-1 (1.544 Mbps) and T-3 (45 Mbps)
speeds. In fact, you can think of Frame Relay as a way of utilizing existing T-1 and T-3 lines owned by a
service provider. Most telephone companies now provide Frame Relay service for customers who want
connections at 56 Kbps to T-1 speeds. (In Europe, Frame Relay speeds vary from 64 Kbps to 2 Mbps. it
operats at datalink layer os osi model.

1.explain 7 osi layers briefly. 2.define router,gateways,brouter. 3.explain abt


encryption & decryption.

7 OSI LAYER IS A MODEL WHICH ARE DESCRIBE OPERATION HOW YOUR PACKET GOES
FROM ONE PC TO OTHER, THAT IS INCLUDING 7 LAYER
APPLICATION,PRESENTATION,SESSION,NETWORK,TRANSPORT ,DATALINK,PHYSICAL
LAYER.ROUTER IS A INTERNETWORKING DEVICE WHICH IS USED FOR CONNECTING 2 OR
MORE DIFFRENT NETWORK BASICALLY ROUTER HAVE ROUTING TABLE WHICH SHOW
ADDRESS OF ALL NETWORK, THIS IS WORK ON NETWORK LAYER IN OSI MODEL .
GATEWAY IS A ALSOINTERNETWORKING DEVICE WHICH WORK ON ALL LAYER OF OSI
MODEL. ENCRYPTION & DECRYPTION IS METHOD FOR PROVIDE SECURITY OF YOUR
PKT,AFTER ENCRYPTION NO ONE ACCSES YOUR PKT WITHOUT DECRYPTION.

WHAT IS DIFFERENCE BETWEEN DIAL-UP INTERNET CONNECTION AND


BROADBAND CONNECTION?

Dial up connection requires a username/password & a modem to connect to internet.The maximum speed
will be of 56kbps only. In this either the phone or the internet will work at a time.

While in broadband connection (it need a modem & may need user/password).It is directly connected with
RJ45 LAN card. Its speed ranges from 256kbps to several mbps. In this both phone line and internet can
work together.

What is NVT (Network Virtual Terminal)?


It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet
session.

What is the default subnet mask for an ipv6 address ?


255.255.255.255.255.0
Whatz the difference between DNS and WINS?
DNS- Domain Name Server or Services.

WINS- Windows Internet Name Service.

DNS is resolve the web site name to IP address or you can say.

In WINS used a file name those is LMhost, this file in the System32, and when we put the websit name and
its IP address, then it resolve the particular IP address those insert in the LMhost file.
Page-8
Difference between bit rate and baud rate?
Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal
units per second that are required to represent those bits.
baud rate = bit rate / N
where N is no-of-bits represented by each signal shift.
What is supernetting?why it is used
Supernetting refers to increase host and reduce the subnet's. It mean reduce the network bits and increase the
host bits. We do use supernetting because when the PCs in the network increase where we need the more
valid IP's in the same network.
What is piggy backing?
Piggybacking is gaining access to restricted communication channel by using session that another user has
already established. Piggybacking can be defeated by logging off before leaving a workstation or terminal or
by initiating a protected mode, such as via a screensaver, that requires re-authentication before access can be
resumed.
What is attenuation?
Attenuation signifies the loss of energy.
When a signal travels through a medium,it loses some of its energy so that it can overcome the resistance of
the medium.
Explain 5-4-3 rule.
In a Ethernet network, between any two points on the network, there can be no more than five network
segments or four repeaters, and of those five segments only three of segments can be populated.
What is REX?
Request to Exit (REX) - A signal that informs the controller that someone has requested to exit from a
secure area.

What do you meant by "triple X" in Networks?


The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The
standard protocol has been defined between the terminal and the PAD, called X.28; another standard
protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are
often called "triple X".

Anda mungkin juga menyukai