can any 1 explain active directory, forest, tree etc
How wireless routers work
can any 1 explain active directory, forest, tree etc
How wireless routers work
Insimple words active directory is used to provide security to network,clients ,users etc.,
Eigrp stands for enchanced interior gateway routing protocol
The basic difference between Ftp and Udp is tat Ftp is a reliable protocol...On the other hand Udp and Ip are both unreliable.
Yes, that is true and I am agree with you for the difference and it is simple. Thx
10) How to see the ISDN Layers are functional or not? Basic commands for ISDN to dial? Debugging of ISDN?
I have two IOS in flash?? How to boot the IOS with a specific flash image
In a router interface how do you know that a how much bandwidth is utilized. How to check congestion on an interface
Does router Serial Interface have a Mac address
DLCI significance local or remote? What do you mean local significance
I have RIP/static and EIGRP in the network. How do I integrate both
how much mcse server international paper is important?
1. Ftp- file transfer protocol for exchanging and manipulating files over a tcp computer network. An ftp client may connect to an ftp server to manipulate files on that server., udp- user datagram protocol with udp, computer applications can send messages.
2.a router has firmware, not an os. This means you can log into it and give it instructions. You can set-up new options. You can set-up routing tables, dmz's, you have qos, you can open and close ports. Do port forwarding / trigger ports.a switch on the other hand has no firmware. So you have pretty much none of the above mentioned stuff. Its just a basic piece of hardware that allows you to send data from one computer to the next.
3.dora process contain 1st three packets(discover,offer,request)are broadcast and last aknowledge packet is unicast.
4.the kerberos protocol relies heavily on an authentication technique that makes use of shared secrets. The basic concept is quite simple: if a secret is known by only two people, either person can verify the identity of the other by confirming that the other person knows the secret. For example, let's suppose that alice often sends messages to bob and that bob needs to be sure that a message from alice really has come from alice before he acts on its information. They decide to solve their problem by selecting a password, and they agree not to share this secret with anyone else. If alice's messages can somehow demonstrate that the sender knows the password, bob knows that the sender is alice. The only question for alice and bob to resolve is how alice can show that she knows the password. She might simply include it somewhere in her messages, perhaps in a signature block at the end — alice, our$ecret . This would be simple and efficient and might even work if alice and bob can be sure that no one else is reading their mail. Unfortunately, that is not the case. Their messages pass over a network used by people like carol, who has a network analyzer and a hobby of scanning traffic in hope that one day she might spot a password. So it is out of the question for alice to prove that she knows the secret simply by saying it. To keep the password secret, she must show that she knows it without revealing it. The kerberos protocol solves this problem with secret key cryptography . Rather than sharing a password, communication partners share a cryptographic key. They use knowledge of this key to verify one another's identity. For this method of authentication to work, the shared key must be symmetric — a single key must be capable of both encryption and decryption. One party proves knowledge of the key by encrypting a piece of information, the other by decrypting it.
Last edited by get_pawan; 03-16-2009 at 11:37 AM. Reason: making it readable
1. Which routing protocol used tcp and udp?
All the routing protocol.
2. Difference between ripv1 and rip v2?
Ripv1 is a classful routing protocol, Ripv2 is a classless routing protocol.
Ripv1 does not send subnet mask information in it’s update but ripv2 it will send the subnet mask in update ,
Ripv1 does not support authentication but Ripv2 it will support authentication .
3. Difference between classless and classfull?
Classless it will support Ripv1 and classful Ripv2,
Classless it will support IGRP and Classful EIGRP ,
Classless it will support EGP and classful OSPF,
Classles support BGP3 and classful IS-IS and BGP4.
4. What is routed and routing protocol?
5. Multicast address of ripv2,eigrp,ospf?
6. What is the best subnet mask for point to point connectivity?
7. What is as no?
8. Which one protocol does a fast convergence at the time of route failure and give reason (eigrp and ospf)?
9. What is fessible distance and advertisement distance?
10. What is the method to find the fd value?
11. What is the concept used in the selection of fessible successor and what is it?
12. What is active and passive route?
13. What is the ad value of the following
eigrp external route,eigrp summary route,ospf, bgp internal and external
14.can we stop the rip 30 min update time with any metods ?
15 what is split horizon?
16 What is the difference between switch & router?
17 What is FTP & UDP?
FTP is file transfer protocol. ftp is a application that works in application
layer of osi model.
one good reason to use ftp is to download files. ftp is much fater than
standard http downloads.
UDP is nothing but user datagram protocol this protocol works at
transport layer of osi model.
udp is un reliable ,connectionless datagram protocol " unreliable" merely
means that the protocol has no technique for verifying that the data
reached the other end of network correctly
A routed protocol that can be routed by a router, router must be able to interpret the logical inter network as specified by that routed protocol.
A routing protocol that accomplishes routing through the implementation of a specific routing protocol.
Multicast address of Ripv2 is 224.0.0.9,
Multicast address of Eigrp is 224.0.0.10,
Multicast address of Ospf is 224.0.0.6.
1. (i) FTP (File Transfer Protocol) is the standard mechanism provided by the TCP/IP protocol suite for copying a file from one host to another
(ii) UDP (User Datagram Protocol) is one of the available standards that is offered for process-to- process communication within the transport layer,
also note: UDP is prefered for FTP where large amounts of data is sent. This is because UDP is a best-effort protocol (unreliable and connectionless).
2. When compared to a Switch, Routers are sophisticated devices. Switches are concerened with transmitting and handling of Frames whereas the Router is more concerened with
the routing of packets to other networks until it reach its final destsination.
3. "DORA" (Discover, Offer,Request and Acknowledgement) is the process of assigning IP addresses by the DHCP server
and here are the steps implemented in brief:
i) Client makes a UDP Broadcast to the server about the DHCP discovery.
ii) DHCP offers to the client.
iii) In response to the offer Client requests the server.
iv)Server responds all the Ip Add/mask/gty/dns/wins info along with the acknowledgement packet.
4. Kerberos is a network authentication protocol which utilizes symmetric cryptography to provide authentication for client-server applications.
This authentication is called secure because it:
*Does not occur in plaintext
*Does not rely on authentication by the host operating system
*Does not base trust on IP addresses
*Does not require physical security of the network hosts
FTP :- ftp is file transfer protocol that help transfer any data source to destionation. and it work on transport layer on port no. 21.it means by useing ftp we can download or upload data on internet.
UDP :- UDP means user datagram protocol that help send data other end. it is connectionless protocol, not verify us that data revd other end yes or no.
Switch & Router :- switch is the multiport networking devices that enable connect more computers in local network and it is full duplex mode that means at a time more computer send and recvd data.
Router is networking device that help we connect to internet. it help us unothorised sites. and filter data for sending source to destination.
how can access another pc by using remote desktop
Hi,
U need to install 'Remote Desktop Control' Software on Client and server Systems.
After that u can access Pc remotely..
Regards,
Riju.