ACID is a term coined by Andrew Router in
1983, which stands for Atomicity, Consistence, Isolation and Durability.
A stored procedure ia s named collection of
SQL statements and procedural logic that is compiled, verified and stored in a
server database. It is typically treated like any other database object. Stored
procedures accept input parameters so that a single procedure can be used over
the network by multiple clients using different input data. A single remote
message triggers the execution of a collection of stored SQL statements. The
results is a reduction of network traffic and better performance.
Wide-mouth frog is the simplest known key
distribution center (KDC) authentication protocol.
When the computers on the network simply
listen and receive the signal, they are referred to as passive because they
don’t amplify the signal in any way.
Example for passive topology - linear bus
Example for passive topology - linear bus
When hierarchical routing is used, the routers
are divided into what we call regions, with each router knowing all the details
about how to route packets to destinations within its own region, but knowing
nothing about the internal structure of other regions.
Virtual channel is normally a connection from
one source to one destination, although multicast connections are also
permitted. The other name for virtual channel is virtual circuit.
Transmission is a physical movement of
information and concern issues like bit polarity, synchronization, clock etc.
Communication means the meaning full exchange of information between two communication media.
Communication means the meaning full exchange of information between two communication media.
The Trivial File Transfer Protocol (TFTP)
allows a local host to obtain files from a remote host but does not provide
reliability or security. It uses the fundamental packet delivery services
offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.
The three types of routing tables are fixed,
dynamic, and fixed central. The fixed table must be manually modified every
time there is a change. A dynamic table changes its information based on
network traffic, reducing the amount of manual maintenance. A fixed central
table lets a manager modify only one table, which is then read by other
devices. The fixed central table reduces the need to update each machine's
table, as with the fixed table. Usually a dynamic table causes the fewest
problems for a network administrator, although the table's contents can change
without the administrator being aware of the change.
The process that allows a network to
self-repair networks problems. The stations on the network notify the other
stations on the ring when they are not receiving the transmissions. Beaconing
is used in Token ring and FDDI networks.
61
:: What does the Mount protocol do?
The Mount protocol returns a file handle
and the name of the file system in which a requested file resides. The message
is sent to the client from the server after reception of a client's request.
62
:: What are Diagrams and Trigrams?
The most common two letter combinations are
called as diagrams. e.g. th, in, er, re and an. The most common three letter
combinations are called as trigrams. e.g. the, ing, and, and ion.
63
:: What is the HELLO protocol used for?
The HELLO protocol uses time instead of
distance to determine optimal routing. It is an alternative to the Routing
Information Protocol.
64
:: What is the minimum and maximum length of the header in the TCP segment and
IP datagram?
The header should have a minimum length of
20 bytes and can have a maximum length of 60 bytes.
65
:: What do you meant by "triple X" in Networks?
The function of PAD (Packet Assembler
Disassembler) is described in a document known as X.3. The standard protocol
has been defined between the terminal and the PAD, called X.28; another
standard protocol exists between the PAD and the network, called X.29.
Together, these three recommendations
The degeneration of a signal over distance on
a network cable is called attenuation.
The data unit in the LLC level is called the
protocol data unit (PDU). The PDU contains of four fields a destination service
access point (DSAP), a source service access point (SSAP), a control field and
an information field. DSAP, SSAP are addresses used by the LLC to identify the
protocol stacks on the receiving and sending machines that are generating and
using the data. The control field specifies whether the PDU frame is a
information frame (I - frame) or a supervisory frame (S - frame) or a
unnumbered frame (U - frame).
The data unit created at the application layer
is called a message, at the transport layer the data unit created is called
either a segment or an user datagram, at the network layer the data unit
created is called the datagram, at the data link layer the datagram is
encapsulated in to a frame and finally transmitted as signals along the
transmission media.
The address resolution protocol (ARP) is used
to associate the 32 bit IP address with the 48 bit physical address, used by a
host or a router to find the physical address of another host on its network by
sending a ARP query packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.
The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.
The address for a device as it is identified
at the Media Access Control (MAC) layer in the network architecture. MAC
address is usually stored in ROM on the network adapter card and is unique.
No comments:
Post a Comment