Académique Documents
Professionnel Documents
Culture Documents
Troubleshooting is a form of problem solving, often applied to repair failed products or processes
on a machine or a system. It is a logical, systematic search for the source of a problem in order
to solve it, and make the product or process operational again. Troubleshooting is needed to
identify the symptoms. Determining the most likely cause is a process of elimination—eliminating
potential causes of a problem. Finally, troubleshooting requires confirmation that the solution
restores the product or process to its working state.
4. What is DHCP?
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to
automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope)
configured for a given network.
5. TCP Vs UDP?
There are two types of Internet Protocol (IP) traffic. They are TCP or Transmission Control
Protocol and UDP or User Datagram Protocol. TCP is connection oriented – once a connection
is established, data can be sent bidirectional. UDP is a simpler, connectionless Internet protocol.
10.IPv4 Vs IPv6.
IPv4 stands for Internet Protocol version 4. It is the underlying technology that makes it possible
for us to connect our devices to the web. Whenever a device access the Internet (whether it's a
PC, Mac, smartphone or other device), it is assigned a unique, numerical IP address such as
99.48.227.227. To send data from one computer to another through the web, a data packet must
be transferred across the network containing the IP addresses of both devices.
IPv6 is the sixth revision to the Internet Protocol and the successor to IPv4. It functions similarly
to IPv4 in that it provides the unique, numerical IP addresses necessary for Internet-enabled
devices to communicate. However, it does sport one major difference: it utilizes 128-bit
addresses. I'll explain why this is important in a moment.
11.Internet vs Intranet.
Internet
1. Internet is wide network of computers and is open for all.
2. Internet itself contains a large number of intranets.
3. The number of users who use internet is Unlimited.
4. The Visitors traffic is unlimited.
5. Internet contains different source of information and is available for all.
Intranet
1. Intranet is also a network of computers designed for a specific group of users.
2. Intranet can be accessed from Internet but with restrictions.
3. The number of users is limited.
4. The traffic allowed is also limited.
5. Intranet contains only specific group information.
Therefore the Internet is an open, public space, while an intranet is designed to be a private
space. An intranet may be accessible from the Internet, but it is protected by a password and
accessible only to authorized users.
12.Explain handshaking protocol.
#Handshaking Defined
Handshaking is an automated process that sets parameters for communication between two
different devices before normal communication begins. Much like the way a human handshake
sets the stage for the communication to follow, the computing handshake provides both devices
with the basic rules for the way data is to be shared between them. These rules can include
transfer rate, coding alphabet, parity, interrupt procedure and more.
#When Handshaking Takes Place
In order to establish a connection between a computer and a device like a modem, printer, or
server, the handshake process begins the connection by telling both devices how to communicate
with each other. A classic example is the noises made when two dial-up modems connect to each
other. That squealing noise is actually the handshaking procedure. A handshake can also be used
between a computer and a printer before printing takes place to tell the printer how to receive and
output the data it receives from the computer.
#Why Handshaking Is Used
In addition to exchanging protocol information, handshaking is often used to verify the quality or
speed of the connection, as well as any authority that may be required to complete the connection
between devices. This latter purpose is a common part of establishing a connection between your
computer and a remote server.
#Examples of Handshaking Protocols
While practically every computing device that connects to another device uses handshaking, there
are a few examples you use every day. The cryptographic protocol Transport Layer Security and
its predecessor Secure Sockets Layer both use a handshaking procedure when making network
connections to verify authorization and protect data between two computers. USB connections
between computers and devices also use handshakes to verify data has been received
successfully, that it was not received, or that the device requires user intervention to continue.
Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal — through
the network at the electrical and mechanical level. It provides the hardware means of sending and
receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet,
RS232, and ATM are protocols with physical layer components.
Layer 1 Physical examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.
Data Link (Layer 2): At OSI Model, Layer 2, data packets are encoded and decoded
into bits. It furnishes transmission protocol knowledge and management and handles errors in the
physical layer, flow control and frame synchronization. The data link layer is divided into two sub
layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The
MAC sub layer controls how a computer on the network gains access to the data and permission
to transmit it. The LLC layer controls frame synchronization, flow control and error checking.
Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2,
HDLC, Frame Relay.
Network (Layer 3): Layer 3 provides switching and routing technologies, creating
logical paths, known as virtual circuits, for transmitting data from node to node. Routing and
forwarding are functions of this layer, as well as addressing, internetworking, error handling,
congestion control and packet sequencing.
Transport (Layer 4): OSI Model, Layer 4, provides transparent transfer of data
between end systems, or hosts, and is responsible for end-to-end error recovery and flow control.
It ensures complete data transfer.
Session (Layer 5): This layer establishes, manages and terminates connections between
applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. It deals with session and connection coordination.
Layer 5 Session examples include NFS, NetBios names, RPC, SQL.
.
Presentation (Layer 6): This layer provides independence from differences in data
representation (e.g., encryption) by translating from application to network format, and vice versa.
The presentation layer works to transform data into the form that the application layer can accept.
This layer formats and encrypts data to be sent across a network, providing freedom from
compatibility problems. It is sometimes called the syntax layer.
Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG,
MPEG, MIDI.
Application (Layer 7): OSI Model, Layer 7, supports application and end-user
processes. Communication partners are identified, quality of service is identified, user
authentication and privacy are considered, and any constraints on data syntax are identified.
Everything at this layer is application-specific. This layer provides application services for file
transfers, e-mail, and other network software services. Telnet and FTP are applications that exist
entirely in the application level. Tiered application architectures are part of this layer.
Layer 7 Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP
14. Explain TCP/IP Model.
TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network model used
in the current Internet architecture as well. Protocols are set of rules which govern every possible
communication over a network. These protocols describe the movement of data between the source
and destination or the internet. These protocols offer simple naming and addressing schemes.
The features that stood out during the research, which led to
making the TCP/IP reference model were:
The TCP/IP specifications described a lot of applications that were at the top of the protocol stack.
Some of them were TELNET, FTP, SMTP, DNS etc.
1. It operated independently.
2. It is scalable.
3. Client/server architecture.
4. Supports a number of routing protocols.
5. Can be used to establish a connection between two computers.
Demerits of TCP/IP
You can also use your Windows 7 laptop or desktop as a wireless hotspot without software and
without cmd. Unlike Windows 8 WiFi hotspot or Windows 10 WiFi hotspot, Microsoft enables
the graphical wizard to help create an ad hoc network in Windows 7. You can read more about it
in the post Top 3 Ways to Create Windows PC WiFi Hotspot.
Here is how to convert your Windows 7 PC into WiFi hotspot with the help of wizard to share
internet connection. If it does not work, try the method of Top 1.
Step 1. Go to the “Manage wireless network” window. You can click on the Start menu and type
“wireless” into the search box to locate it.
Step 4. Enter a name and password for your wireless hotspot and select “Save this network”.
Remember to activate the “Allow other network users to connect through this computer’s internet
connection” checkbox.
Updated: We’ve received some reports about saying the wireless hotspot has no internet
connection by using this method. This could happen when the wireless network adapter driver is
not working or when your computer has other conflicts. We do recommend you to try OSToto
Hotspot to build a safe and stable hotspot for Windows 7.
1. Short for Internet Protocol address, an IP or IP address is a number (example shown right)
used to indicate the location of a computer or other device on a network using TCP/IP. These
addresses are similar to those of your house, allowing data to reach the appropriate destination on
a network and the Internet.
45.79.151.23
2601:681:4200:c5c0:516:f0bb:ac3b:46bd
IP address classes
With an IPv4 IP address, there are five classes of available IP ranges: Class A, Class B, Class C,
Class D and Class E, while only A, B, and C are commonly used. Each class allows for a range of
valid IP addresses, shown in the following table.
Class Address Range Supports
Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to Supports 65,000 hosts on each of 16,000 networks.
191.255.255.254
Class C 192.0.1.1 to Supports 254 hosts on each of 2 million networks.
223.255.254.254
Class D 224.0.0.0 to Reserved for multicast groups.
239.255.255.255
Class E 240.0.0.0 to Reserved for future use, or Research and Development
254.255.255.254 Purposes.
Ranges 127.x.x.x are reserved for the loopback or localhost, for example, 127.0.0.1 is the loopback
address. Range 255.255.255.255 broadcasts to all hosts on the local network.
IP address breakdown
Every IP address is broken down into four sets of octets and translated into binary to represent the
actual IP address. The below table is an example of the IP 255.255.255.255. If you are new to
binary, we highly recommend reading our binary and hexadecimal conversions section to get a
better understanding of what we're doing in the below charts.
For an example, let's break down the IP "166.70.10.23" in the following table. The first row
contains the separate sections of the IP address, the second has binary values, and the third row
shows how the binary value equals the section of the IP address.
IP: 166 70 10 23
Binary value: 10100110 01000110 00001010 00010111
Numerical value: 128+32+4+2=166 64+4+2=70 8+2=10 16+4+2+1=23
If you have ever connected to your home network, you should be familiar with the gateway address
or 192.168.1.1, which is the address you use to connect to your home network router to change its
settings. Another common IP range that may be used is 10.0.0.3-254.
Getting an IP address
By default, the router you use will assign each of your computers their own IP address, often using
NAT to forward the data coming from those computers to outside networks such as the Internet.
If you need to register an IP address that can be seen on the Internet, you must register through
InterNIC or use a web host that can assign you addresses.
Anyone who connects to the Internet is assigned an IP address by their Internet Service Provider
(ISP), which has registered a range of IP addresses. For example, let's assume your ISP is given
100 addresses, 109.145.93.150-249. In this range, the ISP owns addresses 109.145.93.150 to
109.145.93.249 and can assign any address in that range to its customers. So, all these addresses
belong to your ISP until they are assigned to a customers computer. In the case of a dial-up
connection, you are given a new IP address each time you dial into your ISP. With most broadband
Internet service providers, you are always connected to the Internet your address rarely changes.
It remains the same until the service provider requires otherwise.
The above picture is taken from our "How do computers connect to each other over the Internet"
page and gives a good overview of how a computer can talk to another computer over the Internet
using an IP address.
There are two types of addressing in networking: Physical addressing and logical addressing.
Physical address is the MAC address (Media access control) which is fixed for a particular
computer. Logical address is the IP (Internet Protocol) address. In this CCNA tutorial, you will get
to know Internet Protocol version 4 (IPv4) and different network classes explained in a simple
way.
Well, here I am going to put the simplest explanation for subnet mask. Please refer the network
diagram below for better understanding. Let’s say you’ve got an IP address 200.1.1.2 with a subnet
mask 255.255.255.0, it means that 200.1.1 is the network portion and last octet is the host portion.
So any IP which starts with 200.1.1 goes to the same network (Network A), like 200.1.1.1,
200.1.1.10, 200.1.1.100 upto 200.1.1.254. And hence they don’t require a router to communicate
with each other.
In Network A the first IP 200.1.1.0 is used to indicate network address and last IP 200.1.1.255 is
used to send broadcast messages to all host computers in the network A.
Now another IP 200.1.2.2 which also has the same subnet mask cannot communicate with Network
A without using a router because there’s a change in the network part. It belongs to another network
with network address 200.1.2.0(Network B). Hope you got the point.
Another IP 10.1.1.2 with subnet mask 255.0.0.0 makes you understand that it belongs to the
network 10.0.0.0(Network C), where only the first octet indicates network.
So subnet mask let’s you understand the IP belongs to which network. By default the following
subnet masks are used.
Note: All host bits ‘0’ is a network address.
All host bits ‘1’is a broadcast address.
Now let us see network classes A B C D of internet protocol a little deeper.
Class A network subnet mask is 255.0.0.0, which means it has 8 network bits of which the first bit
is fixed as ‘0’. And hence a total of 7 network bits and 24 host bits.
Hence total no. of network will be
Here 2 is subtracted as 0.0.0.0 is the default network and 127.0.0.0 is the loopback ip address used
for checking proper functionality (self testing).
Class B Network
Now class B network range starts from 128.0.0.0 to 191.255.255.255. Default subnet mask is
255.255.0.0, which means it has 16 network bits of which first two bits are fixed as ‘10’. And
hence a total of 14 network bits and 16 host bits.
2 IP’s are subtracted, one each for network and broadcast address.
Let us take an example:
Network address -128.0.0.0
Subnet Mask -255.255.0.0
First host address -128.0.0.1
Last host address -128.0.255.254
Broadcast address -128.0.255.255
Class C Network
IP range starts from 192.0.0.0 to 223.255.255.255. Class C network subnet mask is 255.255.255.0
that means it has 24 network bits of which the first three bits are fixed as ‘110’. So a total of 21
network bits and 8 host bits.
Hence total no. of network will be
And the total number of hosts per network will be
Here also 2 IP’s are subtracted, one for network and other for broadcast address.
Subnetting is the strategy used to partition a single physical network into more than one smaller
logical sub-networks (subnets). An IP address includes a network segment and a host segment.
Subnets are designed by accepting bits from the IP address's host part and using these bits to assign
a number of smaller sub-networks inside the original network. Subnetting allows an organization
to add sub-networks without the need to acquire a new network number via the Internet service
provider (ISP). Subnetting helps to reduce the network traffic and conceals network complexity.
Subnetting is essential when a single network number has to be allocated over numerous segments
of a local area network (LAN).
Subnets were initially designed for solving the shortage of IP addresses over the Internet.
Each IP address consists of a subnet mask. All the class types, such as Class A, Class B and Class
C include the subnet mask known as the default subnet mask. The subnet mask is intended for
determining the type and number of IP addresses required for a given local network. The firewall
or router is called the default gateway. The default subnet mask is as follows:
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
The subnetting process allows the administrator to divide a single Class A, Class B, or Class C
network number into smaller portions. The subnets can be subnetted again into sub-subnets.
Dividing the network into a number of subnets provides the following benefits:
45.79.151.23
2601:681:4200:c5c0:516:f0bb:ac3b:46bd
20. Define Class of IP.
Network IP address is used to identify a host (PC or any network device) in a network. IP is a 32
bit binary number divided into 4 octet groups, each octet giving a maximum of 255 in decimal.
For easier addressing of these IP address octet, they are written as dotted decimals.
Must Read: [Complete Guide] Class A IP Address, Subnet Mask, and Subnetting
Note: How to find out a host IP address? You can go for the command prompt IP address check
by typing ipconfig as shown in the screenshot below
1. Network address
2. Broadcast address
To communicate over an internet, a device must have a public IP address which is provided by
IANA (Internet Assigned Numbers Authority). Private range of IP addresses are used in an intranet
(an internal network that uses internet technology). IANA also provides address for private
networks in each class as follows:
Before going in detail to IP classes we need to know about subnet masks and how to find subnet
mask for IP addresses.
As we know "wired" is the term refers to any physical medium consisting of cables. The cables
can be copper wire, twisted pair or fiber optic. Wired network is used to carry different forms of
electrical signals from one end to the other. Mostly in wired network one internet connection is
being taken using T1 line, cable modem or using any other means. This connection is shared among
multiple devices using wired network concept.
EXAMPLE #1: LAN (Local Area Network): This network consists of ethernet cards housed in
PCs or laptops. These cards are connected using ethernet cables. The data flows between these
cards. For small wired network router is used to connect few number of desktop or laptop
computers. In order to increase the network coverage for more number of systems multiple
switches and routers are used.
Wireless Network
As we know "Wireless" is the term refers to medium made of electromagnetic waves (i.e. EM
Waves) or infrared waves. All the wireless devices will have antenna or sensors. Typical wireless
devices include cellular mobile, wireless sensors, TV remote, satellite disc receiver, laptops with
WLAN card etc. Wireless network does not use wires for data or voice communication; it uses
radio frequency waves as mentioned above. The other examples are fiber optic communication
link and broadband ADSL etc.
EXAMPLES:
1. Outdoor cellular technologies such as GSM, CDMA, WiMAX, LTE, Satellite etc.
2. Indoor wireless technologies such as Wireless LAN(or WiFi), Bluetooth, IrDA, Zigbee, Zwave
etc.
Following table mentions comparison between wired network and wireless network types.
CDMA
GSM
Stands for Code Division Multiple Access Global System for Mobile communication
Dominance Dominant standard in the U.S. Dominant standard worldwide except the
U.S.
Network There is one physical channel and a Every cell has a corresponding network
special code for every device in the tower, which serves the mobile phones in
coverage network. Using this code, that cellular area.
the signal of the device is
multiplexed, and the same physical
channel is used to send the signal.
Network service Handset specific SIM specific. User has option to select
handset of his choice.
27: WHY WIRES ARE TWISTED AROUND EACH OTHER IN TWISTED PAIR CABLE?
ANS: Twisted pair cabling is a type of wiring in which two conductors of a single circuit
are twisted together for the purposes of canceling out electromagnetic interference (EMI) from
external sources; for instance, electromagnetic radiation from unshielded twisted
pair (UTP) cables, and crosstalk between neighboring pairs.
28:EXPLAIN REPEATERS?
ANS: A repeater is a network device that is used to regenerate or replicate signals that are
weakened or distorted by transmission over long distances and through areas with high levels of
electromagnetic interference (EMI).
So to come back to your question, why not just use a two-way handshake? The short answer is because a
two way handshake would only allow one party to establish an ISN, and the other party to acknowledge
it. Which means only one party can send data.
But TCP is a bi-directional communication protocol, which means either end ought to be able to send data
reliably. Both parties need to establish an ISN, and both parties need to acknowledge the other's ISN.
Ans. Network security is the security provided to a network from unauthorized access and risks.
It is the duty of network administrators to adopt preventive measures to protect their networks
from potential security threats.
Computer networks that are involved in regular transactions and communication within the
government, individuals, or business require security. The most common and simple way of
protecting a network resource is by assigning it a unique name and a corresponding password.
Comparison chart
Factors AM FM
Modulating In AM, a radio wave known as the In FM, a radio wave known as the
differences "carrier" or "carrier wave" is "carrier" or "carrier wave" is
modulated in amplitude by the modulated in frequency by the signal
signal that is to be transmitted. The that is to be transmitted. The
frequency and phase remain the amplitude and phase remain the same.
same.
Pros and cons AM has poorer sound quality FM is less prone to interference than
compared with FM, but is cheaper AM. However, FM signals are
and can be transmitted over long impacted by physical barriers. FM
distances. It has a lower bandwidth has better sound quality due to higher
so it can have more stations bandwidth.
available in any frequency range.
Frequency AM radio ranges from 535 to 1705 FM radio ranges in a higher spectrum
Range KHz (OR) Up to 1200 bits per from 88 to 108 MHz. (OR) 1200 to
second. 2400 bits per second.
Bandwidth Twice the highest modulating Twice the sum of the modulating
Requirements frequency. In AM radio signal frequency and the frequency
broadcasting, the modulating deviation. If the frequency deviation
signal has bandwidth of 15kHz, is 75kHz and the modulating signal
and hence the bandwidth of an
AM versus FM comparison chart
Factors AM FM
Complexity Transmitter and receiver are Tranmitter and reciver are more
simple but syncronization is complex as variation of modulating
needed in case of SSBSC AM signal has to beconverted and
carrier. detected from corresponding
variation in frequencies.(i.e. voltage
to frequency and frequency to voltage
conversion has to be done).
34.What is WiMax?
Ans.
WiMAX (Worldwide Interoperability for Microwave Access) is a wireless industry coalition
dedicated to the advancement of IEEE 802.16 standards for broadband wireless access (BWA)
networks.
WiMAX supports mobile, nomadic and fixed wireless applications. A mobile user, in this context,
is someone in transit, such as a commuter on a train. A nomadic user is one that connects on a
portable device but does so only while stationary. For example, connecting to an office network
from a hotel room and then again from a coffee shop.
35. Difference between QSK,PSK,FSK. Which one is better?
Ans.
Modulation of digital signals is known as Shift Keying. There are 3 types: ASK, FSK and PSK.
Amplitude Shift Keying (ASK): According to difference signals, it adjusts the amplitude of
sine-wave.
Pros: simple
Cons: susceptible to noise
Example: Many legacy wireless systems, e.g. AMR
Frequency Shift Keying (FSK): It uses digital signal to adjust the frequency of wave carrier.
Pros: less susceptible to noise
Cons: theoretically requires larger bandwidth/bit than ASK
Popular in modern systems
Phase Shift Keying (PSK): Different phase angles in the carrier signal are used to represent the
binary states of 0 and 1
Pros:
– Less susceptible to noise
– Bandwidth efficient
Cons:
– Requires synchronization in frequency and phase and complicates
receivers and transmitter
Example: IEEE 802.15.4 / ZigBee
In the alarm system, FSK is much better than ASK because of the following advantages:
Comparison chart
Hardware Bluetooth adaptor on all the Wireless adaptors on all the devices
requirement devices connecting with each of the network, a wireless
other router and/or wireless access points
Ease of Use Fairly simple to use. Can be used It is more complex and requires
to connect up to seven devices at configuration of hardware and
a time. It is easy to switch software.
between devices or find and
connect to any device.
LTE :
LTE (Long Term Evolution) is the project name given to development of a high performance air
interface for cellular mobile communication systems. It is the last step toward the 4th generation
(4G) of radio technologies designed to increase the capacity and speed of mobile telephone
networks. While the former generation of mobile telecommunication networks are collectively
known as 2G or 3G, LTE is marketed as 4G.
LTE has introduced a number of new technologies when compared to previous cellular systems.
They enable LTE to operate more efficiently with respect to the use of spectrum, and also provide
the much higher data rates that are now required.
MS Protocols
Based on the interface, the GSM signaling protocol is assembled into three general layers:
Layer 1 : The physical layer. It uses the channel structures over the air interface.
Layer 2 : The data-link layer. Across the Um interface, the data-link layer is a modified
version of the Link access protocol for the D channel (LAP-D) protocol used in ISDN,
called Link access protocol on the Dm channel (LAP-Dm). Across the A interface, the
Message Transfer Part (MTP), Layer 2 of SS7 is used.
Layer 3 : GSM signalling protocol’s third layer is divided into three sublayers:
The CM layer is the topmost layer of the GSM protocol stack. This layer is responsible for Call
Control, Supplementary Service Management, and Short Message Service Management. Each of
these services are treated as individual layer within the CM layer. Other functions of the CC
sublayer include call establishment, selection of the type of service (including alternating between
services during a call), and call release.
BSC Protocols
The BSC uses a different set of protocols after receiving the data from the BTS. The Abis interface
is used between the BTS and BSC. At this level, the radio resources at the lower portion of Layer
3 are changed from the RR to the Base Transceiver Station Management (BTSM). The BTS
management layer is a relay function at the BTS to the BSC.
The RR protocols are responsible for the allocation and reallocation of traffic channels between
the MS and the BTS. These services include controlling the initial access to the system, paging
for MT calls, the handover of calls between cell sites, power control, and call termination. The
BSC still has some radio resource management in place for the frequency coordination, frequency
allocation, and the management of the overall network layer for the Layer 2 interfaces.
To transit from the BSC to the MSC, the BSS mobile application part or the direct application
part is used, and SS7 protocols is applied by the relay, so that the MTP 1-3 can be used as the
prime architecture.
MSC Protocols
At the MSC, starting from the BSC, the information is mapped across the A interface to the MTP
Layers 1 through 3. Here, Base Station System Management Application Part (BSS MAP) is said
to be the equivalent set of radio resources. The relay process is finished by the layers that are
stacked on top of Layer 3 protocols, they are BSS MAP/DTAP, MM, and CM. This completes
the relay process. To find and connect to the users across the network, MSCs interact using the
control-signalling network. Location registers are included in the MSC databases to assist in the
role of determining how and whether connections are to be made to roaming users.
Each GSM MS user is given a HLR that in turn comprises of the user’s location and subscribed
services. VLR is a separate register that is used to track the location of a user. When the users
move out of the HLR covered area, the VLR is notified by the MS to find the location of the user.
The VLR in turn, with the help of the control network, signals the HLR of the MS’s new location.
With the help of location information contained in the user’s HLR, the MT calls can be routed to
the user.
(1)AUTHENTICATION:-This procedure uses A3, A8 & 32 digit RAND, which are created in
authentication centre & MS SIM card, which is used for security purpose.
(a)VLR after receiving process access, request message, VLR initiates authentication and
sends it to MSC .this message contains 32 digits RAN B.
(b) Once MSC receives authentication MSG, it sends authentication request message to MS
through different interface + 32 digit RAND.
(c) MS authentication procedure uses A3 & A8 algorithm, in sim cards A3, A8, & 32digit
RAND and same can be found in authentication centre, then authentication went ok.
(2) CIPHERING: - It uses A5 algorithm & used for security.
(a) Ciphering means nobody can decode the information b/w calling and called party, other
than the called party, which has ciphering key sequence.
(b) After authentication, VLR initiates ciphering and sends it to MSC, after this, MSC sends
ciphering mode command MSg to BSC, in order to start process b/w MS and BTS.
(c) Once BSC receives ciphering mode command Msg. it sends CMC msg along with
encryption command to BTS.
(d) After this BTS informed to MS about beginning ciphering & start the recovering in
ciphering mode & MS once receives the CMC message, the MS enters the ciphering mode & sends
ciphering mode ACK MSG to VLR through different interface.
Ciphering process b/w MS and BTS uses SDCCH.
(3) TMSI REALLOCATION:-
(a) After completion of ciphering the VLR accepts the process access request MSG. and
initiates TMSI reallocation process and sends it to MSC, then MSC sends it to MS.
(b) The purpose of this process is to providing the user identity confidently. This procedure
is performed at least at each change of location area.
TMSI reallocation command message contains new combination of TMSI & LA, allocated
by network, usually, TMSI reallocation command message is sent to MS by using RR connection
in ciphering mode.
(c) When MS receives the TMSI reallocation command MSG, it stores the LAI in SIM, if
received, identify IMSI of MS it delete the previous stores TMSI. In both cases VLR is updated.
This procedure b/w BTS and MS uses SDCCH.
(4) CALL SET UP PART:-
(a) After authentication, identification & ciphering the MS is in SDCCH & ready to start real call
set up signalling. The MS sends RIL-3RR set up message i.e. Sent to VLR. This MSG. contains
called party no. and description of required services and some supplementary services.
(b) MSC receives the above message, analyse the request and checks whether it can accepts it
depending upon its capacity to provide the service. If everything is OK, then on one hand MSC
starts establish through network and on other hand send RIL-3RR call proceeding msg. once MS
receives this msg it enters mobile originated call proceeding (noc). In call set up and call
proceeding msg b/w MS & BTS uses SDCCH.
(c) After above completion, MSC sends assignment request msg to BSC in order to start TCH
allocation.
(d) once BSC receives assignment request msg ,it sends physical context msg to BTS ,by using
msg BSC interfaces actual timing advances from BTS in order to start the TCH allocation.
(e) after this BSC sends channel activation msg to BTS in order to activate TCH ,this msg
contains information like channel no., activation type, channel mode, channel type, channel
identity, encryption information, power level of MS & BTS & finally TA.
(f) BTS sends back channel activation ACK this msg. Contains current TDMA frame no.
(g) BSC receives ACK & sends assignment commond message to ms through BTS using
SDCCH. At this stage, TCH is allocated available to MS.
(h)after receiving assignment commond msg the MS sends SABH(set asynchronous balance
mode) msg to BTS using FACH .this is 1-2 msg & contains L3 information. the contains of the
msg are service request ,ciphering key set,ms ,identity.
(i) Once BTS receives SABH, it sends estb. Indication msg. to BSC this msg has two uses.
(a) Description of ch, MS is on FACCH.
(b) BTS identifies main signaling link & add received information in L3.
(j) BTS after sending ESTB indication msg. to BSC it sends UA (unnumbered ack) msg to MS .
UA is L2 ACK msg used for L-2 link in LAPD protocol.
5. TCH SEIZED PART:-
(a) MS after receiving UA message sends assignment complete msg to MSC, the MS informs
to the n/w, it is now on TCH & everything is ok.BSC ack CH seizure to MSC.
(b) BSC sends channel release to msg. to BTS as MS is on TCH & there is no need for
signalling so SDCCH is released and ACK is send back.
(c) On other side MSC will receive information from external n/w report of the requested call
established, as seen by switch in-charge that the called party has been alerted of incoming call.
(d) Once called party lifts the phone, MSC sends connect msg to MS using FACCH at air
interface. After receiving msg MS enters to speech path.
(e) After that MS sends ACK to MSC in FACCH, MS tells n/w that TCH is activated & it’s on
speech path.
6. CONVERSATION PART:- During conversation ,MS will send measurement reports to BTS
using SACCH 1/SEC or 2/sec at rate of 13 bps or 26 bps. The report contain information like, RX
level ,quality, TA, power control, present BCCH, serving cell, information about neighbour. MS
will have time to decode neighbouring cells when.
1. after receiving and before transmission.
2. before receiving and after transmission.
3. BTS sends these measurement reports to BSC.
7. RELEASE BY MS: -
(a) after conversation part is over, MS sends disconnect msg to MSC using FACCH, this msg
will clear the end to end connection.
(b) when MSC determines that has call no more reason to exist , it sends release msg to MS
,which answers back with an ACK to MSC only then lower connections released & mobile
returned to idle state.
(c) Finally release the RF channels.
8. STOP: - this ends call processing.
40. Difference between FDM and TDM?
Ans.
Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal — through
the network at the electrical and mechanical level. It provides the hardware means of sending and
receiving data on a carrier, including defining cables, cards and physical aspects. Fast
Ethernet, RS232, and ATM are protocols with physical layer components.
Layer 1 Physical examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.
Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical paths, known as virtual
circuits, for transmitting data from node to node. Routing and forwarding are functions of this
layer, as well as addressing, internetworking, error handling, congestion control and packet
sequencing.
Layer 3 Network examples include AppleTalk DDP, IP, IPX.
Transport (Layer 4)
OSI Model, Layer 4, provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Layer 4 Transport examples include SPX, TCP, UDP.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session
layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the
applications at each end. It deals with session and connection coordination.
Layer 5 Session examples include NFS, NetBios names, RPC, SQL.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by
translating from application to network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept. This layer formats and encrypts
data to be sent across a network, providing freedom from compatibility problems. It is sometimes
called the syntax layer.
Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT,
JPEG, MPEG, MIDI.
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Communication partners are
identified, quality of service is identified, user authentication and privacy are considered, and any
constraints on data syntax are identified. Everything at this layer is application-specific. This layer
provides application services for file transfers, e-mail, and
other network software services. Telnet and FTP are applications that exist entirely in the
application level. Tiered application architectures are part of this layer.
Layer 7 Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP
43.What is router and modem? What is the difference between the two?
Ans. Routers and modems are two of the most common computer peripherals, yet many people
don't know the function of each one. While the two devices may look similar, they each serve a
difference purpose. Fortunately, the functions of the two devices are pretty easy to understand.
Router: A router is a small box that allows multiple computers to join the same network (see
below).
While early routers provided several Ethernet ports for wired connections, most modern routers
offer wireless connectivity as well. These "wireless routers" often have one or two moveable
antennas on the sides, though some models house the antennas inside the enclosure. Wireless
routers allow multiple computers and other devices, such as smartphones and tablets, to join the
same network.
While connecting to a router provides access to a local network (LAN), it does not necessarily
provide access to the Internet. In order for devices on the network to connect to the Internet, the
router must be connected to a modem. Therefore, most routers have a specific Ethernet port that is
designed to connect to the Ethernet port of a cable or DSL modem.
Modem: A modem is a device that provides access to the Internet (see below).
The modem connects to your ISP, which typically provides either cable or DSL Internet service.
Cable modems have a coaxial (or "coax") connection, which is the same type of connector found
on a TV or cable box. This connects to a cable port on the wall. DSL modems have a telephone
connector, also called an RJ-11 jack, which connects to a telephone socket on the wall.
By connecting your modem to your router (instead of directly to a computer), all devices connected
to the router can access the modem, and therefore, the Internet. The router provides a local IP
address to each connected device, but they will all have the same external IP address, which is
assigned by your ISP.
Independent? Yes. A modem can work without Routers can share information
a router, delivering information between computers, but cannot
(such as Internet access) to a single connect to the internet without a
PC. modem.
For example, in consumer electronics, a remote control can be used to operate devices
such as a television set, DVD player, or other home appliance, from a short distance.
A remote control is primarily a convenience feature for the user, and can allow operation of devices
that are out of convenient reach for direct operation of controls. In some cases, remote controls
allow a person to operate a device that they otherwise would not be able to reach, as when a garage
door opener is triggered from outside or when a Digital Light Processing projector that is mounted
on a high ceiling is controlled by a person from the floor level.
Partial Mesh Topology : In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
Full Mesh Topology : Each and every nodes or devices are connected to each other.
Features of Mesh Topology
Fully connected.
Robust.
Not flexible.
Advantages of Mesh Topology
Each connection can carry its own data load.
It is robust.
Fault is diagnosed easily.
Provides security and privacy.
Disadvantages of Mesh Topology
Installation and configuration is difficult.
Cabling cost is more.
Bulk wiring is required.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
Features of Tree Topology
Ideal if workstations are located in groups.
Used in Wide Area Network.
Advantages of Tree Topology
Extension of bus and star topologies.
Expansion of nodes is possible and easy.
Easily managed and maintained.
Error detection is easily done.
Disadvantages of Tree Topology
Heavily cabled.
Costly.
If more nodes are added maintenance is difficult.
Central hub fails, network fails.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For example
if in an office in one department ring topology is used and in another star topology is used,
connecting these topologies will result in Hybrid Topology (ring topology and star topology).
Features of Hybrid Topology
It is a combination of two or topologies
Inherits the advantages and disadvantages of the topologies included
Advantages of Hybrid Topology
Reliable as Error detecting and trouble shooting is easy.
Effective.
Scalable as size can be increased easily.
Flexible.
Disadvantages of Hybrid Topology
Complex in design.
Costly.
49. TCP IP and OSI model questions.Explain and differentiate with application point of
view
TCP/IP(Transmission Control Protocol / Internet
OSI(Open System Interconnection)
Protocol)
1. OSI is a generic, protocol independent 1. TCP/IP model is based on standard protocols
standard, acting as a communication around which the Internet has developed. It is a
gateway between the network and end communication protocol, which allows connection of
user. hosts over a network.
2. In TCP/IP model the transport layer does not
2. In OSI model the transport layer
guarantees delivery of packets. Still the TCP/IP
guarantees the delivery of packets.
model is more reliable.
3. Follows vertical approach. 3. Follows horizontal approach.
4. OSI model has a separate Presentation 4. TCP/IP does not have a separate Presentation
layer and Session layer. layer or Session layer.
5. OSI is a reference model around which
5. TCP/IP model is, in a way implementation of the
the networks are built. Generally it is
OSI model.
used as a guidance tool.
6. Network layer of OSI model provides
6. The Network layer in TCP/IP model provides
both connection oriented and
connectionless service.
connectionless service.
7. OSI model has a problem of fitting the
7. TCP/IP model does not fit any protocol
protocols into the model.
8. Protocols are hidden in OSI model and
are easily replaced as the technology 8. In TCP/IP replacing protocol is not easy.
changes.
9. OSI model defines services, interfaces
and protocols very clearly and makes 9. In TCP/IP, services, interfaces and protocols are
clear distinction between them. It is not clearly separated. It is also protocol dependent.
protocol independent.
10. It has 7 layers 10. It has 4 layers
VOIP (Voice over Internet Protocol) is the technology for voice conversations with Internet
network or any IP . This means that, it sends the voice signal into digital form in packets rather
than send it in digital form or analog circuits using a mobile phone company or conventional
PSTN (acronym for Public Switched Telephone Network).
The protocols used to send voice signals over the IP network protocol is known as Voice over IP
or IP protocols. These can be seen as commercial applications of the “experimental Network
Voice Protocol (1973) invented for the ARPANET.
Voice over IP can drive through any IP network, including those connected to the Internet, such
as local area networks ( LANs ).
It is very important to differentiate between Voice over IP (VOIP) and telephony over IP.
VOIP is a set of standards, devices, protocols, ultimately the technology which enables voice
over IP protocol.
Telephony over IP phone service is available to the public, so numbered I.164 , made with VOIP
technology.
51. How FTP used and working?
When you want to copy files between two computers that are on the same local network, often
you can simply "share" a drive or folder, and copy the files the same way you would copy files
from one place to another on your own PC.
What if you want to copy files from one computer to another that is halfway around the
world? You would probably use your Internet connection. However, for security reasons, it is
very uncommon to share folders over the Internet. File transfers over the Internet use special
techniques, of which one of the oldest and most widely-used is FTP. FTP, short for "File
Transfer Protocol," can transfer files between any computers that have an Internet connection,
and also works between computers using totally different operating systems.
Transferring files from a client computer to a server computer is called "uploading" and
transferring from a server to a client is "downloading".
Requirements for using FTP
To transfer files, provide your client software (Auto FTP Manager) with the server address, user
name, and password. After connecting to the FTP server, you can use Auto FTP Manager's File
Manager to upload, download and delete files. Using the File Manager is a lot like working
with Windows Explorer.
Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional
interactive text-oriented communications facility using a virtual terminal connection.
Configuring network devices: What you see above is a screenshot from my own ADSL
router; this is a thoroughly modern router with a Web interface and all, but it also accepts
incoming Telnet connections from the local LAN. That means if I ever want to configure
it via Telnet, I can.
Participating in online communities: Telnet’s text-based nature, and the fact that a
Telnet session often looks like something from the early Seventies, actually make it ideal
for online communities.
Trivial File Transfer Protocol, is a simple high-level protocol for transferring data servers use to
boot diskless workstations, X-terminals, and routers by using User Data Protocol (UDP).
Although it may sound similar, TFTP works differently than FTP (File Transfer Protocol) and
HTTP (HyperText Transfer Protocol). Although TFTP is also based in FTP technology, TFTP is
an entirely different protocol. Among the differences is that TFTP’s transport protocol uses UDP
which is not secure while FTP uses Transmission Control Protocol (TCP) to secure
information.
TFTP was primarily designed to read or write files by using a remote server. However, TFTP is a
multi-purpose protocol that can be leveraged for an array of different tasks.
Transferring files
Remote-booting without hard drives
Upgrading codes
Backing up network configurations
Backing up router configuration files
Saving IOS images
Booting PCs without a disk
64. What are the possible causes if Internet is not working on your device?
1. Issue with router, May be router is not working properly.
2. Issue with ISP.
3. May be the ISP server is down
4. Issue with wi fi port.
APIs act as a doorway that people with the right key can get through. Want to give
specific people—but not everyone—access to your assets? An API acts like a doorway to
your server and database that those with an API key (or a paid subscription) can use to
access whatever assets you choose to reveal. A key could give a user read access, write
access, or both—it’s up to you
APIs let applications (and devices) seamlessly connect and communicate. An API can
create a seamless flow of data between apps and devices in real time. This not only lets
developers create apps for any format—a mobile app, a wearable, or a website—it allows
apps to “talk to” one another. This is the heart of how APIs create rich user experiences
in apps.
APIs let you build one app off another app. Entire businesses and popular web
applications like Hootsuite, Zapier, and IFTT (If This Then That) have been built solely
on creative ways to leverage APIs. APIs allow you to write applications that use other
applications as part of their core functionality. Not only can developers get access to
reusable code and technology, they can leverage other technology for their own apps.
APIs act like a “universal plug.” What if all of those people with keys to your door
speak different languages? With an API, it doesn’t matter—everyone, no matter what
machine, operating system, or mobile device they’re using—gets the same access. Think
about those universal outlet plugs that let you use an appliance in any country’s socket.
An API is a lot like that; it standardizes access.
APIs act as a filter. Security is a big concern with APIs—after all, you’re giving
outsiders access to your servers and all they contain—which is why they have to be
carefully constructed. APIs should give controlled access to assets, with permissions and
other measures that keep too much traffic—or malicious traffic—from bringing down
your server. This is a very important API design consideration for industries that are
heavily regulated, like healthcare and finance.
The most basic definition of any security system is found in its name. It is literally a means or
method by which something is secured through a system of interworking components and
devices.
In this instance, we're talking about home security systems, which are networks of integrated
electronic devices working together with a central control panel to protect against burglars and
other potential home intruders.
The sensors are typically placed in doors that lead to and from a house as well as easily
accessible windows, particularly any that open, especially those at ground level. Open spaces
inside of homes can be secured with motion sensors.
Control Panel: The control panel is the computer that arms and disarms the security systems,
communicates with each installed component, sounds the alarm when a security zone is
breached, and communicates with an alarm monitoring company.
They typically feature a touchpad for easy programming and interaction, is where pass codes are
entered to arm and disarm the system, can work on voice commands, and can be programmed to
work with wireless remote controls called key fobs.
Door and Window Sensors: Door and window sensors are comprised of two parts installed
adjacent to each other. One part of the device is installed on the door or window and the other on
the door frame or window sill. When a door or window is closed, the two parts of the sensor are
joined together, creating a security circuit.
When the security system is armed at the control panel, these sensors communicate with it by
reporting that the point of entry is secure. Should a monitored door or window suddenly be
opened, the security circuit is broken and the control panel interprets this as a breach of a secured
zone. A high-decibel alarm is sounded and in most instances the alarm monitoring company is
automatically notified.
Motion Sensors: These security components, when armed, protect a given space by creating an
invisible zone that cannot be breached without sounding an alarm. These are typically used to
protect rooms containing valuables, as well as areas less frequented in larger homes.
Surveillance cameras can be accessed remotely on computers, smartphones, and tablets. They are
often used in this method when homeowners are out of town, to watch for deliveries and other
service personnel like caregivers and landscapers, and to monitor the arrival of children after
school. They can also be used to record any security breaches, which could result in having
footage of a home invasion, including a good look at the burglars and perhaps even the vehicle
they drove.
High-decibel Alarm: Loud enough for neighbors to hear, home security alarms serve a few
different purposes. First, they alert the people inside the house that a problem occurred. They're
also shrill enough to send a burglar running while also notifying nearby neighbors to the
situation.
Yard Sign and Window Stickers: On the surface, these items might seem like nothing more
than marketing tools for alarm companies, but they play important roles in home security. When
you place a security company's sticker in a front window and plant their sign in your front yard,
you are telling burglars you home is professionally protected and not a wise choice for an
attempted burglary. They are effective at conveying this message and should be used as
recommended by the security company.
Server security is the protection of information assets that can be accessed from a server.
Server security is important for any organization that has a physical or virtual Web server
connected to the Internet. It requires a layered defense and is especially important for
organizations with customer-facing websites.
We describe user-level security first because its simpler. In user-level security, the client sends a
session setup request directly following protocol negotiation. This request provides a username
and password. The server can either accept or reject that username/password combination. At
this stage the server has no idea what share the client will eventually try to connect to, so it can't
base the accept/reject on anything other than:
1. the username/password.
2. the name of the client machine.
If the server accepts the username/password credentials, the client expects to be able to mount
shares (using a tree connection) without further specifying a password. It expects that all access
rights will be as the username/password credentials set that was specified in the initial session
setup.
It is also possible for a client to send multiple session setup requests. When the server responds,
it gives the client a uid to use as an authentication tag for that username/password. The client can
maintain multiple authentication contexts in this way (WinDD is an example of an application
that does this).
Windows networking user account names are case-insensitive, meaning that upper-case and
lower-case characters in the account name are considered equivalent. They are said to be case-
preserving, but not case significant. Windows and LanManager systems previous to Windows
NT version 3.10 have case-insensitive passwords that were not necessarily case-preserving. All
Windows NT family systems treat passwords as case-preserving and case-sensitive.
Example Configuration
security = user
Share-Level Security
In share-level security, the client authenticates itself separately for each share. It sends a
password along with each tree connection request (share mount), but it does not explicitly send a
username with this operation. The client expects a password to be associated with each share,
independent of the user. This means that Samba has to work out what username the client
probably wants to use, because the username is not explicitly sent to the SMB server. Some
commercial SMB servers such as NT actually associate passwords directly with shares in share-
level security, but Samba always uses the UNIX authentication scheme where it is a
username/password pair that is authenticated, not a share/password pair.
Many clients send a session setup request even if the server is in share-level security. They
normally send a valid username but no password. Samba records this username in a list of
possible usernames. When the client then issues a tree connection request, it also adds to this list
the name of the share they try to connect to (useful for home directories) and any users listed in
the user parameter in the smb.conf file. The password is then checked in turn against these
possible usernames. If a match is found, then the client is authenticated as that user.
Where the list of possible user names is not provided, Samba makes a UNIX system call to find
the user account that has a password that matches the one provided from the standard account
database. On a system that has no name service switch (NSS) facility, such lookups will be from
the /etc/passwd database. On NSS enabled systems, the lookup will go to the libraries that have
been specified in the nsswitch.conf file. The entries in that file in which the libraries are specified
are:
In the example shown here (not likely to be used in practice) the lookup will check /etc/passwd
and /etc/group, if not found it will check NIS, then LDAP.
Example Configuration
security = share