261⟩ Explain wide-mouth frog
Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.
“MCSE Interview Questions and Answers will guide you that Microsoft Certified Systems Engineer (MCSE) refers to the broad certification program for Microsoft, although it can also refer to an individual candidate who had completed any one exam within the program (subject to some exclusions). This MCSE Interview Questions and Answers will help you to get preparation of MCSE job or MCSE Certification. This MCSE Interview Questions and Answers guide is based on research and latest techniques.”
Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.
This problem can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.
When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.
Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.
One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.
Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.
Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.
Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.
One of two sub layers of the data link layer (of OSI reference model), as defined by the IEEE 802 standard. This sub layer is responsible for maintaining the link between computers when they are sending data across the physical network connection.
Routable protocols can work with a router. It can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router
In token Ring, hub is called Multistate Access Unit (MAU).
In an Ethernet network, between any two points on the network, there can be no more than five network segments or four repeaters and of those five segments, only three of segments can be populated.
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer, and another for control information.
Class A 0.0.0.0 - 127.255.255.255Class B 128.0.0.0 - 191.255.255.255Class C 192.0.0.0 - 223.255.255.255Class D 224.0.0.0 - 239.255.255.255Class E 240.0.0.0 - 247.255.255.255
The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.
The address resolution protocol (ARP) is used to associate the 32-bit IP address with the 48-bit physical address, used by a host or a router to find the physical address of another host on its network by sending an ARP query packet that includes the IP address of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.
The data unit created at the application layer is called a message; at the transport layer, the data unit created is called either a segment or a user datagram. At the network layer, the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media.
It is a project started by IEEE to set standards. It enables intercommunication between equipment from a variety of manufacturers. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LAN protocols.It consists of the following:
802.1 is an internetworking standard for compatibility of different LANs and MANs across protocols. 802.2 Logical link control (LLC) is the upper sub layer of the data link layer, which is non-architecture-specific, that is, remains the same for all IEEE-defined LANs. Media access control (MAC) is the lower sub layer of the data link layer that contains some distinct modules. Each one carries proprietary information specific to the LAN product being used. The modules are Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5). 802.6 is distributed queue dual bus (DQDB) designed to be used in MANs.
Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.