Explain following term: (i) Subnet Masking (ii) ARP (iii) FTP (iv) TCP

1 Answer

Answer :

(i) Subnet masking: Subnet mask is a 32 bits long address divided into 4 octets used to distinguish between network address and host address in IP address. It is always used with IP address.  It is used to identify which part of an IP address is network address and which part is host address.  Wherever there is ‘0’ in the subnet mask, the corresponding bit in the IP address represents host bit and wherever there is ‘1’, the corresponding bit in the IP address represents network bit.  The default subnet mask for class A is 255.0.0.0, class B is 255.255.0.0 and class C is 255.255.255.0.  Thus for a class A IP address, by default, the first octet represents the network ID and the remaining numbers represent host ID.

(ii) ARP: 

Address Resolution Protocol used to convert IP address into corresponding physical or MAC address. 

Functions: ARP takes the IP address of a host as input & gives its corresponding physical address as the output. It sends the broadcast message to all the computers on the network for the given IP address. The computer whose IP address matches the broadcast IP address sends a reply and along with its physical address to the broadcasting computer. All other computers ignore the broadcast message as IP address is different. As it knows sender hardware as well as IP address, it unicasts the reply so that only sender receives it.

(iii) FTP: 

File Transfer Protocol used to transfer files over internet. 

Functions: FTP is a stranded mechanism provided by the Internet for copying a file from one host to the other. FTP establishes two connections between the client and server. One is for data transfer and the other is for the control information. The fact that FTP separates control and data makes it very efficient. The control connection uses simple rules of communication. Only one line of command or a line of response is transferred at a time. But the data connection uses more complex rules due to the variety of data types being transferred. FTP uses port 21 for the control connection and port 20 for the data connection.

(iv) TCP : 

Transmission Control Protocol used to establish the connection between two computers in a network.  TCP is a full duplex, connection oriented, reliable and accurate protocol.  When two TCPs in two machines are connected, they are able to send data using segments to each other simultaneously.  Transmission Control Protocol (TCP) is one of the transport layer protocols in the TCP/IP protocol suite.  The unit of data transfer between two devices using TCP software is called a segment; it has 20 to 60 bytes of header, followed by data from the application program.  A TCP connection normally consists of three phases: connection establishment, data transfer, and connection termination. The connection establishment in TCP is called three way handshaking.  TCP uses flow control, implemented as a sliding window mechanism, to avoid bulk data at the receiver.  TCP uses error control to provide a reliable service. Corrupt and lost segments are retransmitted, and duplicate segments are discarded.

Related questions

Description : Give function of the following TCP/IP protocols. i. ARP ii. FTP 

Last Answer : i. ARP ARP:(Address resolution protocol)  Networking H/W demands that a datagram contain the physical address of the intended recipient. If problem Address Resolution protocol (ARP) was developed. ARP ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : Describe the need and importance of subnet masking. Give an example of subnet mask.

Last Answer : Subnet mask is a 32 bits long address used to distinguish between network address and host address in IP address. Subnet mask is always used with IP address. Subnet mask has ... In binary notation  IP address 11000000.10101000.00000001.00001010  Subnet mask 11111111.11111111.11111111.00000000

Description : What do you understand by subnet masking?

Last Answer : A subnet mask is a screen of numbers used for routing traffic within a subnet. Once a packet has arrived at an organization's gateway or connection point with its unique network number, it can be routed to ... to handle the entire 32 bit address; it can simply look at the bits selected by the mask.

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : Name the different TCP/IP Protocols. Explain the working of FTP.

Last Answer : TCP/IP Protocols: 1. DNS (Domain Naming System) 2. HTTP(Hypertext Transfer Protocol) 3. Telnet 4. FTP (File Transfer Protocol), 5. TFTP (Trivial File Transfer Protocol), 6. SNMP (Simple ... TCP ports: port 21 is used for the control connection and port 20 is used for the data connection.

Description : Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 a. (i) and (ii) only b. (ii) and (iii) only c. (ii) and (iv) only d. (iv) only

Last Answer : c. (ii) and (iv) only

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : C) ii, iii and iv only

Description : The ________ protocol is the transmission mechanism used by the TCP/IP suite. A) ARP B) IP C) RARP D) noneof the above

Last Answer : IP

Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP

Last Answer : c. TCP

Description : Which protocol does switch use at the layer 2 for finding MAC address? a. ICMP b. UDP c. ARP d. TCP

Last Answer : c. ARP

Description : Which is a link layer protocol? a) ARP b) TCP c) UDP d) HTTP

Last Answer : b) TCP

Description : Which protocol does hackers use to make their system seems as your system or another allowed host on your network? a. SNMP protocol b. TCP protocol c. ARP protocol d. ICMP protocol

Last Answer : c. ARP protocol

Description : Give the name of protocols used by different layers of TCP/IP. Discuss the function of ARP and RARP.

Last Answer : TCP/IP Model contains following layer. 1) Host-to-Network Layer - It defines characteristics of transmission media. It also concern with delivery of data when two systems are attached to same network ... such broadcasts are not forwarded by routers, so a RARP server is needed on each network. 

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Compare between OSI and TCP/IP reference model.

Last Answer : OSI reference model TCP/IP network model 1)It has 7 layers 1) It has 4 layers 2)Transport layer guarantees delivery of packets 2) Transport layer does not guarantees delivery of ... a problem of protocol filtering into a model  10)The model does not fit any protocol stack. 

Description : Draw TCP-IP reference model and state the function of various layers.

Last Answer : As we can see from the above figure, presentation and session layers are not there in TCP/IP model. Also note that the Network Access Layer in TCP/IP model combines the functions of Data ... The protocols included in Network Access Layer are Ethernet, Token Ring, FDDI, X.25, Frame Relay etc.

Description : FTP utilizes TCP/IP protocol suite. -Technology

Last Answer : True FTP is the easiest way to transfer files between computers via an Internet and utilizes TCP (Transmission Control Protocol)/IP (Internet Protocol) systems to perform uploading and downloading tasks.

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above

Last Answer : SMTP

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe

Last Answer : A) FTP

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Which application-level protocol plays a crucial role in carrying out the data definition and manipulation in addition to X-500 features? a. TCP b. LDAP c. FTP d. None of the above

Last Answer : b. LDAP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : When displaying a web page, the application layer uses the _____________ A. HTTP protocol B. FTP protocol C. SMTP protocol D. TCP protocol

Last Answer : A. HTTP protocol

Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP

Last Answer : C. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP

Last Answer : c) TCP and UDP

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : How the TCP connections are needed in FTP?

Last Answer : FTP establishes two connections between the hosts. One connection is used for data transfer, the other for control information. The control connection uses very simple rules of communication. The data connection needs more complex rules due to the variety of data types transferred.

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : Which of the following of the TCP/IP protocolsis the used for transferring filesfrom one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : The protocol which allows the file transfer between computers is a. TCP/IP b. FTP c. HTTP d. SOA

Last Answer : b. FTP

Description : .............. is a protocol used by e-mail clients to download emails to your computer. (A) TCP (B) FTP (C) SMTP (D) POP

Last Answer : Answer: D

Description : Define the following power problems. i. Blackout ii. Surge iii. Spike

Last Answer : i. Blackout: It is the complete loss of electrical power where voltage and current drop to a very low value (typically zero). They are caused due to physical interruption in the local ... . Spikes: It is a large over voltage condition that occurs over short duration of few microseconds. 

Description : Consider the following statements. I. TCP connections are full duplex. II. TCP has no option for selective acknowledgment III. TCP connections are message streams. a. Only I is correct b. Only I and II are correct c. Only II and III are correct d. All of I, II and III are correct

Last Answer : a. Only I is correct

Description : Term which is not a part of the weld symbol (i) Tail (ii) Arrow (iii) Temperature of welding (iv) None

Last Answer : (iii) Temperature of welding

Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above

Last Answer : iv) All of the above

Description : The objectives of Cash Flow Statement are (i) Analysis of cash position (ii) Short-term cash planning (iii) Evaluation of liquidity (iv) Comparison of operating Performance A. Both (i) and (ii) B. Both (i) and (iii) C. Both (ii) and (iv) D. (i), (ii), (iii), (iv)

Last Answer : D. (i), (ii), (iii), (iv)

Description : Define the term: i)Tensile strength ii) Hardness iii) Ductility iv) Soldering

Last Answer : i)Tensile Strength : Tensile Strength is the ability of metal to carry a load without breaking. ii)Hardness :- Hardness is the ability of metal to resist wear or abrasion and resist penetration. ... a non ferrous alloy having melting point below 4000 c in between them is called as soldering. 

Description : Define following term: (i) Precision (ii) Drift (iii) Static error (iv) Dead zone

Last Answer : (i) Precision: It is the measure of consistency or repeatability of measurements.   OR The closeness with which the individual measurements are departed or distributed about the average of number ... variable to which instrument does not respond. It is mainly due to friction in the instrument.