Professional Documents
Culture Documents
NPNS Answer Key 2.1
NPNS Answer Key 2.1
Best of Luck!!!
Exam Question
Explain the procedure for mapping multicast address to Ethernet address: http://www.tcpipguide.com/free/t_TCPIPAd dressResolutionForIPMulticastAddresses.htm
IP multicast addresses are resolved to IEEE 802 (Ethernet) MAC addresses using a direct mapping technique that uses 23 of the 28 bits in the IP multicast group address.
Linux IP firewall utility called iptables. An iptables firewall consists of several tables, each with a default policy and builtin chains of rules. Further rule chains can optionally be created in each table. Different tables and chains are traversed according to the source and destination of the packet. IPTables is a statefulfirewall. The iptables command is used to configure both IP filtering and Network Address Translation.
What is DHCP? The Internet is a vast source of information that is continuously updated and accessed via computers and other devices. For a device (also referred to as a host) to connect to the Internet, it is necessary that among other configurations, it must have an Internet Protocol (IP) address. The IP address is the computer's address on the Internet. A common comparison of an IP address is an individual's telephone number, which is an identifier for people to communicate with the individual. Up until the late 1980s, configuring a computer to connect to the Internet was a manual process. The protocol Bootstrap Protocol (BOOTP) was the first Transmission Control Protocol/Internet Protocol (TCP/IP) network configuration tool used to prevent the task of having to manually assign IP addresses by automating the process. While the introduction of the BOOTP network protocol was a welcome innovation for network administrators tasked with managing large numbers of computers on a network, it was the first attempt and a new and improved TCP/IP network protocol soon followed. This protocol is called Dynamic Host Configuration Protocol (DHCP). DHCP was not designed as a replacement for BOOTP, but an extension of its functionality.
How DHCP Works As its name indicates, DHCP provides dynamic IP address assignment. What this means is that instead of having to rely on a specific IP address, a computer will be assigned one that is available from a subnet or "pool" that is assigned to the network. DHCP also extends BOOTP functionality to provide IP addresses that expire. BOOTP indirectly uses a form of leasing that never expired, but the term wasn't actually used until the introduction of DHCP. When DHCP assigns an IP address, it actually leases the identifier to the host computer for a specific amount of time. The default lease is five days, but a network administrator should evaluate their own particular circumstances to determine an appropriate lease.
Extension Headers In IPv6, extension headers are used to encode optional Internetlayer information. Extension headers are placed between the IPv6 header and the upper layer header in a packet. Extension headers are chained together using the next header field in the IPv6 header. The next header field indicates to the router which extension header to expect next. If there are no more extension headers, the next header field indicates the upper layer header (TCP header, User Datagram Protocol [UDP] header, ICMPv6 header, an encapsulated IP packet, or other items). http://www.juniper.net/techpubs/en_US/junos9.6/informationproducts/topic-collections/config-guide-routing/id-10122335.html
register_netdev(snull_devs); unregister_netdev(dev);
Architecture
Network stack sk_buff net_device
sk_buff
The struct sk_buff is the structure representing a network packet Designed to easily support encapsulation/decapsulation of data through the protocol layers In addition to the data itself, an sk_buff maintains
These fields are updated when the packet goes through the protocol layers
struct net_device
This structure represents a single network interface Allocation takes place with alloc_etherdev()
The size of private data must be passed as argument. The pointer to these private data can be read in net_device>priv alloc_etherdev() is a specialization of alloc_netdev() for Ethernet interfaces
Windows Sockets server applications generally create a socket, and then use the listen() function on it to listen for connection requests. One of the parameters passed when calling listen() is the backlog of connection requests that the application would like Windows Sockets to queue for it. This value controls the number of unaccepted connections that can be queued. Once an application accepts a connection, it is moved out of the connection request backlog and no longer counts. The Windows Sockets 1.1 specification indicates that the maximum allowable value for a backlog is 5; however, Windows NT 3.51 accepts a backlog of up to 100, Windows NT 4.0 and Windows 2000 Server accept a backlog of 200, and Windows NT 4.0 Workstation and Windows 2000 Professional accept a backlog of 5 (which reduces memory demands).
Declaration
The system include file WinSock2.inc contains the following declaration for the listen function: function listen(s : SOCKET; backlog : integer) : integer; external dll='ws2_32.dll';
The Second Argument The second argument passed to the listen function is the maximum length of the queue of pending connections. If you pass a value, for this argument, that is too large then the underlying service provider will choose an appropriate value. If you are not sure what value you should use for this argument then use SOMAXCONN, which will cause the underlying service provider to choose an appropriate value. NOTE: The constantSOMAXCONN is declared in the system include file WinSock2.inc.
Prefixes can be used to map v4 to v6 space and visa-versa Lots of flexibility with 128 bits!
~1500 address/sqft of the earths surface
CS 640
32
Misc