This site works best with JavaScript enabled
Sign In
Discussions
Activity
Sign In
Previous Results
1. What is the role of transport layer protocols in networking
Transport layer protocols bridge the gap between the raw packets of the internet layer and the refined needs of application. It is necessary for user-space programs as otherwise it would be difficult for user-space programs to deal with a bunch of r…
by
gaurav133232
January 31
014.01.42.The Transport Layer TCP UDP Services.
permalink
Block Driver. Macroscopic View
UNDERSTANDING THE DATA AND ADDRESS COMPOSITION IN ONE BYTE FORM
Memory and data can be represented in ONE BYTE form using HEXADECIMAL notation
0000 0000 // These are two nibbles - two sets of 4 bit aggregations
= 0x00 // Hexadecimal n…
by
nirmalpg124
January 31
008 Block Device Driver Development
permalink
10.significance of the loopback interface (lo) in network configuration
The loopback interface is a virtual network interface called so as it loops back to itself. The effect is that connection to 127.0.0.1 or (::1 in IPv6) connects to the machine you're currently using. These are the peculiarities of it:-The netma…
by
gaurav133232
January 30
014.01.40.Resolving Hostnames
permalink
1.Packets. What are the two main parts of a packet in computer networking?
Main Parts of the Packets
Header : contains both source and destination stack layer addresses along with all other information.
Payload: contains actual data to be shared.
by
usaidsyedmohd
January 28
014.01.14.Packets-IQs
permalink
6.What types of connections can exist on a LAN, according to the
The connection exist on LAN are:wiredwireless
by
usaidsyedmohd
January 28
014.01.12.Introduction to Networking
permalink
1. Can you explain the importance of DNS in network configuration
DNS is important for network configuration and its place in the application layer i.e. user space because a normal end user finds it difficult to remember IP addresses and also IP addresses are subject to change, no company provides IP addresses jus…
by
gaurav133232
January 27
014.01.40.Resolving Hostnames
permalink
3.What is the main disparity mentioned in the text regarding network configuration elemen
The disparity is that network configuration elements are present in each of the different network configuration layers, a consequence is that the software responsible for making networking happen is in several parts of the kernel and user-space tool…
by
gaurav133232
January 26
014.01.34.Boot Activated Network Configuration
permalink
11.The network configuration tool "ip" compared to older "ifconfig"
The ip command is a modern and more versatile network configuration tool compared to the older ifconfig command. It provides a broader set of functionalities for configuring and managing network. Command ip is more consistent across different Linux …
by
mohdmohsinkhanee
January 26
014.01.18.The Internet Layer
permalink
3.decentralized topology of internet,made up of smaller networks,subnets
The decentralized topology of the Internet is formed by smaller interconnected networks called subnets. These subnets are interlinked in various ways, contributing to the overall structure of the Internet. Interconnection is facilitated by a device …
by
mohdmohsinkhanee
January 25
014.01.18.The Internet Layer
permalink
8.What does the physical layer of the network stack define
The physical layer in the network stack manages how raw data travels from one point to another. This involves using physical mediums, which can be either wired or wireless. Wired mediums, such as optical fibre and coaxial cables, are renowned for t…
by
mohdmohsinkhanee
January 25
014.01.16.NetworkLayers
permalink
5.significance of the subnet and interface ID
subnet's significance is that it tells the user about the family of hosts being used, and interface id helps in differentiating the addresses since they are unique for each host. For average end user, they often cover half of the available bits…
by
gaurav133232
January 25
014.01.24.IPv6 Addresses And Networks
permalink
6.how is an IPv6 address breakdown
Subnets are denoted using CIDR notation in IPv6. For the end user, they cover half of the available bits in the address space(/64) but there are instances where fewer are used. Interface id of each host is unique as there are different interfaces co…
by
gaurav133232
January 25
014.01.24.IPv6 Addresses And Networks
permalink
17.traffic goes through the router at the link-local address rather than its global IP address
The default route 3 (also written as::/0 in IPv6 ), this configuration arranges for the traffic to go through the router at the link-local address. The router usually doesn't care about how it gets traffic, it cares about where the traffic is s…
by
gaurav133232
January 23
014.01.24.IPv6 Addresses And Networks
permalink
5.what characteristics do the machines on a LAN usually share?
Although there is no precise definition for a Local Area Network (LAN), a LAN is widely understood to be a collection of networked devices in a limited amount of space, usually a single building or campus.
Characteristics of LAN are:Limited sizeSha…
by
sumacangadi
January 22
014.01.12.Introduction to Networking
permalink
3.what is the purpose of the default route...
The purpose of default route is that all the traffic coming to it must be sent to the router. In the routing table it is represented as:-
default via 192.168.1.1 dev enp4s0f2 proto dhcp src 192.168.1.10 metric 100default via 192.168.1.1 dev wlp3s0…
by
gaurav133232
January 22
014.01.20.routes and the kernel routing table
permalink
1. What is the role of transport layer protocols in networking
014.01.40.1. What is the role of transport layer protocols in networking, and why are they necessary for user-space programs dealing with packet data?
by
pravjot
January 22
014.01.42.The Transport Layer TCP UDP Services.
permalink
2.three common application layer protocols
DNS (Domain Name System): Translates human-readable domain names (like www.example.com) into machine-readable IP addresses.SSH (Secure Shell): Provides secure remote access to a computer system.POP3 (Post Office Protocol 3): Retrieves email messages…
by
sumacangadi
January 19
014.01.16.NetworkLayers
permalink
5.How are the transport layer and layers below handled?
In Linux, the transport layer and all layers below are primarily handled by the Kernel. Yes, there are some exceptions where data packets are sent into user space for processing.
by
mohdmohsinkhanee
January 19
014.01.16.NetworkLayers
permalink
3.Where does application layer processing occur?
Application layer processing occur in user space.For example: TLS (Transport Layer Security) is commoly combined with HTTP (Hyper Text Transfer Protocol) to form HTTPS (Hyper Text Transfer Protocol Secure).
by
mohdmohsinkhanee
January 19
014.01.16.NetworkLayers
permalink
9. How does the router enable all machines on the LAN to have acc
9. How does the router enable all machines on the LAN to have access to the internet?
by
pravjot
January 16
014.01.12.Introduction to Networking
permalink
Powered by
Vanilla
Howdy, Stranger!
It looks like you're new here. If you want to get involved, click one of these buttons!
Sign In
Apply for Membership