0% found this document useful (0 votes)
65 views

Difference Between IPV4 & IPV6

To ensure an answer is authoritative, query the authoritative name server directly for the domain. Authoritative name servers have the original records configured by the domain administrator, so their responses will be authoritative. Unauthoritative servers get their information from caching responses from other servers, so their answers may not be up-to-date or correct.

Uploaded by

Anish Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

Difference Between IPV4 & IPV6

To ensure an answer is authoritative, query the authoritative name server directly for the domain. Authoritative name servers have the original records configured by the domain administrator, so their responses will be authoritative. Unauthoritative servers get their information from caching responses from other servers, so their answers may not be up-to-date or correct.

Uploaded by

Anish Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1. Difference between IPV4 & IPV6.

IPV4 IPV6
 32 bit address length.  128 bit address length.
 Supports manual DHCP address.  Supports auto remembering address
 Encryption and authentication facility is configurations.
not provided.  Encryption and authentication facility is
 Broadcast message transmission provided.
scheme.  Broadcast & any cast message
 Checksum field is available. transmission scheme.
 Checksum field is not available.

2. OSI & TCP/IP Architecture.

OSI

APPLICATION
PRESENTATION
SESSION
TRANSPORT
NETWORK
DATALINK
PHYSICAL

TCP/IP

TELNET FTP SMTP

TCP(Transmission Control Protocol) UDP


IP (Internet Protocol)

3. What is NFS? What are its characteristics and benefits? Write some of its services?

NFS includes many features such as:

 Compatibility and cooperation with firewalls and NAT devices.


 Stateful operation.
 Strong, integrated security.
 Support for replication and migration.
 Support for Unicode filenames.
 Access control lists.

Benefits of NFS are:

 NFS allows local access to remote files.


 Standard client/server architecture for file sharing between all *NIX based machines.
 With NFS, it is not necessary that both machines run on the same OS.
 User get their data irrespective of physical location.
 No manual refresh needed for new files.
Services provided by NFS are:

 portmap: It maps calls mode from other machines to correct RPC service.
 nfs – It translates remote file sharing requests into requests on the local file system.
 rpc.mountd – This service is responsible for mounting and unmounting of file systems.

4. Difference between TCP & UDP.

TCP UDP
 Transmission Control Protocol  User Datagram Protocol
 It is connection-oriented.  It is a connectionless protocol.
 It is slower.  It is faster as error recovery is not
 Header size is 20 bytes. attempted.
 Header size is 8 bytes.

5. Difference between NFSv3 and NFSv4.

NFSv3 NFSv4
 All exports are mounted separately.  All exports can be mounted together in
 Permanent locks in yet another a directory tree structure.
protocol.  Lease based locking in the same
 One operation per RPC protocol.
 No native parallel high bandwidth  Multiple operations per RPC.
access.  Parallel high bandwidth access: pNFS

6. What does the NFS dependency on portmap means in terms of security?

7. In NFS v3 and v4, what is the relationship between NFSD and PortD?

8. Differentiate between statefull and stateless server.

9. What are the conceptual changes between NFSv3 and NFSv4? How does the attribute change in
protocol?

10. List the steps needed to make mountD and NFSD recognize the new shared file systems? How
could you verify that the directories were being shared without mounting them?

11. How a pull method of updating a local machine file is more secure than a push method?

12. What method does your site user use to share system files? What security issues are related to
that method?

13. Explain the TCP/IP Protocol Stack.

Application – Supports network applications.

Transport – Data transfer from end to end system.

Network – Finding the way through the network from machine to machine

Data Link – Data transfer between two neighbours in the network.

Physical – Bits on the wire.


14. Explain IP Spoofing & IP Forwarding (Encapsulation)

IP Forwarding – It is also known as IP routing or Internet routing, it is a process used to determine


which path a packet or datagram can be sent.

IP Spoofing – It is a technique used to gain unauthorized access to machines, whereby an attacker


illicitly impersonates another machine by manipulating IP packets.

15. What is DNS? What is the need of DNS?

It is a collection of the databases that contain information about domain names and their
corresponding IP addresses.

We need DNS to:

Identify and locate computers connected to the internet.

Get addresses to locate objects.

Names are easier to remember than numbers.

DNS provides a mapping from names to resources of several types.

16. How DNS works?

When an application program needs to communicate with other computer, it needs to translate the
name of the other computer into an IP address. The application program that requests the service
becomes the client of the DNS.

It then sends the request to DNS Server. The server looks up the name and then returns the correct
IP address. A large number of DNS servers maybe involved to get the right IP address. After receiving
the correct IP address, the communication between the two computers starts.

17. How to add new machine to DNS?

18. BIND Server?

19. Name Server?

Name server is a server that handles queries regarding the location of a domain name’s various
service such as website, emails and so on. It is also a part of the DNS which maintains a directory of
domain names and translates them into IP addresses.

20. What are the implications of negative caching? Why is it important?

Negative cache is a cache that stores negative responses i.e. failures. DNS requires that caching
name servers remember negative responses as well as positive ones. If an authoritative name server
returns a negative response, meaning the name does not exist, this is cached.

21. What is the difference between authoritative and unauthoritative answer to a DNS query?

Unauthoritative DNS servers do not contain the original source files of domain’s zone. They have a
cache file for the domains that is constructed from all DNS lookups done previously.

Authoritative DNS servers has the original source files of a domain zone files. This is where the
domain administrator has configured the DNS records for a domain..

22. How to ensure that an answer is authoritative?

You might also like