Professional Documents
Culture Documents
There is a many-to-one relationship between clients and server. Clients always initiate the dialog by
requesting a service. Servers are passively awaiting for requests from clients.
What is meant by 3-Tier architecture?
In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is separated
from the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and
flexible.
Example: TP monitor, Web.
What are the types of Transparencies?
The types of transparencies the NOS middleware is expected to provide are:-
* Location transparency
* Namespace transparency
* Logon transparency
* Replication transparency
* Local/Remote access transparency
* Distributed time transparency
* Failure transparency and
* Administration transparency.
What is network database?
Network database is a collection of object-oriented, network and semi structured models or as some kind of
object database.
What is a Web server? This new model of Client/Server consists of thin, protable,
"universal" clients that talk to superfat servers. In the simplet form, a web server
returns documents when clients ask for them by name. The clients and server
communicate using an RPC-like protocol called HTTP.
This new model of Client/Server consists of thin, protable, "universal" clients that talk to superfat servers. In
the simplet form, a web server returns documents when clients ask for them by name. The clients and server
communicate using an RPC-like protocol called HTTP.
What are the functions of the typical server program?
It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients
first. Initiates and runs background task activity. Keeps running. Grown bigger and faster.
What is a TP Monitor?
There is no commonly accepted definition for a TP monitor. According to Jeri Edwards' a TP Monitor is "an
OS for transaction processing".
What are Service-specific middleware?
It is needed to accomplish a particular Client/Server type of services which includes:-
TP Monitor does mainly two things extremely well. They are Process management
and Transaction management.?
They were originally introduced to run classes of applications that could service hundreds and sometimes
thousands of clients. TP Monitors provide an OS - on top of existing OS - that connects in real time these
thousands of humans with a pool of shared server processes.
What are the characteristics of Client/Server?
Service
* Shared resources
* Asymmentrical protocols
* Transparency of location
* Mix-and-match
* Message based exchanges
* Encapsulation of services
* Scalability
* Integrity
Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends
it to the remote server. The server receives the request, unpack the parameters, calls the procedures, and
sends the reply back to the client. It is a telephone-like metaphor.
What are the characteristics of client/server architectures ?
The basic characteristics of client/server architectures are:<br><br> 1. Combination of a client or front-end
portion that interacts with the user, and a server or back-end portion that interacts with the shared resource.
The client process contains solution-specific logic and provides the interface between the user and the rest
of the application system. The server process acts as a software engine that manages shared resources such
as databases, printers, modems, or high powered processors.<br> 2. The front-end task and back-end task
have fundamentally different requirements for computing resources such as processor speeds, memory, disk
speeds and capacities, and input/output devices.<br> 3. The environment is typically heterogeneous and
multi-vendor. The hardware platform and operating system of client and server are not usually the same.
Client and server processes communicate through a well-defined set of standard application program
interfaces (API?s) and RPC?s.<br> 4. An important characteristic of client-server systems is scalability.
They can be scaled horizontally or vertically. Horizontal scaling means adding or removing client
workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster
server machine or multiservers.<br>
NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the
use on small subnets.
What is RAID?
Page-4
RAID stands for Redundant Array of Independent(or Inexpensive) Disk Drives that employ two or more
drives in combination for fault tolerance and Performance.
What are the advantages and disadvantages of the three types of routing tables?
The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be manually
modified every time there is a change. A dynamic table changes its information based on network traffic,
reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table,
which is then read by other devices. The fixed central table reduces the need to update each machine's table,
as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator,
although the table's contents can change without the administrator being aware of the change.
What is difference between baseband and broadband transmission?
In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband
transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.
In base band transmission we transmit digital signal without converting it into analog.here a low pass
channel is used.
In broad band transmission we transmit digital signal by converting it into analog.Here a band pass channel
is used.
10Base5?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling, with 5 continuous segments not exceeding 100 meters per segment.
10BaseT?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling and twisted pair cabling.
All these 3 are related to ethernet cables, where 10base2 can define as maximum rate of data tranfer is
10megabits per second ,B standa for baseband signaling and 2 is for 200 meter of lenght... this is same for
10base5 but where in 10baset T stands for twisted pair of cable
Bridges:
These operate both in the physical and data link layers of LANs of same type. They divide a larger network
in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and
thus are repeaters that relay a frame only the side of the segment containing the intended recipent and
control congestion.
Routers:
They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in
the physical, data link and network layers. They contain software that enable them to determine which of the
several possible paths is the best for a particular transmission.
Gateways:
They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They
Page-5
accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before
forwarding it. They operate in all seven layers of the OSI model.
I Think Switches has left both layer 2 and 3. Bridges aren't used these days and it also work on data link
layer and not on physical layer.
Switches (L2)
--------
It breaks collasion domain.Uses MAC address to communicate. Faster than bridges.
Communication means the meaning full exchange of information between two communication media.
Transmission is a one way scheme while communication is two-way scheme
What is region?
When hierarchical routing is used, the routers are divided into what we call regions, with each router
knowing all the details about how to route packets to destinations within its own region, but knowing
nothing about the internal structure of other regions.
A Logical address is a 32- bit address assigned to each system in a network. This works in Layer-3 of OSI
Model. This would be generally the IP address.
What is the difference between tree and forest?
A tree start whenever you install the first domain controller and a tree may consist a single domain or
multiple domain arranged in structure called child or grand child which will inherit name from its parent.
When we install first domain controller a new domain ,anew tree and a new forest begins.In a new forest
you can have single tree or multiple tree.
What is the difference between TFTP and FTP application layer protocols?
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not
provide reliability or security. It uses the fundamental packet delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from
one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two
connections (virtual circuits) between the hosts, one for data transfer and another for control information.
* FTP is a complete, session-oriented, general purpose file transfer protocol. TFTP is used as a bare-bones
special purpose file transfer protocol.
* FTP can be used interactively. TFTP allows only unidirectional transfer of files.
* FTP depends on TCP, is connection oriented, and provides reliable control. TFTP depends on UDP,
requires less overhead, and provides virtually no control.
* FTP provides user authentication. TFTP does not.
Page-6
* FTP uses well-known TCP port numbers: 20 for data and 21 for connection dialog. TFTP uses UDP port
number 69 for its file transfer activity.
* The Windows NT FTP server service does not support TFTP because TFTP does not support
authentication.
* Windows 95 and TCP/IP-32 for Windows for Workgroups do not include a TFTP client program.
Advantages
All the IP configuration information gets automatically configured for your client machine by the DHCP
server.
If you move your client machine to a different subnet, the client will send out its discover message at boot
time and work as usual. However, when you first boot up there you will not be able to get back the IP
address you had at your previous location regardless of how little time has passed.
Disadvantage
Your machine name does not change when you get a new IP address. The DNS (Domain Name System)
name is associated with your IP address and therefore does change. This only presents a problem if other
clients try to access your machine by its DNS name.
t is using a router to answer ARP requests. This will be done when the originating host believes that a
destination is local, when in fact is lies beyond router.
Proxy ARP (Address Resolution Protocol) is a technique by which a device on a given network answers the
ARP queries for a network address that is not on that network. The ARP Proxy is aware of the location of
the traffic's destination, and offers its own MAC address in reply, effectively saying, "send it to me, and I'll
get it to where it needs to go." Serving as an ARP Proxy for another host effectively directs LAN traffic to
Page-7
the Proxy. The "captured" traffic is then typically routed by the Proxy to the intended destination via another
interface
What is frame relay, in which layer it comes?
Frame relay is a packet switching technology. It will operate in the data link layer.
FRAME RELAY is packet-switching protocol for connecting devices on a Wide Area Network (WAN).
Frame Relay networks in the U.S. support data transfer rates at T-1 (1.544 Mbps) and T-3 (45 Mbps)
speeds. In fact, you can think of Frame Relay as a way of utilizing existing T-1 and T-3 lines owned by a
service provider. Most telephone companies now provide Frame Relay service for customers who want
connections at 56 Kbps to T-1 speeds. (In Europe, Frame Relay speeds vary from 64 Kbps to 2 Mbps. it
operats at datalink layer os osi model.
7 OSI LAYER IS A MODEL WHICH ARE DESCRIBE OPERATION HOW YOUR PACKET GOES
FROM ONE PC TO OTHER, THAT IS INCLUDING 7 LAYER
APPLICATION,PRESENTATION,SESSION,NETWORK,TRANSPORT ,DATALINK,PHYSICAL
LAYER.ROUTER IS A INTERNETWORKING DEVICE WHICH IS USED FOR CONNECTING 2 OR
MORE DIFFRENT NETWORK BASICALLY ROUTER HAVE ROUTING TABLE WHICH SHOW
ADDRESS OF ALL NETWORK, THIS IS WORK ON NETWORK LAYER IN OSI MODEL .
GATEWAY IS A ALSOINTERNETWORKING DEVICE WHICH WORK ON ALL LAYER OF OSI
MODEL. ENCRYPTION & DECRYPTION IS METHOD FOR PROVIDE SECURITY OF YOUR
PKT,AFTER ENCRYPTION NO ONE ACCSES YOUR PKT WITHOUT DECRYPTION.
Dial up connection requires a username/password & a modem to connect to internet.The maximum speed
will be of 56kbps only. In this either the phone or the internet will work at a time.
While in broadband connection (it need a modem & may need user/password).It is directly connected with
RJ45 LAN card. Its speed ranges from 256kbps to several mbps. In this both phone line and internet can
work together.
DNS is resolve the web site name to IP address or you can say.
In WINS used a file name those is LMhost, this file in the System32, and when we put the websit name and
its IP address, then it resolve the particular IP address those insert in the LMhost file.
Page-8
Difference between bit rate and baud rate?
Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal
units per second that are required to represent those bits.
baud rate = bit rate / N
where N is no-of-bits represented by each signal shift.
What is supernetting?why it is used
Supernetting refers to increase host and reduce the subnet's. It mean reduce the network bits and increase the
host bits. We do use supernetting because when the PCs in the network increase where we need the more
valid IP's in the same network.
What is piggy backing?
Piggybacking is gaining access to restricted communication channel by using session that another user has
already established. Piggybacking can be defeated by logging off before leaving a workstation or terminal or
by initiating a protected mode, such as via a screensaver, that requires re-authentication before access can be
resumed.
What is attenuation?
Attenuation signifies the loss of energy.
When a signal travels through a medium,it loses some of its energy so that it can overcome the resistance of
the medium.
Explain 5-4-3 rule.
In a Ethernet network, between any two points on the network, there can be no more than five network
segments or four repeaters, and of those five segments only three of segments can be populated.
What is REX?
Request to Exit (REX) - A signal that informs the controller that someone has requested to exit from a
secure area.