Menu

Wednesday, July 17, 2013

Notes on Computer Networking:Part II

IP address classes:
Class
Leftmost bits
Start address
Finish address
A
0xxx
0.0.0.0
127.255.255.255
B
10xx
128.0.0.0
191.255.255.255
C
110x
192.0.0.0
223.255.255.255
D
1110
224.0.0.0
239.255.255.255
E
1111
240.0.0.0
255.255.255.255

IP address range for Intranets (Private Networks):
Class
Private start address
Private finish address
A
10.0.0.0
10.255.255.255
B
172.16.0.0
172.31.255.255
C
192.168.0.0
192.168.255.255

IP packets addressed by them cannot be transmitted onto the public Internet. If such a private network needs to connect to the Internet, it must use either a network address translator (NAT) gateway, or a proxy server.

Some good facts on IP V6:

In IPV6, The address block fc00::/7 has been reserved for private networks.
IP officially reserves the entire range from 127.0.0.0 through 127.255.255.255 for loopback purposes.
Very Imp: IPv6 does not use classes. IPv6 supports the following three IP address types: 
1. Unicast 
2. Multicast 
3. Anycast
IPv6 does not support broadcast. Multicast addresses in IPv6 start with 'FF' (255) just like IPv4 addresses. Unicast addresses have 3 defined scopes, including link-local, site-local and global; and multicast addresses have 14 scopes.
The number of IPv6 addresses is 1028. There is no ARP in V6. Currently, DHCP, FTP, PPP, RIP, SNMP, VPN, L2TP and Telnet do not support IPv6.
IPv6 does not require NAT. NAT, too, doesn't support V6. Currently, IPv6 packets are not forwarded.
IPv6 reserves just two special addresses: 0:0:0:0:0:0:0:0 and 0:0:0:0:0:0:0:1. IPv6 uses 0:0:0:0:0:0:0:0 internal to the protocol implementation, so nodes cannot use it for their own communication purposes. IPv6 uses 0:0:0:0:0:0:0:1 as its loopback address, equivalent to 127.0.0.1 in IPv4. The minimum size of an IP datagram is 28 bytes, including 20 bytes of header.
Anycast is a network addressing and routing methodology in which datagrams from a single sender are routed to the topologically nearest node in a group of potential receivers, though it may be sent to several nodes, all identified by the same destination address. On the Internet, anycast is usually implemented by using BGP.
In denial-of-service attacks (DoS), a rogue network host may advertise itself as an anycast server for a vital network service, to provide false information or simply block service.
6to4 is an Internet transition mechanism for migrating from IPv4 to IPv6, a system that allows IPv6 packets to be transmitted over an IPv4 network. 6to4 does not facilitate interoperation between IPv4-only hosts and IPv6-only hosts, but simply a transparent mechanism used as a transport layer between IPv6 nodes.

The network requests supporting DNS lookups run over TCP and UDP, port 53 by default.

Some Questions-Answers with explanation
In a network of LANs connected by bridges, packets are sent from one LAN to another through intermediate bridges. Since more than one path may exist between two LANs, packets may have to be routed through multiple bridges. Why is the spanning tree algorithm used for bridge-routing? (GATE 2005)
(a) For shortest path routing between LANs         (b) For avoiding loops in the routing paths
(c) For fault tolerance                                      (d) For minimizing collisions
SOLUTION: Spanning tree is a protocol that allows the bridges to exchange information so that only one of them will handle a given message that is being sent between two computers within the network. This  protocol prevents the condition known as a BRIDGE LOOP. It is typical to add a second bridge between two network segments as a backup in case the primary bridge fails (both bridges need to have some way to understand which bridge is the primary one). To do this, they have a separate path connection just between the bridges in which they exchange information, using bridge protocol data units (BPDUs).
The program in each bridge that allows it to determine how to use the protocol is known as the spanning tree algorithm. The algorithm is specifically constructed to avoid bridge loops (for a bridge using only the most efficient path when faced with multiple paths). If the best path fails, the algorithm recalculates the network and finds the next best route.
How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, two stop bits and one parity bit?
(1) 600         (2) 800         (3) 876           (4) 1200
For 9600 baud, 1 bit=1/9600=0.104mS. Each char would require 11 bits. That means, to transmit one char, it would take 1.144 mS. So, applying the formula 1000/1.144 (mS in one Sec/transmission time for one char)=approx 875. Nearest answer is (3)
The single stage network is also called
A) one sided network                             B) two sided network
C) recirculating network                      D) pipeline network
Single-Stage Network is a single stage of switching elements (SEs) existing between the inputs and the outputs of the network. Data is circulated a number of times around the network.
 If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum number of hosts per subnet?
(a) 1022 (b) 1023 (c)
 2046 (d) 2047
Explanation: Convert the subnet mask into binary format.
255.255.248.0 = 11111111.11111111.11111000.00000000
Number of 1's in the subnet mask indicates the Network-ID and the Subnet-ID part. Number of 0's in the subnet mask indicates the Host-ID part. Maximum number of Hosts per subnet = 211 = 2048, where 11 = Number of 0's in the Subnet Mask. Out of 2048 values, 2 addresses are reserved, hence we remove them (2048-2 = 2046). Note: In the host part of the address:- all bits as 1 is reserved as broadcast address and all bits as 0 is used as network address of subnet.
Which of the following system calls results in the sending of SYN packets?
(a) socket (b) bind (c) listen (d) connect
The connect system call is normally called by the client process to connect to the server process. The socket system call creates a new socket and assigns the protocol and resources to the created socket descriptor. The bind system call associates a local network transport address with a socket. For a client process, it is not mandatory to issue a bind call. The kernel takes care of doing an implicit binding when the client process issues the connect system call. It is often necessary for a server process to issue an explicit bind request before it can accept connections or start communication with clients. The listen call indicates to the protocol that the server process is ready to accept any new incoming connections on the socket. There is a limit on the number of connections that can be queued up, after which any further connection requests are ignored.


No comments:

Post a Comment