Computer Network Questions & Answers : V
What is anonymous FTP and why would you use it?
Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only.
Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.
What is a DNS resource record?
A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.
Explain the function of Transmission Control Block
A TCB is a complex data structure that contains a considerable amount of information about each connection.
What is virtual path?
Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.
What protocol is used by DNS name servers?
DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.
What is External Data Representation?
External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent.
What is Brouter?
Hybrid devices that combine the features of both bridges and routers.
Explain 5-4-3 rule.
In a Ethernet network, between any two points on the network, there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated.
What is REX?
Request to Exit (REX) - A signal that informs the controller that someone has requested to exit from a secure area.
What are major types of networks and explain?
Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources.
Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration.