8.Explain a Management Information Base (MIB)?
Ans:
A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device’s status, its performance, connections, and configuration. The MIB is queried by SNMP
Mechanism of POP3
•Since email needs to be downloaded into desktop PC before being displayed, you may have the following problems for POP3 access:
You need to download all email again when using another desktop PC to check your email.
May get confused if you need to check email both in the office and at home.
The downloaded email may be deleted from the server depending on the setting of your email client.
•All messages as well as their attachments will be downloaded into desktop PC during the ‘check new email’ process.
•Mailboxes can only be created on desktop PC. There is only one mailbox (INBOX) exists on the server.
•Filters can transfer incoming/outgoing messages only to local mailboxes.
•Outgoing email is stored only locally on the desktop PC.
•Messages are deleted on the desktop PC. Comparatively, it is inconvenient to clean up your mailbox on the server.
•Messages may be reloaded onto desktop PC several times due to the corruption of system files.
Mechanism of IMAP
•Since email is kept on server, it would gain the following benefits for IMAP access:
No need to download all email when using other desktop PC to check your email.
Easier to identify the unread email.
•A whole message will be downloaded only when it is opened for display from its content.
•Multiple mailboxes can be created on the desktop PC as well as on the server.
•Filters can transfer incoming/outgoing messages to other mailboxes no matter where the mailboxes locate (on the server or the PC).
•Outgoing email can be filtered to a mailbox on server for accessibility from other machine.
•Messages can be deleted directly on the server to make it more convenient to clean up your mailbox on the server.
•The occurrence of reloading messages from the server to PC is much less when compared to POP3.
10.What is ERD(Emergency Repair Disk)?
Ans:
To create an ERD:
1. Click Start, point to Programs, point to Accessories, point to System Tools, and then click Backup.2. On the Tools menu, click Create an Emergency Repair Disk.
You can use the ERD for the following repair functions:
• Inspect and repair the startup environment.
• Verify the Windows 2000 system files and replace missing or damaged files.
• Inspect and repair the boot sector.
When you attempt to repair Windows 2000, it asks if you have an ERD diskette, if you do not have the diskett, press L and thecomputer attempts to locate your Windows 2000 installation to perform repairs. This process looks for the Boot.ini file on your computer partition and reads the ARC paths to your operating system(s). The computer then attempts to load the following hive for each ARC path:
%systemroot%\System32\Config\Software
This attempt finds which installation versions matches the installation CDROM used to do the repair.
If the Boot.ini file cannot be read, or the software hive is corrupt, the repair is not able to proceed. At this time, you must have a ERD diskette containing a valid Setup.log file for that computer before repairs are possible.
The registry hives saved during setup are in the following folder:
%systemroot%\repair
The registry hives are used during a FAST repair only, otherwise you need to use Recovery Console to manually copy a more recent registry hive saved by NTbackup in the following folder:
%systemroot%\repair\regback
Your IP address remains the same so that you can run Internetservices that require your IP address to remain the same in order for them to work properly (ie. Web Server, FTP Server).
If, for some reason, the RPI DHCP server is having difficulties handing out IP address, you will still be able to access the web, since your IP is predetermined.
Disadvantages:
You will only be able to effectively use your static IP address from your place of residence. You will be unable to use the web from other places on campus.
Configuring the network settings on your computer is more difficult for static IP than for DHCP, since DHCP is automatic and static IP is manual.
1. What is an Object server?
With an object server, the Client/Server application is written as a set of communicating objects. Client object communicate with server objects using an Object Request Broker (ORB). The client invokes a method on a remote object. The ORB locates an instance of that object server class, invokes the requested method and returns the results to the client object. Server objects must provide support for concurrency and sharing. The ORB brings it all together.
2. What is a Transaction server?
With a transaction server, the client invokes remote procedures that reside on the server with an SQL database engine. These remote procedures on the server execute a group of SQL statements. The network exchange consists of a single request/reply message. The SQL statements either all succeed or fail as a unit.
3. What is a Database Server?
With a database server, the client passes SQL requests as messages to the database server. The results of each SQL command are returned over the network. The server uses its own processing power to find the request data instead of passing all the records back to the client and then getting it find its own data. The result is a much more efficient use of distributed processing power. It is also known as SQL engine
Q: What are the seven layers of the OSI model?
A: The layers are physical, data link, network, transport, session, presentation, and application layers.
Q: In the TCP client-servel model, how does the three-way handshake work in opening connection?
A: The client first sends a packet with sequence "x" to the server. When the server receives this packet, the server will send back another packet with sequence "y", acknowledging the request of the client. When the client receives the acknowledgement from the server, the client will then send an acknowledge back to the server for acknowledging that sequence "y" has been received.
Q: What is the purpose of exchanging beginning sequence numbers during the the connection in the TCP client-server model?
A: To ensure that any data lost during data transfer can be retransmitted.
Q: How does Asynchronous Transfer Mode (ATM) work?
A: ATM works by transmitting all traffic in small, fixed-sized cells. These small, fixed-size cells reduces queuing delay and can be switched quickly. ATM fits into layer 2 of the OSI model and provides functions for framing and error correction. At the port interface, ATM switches convert cells into frames, and vice versa. ATM provides Quality of Service and traffic shaping.
Q: Given a Class B Network with subnet mask of 255.255.248.0 and a packet addressed to 130.40.32.16, what is the subnet address?
A: Take the 2 addresses, write them in binary form, then AND them. The answer is 130.40.32.0
.