Professional Documents
Culture Documents
(YEAR 2)
SAQA ID CREDITS
24419 10
SYSTEM SOFTWARE201
(SEMESTER 1)
Study Guide
In terms of the Copyright Act, no 98 of 1978, no part of this manual may be reproduced or transmitted in any
form or by any means, electronic or mechanical, including photocopying, recording or by any other
information storage and retrieval system without permission in writing from the proprietor.
1|P a g e
System Software201
CONTENTS:
CONTENTS: ............................................................................................................................................................. 2
INTRODUCTION ....................................................................................................................................................... 4
CONTENTS AND STRUCTURE ...................................................................................................................................... 5
SECTION 1: Network and Storage……………………………………………………………………………10
SECTION 2: Protocols………………………………………………………………………………………..30
SECTION 3: Wins and Host Names…………………………………………………………………………..58
SECTION 4: Remote Connectivity……………………………………………………………………………72
2|P a g e
System Software201
Prescribed Text Book: There is no specific prescribed Textbook to be used in conjunction with this
Manual but one of the following Textbooks can be used to complement this manual or a Textbook of
your choice:
Introduction to Computer Networking: Your First Steps into How the Internet
and Networks Work (Computer Networking Series Book 5)
3|P a g e
System Software201
Have knowledge of RAID and its functions
Be able to explain and implement the various backup strategies
Have knowledge of frames and the various frame standards
Have knowledge of the TCP/IP protocol suite
Have knowledge of the Dynamic Host Configuration Protocol (DHCP)
Have knowledge of the NetBios and Wins services
Have an understanding of Host names and Host files
Have knowledge of the Domain Name Servers(DNS)
Have knowledge of Remote connectivity
This course is an introduction. It is therefore impossible to fully describe all aspects of building a
successful functional network.
Instead this course focuses on the basic components of building a simple network architectures by
introducing a student to basic technologies and basic terminologies used in the field of IT.
4|P a g e
System Software201
Section 2: Protocols
This chapter helps a learner to understand TCP/IP protocol suit together with its
layers and their functions in deeper details while also exposing a learner into
deeper knowledge about DHCP available as one of the most important
protocols in network architecture. This chapter introduces a learner into
knowledge about NETBIOS and how NETBIOS could be used in network
architecture.
5|P a g e
System Software201
6|P a g e
The following are important Course Book Notations.
Refer to the prescribed text book Attempt the following questions and
chapters and pages specified. research further if you could not
answer the questions.
Case Study
7|P a g e
System Software201
READING
This manual has been designed to be read in conjunction with the following textbooks:
Computer Networking: Beginner’s guide for Mastering Computer Networking and the
OSI Model (Computer Networking Series Book 1)
Introduction to Computer Networking: Your First Steps into How the Internet and
Networks Work (Computer Networking Series Book 5)
Recommended Reading:
network tutorials:
http://www.ntu.edu.sg/home/ehchua/programming/cpp/cp0_introduction.html
8|P a g e
System Software201
Contents
1.2 READING
1.4 RAID
1.6 FRAMES
1.7 EXERCISES
9|P a g e
Berea College of Technology
System Software201
Have knowledge of different types of networks and differentiate between client/server
networks and peer to peer networks
Have knowledge of RAID and its functions
Be able to explain and implement the various backup strategies
Have knowledge of frames and the various frame standards
10 | P a g e
Introduction
Computer networking is an engineering discipline that aims to study and analyze the
communication process among various computing devices or computer systems that are
linked, or networked, together to exchange information and share resources.
Computer networking depends on the theoretical application and practical implementation
of fields like computer engineering, computer sciences, information technology and
telecommunication.
TYPES OF NETWORKS
Client/Server Networks
Client/server networks consist of two kinds of computer. The clients are usually computer
workstations sitting on the desks of employees in an organisation. The servers are usually
more powerful computers and are held in a central location or locations within an
organization
11 | P a g e
Peer-to-peer Networks
Peer-to-peer networks have workstations connected to each other but do not have
servers. Files can be shared between workstations, and a printer connected to one
workstation can be accessed by another workstation. Peer-to peer networks are often
much simpler to set up than client/server networks. However, they lack some of the
advantages normally associated with networks such as centrally managed security and
ease of backing up files. Peer-to-peer networks would really only be set up among a few
computers within an office or single room.
RAID
The phrase "RAID" is an umbrella term for computer data storage schemes that can divide
and replicate data among multiple hard disk drives. RAID's various designs all involve two
key design goals: increased data reliability and increased input/output performance. When
several physical disks are set up to use RAID technology, they are said to be in a RAID
array. This array distributes data across several disks, but the array is seen by the
computer user and operating system as one single disk.
12 | P a g e
RAID systems with redundancy continue working without interruption when one, or
sometimes more, disks of the array fail, although they are vulnerable to further failures.
When the bad disk is replaced by a new one the array is rebuilt while the system continues
13 | P a g e
to operate normally. Some systems have to be shut down when removing or adding a drive;
others support hot swapping, allowing drives to be replaced without powering down.
RAID with hot-swap drives is often used in high availability systems, where it is important
that the system keeps running as much of the time as possible.
RAID is not a good alternative to backing up data. Data may become damaged or destroyed
without harm to the drive(s) on which it is stored. For example, part of the data may be
overwritten by a system malfunction; a file may be damaged or deleted by user error or
malice and not noticed for days or weeks; and of course the entire array is at risk of
catastrophes such as theft, flood, and fire.
14 | P a g e
Redundancy through Hamming
code. Disks are synchronised and
striped in very small stripes, often in
RAID 2 single bytes/words. Hamming codes 3
error correction is calculated across
corresponding bits on disks, and is
stored on multiple parity disks.
15 | P a g e
Striped set with distributed parity.
Distributed parity requires all drives but
16 | P a g e
Backup Strategies
Full backup
Is the starting point for all other backups and contains all the data in the folders and files
that are selected to be backed up. Because the full backup stores all files and folders,
frequent full backups result in faster and simpler restore operations. The amount of time it
takes to run full backups often prevents us from using this backup type. Full backups are
often restricted to a weekly or monthly schedule, although the increasing speed and
capacity of backup media is making overnight full backups a more realistic proposition. Full
backups, if you have the time to perform them, offer the best solution in data protection. In
effect, a single backup can provide the ability to completely restore all backed-up files.
Incremental backup
Incremental backup stores all files changed since the last FULL, DIFFERENTIAL OR
INCREMENTAL backup. The advantage of an incremental backup is that it takes the
least time to complete. During a restore operation, each incremental backup is
processed, which could result in a lengthy restore job. Incremental backup provides a
faster method of backing up data than repeatedly running full backups. During an
incremental backup only the files changed since the most recent backup are included.
That is where it gets its name: each backup is an increment since the most recent
backup.
17 | P a g e
FRAME TYPES
IEEE 802
IEEE 802 refers to a family of IEEE standards(Institute of Electrical and Electronics
Engineers) dealing with local area networks and metropolitan area networks. More
specifically, the IEEE 802 standards are restricted to networks carrying variable-size
packets.
18 | P a g e
Recommended Additional Reading
Stalling W., Operating systems, 3rd Edition
Computer Networking: Beginner’s guide for Mastering Computer Networking and the
OSI Model (Computer Networking Series Book 1)
Recommended Digital Engagement and Activities
network tutorials:
http://www.ntu.edu.sg/home/ehchua/programming/cpp/cp0_introduction.html
19 | P a g e
Revision Exercise
Task 1:
This set of multiple choice SAN storage questions and answers focuses on RAID technology
and various levels of RAID.
20 | P a g e
d) 4 sets with 1 disk each
7. Which of the following raid levels provides maximum usable disk space?
a) RAID 1
b) RAID 0
c) RAID 5
d) RAID 6
8. Can you help decide on the RAID level to use – we are a media house and we use lot of
graphics/video applications – we need large throughputs for videos to get played without any
jitter and since we are in publishing business we can’t afford downtimes.
Even if there is any downtime we would like our data to be quickly reconstructed and enable
us to continue without work in less time
a) Raid 5
b) Raid 10
c) Raid 6
d) Raid 01
9. The mean time to failure of a single disk is 200000 hrs. If an array of disks is using 5 such
disks, the mttf of the array is
a) 200000 hrs
b) 40000 hrs
c) 1000000 hrs
d) Can not be determined
10. An array of disks is more likely to fail compared to a single disk. How is it that RAID
arrays still manage to provide more data protection compared to a single disk?
a) Using either mirroring or striping
b) Using either mirroring or parity
c) Using better quality disks
d) Using dedicated hardware
11. Network in which every computer is capable of playing role of client, server or both at
same time is called
21 | P a g e
A. peer-to-peer network
B. local area network
C. dedicated server network
D. wide area network
Answer
A. server
B. client
C. peer
D. sender
TASK2
1. Central Computer which is powerful than other computers in the network is called as __________.
a. Client
b. Server
c. Hub
d. Switch
2. Machine that places the request to access the data is generally called as __________.
a. Server Machine
b. Client Machine
c. Request Machine
b. Network Printing
22 | P a g e
c. Email
b. Xerox PARC
c. Intel Lab
a. Peer to peer
b. Client server
c. Both a and b
6. The time taken by a packet to travel from client to server and then back to the client is called ____
a. STT
b. RTT
c. PTT
d. Total time
7. In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.
a. 2
23 | P a g e
b. 1
c. 4
d. 3
a. Request line
b. Header line
c. Status line
d. Entery line
a. Client-server
b. P2P
a. server
b. client
TASK 3:
24 | P a g e
1. ________ is a virtual-circuit wide-area network that was designed in response to demands for a new type o
early 1990s.
a. X.25
b. Frame Relay
c. ATM
a. PVCs
b. SVCs
a. PVC
b. SVC
c. DLCIs
4. In Frame Relay, when a _____ is selected, the corresponding table entry is recorded for all switches by the
a. PVC
b. SVC
25 | P a g e
5. In Frame Relay, when ______ is selected, it requires establishing and terminating phases
a. a PVC
b. an SVC
7. At the data link layer, Frame Relay uses a protocol that supports _____control.
a. flow
b. error
a. only 2
b. 2 to 3
c. 2 to 4
d. 4 to 8
26 | P a g e
9. In Frame Relay, the EA field defines the number of bytes; it is _____ in the last byte of the address.
a. 0
b. 1
c. 2
d. 3
10. To handle frames arriving from other protocols, Frame Relay uses a device called a _________.
a. VOFR
b. FRAD
c. MUX
27 | P a g e
Overall impression (each out of 10):
Professionalism: .................................................................................................
Easy to read: ................................................................
Efficient algorithm: ............................................................................
Correctness: .............................................................................................
Reusability: ...............................................................................
Instructions followed: .....................................................................................
Suitable meaningful variable names: ......................................................................
28 | P a g e
System Software201
CONTENTS
READING
INTRODUCTION
DHCP
NETBIOS
EXERCISES
Have an understanding of various networking protocols mainly the TCP/IP protocol.
Have an understanding of the various networking topologies and devices used to
create them
Have knowledge of the various network sizes, namely: LAN, WAN, MAN etc.
Have knowledge of the TCP/IP protocol suite
Have knowledge of the Dynamic Host Configuration Protocol (DHCP)
Have knowledge of the NetBios and Wins services
30 | P a g e
Introduction
The Internet Protocol (IP) is the method or protocol by
which data is sent from one computer to another on the Internet.
Each computer (known as a host) on the Internet has at least
one IP address that uniquely identifies it from all other computers
on the Internet.
Because a message is divided into a number of packets, each packet can, if necessary, be
sent by a different route across the Internet. Packets can arrive in a different order than the
order they were sent in. The Internet Protocol just delivers them. It's up to another protocol,
the Transmission Control Protocol (TCP) to put them back in the right order.
The most widely used version of IP today is Internet Protocol Version 4 (IPv4). However, IP
Version 6 (IPv6) is also beginning to be supported. IPv6 provides for much longer
31 | P a g e
addresses and therefore for the possibility of many more Internet users. IPv6 includes the
capabilities of IPv4 and any server that can support IPv6 packets can also support IPv4
packets.
TCP/IP PROTOCOL
The Internet Protocol Suite (commonly TCP/IP) is the set of communications protocols
used for the Internet and other similar networks. It is named from two of the most important
protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP),
which were the first two networking protocols defined in this standard. Today's IP
networking represents a synthesis of several developments that began to evolve in the
1960s and 1970s, namely the Internet and LANs (Local Area Networks), which, together
with the invention of the World Wide Web by Tim Berners-Lee in 1989, have revolutionized
computing.
The Internet Protocol Suite, like many protocol suites, may be viewed as a set of layers.
Each layer solves a set of problems involving the transmission of data, and provides a well-
defined service to the upper layer protocols based on using services from some lower
layers. Upper layers are logically closer to the user and deal with more abstract data,
relying on lower layer protocols to translate data into forms that can eventually be
physically transmitted.
The TCP/IP model consists of four layers (RFC 1122). From lowest to highest, these are
the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.
32 | P a g e
Common terms and concepts in TCP/IP are defined as follows:
Node Any device, including routers and hosts, which runs an implementation of IP.
Router A node that can forward IP packets not explicitly addressed to itself. On an
IPv6 network, a router also typically advertises its presence and host configuration
information.
Host A node that cannot forward IP packets not explicitly addressed to itself (a non-
router). A host is typically the source and the destination of IP traffic. A host silently
discards traffic that it receives but that is not explicitly addressed to itself.
Upper-layer protocol A protocol above IP that uses IP as its transport. Examples
include Internet layer protocols such as the Internet Control Message Protocol (ICMP)
and Transport layer protocols such as the Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP). (However, Application layer protocols that use TCP
and UDP as their transports are not considered upper-layer protocols.
LAN segment A portion of a subnet consisting of a single medium that is bounded by
bridges or Layer 2 switches.
Subnet One or more LAN segments that are bounded by routers and use the same
IP address prefix. Other terms for subnet are network segment and link.
Network Two or more subnets connected by routers. Another term for network is
internetwork.
Neighbor A node connected to the same subnet as another node.
Interface The representation of a physical or logical attachment of a node to a
subnet. An example of a physical interface is a network adapter. An example of a
logical interface is a tunnel interface that is used to send IPv6 packets across an IPv4
network.
Address An identifier that can be used as the source or destination of IP packets and
that is assigned at the Internet layer to an interface or set of interfaces.
The TCP/IP suite uses encapsulation to provide abstraction of protocols and services.
Such encapsulation usually is aligned with the division of the protocol suite into layers of
general functionality. Generally an application (the highest level of the model) uses a set of
protocols to send its data down the layers, being further encapsulated at each level.
The major functional groups of protocols and methods are the Application Layer, the
Transport Layer, the Internet Layer, and the Link Layer (RFC 1122). It should be noted
that this model was not intended to be a rigid reference model into which new protocols
have to fit in order to be accepted as a standard.
The Application Layer is the seventh level of the seven-layer OSI model, and the top
layer of the TCP/IP model. It interfaces directly to and performs common application
services for the application processes; it also issues requests to the Presentation Layer
(OSI).
34 | P a g e
In computer networking, the Transport Layer is a group of methods and protocols within a
layered architecture of network components, within which it is responsible for encapsulating
application data blocks into datagrams (packets) suitable for transfer to the network
infrastructure for transmission to the destination host, or managing the reverse transaction
by abstracting network datagrams and delivering them to an application. Such protocol are
also referred to as "transport protocols". Transport layers are contained in both, the TCP/IP
model (RFC 1122),which is the foundation of the Internet, and the Open Systems
Interconnection (OSI) model of general networking. The definitions of the Transport Layer
are slightly different in these two models
The Internet Layer is a group of internetworking methods in the TCP/IP protocol suite
which is the foundation of the Internet (RFC 1122). It is the group of methods, protocols,
and specifications which are used to transport datagrams (packets) from the originating
host across network boundaries, if necessary, to the destination host specified by a
network address (IP address) which is defined for this purpose by the Internet Protocol (IP).
The Internet Layer derives its name from its function of forming an "internet"
(uncapitalized), or facilitating "internetworking", which is the concept of connecting multiple
networks with each other through gateways. Internet Layer protocols use IP-based packets.
35 | P a g e
The following table provides some examples of the protocols grouped in their
respective layers.
Application DNS, TFTP, TLS/SSL, FTP, Gopher, HTTP, IMAP, IRC, NNTP, POP3,
SIP, SMTP, SNMP, SSH, TELNET, ECHO, RTP, PNRP, rlogin, ENRP
IP address
There are five classes of available IP ranges: Class A, Class B, Class C, Class D and
Class E, while only A, B and C are commonly used. Each class allows for a range of
valid IP addresses. Below is a listing of these addresses.
TCP/IP PORTS
A number assigned to user sessions and server applications in an IP network. The port
number resides in the TCP or UDP header of the packet
36 | P a g e
Some commonly used Ports are:
42 nameserv, WINS 110 POP3
1 tcpmux 43 whois, nickname 111 Sun RPC
3 49 TACACS, Login Portmapper
4 Host Protocol 113 identd/auth
50 RMCP, re-mail-ck 115 sftp
5 rje
53 DNS 116
7 echo
57 MTP 117 uucp
9 discard
59 NFILE 118
11 systat
63 whois++ 119 NNTP
13 daytime
66 sql*net 120 CFDP
15 netstat
67 bootps 123 NTP
17 qotd
68 bootpd/dhcp 124 SecureID
18 send/rwp
69 Trivial File 129 PWDGEN
19 chargen
Transfer Protocol
133 statsrv
20 ftp-data (tftp)
135 loc-srv/epmap
21 ftp 70 Gopher
22 ssh, pcAnywhere 137 netbios-ns
79 finger
23 Telnet 138 netbios-
80 www-http
dgm (UDP)
25 SMTP 87
139 NetBIOS
27 ETRN 88 Kerberos, WWW
143 IMAP
29 msg-icp 95 supdup
144 NewS
31 msg-auth 96 DIXIE
150
33 dsp 98 linuxconf
152 BFTP
37 time 101 HOSTNAME
153 SGMP
38 RAP 102 ISO, X.400, ITOT 156
39 rlp 105 cso
161 SNMP
40 106 poppassd
41 109 POP2
37 | P a g e
TCP/IP utilities
To assist with the management of TCP/IP, there are three types of TCP/IP-based utilities:
Connectivity utilities that you can use to interact with and use resources on a variety
of Microsoft® and non-Microsoft hosts, such as UNIX systems.
Diagnostic utilities that you can use to detect and resolve networking problems.
TCP/IP server software that provides printing and publishing services to
TCP/IP-based Microsoft Windows® clients.
Connectivity utilities
Utility Description
Ftp Transfers files of any size between computers running Windows Server 2003
operating systems and any computer running File Transfer protocol (FTP)
server software. For more information, see Ftp.
Lpr Sends print jobs to remote UNIX printers managed by Line Printer Daemon
(LPD) print server software. For more information, see Lpr.
Rcp Copies files between computers running Windows Server 2003 operating
systems and computers running Remote Copy protocol (RCP) server software.
For more information, see Rcp.
Rexec Executes processes on remote computers. For more information, see Rexec.
Rsh Runs commands on a computer running Remote Shell (RSH) server software.
For more information, see Rsh.
Telnet Uses terminal-based login to remotely access network devices that are running
Telnet server software. For more information, see Telnet.
Tftp Transfers small files between computers running Windows Server 2003
operating systems and computers running Trivial File Transfer protocol (TFTP)
server software. For more information, see Tftp.
38 | P a g e
Diagnostic utilities
Utility Description
Arp Displays and modifies the Address Resolution protocol (ARP) cache. This
cache is a local table used to resolve IP addresses to media access control
addresses used on the local network. For more information, see Arp and
Address Resolution Protocol (ARP).
Hostname Returns the host name of the local computer. For more information, see
Hostname.
Ipconfig Displays the current TCP/IP configuration. Also used to manually release
and renew TCP/IP configurations assigned by a DHCP server. For more
information, see Ipconfig and Command-line utilities.
Lpq Obtains print queue status information from computers running Line Printer
Daemon (LPD) print server software. For more information, see Lpq.
Nbtstat Displays the local NetBIOS name table, a table of NetBIOS names
registered by local programs, and the NetBIOS name cache, a local cache
listing of NetBIOS computer names that have been resolved to IP
addresses. For more information, see Nbtstat and Release and refresh
NetBIOS names by using the nbtstat command.
Netsh Displays and administers TCP/IP protocol settings on the local computer or
a remote computer. For more information, see Netsh commands for
Interface IP.
Netstat Displays TCP/IP protocol session information. For more information, see
Netstat.
Nslookup Checks records, domain host aliases, domain host services, and operating
system information by querying DNS servers. For more information, see
Nslookup and Verify DNS registration for domain controllers using the
nslookup command.
39 | P a g e
Ping Verifies configurations and tests IP connectivity. For more information, see
Ping and Test a TCP/IP configuration by using the ping command.
Route Displays or modifies the local routing table. For more information, see
Route.
Tracert Traces the route a packet takes to a destination. For more information, see
Tracert and Trace a path by using the tracert command.
Pathping Traces the route a packet takes to a destination and displays information
on packet losses for each router in the path. Pathping can also be used to
troubleshoot Quality of Service (QoS) connectivity. For more information,
see Using the pathping command.
DHCP
40 | P a g e
When a DHCP-configured client (be it a computer or any other network-aware device)
connects to a network, the DHCP client sends a broadcast query requesting necessary
information from a DHCP server. The DHCP server manages a pool of IP addresses and
information about client configuration parameters such as the default gateway, the domain
name, the DNS servers, other servers such as time servers, and so forth. Upon receipt of a
valid request the server will assign the computer an IP address, a lease (the length of time
for which the allocation is valid), and other IP configuration parameters, such as the subnet
mask and the default gateway. The query is typically initiated immediately after booting and
must be completed before the client can initiate IP-based communication with other hosts.
The two other modes for allocation of IP addresses are automatic (also known as DHCP
Reservation), in which the address is permanently assigned to a client, and manual, in
which the address is selected by the client (manually by the user or any other means) and
the DHCP protocol messages are used to inform the server that the address has been
allocated.
The automatic and manual methods are generally used when finer-grained control over IP
address is required (typical of tight firewall setups), although typically a firewall will allow
access to the range of IP addresses that can be dynamically allocated by the DHCP server.
The process of address allocation is known as ROSA. Request, Offer, Send, Accept
41 | P a g e
IP address allocation
Depending on implementation, the DHCP server may have three methods of allocating IP-
addresses, plus a fourth mode of operation ("manual") in which the client (rather than the
DHCP server) assigns an IP address. (WARNING--the terminology below differs from the
terminology above in Basic protocol operation):
manual allocation: The DHCP server does not assign the IP address; instead, the
client is configured with a user-specified static IP address.
42 | P a g e
NetBIOS
NetBIOS is an acronym for Network Basic Input/Output System. The NetBIOS API
allows applications on separate computers to communicate over a local area network. In
modern networks, it normally runs over TCP/IP (NetBIOS over TCP/IP, or NBT), giving
each computer in the network both a NetBIOS name and an IP address corresponding to a
(possibly different) host name. Older operating systems ran NetBIOS over IPX/SPX or
IEEE 802.2 (NBF). NetBIOS provides services related to the session layer of the OSI
model.
NetBIOS name
Host name
A Windows machine's NetBIOS name is not to be confused with the computer's host name.
Generally a computer running TCP/IP (whether it's a Windows machine or not) has a host
name (also sometimes called a machine name or a DNS name). Generally the host name
of a Windows computer is based on the NetBIOS name plus the Primary DNS Suffix, which
are both set in the System Control Panel.
Node types
The node type of a networked computer relates to the way it resolves NetBIOS names to
IP addresses. There are four node types.
B-node: 0x01 Broadcast
P-node: 0x02 Peer (WINS only)
M-node: 0x04 Mixed (broadcast, then WINS)
H-node: 0x08 Hybrid (WINS, then broadcast)
43 | P a g e
The node type in use is displayed by opening a command line and typing ipconfig /all. A
Windows computer registry may also be configured in such a way as to display "unknown"
for the node type.
44 | P a g e
NETBIOS PROVIDES THREE DISTINCT SERVICES:
Name service for name registration and resolution
Session service for connection-oriented communication
vi. Datagram distribution service for connectionless communication
Services
NetBIOS provides three distinct services:
Name service for name registration and resolution.
Session service for connection-oriented communication.
3. Datagram distribution service for connectionless communication.
Name service
In order to start Sessions or distribute Datagrams, an application must register its
NetBIOS name using the Name service.
45 | P a g e
Recommended Additional Reading
Stalling W., Operating systems, 3rd Edition
Computer Networking: Beginner’s guide for Mastering Computer Networking and the
OSI Model (Computer Networking Series Book 1)
Recommended Digital Engagement and Activities
network tutorials:
http://www.ntu.edu.sg/home/ehchua/programming/cpp/cp0_introduction.html
46 | P a g e
Revision Exercise
TASK 1:
What is the use of Ping command?
a. 32 bytes
b. 64 bytes
c. 30 bytes
d. 60 bytes
a. TCP
b. IP
47 | P a g e
c. UDP
a. Protocol
b. IP Address
c. MAC Address
d. Network Address
6. Controlling access to a network by analyzing the incoming and outgoing packets is called
a. IP Filtering
b. Data Filtering
c. Packet Filtering
d. Firewall Filtering
7. This is an Internet Protocol (IP)-based storage networking standard for linking data storage facilities that ca
Ethernet networks.
a. NAT
b. RAID
c. iSCSI
d. NIC
8. This is the telecommunication protocol that all computers must use to be part of the Internet.
a. Internet Protocol
48 | P a g e
b. FTP
d. DHCP
9. This is one of two protocols that let a network administrator supervise and distribute IP addresses from a ce
sends a new IP address when a computer is plugged into a different place in the network.
a. DHCP
b. TCPMAN
c. TCP
d. UDP
10. ______________ allow many devices to share limited address space on a network.
a. Multiple addressing
b. Port addressing
c. Dynamic addressing
TASK 2:
MCQ: Connector that is used for connecting cable to networking devices is called
Answer
A. RJ-45
B. RG-59
C. RG-58
D. RG-ll
49 | P a g e
Answer
MCQ: A signal that is result of a conversion of data from another form is known as
A. transmission medium
B. data
C. information
D. communication
Answer
A. 3 broad groups
B. 6 broad groups
C. 9 broad groups
D. 8 broad groups
Answer
A. one direction
B. all directions
C. depends on situation
D. both a and c
Answer
A. index of refraction
B. sudden change of signal
C. index of density
D. index of light rays
Answer
A. telephone lines
B. DSL lines
C. LAN
D. All of the above
Answer
MCQ: Infrared waves, that can be used for short range communication have frequencies
between
Answer
MCQ: How many modes are currently in used for propagating light along optical channels
A. one mode
B. two modes
C. three modes
D. five modes
Answer
A. decibels
B. hertz
C. gauge
D. diameter
Answer
MCQ: Microwaves are used for
A. short-range communication
B. multicast communications
C. unicast communication
D. long range communication
Answer
A. Free space
B. Twisted pair cable
C. fiber optic cable
D. Coaxial cable
Answer
MCQ: In electromagnetic spectrum for wireless communication, reserved range for Radio
waves and microwaves is known as
A. ground propagation
B. sky propagation
C. line-of-sight propagation
D. None
Answer
Answer
MCQ: Long-distance communication using electric signals was started with invention of
telegraph by Morse in
A. 19th century
B. 18th century
C. 20th century
D. middle of 18 and 19 century
Answer
A. FM radio
B. satellite communication
C. AM radio
D. cellular phones
Answer
A. 3-30 kHz
B. 900KHz-300 kHz
C. 3khz-30 MHz
D. 300 kHz-3 MHz
MCQ: Field of MAC frame that alerts receiver and enables it to synchronize is known as
A. SFD
B. preamble
C. source address
D. destination address
Answer
A. 550 m
B. 25 m
C. 100 m
D. 5000 m
52 | P a g e
Answer
MCQ: 1000Base-LX has used two wires for long wave are
A. STP Cable
B. UTP Cable
C. Fiber Optic
D. Coaxial Cable
Answer
A. LLC
B. HDLC
C. MAC
D. DSAP
Answer
MCQ: Terms that control flow and errors in full duplex switched Ethernet is called
Answer
A. Thick
B. Thin
C. Twisted Pair
D. None of the above
Answer
A. 6 Bytes
B. 4 Bytes
C. 2 Bytes
D. 7 Bytes
Answer
A. 100 meter
B. 185 meters
C. 500 meter
53 | P a g e
D. 2000 meter
Answer
A. Unicast
B. multicast
C. broadcast
D. all of the above
Answer
MCQ: In Ethernet frame, both destination and sender addresses are of length
A. 1 Byte
B. 2 Bytes
C. 4 Bytes
D. 6 Bytes
Answer
A. 2
B. 4
C. 6
D. 8
Answer
A. 1980
B. 1976
C. 1960
D. 1967
Answer
A. 3 Fields
B. 5 Fields
C. 7 Fields
D. 9 Fields
Answer
A. 1970
54 | P a g e
B. 1975
C. 1980
D. 1985
Answer
Answer
A. Unicast
B. Multicast
C. Broadcast
D. None of the above
Answer
A. Ring Topology
B. Bus Topology
C. Star Topology
D. Mesh Topology
Answer
MCQ: Term that is used to set standards to enable intercommunication among equipment
from a variety of manufacturers is called
A. Project 802
B. Project 8802
C. Project 2088
D. Project 208
Answer
A. 10 meter
B. 250 meter
C. 500 meter
D. 5000 meter
Answer
55 | P a g e
MCQ: IEEE Standard was adopted by the
A. ISO
B. ANSI
C. OSI
D. None of the above
Answer
Answer
56 | P a g e
SECTION THREE: WINS AND HOSTS
CONTENTS
READING............................................................................................................... 43
INTRODUCTION ................................................................................................... 44
....................... 51
EXERCISES...................................................................................................................................... 25
57 | P a g e
System Software201
Have knowledge of the NetBios and Wins services
Have an understanding of Host names and Host files
Have knowledge of the Domain Name Servers(DNS)
58 | P a g e
System Software201
INTRODUCTION
Overview of WINS
Unlike DNS the mappings are dynamically updated (e.g. at workstation boot), so that when
a client needs to contact another computer on the network it can get its up-to-date IP
address which may be issued by a DHCP server, aside from this the WINS functionality
provides a way of keeping the client names unique on the network.
Networks normally have more than one WINS server and each WINS server should be in
push/pull replication; where more than two WINS servers are required the best practice
replication model is the hub and spoke, thus the WINS design is not central but distributed.
Each WINS server holds a full copy of every other related WINS system's records. There is
no hierarchy in WINS (unlike DNS), but like DNS its database can be queried for the
address to contact rather than broadcasting a request for which address to contact. The
system therefore reduces broadcast traffic on the network, however replication traffic can
add to WAN/LAN traffic, although this can be set to replicate in non-busy periods. By
design any WINS client can register any name with any WINS server. This makes the
system prone to abuse or unreliable through poor administration.
All WINS clients should be configured to use a primary WINS server and a different
secondary WINS server. The secondary would normally be the hub server, The setting of
which WINS servers to use is either in the DHCP scope options or a per client hard coded
value.
As of Windows 2000, DNS provides the favored alternative to WINS, as part of Active
Directory.
In theory, if DNS is available, WINS is only necessary if pre-Windows 2000 clients or
servers need to resolve names. In reality, especially in large enterprise environments,
applications such as SMS 2003 with its use of the 1A record, SQL Server 2000 for use of
named pipes, and Exchange Server 2000 and 2003 often require WINS for full functionality.
The WINS server from Microsoft is only available as a service to run on the Windows
Server family of operating systems. The WINS client from Microsoft is common across all
its operating systems including DOS. Note that WINS clients can be devices such as IP
phones, and printers.
59 | P a g e
HOST NAME
WinSock applications utilize the IP address of the host name for a connection to be
established. Name resolution is not needed if the IP addresses are used to establish
connections. However, because host names are simpler to remember than IP an address,
the host name is typically used instead of the IP addresses. This is especially evident with
TCP/IP applications.
When the host name is used, and not the IP address, the host name has to be resolved to
an IP address for IP communication to occur. This is known as host name resolution. A
host name must match to an IP address that is located in a DNS server database, or in a
Hosts file.
60 | P a g e
Name resolution mechanisms:
LMHOSTS files
Network broadcasts
NetBIOS name cache
Windows Internet Naming Service (WINS)
Active Directory service
The common methods used to resolve host names are listed below:
NetBIOS name resolution: This is the process of mapping the NetBIOS name of the
computer to an IP address. With NetBIOS, communication occurs between NetBIOS
hosts via name discovery, name registration, and name release.
HOSTS file: This is a text file that includes the host names to IP addresses
mappings. The HOSTS file is stored locally.
DNS server: DNS resolves host names and fully qualified domain names (FQDNs)
to IP addresses in TCP/IP networks. The DNS server manages a database of host
name to IP address mappings. This is the primary method used for name resolution
in Windows Server 2003.
61 | P a g e
Recommended Additional Reading
Stalling W., Operating systems, 3rd Edition
Computer Networking: Beginner’s guide for Mastering Computer Networking and the
OSI Model (Computer Networking Series Book 1)
Recommended Digital Engagement and Activities
network tutorials:
http://www.ntu.edu.sg/home/ehchua/programming/cpp/cp0_introduction.html
62 | P a g e
Revision Exercise
TASK 1:
Which of the following devices translates hostnames into IP addresses?
a.
b.
c.
d.
a. DNS handler
b. DNS resolver
c. DNS updater
a. 255 characters
63 | P a g e
b. 127 characters
c. 63 characters
d. 31 characters
a. directly
c. it is not possible
b. hostname-to-address records
c. hostname aliases
7. If a server has no clue about where to find the address for a hostname then
8. Which one of the following allows client to update their DNS entry as their IP address change?
64 | P a g e
a. dynamic DNS
a. @
b. *
c. &
d. #
10. The right to use a domain name is delegated by domain name registers which are accredited by
b. internet society
Task 2:
MCQ: In version field of IPv4 header, when machine is using some other version of IPv4
then datagram is
A. Discarded
B. Accepted
C. Interpreted
D. Interpreted incorrectly
Answer
MCQ: Network layer at source is responsible for creating a packet from data coming from
another
A. Station
B. Link
65 | P a g e
C. Node
D. Protocol
Answer
A. 0 to 20 bytes
B. 20 to 40 bytes
C. 20 to 60 bytes
D. 20 to 80 bytes
Answer
A. Fixed length
B. Variable length
C. Global length
D. 0 length
Answer
MCQ: In IPv4, service type of service in header field, first 3 bits are called
A. Type of service
B. Code bits
C. Sync bits
D. Precedence bits
Answer
A. Receiver
B. Message
C. Sender
D. Network
Answer
Answer
66 | P a g e
A. Four Layers
B. Five Layers
C. Six Layers
D. Seven Layers
Answer
MCQ: Parameter that is normally achieved through a trailer added to end of frame is
A. Access Control
B. Flow Control
C. Error Control
D. Physical addressing.
Answer
MCQ: Packets of data that is transported by IP is called
A. datagrams
B. Frames
C. Segments
D. Encapsulate message
Answer
A. Email services
B. Frame Division
C. File Making
D. None of the above
Answer
A. Physical Layer
B. Data Link Layer
C. transport Layer
D. Network LAYER
Answer
A. Physical layer
B. Application layer
C. Presentation layer
D. Hardware
67 | P a g e
Answer
MCQ: Segmentation and reassembly is responsibility of
A. 7th Layer
B. 6th Layer
C. 5th Layer
D. 4th layer
Answer
MCQ: In encapsulation, data portion of a packet at level N - 1 carries whole packet from
level
A. N
B. N+1
C. N+2
D. N+3
Answer
Answer
MCQ: OSI model deals with physical, data link, network, transport, session and
A. Presentation layer
B. Application layer
C. both a and b
D. None of Above
Answer
Answer
A. 16bit long
B. 32bit long
C. 64bit long
D. 128bit long
Answer
MCQ: Both TCP and SCTP protocols are
A. Connection less
B. connection oriented
C. start but no ending
D. None of Above
Answer
A. Network
B. Transport
C. Presentation
D. Data link
Answer
A. packets
B. bits
C. Segments
D. frames
Answer
MCQ: Layer that are used to deal with mechanical and electrical specifications are
A. Physical Layer
B. Data Link Layer
69 | P a g e
C. Network Layer
D. Transport Layer
Answer
Berea College of Technology
70 | P a g e
System Software201
CONTENTS
4.2 READING
4.3 INTRODUCTION
4.7 EXERCISES
71 | P a g e
System Software201
describe the components of a computer, their role and function and discuss how cpu,
memory, storage and network resources are leveraged by systems software; articulate
the various forms of virtualization; (Systems - Theory)
manage multiple operating systems, systems software, network services and security
and demonstrate analytical skills in identifying and troubleshooting networking, security
and performance issues; (Managing Systems - Applied)
identify core networking and infrastructure components and the roles they serve; and
given requirements and constraints, design an IT infrastructure including devices,
topologies, protocols, systems software, management and security; (IT Infrastructure -
Theory)
analyze business requirements, research, develop and integrate solutions for enterprise
IT requirements; balance business, technical and security requirements and constraints.;
integrate operating systems, services, network devices, and security controls to meet the
requirements; (Developing Infrastructure Solutions - Applied)
72 | P a g e
System Sofware201
Introduction
Remote access is the ability to access a computer or
a network remotely through a network connection.
Remote access enables users to access the systems
they need when they are not physically able to
connect directly; in other words, users access
systems remotely by using a telecommunications or
internet connection. People at branch offices,
telecommuters and people who are traveling may
need access to their companies' networks.
REMOTE CONNECTIVITY
POINT-TO-POINT PROTOCOL
In networking, the Point-to-Point Protocol, or PPP, is a data link protocol commonly used to
establish a direct connection between two nodes over serial cable, phone line, trunk line,
cellular telephone, specialized radio links, or fiber optic links. Most Internet service
providers use PPP for customers' dial-up access to the Internet. Two common
encapsulated forms of PPP, Point-to-Point Protocol over Ethernet (PPPoE) or Point-to-
Point Protocol over ATM (PPPoA), are used in a similar role with Digital Subscriber Line
(DSL) Internet service.
is commonly used to act as a data link layer protocol for connection over synchronous and
asynchronous circuits, where it has largely superseded the older, non-standard Serial Line
Internet Protocol (SLIP), and telephone company mandated standards (such as Link
Access Protocol, Balanced (LAPB) in the X.25 protocol suite). PPP was designed to work
with numerous network layer protocols, including Internet Protocol (IP), Novell's
Internetwork Packet Exchange (IPX), NBF and AppleTalk.
73 | P a g e
VOCABULARY LIST
10Base2 - Ethernet specification for thin coaxial cable, transmits signals at 10 Mbps (megabits per second)
with a distance limit of 185 meters per segment.
10Base5 - Ethernet specification for thick coaxial cable, transmits signals at 10 Mbps (megabits per second)
with a distance limit of 500 meters per segment.
10BaseF - Ethernet specification for fiber optic cable, transmits signals at 10 Mbps (megabits per second)
with a distance limit of 2000 meters per segment.
10BaseT - Ethernet specification for unshielded twisted pair cable (category 3, 4, or 5), transmits signals at
10 Mbps (megabits per second) with a distance limit of 100 meters per segment.
100BaseT - Ethernet specification for unshielded twisted pair cabling that is used to transmit data at 100
Mbps (megabits per second) with a distance limit of 100 meters per segment.
1000BaseTX -Ethernet specification for unshielded twisted pair cabling that is used to transmit data at 1 Gbps
(gigabits per second) with a distance limitation of 220 meters per segment.
Asynchronous Transfer Mode (ATM) - A network protocol that transmits data at a speed of 155 Mbps and
higher. It is most often used to interconnect two or more local area networks.
AppleTalk - Apple Computer's network protocol originally designed to run over LocalTalk networks, but can
also run on Ethernet and Token Ring.
AUI Connector (Attachment Unit Interface) - A 15 pin connector found on Ethernet cards that can be used for
attaching coaxial, fiber optic, or twisted pair cable.
Bit - Binary digit in the binary numbering system. Its value can be 0 or 1. In an 8-bit character scheme, it
takes 8 bits to make a byte (character) of data.
BNC Connector (Bayone-Neill-Concelman) - Standard connector used to connect 10Base2 coaxial cable.
Bridge - Devices that connect and pass packets between two network segments that use the same
communications protocol.
Byte - an 8-bit long binary value, which originally mapped to text character values (between 0 and 255
decimal). For example, a decimal value of 65, represented in a binary byte is "01000001" and represents the
capital letter "A". A byte also is the atomic value of data storage, so a megabyte is the amount of memory
required to store a million bytes.
Cable - Transmission medium of copper wire or optical fiber wrapped in a protective cover.
Client/Server - A networking system in which one or more file servers (Server) provide services; such as
network management, application and centralized data storage for workstations (Clients).
CSMA/CA - Carrier Sense Multiple Access Collision Avoidance is a network access method in which each
device signals its intent to transmit before it actually does so. This prevents other devices from sending
74 | P a g e
information, thus preventing collisions from occurring between signals from two or more devices. This is the
access method used by LocalTalk.
CSMA/CD - Carrier Sense Multiple Access Collision Detection is a network access method in which devices
that are ready to transmit data first check the channel for a carrier. If no carrier is sensed, a device can
transmit. If two devices transmit at once, a collision occurs and each computer backs off and waits a random
amount of time before attempting to retransmit. This is the access method used by Ethernet.
Coaxial Cable - Cable consisting of a single copper conductor in the center surrounded by a plastic layer for
insulation and a braided metal outer shield.
Concentrator - A device that provides a central connection point for cables from workstations, servers, and
peripherals. Most concentrators contain the ability to amplify the electrical signal they receive.
DIN - A plug and socket connector consisting of a circular pattern of pins in a metal sleeve. This type of
connector is commonly seen on keyboards.
Dumb Terminal - Refers to devices that are designed to communicate exclusively with a host (main frame)
computer. It receives all screen layouts from the host computer and sends all keyboard entry to the host. It
cannot function without the host computer.
E-mail - An electronic mail message sent from a host computer to a remote computer.
Ethernet - A network protocol invented by Xerox Corporation and developed jointly by Xerox, Intel and Digital
Equipment Corporation. Ethernet networks use CSMA/CD and run over a variety of cable types at 10 Mbps
(megabits per second).
Expansion Slot - Area in a computer that accepts additional input/output boards to increase the capability of
the computer.
Fast Ethernet - An Ethernet standard that supports 100 Mbps using category 5 twisted pair or fiber optic
cable.
Fiber Distributed Data Interface (FDDI) - A network protocol that is used primarily to interconnect two or
more local area networks, often over large distances.
Fiber Optic Cable - A cable, consisting of a center glass core surrounded by layers of plastic, that transmits
data using light rather than electricity. It has the ability to carry more information over much longer distances.
File Server - A computer connected to the network that contains primary files/applications and shares them
as requested with the other computers on the network. If the file server is dedicated for that purpose only, it is
connected to a client/server network. An example of a legacy client/server network is Novell Netware. All the
computers connected to a peer-to-peer network are capable of being the file server. Most modern operating
systems can operate as servers or as clients, greying the distinction in the server architecture.
Firewall - A security device which inspects traffic entering and leaving a network, and allows or disallows the
traffic, depending on rules describing acceptable use of the network, by filtering out unwanted packets. The
firewall is usually positioned as the gateway device to another network, such as the internet. Many routers
now contain firewalls. A personal firewall is usually software that runs on a workstation or server to filter
unwanted traffic at the individual machine.
75 | P a g e
Gigabit Ethernet - An Ethernet protocol that raises the transmission rates to 1 Gbps (gigabits per second).
Most school, corporate, and household networks provide gigabit ethernet to the workstations via cabled
connections.
Hub - A hardware device that contains multiple independent but connected modules of network and
internetwork equipment. Hubs can be active (where they repeat signals sent through them) or passive (where
they do not repeat but merely split signals sent through them).
Infrared - Electromagnetic waves whose frequency range is above that of microwaves, but below that of the
visible spectrum.
Internet - A global network of networks used to exchange information using the TCP/IP protocol. It allows for
electronic mail and the accessing ad retrieval of information from remote sources.
LAN (Local Area Network) - A network connecting computers in a relatively small area such as a building.
Linear Bus - A network topology in which each node attaches directly to a common cable.
LocalTalk - Apple Corporation proprietary protocol that uses CSMA/CA media access scheme and supports
transmissions at speeds of 230 Kbps (Kilobits per second).
MAN (Metropolitan Area Network) - A network connecting computers over a large geographical area, such as
a city or school district.
Modem (Modulator/Demodulator) - Devices that convert digital and analog signals. Modems allow computer
data (digital) to be transmitted over voice-grade telephone lines (analog).
Multiplexer - A device that allows multiple logical signals to be transmitted simultaneously across a single
physical channel.
Network Modem - A modem connected to a Local Area Network (LAN) that is accessible from any
workstation on the network.
Network Interface Card (NIC) - A board that provides network communication capabilities to and from a
computer.
Network Operating System (NOS) - Operating system designed to pass information and communicate
between more than one computer. Examples include Linux/Unix and Windows Server.
Node - End point of a network connection. Nodes include any device attached to a network such as file
servers, printers, or workstations.
PCMCIA - (later versions were PCMCIA2 and PC Card) An expansion slot found in many laptop computers.
Largely replaced by USB in the 2000-2010 period.
76 | P a g e
Peer-to-Peer Network - A network in which resources and files are shared without a centralized
management source.
Physical Topology - The physical layout of the network; how the cables are arranged; and how the
computers are connected.
Protocol -A formal description of a set of rules and conventions that govern how devices on a network
exchange information.
RAID (Redundant Array of Inexpensive Disks) - A configuration of multiple disks designed to preserve data
after a disk casualty.
RAM (Random Access Memory) - The working memory of a computer where data and programs are
temporarily stored. RAM only holds information when the computer is on.
Repeater - A device used in a network to strengthen a signal as it is passed along the network cable.
Router -A device that routes information between interconnected networks. It can select the best path to
route a message, as well as translate information from one network to another. Many routers now contain
firewalls. Home routers can contain firewall, router, switching (for cabled connections), and a wireless access
point.
SCSI (Small Computer Serial Interface) - An interface controller that allows several peripherals to be
connected to the same port on a computer.
Segment - Refers to a section of cable on a network. In Ethernet networks, two types of segments are
defined. A populated or trunk segment is a network cable that has one or more nodes attached to it. A link
segment is a cable that connects a computer to an interconnecting device, such as a repeater or
concentrator, or connects a interconnecting device to another interconnecting device.
Sneaker-Net - Refers to a manual method of sharing files in which a file is copied from a computer to a floppy
disk, transported to a second computer by a person physically walking (apparently wearing sneakers) to the
second computer, and manually transferring the file from floppy disk to the second computer.
Speed of Data Transfer - The rate at which information travels through a network, usually measured in
megabits per second.
Star Topology - LAN topology in which each node on a network is connected directly to a central network
hub or concentrator.
Star-Wired Ring - Network topology that connects network devices (such as computers and printers) in a
complete circle.
Switch - A "intelligent" type of hub, in that it sends packets only to the intended ports, rather than all
computers on the network.
77 | P a g e
Tape Back-Up - A common server or network peripheral which allows copying data and programs
from a computer system to magnetic tape. On tape, data is stored sequentially. When retrieving data,
the tape is searched from the beginning of tape until the data is found.
Terminator - A device that provides electrical resistance at the end of a transmission line. Its function
is to absorb signals on the line, thereby keeping them from bouncing back and being received again
by the network.
Thicknet - A thick coaxial cable that is used with a 10Base5 Ethernet LAN.
Thinnet - A thin coaxial cable that is used with a 10Base2 Ethernet LAN.
Token - A special packet that contains data and acts as a messenger or carrier between each
computer and device on a ring topology. Each computer must wait for the messenger to stop at its
node before it can send data over the network.
Token Ring - A network protocol developed by IBM in which computers access the network through
token-passing. Usually uses a star-wired ring topology.
Topology - There are two types of topology: physical and logical. The physical topology of a network
refers to the configuration of cables, computers, and other peripherals. Logical topology is the method
used to pass the information between workstations. Issues involving logical topologies are discussed
on the Protocol chapter
Transceiver (Transmitter/Receiver) - A Device that receives and sends signals over a medium. In
networks, it is generally used to allow for the connection between two different types of cable
connectors, such as AUI and RJ-45.
Tree Topology - LAN topology similar to linear bus topology, except that tree networks can contain
branches with multiple nodes.
78 | P a g e
Recommended Additional Reading
Stalling W., Operating systems, 3rd Edition
Computer Networking: Beginner’s guide for Mastering Computer Networking and the
OSI Model (Computer Networking Series Book 1)
Recommended Digital Engagement and Activities
network tutorials:
http://www.ntu.edu.sg/home/ehchua/programming/cpp/cp0_introduction.html
79 | P a g e
Revision Exercise
Exercise 1
A. Web
B. Server
C. Domain
D. Client
Answer
MCQ: To let client know about type of document sent, a CGI program creates
A. Body
B. Header
C. Borders
D. Footer
Answer
A. Proxy Domain
B. Proxy Documents
C. Proxy Server
D. Proxy IP
Answer
A. TCP/IP
B. WWW
C. HTML
D. FTP
Answer
MCQ: A browser can retrieve and run an HTML file that has embedded address of
A. Applets
B. Language
C. HTML
D. HTTP
80 | P a g e
Answer
MCQ: Nontextual information such as digitized photos or graphic images is not a physical
part of an
A. WebPage
B. WebData
C. HTML
D. Web-document
Answer
Answer
MCQ: To use proxy server, client must be configured to access proxy instead of the
A. Proxy Server
B. Target Server
C. Domain Server
D. Original Server
Answer
A. IP
B. Header
C. Document
D. Cache
Answer
A. C++
B. Perl
C. java
D. Php
Answer
MCQ: Documents that are created and stored in a server as a Fixed Content are called
A. Static Documents
B. Stateless Document
81 | P a g e
C. Active Documents
D. Dynamic Documents
Answer
A. Different
B. Similar
C. Constant
D. Active
Answer
A. Connection Generation
B. Reserved Connection
C. Connection termination
D. Active Connection
Answer
MCQ: In WWW and HTTP. a technology that creates and handles dynamic documents is
called
Answer
A. Web Documents
B. HyperLink Documents
C. Static Documents
D. Active Documents
Answer
MCQ: In World Wide Web (WWW), an electronic store (e-commerce) can use a cookie for
its
A. Client Shopper
B. Server Usage
C. Server Data
D. Client Data
Answer
82 | P a g e
MCQ: HTTP uses a TCP connection to
Answer
MCQ: In Hyper Text Transfer Protocol (HTTP), a client can directly connect to a server using
A. Web-based connection
B. Domain
C. TELNET
D. Linear Connection
Answer
Answer
MCQ: A Web page is made up of two parts
Answer
REFERENCES
Introduction to Computer Networking: Your First Steps into How the Internet
and Networks Work (Computer Networking Series Book 5)
84 | P a g e