IP address classes:
Class
|
Leftmost bits
|
Start address
|
Finish address
|
A
|
0xxx
|
0.0.0.0
|
127.255.255.255
|
B
|
10xx
|
128.0.0.0
|
191.255.255.255
|
C
|
110x
|
192.0.0.0
|
223.255.255.255
|
D
|
1110
|
224.0.0.0
|
239.255.255.255
|
E
|
1111
|
240.0.0.0
|
255.255.255.255
|
IP address range for Intranets (Private Networks):
Class
|
Private start address
|
Private finish address
|
A
|
10.0.0.0
|
10.255.255.255
|
B
|
172.16.0.0
|
172.31.255.255
|
C
|
192.168.0.0
|
192.168.255.255
|
IP packets addressed by
them cannot be transmitted onto the public Internet. If such a private network
needs to connect to the Internet, it must use either a network address
translator (NAT) gateway, or a proxy server.
Some good facts on IP
V6:
In IPV6, The address
block fc00::/7 has been reserved
for private networks.
IP officially reserves
the entire range from 127.0.0.0 through 127.255.255.255 for
loopback purposes.
Very Imp: IPv6 does not use classes. IPv6 supports the following three IP address
types:
1. Unicast
2. Multicast
3. Anycast
IPv6 does not support
broadcast. Multicast addresses in
IPv6 start with 'FF' (255) just like IPv4 addresses. Unicast addresses have 3 defined scopes,
including link-local, site-local and global; and multicast addresses have 14
scopes.
The number of IPv6
addresses is 1028. There is no ARP in V6.
Currently, DHCP, FTP, PPP, RIP,
SNMP, VPN, L2TP and Telnet do not support IPv6.
IPv6 does not require
NAT. NAT, too, doesn't support V6. Currently, IPv6 packets are not forwarded.
IPv6 reserves just two
special addresses: 0:0:0:0:0:0:0:0 and 0:0:0:0:0:0:0:1. IPv6 uses
0:0:0:0:0:0:0:0 internal to the protocol implementation, so nodes cannot use it
for their own communication purposes. IPv6 uses 0:0:0:0:0:0:0:1 as its loopback
address, equivalent to 127.0.0.1 in IPv4. The minimum size of an IP datagram is
28 bytes, including 20 bytes of header.
Anycast is a network
addressing and routing methodology in which datagrams from a single sender are
routed to the topologically nearest node in a group of potential receivers,
though it may be sent to several nodes, all identified by the same destination
address. On the Internet, anycast is usually implemented by using BGP.
In denial-of-service
attacks (DoS), a rogue network host
may advertise itself as an anycast server for a vital network service, to
provide false information or simply block service.
6to4 is an Internet transition mechanism for
migrating from IPv4 to IPv6, a system that allows IPv6 packets to be
transmitted over an IPv4 network. 6to4 does not facilitate interoperation
between IPv4-only hosts and IPv6-only hosts, but simply a transparent mechanism
used as a transport layer between IPv6 nodes.
The network requests
supporting DNS lookups run over TCP and UDP, port 53 by default.
Some Questions-Answers
with explanation
In a network of LANs
connected by bridges, packets are sent from one LAN to another through
intermediate bridges. Since more than one path may exist between two LANs,
packets may have to be routed through multiple bridges. Why is the spanning
tree algorithm used for bridge-routing? (GATE 2005)
(a) For shortest path
routing between LANs (b) For avoiding loops in the routing paths
(c) For fault
tolerance
(d) For minimizing collisions
SOLUTION: Spanning tree
is a protocol that allows the bridges to exchange information so that only one
of them will handle a given message that is being sent between two computers
within the network. This protocol prevents the condition known as a
BRIDGE LOOP. It is typical to add a second bridge between two network segments
as a backup in case the primary bridge fails (both bridges need to have some
way to understand which bridge is the primary one). To do this, they have a
separate path connection just between the bridges in which they exchange
information, using bridge protocol data units (BPDUs).
The program in each
bridge that allows it to determine how to use the protocol is known as the
spanning tree algorithm. The algorithm is specifically constructed to avoid
bridge loops (for a bridge using only the most efficient path when faced with
multiple paths). If the best path fails, the algorithm recalculates the network
and finds the next best route.
How many 8-bit
characters can be transmitted per second over a 9600 baud serial communication
link using asynchronous mode of transmission with one start bit, eight data
bits, two stop bits and one parity bit?
(1) 600 (2) 800 (3) 876 (4) 1200
(1) 600 (2) 800 (3) 876 (4) 1200
For 9600 baud, 1
bit=1/9600=0.104mS. Each char would require 11 bits. That means, to transmit
one char, it would take 1.144 mS. So, applying the formula 1000/1.144 (mS in
one Sec/transmission time for one char)=approx 875. Nearest answer is (3)
The single stage
network is also called
A) one sided
network
B) two sided network
C) recirculating network
D) pipeline network
Single-Stage Network
is a single stage of switching elements (SEs) existing between the inputs and
the outputs of the network. Data
is circulated a number of times around the network.
If a class B
network on the Internet has a subnet mask of 255.255.248.0, what is the maximum
number of hosts per subnet?
(a) 1022 (b) 1023 (c) 2046 (d) 2047
(a) 1022 (b) 1023 (c) 2046 (d) 2047
Explanation: Convert the
subnet mask into binary format.
255.255.248.0 =
11111111.11111111.11111000.00000000
Number of 1's in the
subnet mask indicates the Network-ID and the Subnet-ID part. Number of 0's in
the subnet mask indicates the Host-ID part. Maximum number of Hosts per subnet
= 211 = 2048, where 11 =
Number of 0's in the Subnet Mask. Out of 2048 values, 2 addresses are reserved,
hence we remove them (2048-2 = 2046). Note: In the host part of
the address:- all bits as 1 is reserved as broadcast address and all bits as 0
is used as network address of subnet.
Which of the following
system calls results in the sending of SYN packets?
(a) socket (b) bind (c) listen (d) connect
(a) socket (b) bind (c) listen (d) connect
The connect system call is normally called by the client process to connect to
the server process. The socket system call creates a new socket and assigns the
protocol and resources to the created socket descriptor. The bind system call associates a local network transport address with a
socket. For a client process, it is not mandatory to issue a bind call. The
kernel takes care of doing an implicit binding when the client process issues
the connect system call. It is often necessary for a server process to issue an
explicit bind request before it can accept connections or start communication
with clients. The listen call indicates to the protocol that the server
process is ready to accept any new incoming connections on the socket. There is
a limit on the number of connections that can be queued up, after which any
further connection requests are ignored.
No comments:
Post a Comment