BCS052 Valid upto April 2016 1.(a) Why would an application use UDP instead of TCP? Discuss. Ans:1(aUDP provides an unreliable service and datagram may arrive out of order, appear duplicated, or go missing without notice. UDP assumes that error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level. Timesensitive applications often use UDP because dropping packets is preferable to wait for delayed packets, which may not be an option in a real-time system. The User Datagram Protocol (UDP) is a transport layer protocol for use with the IP network layer protocol. It provides a best-effort datagram service to an end system (IP host). UDP provides no guarantee for delivery and no protection from duplication, but the simplicity of UDP reduces overhead from the protocol and can be adequate for some applications. A computer may send UDP packets without first establishing a connection to a recipient. The computer completes the appropriate fields in the UDP header (PCI) and forwards the data together with the header for transmission by the IP network layer. Typically, use UDP in applications where speed is more critical than reliability. For example, it may be better to use UDP in an application sending data from a fast acquisition where it is acceptable to lose some data points. You can also use UDP to broadcast to any machine(s) listening to the server. (b) What is the purpose of VPNs and what are the main features they provide? VPN gives extremely secure connections between private networks linked through the Internet. It allows remote computers to act as though they were on the same secure, local network. A VPN is useful facility and is essential if you travel with a laptop computer, tablet or smartphone. It can be used by both private users and businesses, but in different ways. There are free and paid versions, and each has pros and cons, so let's take a look at what one is and what it does. A Virtual Private Network (VPN) connects two computers securely and privately over the internet, even though that is a public network. A VPN client on one computer connects to a VPN server on another computer and by using encryption and other security measures, no-one can see what information is being exchanged. One use of this technology is to extend a private network across the internet to another location. For example, a businesses can enable workers with laptops on BCS052 Valid upto April 2016 the road or at home to connect to the company network as if they were sat at a desk in the office. The network traffic is routed across the internet from the user to the company, but it is encrypted and therefore secure from eavesdropping and interception. A company that has offices in two locations can connect them using a VPN across the internet so there appears to be one network. VPNs aren't just for businesses and because the connection is private and secure, another use is to access the internet anonymously. Anyone that wants to protect their privacy and security online should use a VPN. Everywhere online someone is tracking your activities. ISPs monitor internet usage and may restrict the bandwidth if they detect certain activities. P2P file sharing and BitTorrent traffic is speed-limited for instance. Websites you visit get your IP address, location, browser and operating system, screen resolution, ISP and more. To see what information you reveal, go to stayinvisible.com. A VPN stops websites spying on you by hiding data that could identify you. 2. (a) Draw the IP datagram header format. ―IP datagram has a checksum field still and it’s called an unreliable protocol.‖ Justify. IP DATAGRAM HEADER FORMAT 1 While it has a checksum field (error detection), it has no way to recover if an error is found (error correction). In TCP, the packet is NACK'd and resent (or dropped and resent after the ack timer expires on the sender, I don't remember). IP will just drop the packet if an error is detected at that level. (b) What is an ―internetwork? State and compare internetworking devices used to connect different LAN segments. An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. BCS052 Valid upto April 2016 Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administeringinternetworks. An Internet working device used to connect different LAN segments is called a Modem. A Modem can be either hard wired to the computer or use a Wi-Fi connection to connect to the computer. Dial up Modems were also used that ran through telephone lines. 3. (a) Describe the activities to be performed at every layer in the TCP model when information flows from layer to another layer. The TCP/IP protocol system is subdivided into layered components, each of which performs specific dutiesThis model, or stack, comes from the early days of TCP/IP, and it is sometimes called the TCP/IP model. The official TCP/IP protocol layers and their functions are described in the following list. Compare the functions in the list with the responsibilities listed earlier in this section, and you’ll see how the responsibilities of the protocol system are distributed among the layers. Network Access layer: Provides an interface with the physical network. Formats the data for the transmission medium and addresses data for the subnet based on physical hardware addresses. Provides error control for data delivered on the physical network. Internet layer: Provides logical, hardware-independent addressing so that data can pass among subnets with different physical architectures. Provides routing to reduce traffic and support delivery across the internetwork. (The term internetwork refers to an interconnected, greater network of local area networks (LANs), such as what you find in a large company or on the Internet.) Relates physical addresses (used at the Network Access layer) to logical addresses. Transport layer: Provides flow-control, error-control, and acknowledgment services for the internetwork. Serves as an interface for network applications. Application layer: Provides applications for network troubleshooting, file transfer, remote control, and Internet activities. Also supports the network application programming interfaces (APIs) that enable programs written for a particular operating environment to access the network. BCS052 Valid upto April 2016 When the TCP/IP protocol software prepares a piece of data for transmission across the network, each layer on the sending machine adds a layer of information to the data that is relevant to the corresponding layer on the receiving machine. For instance, the Internet layer of the computer sending the data adds a header with some information that is significant to the Internet layer of the computer receiving the message. This process is sometimes referred to as encapsulation. At the receiving end these headers are removed as the data is passed up the protocol stack. (b) Classify the problems faced by network administrator. Make a chart to explain the available solutions for each problem. A number of challenges as it is more than just installing computers and networks. You have to make sure your network: o Is designed efficiently, o Is capable of mass management – updating multiple machines at once o Is secured from threats, and internal and external hackers o Meets all of your users requirements and needs And not only for your network, you to have to also: o Understand the users and organisations needs and wants o Be able to troubleshoot and fix problems and errors quickly o Be up to date with the latest technical knowledge and computer news o Be able to write documentation and instructions The basics steps for solving a computer related problem are: 1. Detect the fault of problem 2. Isolate the problem 3. Troubleshoot on how to fix the problem o (Make sure you document your steps or make a backup before you do anything) 4. Carry out tests and use tools to diagnose the problem 5. Solve the problem and document a fix If your network is critical, you cannot just simply reboot a machine, or click a few random buttons to see if you can fix the problem. You have plan how you will fix the problem in the quickest amount of time without causing more disruption to your users, or break it even more. 1. First of all – be systematic. Try the simple things first. If a computer won’t start, make sure the power is turned on. 2. Read logs – Logs provide a lot of information on when things go wrong. So make sure you read and understand what the logs are telling you 3. Pay attention to all the facts BCS052 Valid upto April 2016 4. Read the documentation – yes, it does help and it’s not always there to take up space in the packaging 5. Talk to others – get on the internet, forums, blogs because other people would likely have faced your issue or know how to help, and ask your colleagues 6. Use test environments – see if you can cause the issue again, and then test the ways on how you can fix it. In a test environment, you know you can’t break the production server any more 7. Know your tools – you usually need something to work out how to fix the problem, or even to find out what the problem actually is. You might not know you have a virus if you don’t conduct a scan 8. Work out the root cause of the problem – hardware failure, user interaction, external event? 9. Have a backup in place – make sure that you can restore the system to what it was like before the problem 10. Do it quickly – Users are being affected and can have a large financial loss to the organisation if the system is down. Fix it first, and then discuss the politics 4. (a) Explain the connection oriented & connection less services using bind, connect, listen & accept system calls. Connection Oriented Service The typical set of system calls on both the machines in a connection-oriented setup is shown in Figure below. BCS052 Valid upto April 2016 The sequence of system calls that have to be made in order to setup a connection is given below. 1. The socket system call is used to obtain a socket descriptor on both the client and the server. Both these calls need not be synchronous or related in the time at which they are called. 2. Both the client and the server 'bind' to a particular port on their machines using the bind system call. This function has to be called only after a socket has been created and has to be passed the socket descriptor returned by the socket call. Again this binding on both the machines need not be in any particular order. Moreover the binding procedure on the client is entirely optional. The bind system call requires the address family, the port number and the IP address. The address family is known to be AF_INET, the IP address of the client is already known to the operating system. All that remains is the port number. Of course the programmer can specify which port to bind to, but this is not necessary. The binding can be done on a random port as well and still everything would work fine. The way to make this happen is not to call bind at all. Alternatively bind can be called with the port number set to 0. This tells the operating system to assign a random port number to this socket. This way whenever the program tries to connect to a remote machine through this socket, the operating system binds this socket to a random local port. This procedure as mentioned above is not applicable to a server, which has to listen at a standard predetermined port. 3. The next call has to be listen to be made on the server. 4. The connect system call signifies that the server is willing to accept connections and thereby start communicating. 5. The connect function is then called on the client with three arguments, namely the socket descriptor, the remote server address and the length of the address data structure. 6. The request generated by this connect call is processed by the remote server and is placed in an operating system buffer, waiting to be handed over to the application which will be calling the acceptfunction. The accept call is the mechanism by which the networking program on the server receives that requests that have been accepted by the operating system.. The accept call is a blocking system call. In case there are requests present in the system buffer, they will be returned and in case there aren't any, the call simply blocks until one arrives. 7. Finally when both connect and accept return the connection has been established. Connectionless Service BCS052 Valid upto April 2016 The typical set of system calls on both the machines in a connectionless setup is shown in Figure below. The socket and bind system calls are called in the same way as in the connection-oriented case. Again the bind call is optional at the client side. The connect function is not called in a connectionless communication with the sane intention as above. Instead, if we call a connect() in this case, then we are simply specifying a particular server address to which we have to send, and from which we have to receive the Datagrams Every time a packet has to be sent over a socket, the remote address has to be mentioned. This is because there is no concept of a connection that can remember which remote machine to send that packet to. The calls sendto and recvfrom are used to send datagram packets. Both these calls block until a packet is sent in case of sendto and a packet is received in case of recvfrom. In the strict sense though sendto is not blocking as the packet is sent out in most cases andsendto returns immediately. Suppose if the program desires to communicate only to one particular machine and make the operating system discard packets from all other machines, it can use the connect call to specify the address of the machine with which it will exclusively communicate. All subsequent calls do not require the address field to be given. It will be understood that the remote address is the one specified in connect called earlier. (b) List and explain the features of any four popular enterprisesecurity solutions. BCS052 Valid upto April 2016 Hexaware’s Enterprise Security Solutions Real-time analysis of security data helps in detecting attacks in progress Analyzing both firewall and intrusion detection data raises the awareness of security threats exponentially Correlating external threat activity with the unique requirements of your organization’s environment results in actionable, prioritized remediation recommendations Seamlessly integrate compliance reporting with fully-customizable configuration auditing standards, to provide “one stop shop” for both internal and external auditors Automatically collect and compare configuration and asset data against established baselines Collect real-time information regarding file integrity and the transfer of data to removable media devices on servers and workstations, and correlate with other relevant security information including other configuration and asset data, performance metrics, and network flow data Dynamic Enterprise Security Solutions LTD. Is an independent integrated security and life safety systems solution provider. Our staff have enviable reputations and a proven track record of providing high quality installations within all sectors of the security industry. Based from our office in Manchester we offer nationwide coverage with works ranging from basic installations to project consultations accounting for design from Procurement and Installation of major integrated systems. Within the industry it is all too common to encounter an adversarial relationship between contractor/client and sub-contractor, we aim to bring a partnering approach to all our projects and foster long term relationships. We believe in providing a well engineered solution to fit all our clients’ needs. Microsoft Services will help you identify and implement the best enterprise security solutions to address your company’s unique challenges and goals. Cyber Threat Assistance: Experts when you need them to respond to cyber threats or attacks within your environment Assessment: Comprehensive threat and vulnerability assessments of your enterprise data security and identity infrastructure and processes Strategy and Architecture: Guidance, mitigation steps and prescriptive roadmaps Identity and Access Control: Efficient and effective identity design, architecture and processes to help protect critical information and secure administrative accounts while preparing you to adopt mobility and cloud solutions BCS052 Valid upto April 2016 Fundamentals: Technical assistance to help you implement infrastructure, network, and core operating system security Symantec Protection Suite Enterprise Symantec Insight separates files at risk from those that are safe, for faster and more accurate malware detection on Windows and Mac laptops, desktops, servers, messaging and web gateways--protection beyond antivirus. Real Time SONAR 3 examines programs as they run, identifying and stopping malicious behavior even of new and previously unknown threats. Protection for Virtual Environments helps secure your virtual infrastructure and automatically identify and manage virtual clients. Catch more than 99% of spam and prevent data loss with advanced content filtering to identify and control the flow of sensitive data in email and IM. Web gateway security that protects against web threats, including malicious software, spyware, botnets, viruses, and malware. Deeper security insights from the world’s largest civilian threat intelligence network provides deeper understanding into local and global threat landscape. IBM Security Solutions IBM Security solutions help you establish a holistic and mature security posture that can helpreduce costs, improve service, manage risk and enable innovation. Security intelligence and analytics -Apply analytics and automation to data and incidents to detect threats, perform forensic analysis and automate compliance. Identity and access management- Govern and enforce access across multiple channels, including mobile, social and cloud. Application security - Test and verify applications before deployment to reduce risks and costs. Advanced fraud protection - Detect and prevent attack vectors responsible for the majority of online, mobile and cross-channel fraud. Data security and privacy- Prevent data loss and enable data access to support business operations, growth and innovation. Infrastructure protection- Achieve in-depth security across your networks, servers, virtual servers, mainframes and endpoints. BCS052 Valid upto April 2016 5. (a) What is a mail server? Briefly explain specifying the protocols involved how a sender can send a mail to the server and the recipient retrieves it from the server? A mail server (also known as a mail transfer agent or MTA, a mailtransport agent, a mail router or an Internet mailer) is an application that receives incoming email from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery. our Internet Service Provider has a special computer called mail server, which is responsible for collecting mail from their customers. When you click the send button, your computer connects to the mail server and transmits the message along with the list of recipients. The message is transmitted with Simple Mail Transfer Protocol (SMTP). SMTP is a language that your mail program uses to speak to the mail server. SMTP lets your mail program specify the list of recipients and the text of the message.The mail server that understands SMTP is frequently called Outgoing SMTP Server.Your destination recipient also has an Internet Service Provider. They have a mail server too.When your SMTP server decides that it's time to send your email, it connects to the destination mail server and transmits the message to it. They use SMTP to speak to each other. Therefore the destination mail server is frequently called Destination SMTP Server.Destination SMTP server stores the email message until your recipient decides to check if some email arrived.When the recipient decides to check the email, his email program connects to the destination SMTP server and retrieves mail from the server. This time, they usePost Office Protocol Version 3 (POP3), which is a language used to receive mail. Therefore, this server is usually called Incoming POP3 Server. Destination SMTP server for you is Incoming POP3 server for your recipient. When your recipient replies, the situation reverses - now your mail server becomes a Destination SMTP server from the viewpoint of the reply sender. POP3 service is not necessary. There are other means to access mail on the destination mail server. For example, you can use Web browser to access Hotmail® or Yahoo Mail without downloading all the mail to your computer. There are millions of SMTP servers all around the world. How your SMTP server knows where to send the message? This information is stored in so called MX records. MX is not an abbreviation, it doesn't mean anything. The MX record shows which destination SMTP server must be used for the specific email address. For example, the MX record for aysoft@aysoft.com points to the server called slim.aysoft.com. The database of MX records is maintained by a network called Domain Name Service (DNS). To get access to the MX records, you must have access to the DNS server and have a permission to retrieve MX records. BCS052 Valid upto April 2016 You can look up MX records for any e-mail address with special software, such as AY Spy. there are two SMTP servers involved in sending each message. Your outbound SMTP server is working as a relay - it accepts your message and relays it to the other server.When Internet just started, any SMTP server used to work as relays the message used to be passed from server to server freely. As the email system got abused by spammers, fewer and fewer servers were working this way. Now all open relays are closed. The only server that will relay for you is the one given to you by your Internet Service Provider. It is also possible to bypass all relays and send email directly to the destination server. 5 (b) Explain the importance of three-way handshake method for connection establishment in TCP/IP with the help of suitable diagram. To establish a connection, each device must send a SYN and receive an ACK for it from the other device. Thus, conceptually, we need to have four control messages pass between the devices. However, it's inefficient to send a SYN and an ACK in separate messages when one could communicate both simultaneously. Thus, in the normal sequence of events in connection establishment, one of the SYNs and one of the ACKs is sent together by setting both of the relevant bits (a message sometimes called a SYN+ACK). This makes a total of three messages, and for this reason the connection procedure is called a three-way handshake A three-way-handshake is primarily used to create a TCP socket connection. It works when: BCS052 Valid upto April 2016 A client node sends a SYN data packet over an IP network to a server on the same or an external network. The objective of this packet is to ask/infer if the server is open for new connection. The target server must have open ports that can accept and initiate new connections. When the server receives the SYN packet from the client node, it responds and returns a confirmation receipt - the ACK packet or SYN/ACK packet. The client node receives the SYN/ACK from the server and responds with an ACK packet. 6. (a) Draw the TCP header and list its components. Also, explain how can TCP handle urgent data? Following is the brief description of all the different sections of TCP Header:(1) Source Port Number This is a 16-bit number which specifies the source port number corresponding to the application which is sending the segment. (2) Destination Port Number It is a 16-bit number which specifies the port number of the application program that is receiving the TCP segments at the destination computer. (3) Sequence Number( 32 bits) It specifies the number assigned to the first byte of the data portion of the TCP segment. Each byte to be transmitted is numbered in an increasing sequence. Since sequence number refers to a byte count rather than a segment count, sequence numbers in contiguous TCP segments are not numbered sequentially. (4) Acknowledgment Number (32 bits) This is used by the receiver to acknowledge the received data. It indicates the sequence number of the next byte expected from the sender. For example: On receiving a segment with sequence number X, the receiver BCS052 Valid upto April 2016 sends back X+1 as the acknowledgement number. It defines the sequence number which the receiver is expecting next. (5) HLEN (Header Length: 4 bits) It indicates the length of the TCP Header. The length of the TCP header can be between 20 bytes to 60 bytes. (6) Reserved (6 bits) It is reserved for future use. The values set in this field must be zero. (7) Control Flags (6 bits) This field contains six different control flags that are used to control certain aspects of the TCP connection such as connection establishment, connection termination and flow control. The flags include: (a) URG (Urgent Pointer): When this control flag is set, the ACK indicates that the current segment contains urgent (or high priority) data and that the urgent pointer field value is valid. (b) ACK (Acknowledgement): When this control flag is set, it indicates that the value contained in the acknowledgement number field is valid. It is usually set, except during the first message during connection establishment. (c) PSH (Push): It is used when the transmitting application want s to force TCO to immediately transmit the data that is currently buffered to the application without waiting for the buffer to fill. (d) RST (Reset): When set, RST immediately terminates the process to process TCP connection. (e) SYN (Synchronize): It is set in initial segments used to establish a connection, when a client sends request to the server by generating sequence number. (f) FIN (Finish): It is set to request normal termination of the TCP connection in the direction this segment is travelling. Complete closure of the connection requires one FIN segment in each direction. (8) Window Size (16 bits) This field is used for flow control the segments. It determines the size of the window of the other party must maintain to receive the segments. It is basically the number of transmitted bytes that the receiver of the segment is willing to accept from the sender. (9) Checksum (16 bits) It provides bit error detection for the segment (including the header and data). (10) Urgent Pointer (16 bits) This field is used in situations when the segment contains urgent data. It indicates the position of the first octet of non-printing data in the segment. (11) Options This field contains 40 bytes of optional information about connection BCS052 Valid upto April 2016 establishment. For example: SACK option which stands for Selective Acknowledgement. It allows out of sequence segments to be accepted by a receiver. When an interactive hits the DEL or CTRL-C key to break-off a remote computation that has already begun, the sending application puts some control information in the data stream and gives it to TCP along with the URGENT flag. This even causes TCP to stop accumulating data and transmit everything it has for that connection immediately. The receiving application is interrupted so it can stop whatever it was doing so that it can read the data stream to find the urgent data. (b) What do you understand by a domain name? How is a domain name translated to an equivalent IP address? In its most simple definition, a domain name is a unique name that serves as an identifier for a website. This name, commonly known as a Web address, is how websites across the World Wide Web are accessed. It is done by either physically entering the address into a browser's address bar or by clicking on a link or hyperlink that is embedded in a webpage, email address, or other resource. All domain names end with a suffix, the trailing .es, .org, .net, and so forth, that serves as an indication of what type of website the address belongs to, or in some cases, a country code that indicates the website's general geographic locality. On a final note, whenever a website is accessed, a service that is referred to as a Domain Name Service (DNS), silently and dynamically translates the domain name into an IP address, the actual address that computers use to identify and communicate with each other. Translating a domain name to IP address is handled by a Domain Name Service (DNS). They map domain names to IP addresses that are stored in a database. Networked computers use IP addresses to effectively communicate with and identify each other. Domain names were created so that humans, applications, and singular computers do not have to be concerned with trying to remember IP addresses. For a domain name to function, it has to be mapped through a process known as DNS name resolution, and it is simply a DNS server taking a name, matching it with an IP number, and then returning a resource to the requesting client. Additional information about domain names, IP addresses, DNS, their purpose and how they all work together, follows. 7. (a) List the protocols presently supported by Intranet and explain the use of each protocol in Intranet administration. HTTPd It stands for HTTP daemon. A daemon is a UNIX background process that implements the server side of a protocol. For example, FTPd is the BCS052 Valid upto April 2016 File Transfer Protocol daemon. HTTP daemon, a software program that runs in the background of a Web server and waits for incoming server requests. The daemon answers the requests automatically and serves the hypertext and multimedia documents over the Internet using HTTP. HTTPd is the program you would run on a UNIX platform to establish a web server. Daemons are unique to UNIX on other platforms, such as Microsoft Windows NT, the web server is a background process implemented as a system service. SOCKS SOCKS is an Intranetprotocol that facilitates the routing of network packets between client–server applications via a proxy server. SOCKS perform at Layer 5 of the OSI model—the Session Layer Port 1080 is the well-known port designated for the SOCKS server. The SOCKS5 protocol was originally a security protocol that made firewalls and other security products easier to administer. It was approved by the IETF in 1996. The protocol was developed in collaboration with Aventail Corporation, which markets the technology outside of Asia. #ARP / RARP (Address resolution protocol & Reverse Address resolution Protocol):- It is a basic communication protocol that is used to identify IP address if physical address is known. It is used by networking equipment. It obtains the MAC address for requesting device. It is also used to translate MAC address to IP address & vice-versa. The Address Resolution Protocol uses a simple message format that contains one address resolution request or response. The size of the ARP message depends on the upper layer and lower layer address sizes, which are given by the type of networking protocol (usually IPv4) in use and the type of hardware or virtual link layer that the upper layer protocol is running on. The message header specifies these types, as well as the size of addresses of each. The message header is completed with the operation code for request (1) and reply (2). The payload of the packet consists of four addresses, the hardware and protocol address of the sender and receiver hosts. BCS052 Valid upto April 2016 #SSLSecure Socket Layer (SSL), are cryptographic protocols that provide security for communications over networks such as the Internet. TLS and SSL encrypt the segments of network connections at the Transport Layer end-to-end. Several versions of the protocols are in widespread use in applications like web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP). # SSH Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. Used primarily on GNU/Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for Telnet and other insecure remote shells, which send information, notably passwords, in plaintext, rendering them susceptible to packet analysis. The encryption used by SSH provides confidentiality and integrity of data over an insecure network, such as the Internet. #RSH The remote shell (rsh) is a command linecomputer program that can execute shell commands as another user, and on another computer across a computer network. The remote system to which rsh connects runs the rshddaemon. The rshd daemon typically uses the well-knownTransmission Control Protocol (TCP) port number 514. (b) How many networks can each IP address class (A, B and C) can have? Calculate and justify your answer using a suitable example for each. Class A Address The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from 1 – 127, i.e. Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range 127.x.x.x is reserved for loopback IP addresses. The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A addressing can have 126 networks (27-2) and 16777214 hosts (2242).Class A IP address formatisthus: 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH BCS052 Valid upto April 2016 Class B Address An IP address which belongs to class B has the first two bits in the first octet set to 10, i.e. Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class B is 255.255.x.x. Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses. Class B IP address format is: 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH Class C Address The first octet of Class C IP address has its first 3 bits set to 110, that is: Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for Class C is 255.255.255.x. Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses. Class C IP address format is: 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH 8. (a) What is the purpose of DNS? What is the function of a secondary or tertiary DNS server? In which case will the lookups be transferred to additional DNS servers? DNS Stands for "Domain Name System." Domain names serve as memorable names forwebsites and other services on the Internet. However, computers access Internet devices by their IP addresses. DNS translates domain names into IP addresses, allowing you to access an Internet location by its domain name. Thanks to DNS, you can visit a website by typing in the domain name rather than the IP address. For example, to visit the Tech Terms Computer Dictionary, you can simply type "techterms.com" in the address bar of your web browser rather than the IP address (67.43.14.98). It also simplifies email addresses, since DNS translates the domain name (following the "@" symbol) to the appropriate IP address. The major point in having a secondary DNS server is as backup in the event the primary DNS server handling your domain goes down. In this case, your server would be still up, and so without having a backup, nobody could get to your server possibly costing you lots of lost customers (i.e. REAL MONEY). BCS052 Valid upto April 2016 A secondary DNS server is always up, and ready to serve. It can help balance the load on the network as there are now more than one authoritative place to get your information. Updates are generally performed automatically from the master DNS. Thus it is an exact clone of the master. Generally a DNS server contains more information than just a single server, it might contain mail routing information, information for many many hosts, mail spam keys, etc. So resiliency and redundancy are of DEFINITE benefit to domain holders. (b) What are the NTFS, FAT, HPFS file systems? FAT The most common file system in the PC world is actually a family of file systems. The basic name for this file system is FAT; the name comes from one of the main logical structures that the file system uses: the file allocation table. This file system is the one that was used by DOS on the first IBM PCs, and it became the standard for the PCs that followed. Advantages of FAT It is not possible to perform an undelete under Windows NT on any of the supported file systems. Undelete utilities try to directly access the hardware, which cannot be done under Windows NT. However, if the file was located on a FAT partition, and the system is restarted under MS-DOS, the file can be undeleted. The FAT file system is best for drives and/or partitions under approximately 200 MB, because FAT starts out with very little overhead. Disadvantages of FAT • As the size of the volume increases, performance with FAT will quickly decrease. • It is not possible to set permissions on files that are FAT partitions. • FAT partitions are limited in size to a maximum of 4 Gigabytes (GB) under Windows NT and 2 GB in MS-DOS. HPFS Under HPFS, directory entries hold more information than under FAT. As well as the attribute file, this includes information about the modification, creation, and access date and times. Instead of pointing to the first cluster of the file, the directory entries under HPFS point to the FNODE. The FNODE can contain the file's data, or pointers that may point to the file's data or to other structures that will eventually point to the file's data. HPFS attempts to allocate as much of a file in contiguous sectors as possible. This is done in order to increase speed when BCS052 Valid upto April 2016 doing sequential processing of a file. HPFS organizes a drive into a series of 8 MB bands, and whenever possible a file is contained within one of these bands. Between each of these bands are 2K allocation bitmaps, which keep track of which sectors within a band have and have not been allocated. Banding increases performance because the drive head does not have to return to the logical top (typically cylinder 0) of the disk, but to the nearest band allocation bitmap to determine where a file is to be stored. Advantages of HPFS HPFS is best for drives in the 200-400 MB range. Disadvantages of HPFS Because of the overhead involved in HPFS, it is not a very efficient choice for a volume of under approximately 200 MB. In addition, with volumes larger than about 400 MB, there will be some performance degradation. You cannot set security on HPFS under Windows NT. HPFS is only supported under Windows NT versions 3.1, 3.5, and 3.51. Windows NT 4.0 cannot access HPFS partitions. NTFC NTFS is a much more complex and capable file system than any of the FAT family of file systems. It was designed with the corporate and business environment in mind; it is built for networking and with the goals of security, reliability and efficiency. It includes many features, including file-by-file compression, full permissions control and attribute settings, support for very large files, and transaction-based operation. It also does not have the problems with cluster sizes and hard disk size limitations that FAT does, and has other performance-enhancing features such as RAID support. Its most significant drawbacks are increased complexity, and less compatibility with other operating systems compared to FAT. The NTFS file system actually has more than one version. The one used by Windows NT is commonly called either version 1.1 or version 4.0, and has a few less features than the newer NTFS 5.0 used by Windows 2000. The goals of NTFS are to provide: • Reliability, which is especially desirable for high end systems and file servers • A platform for added functionality • Support POSIX requirements • Removal of the limitations of the FAT and HPFS file systems Advantages of NTFS NTFS is best for use on volumes of about 400 MB or more. This is because performance does not degrade under NTFS, as it does under FAT, with larger BCS052 Valid upto April 2016 volume sizes. The recoverability designed into NTFS is such that a user should never have to run any sort of disk repair utility on an NTFS partition.