12. The socket is used to specify or configure the connectivity For ex. In following JDBC thread, jndi:[email protected]:1521/localuser - 128.0.9.1:1521 is used to specify the connectivity configuration for the JDBC thread.
13.PFB the list of port numbers:
Port Number ---
Description
1 TCP Port Service Multiplexer (TCPMUX)
5 Remote Job Entry (RJE)
7 ECHO
18 Message Send Protocol (MSP)
20 FTP -- Data
21 FTP -- Control
22 SSH Remote Login Protocol
23 Telnet
25 Simple Mail Transfer Protocol (SMTP)
29 MSG ICP
37 Time
42 Host Name Server (Nameserv)
43 WhoIs
49 Login Host Protocol (Login)
53 Domain Name System (DNS)
69 Trivial File Transfer Protocol (TFTP)
70 Gopher Services
79 Finger
80 HTTP
103 X.400 Standard
108 SNA Gateway Access Server
109 POP2
110 POP3
115 Simple File Transfer Protocol (SFTP)
118 SQL Services
119 Newsgroup (NNTP)
137 NetBIOS Name Service
139 NetBIOS Datagram Service
143 Interim Mail Access Protocol (IMAP)
150 NetBIOS Session Service
156 SQL Server
161 SNMP
179 Border Gateway Protocol (BGP)
190 Gateway Access Control Protocol (GACP)
194 Internet Relay Chat (IRC)
197 Directory Location Service (DLS)
389 Lightweight Directory Access Protocol (LDAP)
396 Novell Netware over IP
443 HTTPS
444 Simple Network Paging Protocol (SNPP)
445 Microsoft-DS
458 Apple QuickTime
546 DHCP Client
547 DHCP Server
563 SNEWS
569 MSN
1080 Socks
2.
Port Number Service Brief Description of
Use
----------------------------------------------------------------------
1024 Reserved Reserved for future use
1025 Blackjack Network version of
blackjack
1026 CAP Calendar access protocol
1027 Exosee ExoSee
1029 Solidmux Solid Mux Server
1102 Adobe 1 Adobe Server 1
1103 Adobe 2 Adobe Server 2
44553 Rbr-debug REALBasic Remote
Debug
46999 Mediabox MediaBox Server
47557 Dbbrowse Databeam Corporation
48620–49150 Unassigned These ports have not
been registered
49151 Reserved Reserved for future use
3. 49152 - 65535 : Private ports.
14.netstat
15.For the ease of processing, storage and efficient way.
16.TCP, UDP, TCP, TCP, UDP, UDP, UDP, TCP,TCP.
17.A process of diving a big or complex network into small e prototypes is known as sub netting which is used for making a network to get simpler and more efficient.
18.2^y -2 where y is number of zeros n subnet mask.
19.Router.
12. The combination of the source and destination IP addresses and the source and destination port...
1 a) If the smallest MTU in the path from the source to the destination is 1,000 and the traffic consists of TCP segments what is the largest TCP data payload that can fit in a single IP datagram without having to fragment the IP datagrams? b)What is the decimal value of the contents of the Ver field of the IPv4 header? C)What is the maximum number of routers that an IPv4 packet can pass through on it way from...
14. (10 Points) Suppose Proces A running on Host Process B running on Host Y vi running on Host Z is communicating with Process via a TCP connection. Let x, y, and z be the IP addresses o and Host Z, respectively. Assume the port number o the port number of Process B is 464 26145, and the port number of Process D is 80. a. What are the identifiers of the socket associated with Process B when it is...
IDS can collect data from network like session id, source/destination IP address and port to analyze and match with rules. 1) Passive 2) Active O 3) Network-based O 4) Host-based
Describe the form of data unit for the 5-layer TCP/IP model. Given the following IP source and destination addresses in Hexadecimal format: 3. P source address: 81 7E 7B 01 IP destination address: 81 7E 7B 24, converi then to standard doited decimal format. Describe the form of data unit for the 5-layer TCP/IP model. Given the following IP source and destination addresses in Hexadecimal format: 3. P source address: 81 7E 7B 01 IP destination address: 81 7E 7B...
10. In a network an IP address and prefix is given as 192.168.130.34/17. What is the subnet mask? (A) 0.0.127.255 (B) 255.255.0.0 (C) 255.255.128.0 (D) 0.0.2.34 11. In a network an IP address and prefix are given as 192.168.130.34/17. How many host addresses are there? (A) 34 (B) 32766 (C) 131072 (D) 2 12. One result of subnetting is that the size of the routing table in the routers is reduced (A) True (8) False 13. The port number is...
Examine the following: What header fields are used to identify a UDP socket? source IP address destination port number source port number destination IP address
Consider the following network. IP and Ethernet addresses are marked for all interfaces. Assume a client on host A sends a TCP connection request message to a web server on host B. Show all the headers in the packet on link 1 and on link 2, assuming the addressing indicated on the figure. Include IP source and destination addresses, Ethernet source and destination addressees, and TCP source and destination port numbers. Use port numbers that make sense for the given...
Consider the scenario below in which three hosts, with private IP addresses 10.0.1.13, 10.0.1.15, 10.0.1.20 are in a local network behind a NATted router that sits between these three hosts and the larger Internet. NAT Translation Table WAN side addr LAN side addr 35.122.196.219:517 10.0.1.27:3435 10.0.1.13 2 S: D, 10.0.1.27 135.122.196.219 10.0.1.15 4 3 10.0.1.20 IP datagrams being sent from, or destined to, these three hosts must pass through this NAT router. The router's interface on the LAN side has...
Referring to the above topology diagram, what are the message's Layer 4 port number, layer 3 IP addresses and layer2 MAC addresses as it leaves Laptop2. The web client running on Laptop2 connects to a web server running on Laptop1 and listening for client connections on port 8080. Layer 4 destination port: Layer 3 destination IP: Layer 3 source IP: Layer 2 destination MAC: Layer 2 source MAC: Network Segment 2 Network ID: 192.168.20.0 Subnet Mask: 255.255.255.0 Gateway: 192.168.20.1 Network Segment...
Q1. Hierarchical IP Address 1.1 Give a non-network example of hierarchical addressing, and discuss how it reduces the amount of work needed in physical delivery. Do not use any example in the book, the postal service, or the telephone network.1.2 A firm is assigned the network part 128.171. It selects a 10-bit subnet part. a) Draw the bits for the four octets of the IP address of the first host on the first subnet. (Hint: as we don’t use all...