Questions By CC12
Qs from CC3(Sagar, Arpit, Prashant, Prateek)
What is the need of using the proxy, if the IP is transparent(was mentioned in types of proxy)?
What Tunnel/IRC and SSL Proxy?? How they help security??
Q's for CC1(Soumya and Group)
Think that i have to send a mail what are the protocols involved? and explain the work of each layer in transmission of mail.
Team
Questions!!
--
Sahana
Video of protocol stack data transmission
video of protocol stack data transmission:
Questions on 29th september presentations
what is PAC (proxy auto config) file?
question for protocol stacking?
how different are transport layers of TCP and UDP?
submitted by CC16
darshan thappa
priya m.s.
satchidanand das
karthik k.
Questions by CC10
How did the proxyfire select the 17 proxies?
Protocol Stack and Addressing:
Consider a system with a DSL modem/router and a wifi router. The modem connects to the router through the WAN port on the router. Assume that DHCP is enabled on both. The ip range for DHCP is 192.168.0.X to 192.168.0.Y on the modem and on the router. There is a machine which is connected to the router through the LAN port and a system that accesses the internet wirelessly. If the two machines want to access the network resources simultaneously, will there be a conflict? If yes, why and how to resolve it. If no, why not?
--
Srikanth.V.Goutham
Surakshith.B
Shreyas.V
Amith Nayaka T.E
Questions by CC4
How HTTP is different from SOCKS?
BY CC4
Presentation by CC15
| To view the pdf or download please follow the link below: http://www.keepandshare.com/doc/view.php?id=1419143&da=y |
QUESTIONS by CC19
Question:CC20
1. what is inbound/netbound traffic and how is it recognised in reverse proxy?
QUESTION:-IP ADDRESSING AND PROTOCOL STACK:
1. what is cataloging in enterprise ip address manager
a.what is hop?
b.what is classless addressing
TEAM MEMBERS:- CC20
1.swetha.m
2.shilpa.s
3.padma.b.s
4.shruthi.k.n
Question on http proxy server
from cc11
Shreyas.H.D
Prabhakara.S.H
Vijay.S.S
Sharath.S
Questions by CC9
Why use a proxy server to get a different IP when you can simply mask it?
Question for Protocol Stack:
How does Real Hide IP protect from hackers?
Team members:
Rajavardhan
Rishikesh
Siddharth
Sriniketan
Rishabh
Questions for Sessions on 29th September by CC6
2) What is secure socket layer (SSL)?
3) How is Proxy Server different from Open DNS?
2) How does routing selection happen in network layer?
# Questions by-
Team Noesis (CC 6)
# Members-
- Sourav
- Renuka
- Siddesh
- Masoud
An introduction to TCP/IP utilities
Transmission Control Protocol/Internet Protocol is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.
TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination.
TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be "stateless" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.)
Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a "suite."
Personal computer users with an analog phone modem connection to the Internet usually get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an access provider's modem.
- ARP
- Nbtstat
- Netstat
- Ping
- Route
- Tracert
- Winipcfg