Vous êtes sur la page 1sur 9

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer NETWORK AND SECURITY tyuiopasdfghjklzxcvbnmqwertyuiopas ASSIGNMENT dfghjklzxcvbnmqwertyuiopasdfghjklzx cvbnmqwertyuiopasdfghjklzxcvbnmq wertyuiopasdfghjklzxcvbnmqwertyuio pasdfghjklzxcvbnmqwertyuiopasdfghj klzxcvbnmqwertyuiopasdfghjklzxcvbn mqwertyuiopasdfghjklzxcvbnmqwerty

uiopasdfghjklzxcvbnmqwertyuiopasdf ghjklzxcvbnmqwertyuiopasdfghjklzxc vbnmqwertyuiopasdfghjklzxcvbnmrty uiopasdfghjklzxcvbnmqwertyuiopasdf ghjklzxcvbnmqwertyuiopasdfghjklzxc


7/24/2013 krishna.karunakaran

i) What is the difference between a HUB, Switch and Router?

HUB i) A common connection point for devices in a network.

SWITCH i) In networks, a device that filters and forwards packets between LAN segments.

ROUTER i) A device that forwards data packets along networks.

ii) Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports.

ii) Switches operate at the data link layer (layer 2) and sometimes on network layer (layer 3).

ii) A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISPs network.

iii) In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that the frame is only destined for one port. The hub has no way of distinguishing which port a frame should be sent to. Passing it along to every port ensures that it will reach its intended destination. This places a lot of traffic on the network and can lead to poor network response times.

iii) A switch, however, keeps a record of the MAC addresses of all the devices connected to it. With this information, a switch can identify which system is sitting on which port. So when a frame is received, it knows exactly which port to send it to, without significantly increasing network response times. And, unlike a hub, a 10/100Mbps switch will allocate a full 10/100Mbps to each of its ports. So regardless of the number of PCs transmitting, users will always have access to the maximum amount of bandwidth.

iii) Routers are completely different devices. Where a hub or switch is concerned with transmitting frames, a router's job, as its name implies, is to route packets to other networks until that packet ultimately reaches its destination. One of the key features of a packet is that it not only contains data, but the destination address of where it's going.

ii) What is the difference between OSI model and TCP/IP model?

OSI MODEL

TCP/IP MODEL i) Reference model. ii) This is a theoretical model iii) It has 7 layers. iv) Stricter boundaries for the protocols. v) It has separate session and presentation layer.

i)Implementation of OSI model.


ii) Model around which Internet is developed. iii) It has only 4 layers. iv) Protocols are not strictly defined. v) Combines the session and presentation layer

in the application layer


vi) Supports only connectionless

communication in the network layer

vi) Supports connectionless and connection-

oriented communication in the network layer

vii) Protocols are dependent standard

vii) Protocols are independent standard

viii) Protocols were developed first and then the

viii) Model was developed before the

model was developed.

development of protocols.

iii) What are the functions of Router?

A router is another network infrastructure device that directs packets through the network based on information from Network Layer (Layer 3) of OSI model. A router uses a combination of hardware and software to "route" data from its source to its destination. A router can be configured to route data packets from different network protocols, like TCP/IP, IPX/SPX, and AppleTalk. Routers segment large networks into logical segments called subnets. The division of the network is based on the Layer 3 addressing system, like IP addresses. If the Network Layer (Layer 3) Data packet (IP Datagram) is addressed to another device on the local subnet, the packet does not cross the router and create a traffic congestion problem in another network. If data is addressed to a computer outside the subnet, the router forwards the data to the addressed network. Thus routing of network data helps conserve network bandwidth.
Routers are the first line of defense for your network and they must be configured to pass only traffic that is authorized by the network administrators. Thus a router can function as a firewall if its configured properly.

iv) What are the functions of Firewall?

A firewall is a blockade between a secure internal network and an untrusted network such as the Internet. A firewall provides a controlled single point of contact (called a chokepoint) between your secure internal network and the untrusted network. The functions of the firewall are as follows:

Enabling users in your internal network to use authorized resources that are located on the outside network Preventing unauthorized users on the outside network from using resources on your internal network

When you use a firewall as your gateway to the Internet (or other network), you reduce the risk to your internal network. Using a firewall also makes administering network security easier because firewall functions carry out many of your security policy directives.

Firewall appears as a single address to the public. The firewall provides access to the untrusted network through proxy or SOCKS servers or network address translation (NAT) while hiding your internal network addresses. Consequently, the firewall maintains the privacy of your internal network. Keeping information about your network private is one way in which the firewall makes an impersonation attack (spoofing) less likely. A firewall allows you to control traffic into and out of your network to minimize the risk of attack to your network. A firewall securely filters all traffic that enters your network so that only specific types of traffic for specific destinations can enter. This minimizes the risk that someone might use Telnet or File Transfer Protocol (FTP) to gain access to your internal systems.

v) What are the functions of VPN? The function of VPN is to allow two computers or networks to talk to each other over a transport media that is not secure. To do this VPN uses a computer at each of the two or more points on the various ends of the transport media such as the internet. Each point at the end of the transport media (internet) is called a point of presence (POP).

vi) What is the difference between Static and Dynamic IP addresses? Static IP Address A static IP address is assigned to your computer by your ISP and is permanent. Each time you connect to the internet, the same address is used. This address is never used by any other computer or device. Dynamic IP Address It would be simple if every computer that connects to the Internet could have its own static IP address, but when the Internet was first conceived, the architects did not foresee the need for an unlimited number of IP addresses. Consequently, there are not enough IP addresses to go around. To get around that problem, many Internet service providers economize on the IP addresses they possess by temporarily assigning an IP address to each computer from a pool of IP addresses. The temporary IP address is called a Dynamic IP address. As a result, the IP address may be different each time the computer connects to the Internet .

vii) What is Ping? Packet Internet Groper, ping is a utility used to verify if a network data packet is capable of being distributed to an address without errors. The ping utility is commonly used to check for network errors.

viii) What is meant by Latency / Packet drop?

Network latency is defined as the amount of time it takes for a packet to cross the network from a device that created the packet to the destination device. This is also known as end-to-end latency. Delay could be considered a synonym for latency.

Packet loss can be caused by a number of factors including signal degradation over the network medium due to multi-path fading, packet drop because of channel congestion corrupted packets rejected in-transit, faulty networking hardware, faulty network drivers or normal routing routines.

ix) What is Trace route? Trace route is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network.

x) What are functions of telnet / ftp? The purpose of the TELNET Protocol is to provide a bi-directional, eight-bit byte oriented communications facility. Its primary goal is to allow a standard method of interfacing terminal devices and terminal-oriented processes to each other. It is envisioned that the protocol may also be used for terminal-terminal communication ("linking") and process-process communication (distributed computation).

xi) What is the difference between HTTP / HTTPs? URL begins with http://" in case of HTTP while the URL begins with https:// in case of HTTPS. HTTP is unsecured while HTTPS is secured. HTTP uses port 80 for communication while HTTPS uses port 443 for communication. HTTP operates at Application Layer while HTTPS operates at Transport Layer. No encryption is there in HTTP while HTTPS uses encryption. No certificates required in HTTP while certificates required in HTTPS.

xii) What is DNS and its functions?

The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates easily memorized domain names to the numerical IP addresses needed for the purpose of locating computer services and devices worldwide. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the Internet.

xiii) What is the difference between SMTP / POP 3? SMTP, simple mail transfer protocol, typically running on port 25, is a protocol used by mail servers and programs to send and receive email. POP, post office protocol, typically running on port 110, is a protocol used by email users to get access to the email stored on their mail servers. User sends email using SMTP to their outgoing mail server. The outgoing mail server relays the email using SMTP through one or more mail servers. The destination mail server receives the email using SMTP. The destination user retrieves their email from that server using POP.

xiv) What is mean by TCP and UDP?

TCP i) Acronym for i) Transmission Control Protocol

UDP i) User Datagram Protocol or Universal Datagram Protocol

ii) Function ii) As a message makes its way across the internet from one computer to another. This is connection based. ii) UDP is also a protocol used in
message transport or transfer. This is not connection based which means that one program can send a load of packets to another and that would be the end of the relationship.

iii) Usage

iii) TCP is used in case of non-time


critical applications.

iii)
UDP is used for games or applications that require fast transmission of data. UDP's stateless nature is also useful for servers that answer small queries from huge numbers of clients.

iv) Ordering of data packets

iv) TCP rearranges data packets in


the order specified.

iv)
UDP has no inherent order as all packets are independent of each other. If ordering is required, it has to be managed by the application layer.

v) Speed of transfer

v) The speed for TCP is slower


than UDP.

v) UDP is faster because there is


no error-checking for packets.

vi) Examples

vi) HTTP, HTTPs, FTP, SMTP Telnet

vi) DNS, DHCP, TFTP, SNMP, RIP,


VOIP

xv) What is a Firewall and its various types?

A firewall is a collection of hardware and software that, when used together, prevent unauthorized access to a portion of a network. A firewall consists of the following components:

Hardware Firewall hardware typically consists of a separate computer or device dedicated to running the firewall software functions.

Software Firewall software provides a variety of applications. In terms of network security, a firewall provides these security controls through a variety of technologies:
o o o o o o o o

Internet Protocol (IP) packet filtering Network address translation (NAT) services SOCKS server Proxy servers for a variety of services such as HTTP, Telnet, FTP, and so forth Mail relay services Split Domain Name System (DNS) Logging Real-time monitoring

Vous aimerez peut-être aussi