📄 tytxffi.htm
字号:
<BR>
<A ID="E68E138" NAME="E68E138"></A>
<H3 ALIGN=CENTER>
<CENTER>
<FONT SIZE=5 COLOR="#FF0000"><B>Chapter 8</B></FONT></CENTER></H3>
<BR>
<OL>
<LI>What protocol is used by DNS name servers? Why is that a good choice?
<BR>
<BR>DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.
<BR></LI>
<BR>
<LI>What is a DNS resource record?
<BR>
<BR>A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.
<BR></LI>
<BR>
<LI>Show a sample entry in an IN-ADDR-ARPA file and explain what the fields mean.
<BR>
<BR>An entry in an IN-ADDR-ARPA file would look like this:
<BR>
<BR>merlin IN A 143.12.2.46
<BR>
<BR>The line contains the machine name, the class of machine (IN means Internet), A to show it is an address resource record, and the IP address.
<BR></LI>
<BR>
<LI>BOOTP helps a diskless workstation boot. How does it get a message to the network looking for its IP address and the location of its operating system boot files?
<BR>
<BR>BOOTP sends a UDP message with a subnetwork broadcast address and waits for a reply from a server that gives it the IP address. The same message might contain the name of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server.
<BR></LI>
<BR>
<LI>What is the Network Time Protocol? Why is it used?
<BR>
<BR>The Network Time Protocol is designed specifically to ensure that all internal timers are synchronized and have similar settings.
<BR></LI>
<BR>
</OL>
<BR>
<A ID="E68E139" NAME="E68E139"></A>
<H3 ALIGN=CENTER>
<CENTER>
<FONT SIZE=5 COLOR="#FF0000"><B>Chapter 9</B></FONT></CENTER></H3>
<BR>
<OL>
<LI>Show how the NFS layers compare to the OSI Reference Model.
<BR>
<BR>This is shown in Figure 9.1. The NFS layers comprise the top three layers of the architecture, including the application layer protocols (mount, yp, and so forth), XDR (External Data Representation) in place of the presentation layer, and RPC (Remote Procedure Call) in place of the session layer.
<BR></LI>
<BR>
<LI>Explain how a port mapper assigns ports.
<BR>
<BR>The port mapper controls assignment of ports based on requests from applications. The port mapper maintains a table of ports and the RPC programs that are using them. When the port mapper receives a request for a port, it checks for an available port, then completes a table entry for the port and application, returning the port number with a status message.
<BR></LI>
<BR>
<LI>What is External Data Representation?
<BR>
<BR>External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent.
<BR></LI>
<BR>
<LI>What does the Mount protocol do?
<BR>
<BR>The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request.
<BR></LI>
<BR>
<LI>What is REX? What advantage does REX offer other similar utilities?
<BR>
<BR>The Remote Execution Service (REX) is designed to enable users to run commands on other machines without logging in and without the overhead of larger utilities like Telnet. Because REX preserves the full shell environment, it is better than other remote procedures.
<BR></LI>
<BR>
</OL>
<BR>
<A ID="E68E140" NAME="E68E140"></A>
<H3 ALIGN=CENTER>
<CENTER>
<FONT SIZE=5 COLOR="#FF0000"><B>Chapter 10</B></FONT></CENTER></H3>
<BR>
<OL>
<LI>What components make up a Medium Attachment Unit (MAU) and what are their roles?
<BR>
<BR>The MAU is composed of the Physical Medium Attachment (PMA) and the Medium Dependent Interface (MDI). The MAU manages the connection of the machine to the network medium itself.
<BR></LI>
<BR>
<LI>What is FDDI? Why is it popular?
<BR>
<BR>FDDI is Fiber Distributed Data Interface, popular because it provides very high transmission speeds over a fiber optic cable.
<BR></LI>
<BR>
<LI>What is the role of the Discard service?
<BR>
<BR>The Discard service discards everything it receives, returning nothing back to the sender.
<BR></LI>
<BR>
<LI>The Time protocol is often used by network devices. What is its role?
<BR>
<BR>The Time protocol is used to synchronize devices on a network so their clocks are consistent. If they were not consistent, some packet information involving actual times would be meaningless.
<BR></LI>
<BR>
<LI>Does the presence of a second network protocol (like IPX) affect the basic TCP/IP protocol suite's operations?
<BR>
<BR>TCP/IP can function over other network protocols (like IPX) by replacing parts of the TCP/IP layered architecture with the other network protocol's layers. Some duplication and crossover of functionality can be expected, but TCP/IP can function properly with many different networks.
<BR></LI>
<BR>
</OL>
<BR>
<A ID="E68E141" NAME="E68E141"></A>
<H3 ALIGN=CENTER>
<CENTER>
<FONT SIZE=5 COLOR="#FF0000"><B>Chapter 11</B></FONT></CENTER></H3>
<BR>
<OL>
<LI>How many devices are enabled on a Class B network (the most common)?
<BR>
<BR>Class B networks use two bytes for the device portion of the IP address. This enables 65,534 different devices.
<BR></LI>
<BR>
<LI>What is the difference between the BSD UNIX TCP/IP broadcast address setting and the one normally used?
<BR>
<BR>The BSD UNIX TCP/IP broadcast address uses all 0s, whereas the Internet standard (and most other TCP/IP implementations) uses all 1s. The Internet system is the most widely used except in locations that have run BSD UNIX for many years and have not made the switch.
<BR></LI>
<BR>
<LI>What is a pseudo tty?
<BR>
<BR>A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no connection can take place.
<BR></LI>
<BR>
<LI>What does the following .rhosts file do?
<BR>
<BR># .rhosts
<BR>artemis tparker
<BR>artemis goof
<BR>artemis aarmenakis
<BR>mig rmaclean
<BR>
<BR>This file enables three users from the system artemis and one user from the system mig to log in to the host system without using passwords. The user IDs that can be used are specified after the machine name.
<BR></LI>
<BR>
<LI>What is anonymous FTP and why would you use it?
<BR>
<BR>Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.
<BR></LI>
<BR>
</OL>
<BR>
<A ID="E68E142" NAME="E68E142"></A>
<H3 ALIGN=CENTER>
<CENTER>
<FONT SIZE=5 COLOR="#FF0000"><B>Chapter 13</B></FONT></CENTER></H3>
<BR>
<OL>
<LI>What are the five parts of the OSI Reference Model dealing with network management (called the Specific Management Functional Areas)?
<BR>
<BR>The OSI-RM defines the five aspects of network management as accounting, configuration, faults, performance, and security.
<BR></LI>
<BR>
<LI>What is a Management Information Base (MIB)?
<BR>
<BR>A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device's status, its performance, connections, and configuration. The MIB is queried by SNMP.
<BR></LI>
<BR>
<LI>What is ping?
<BR>
<BR>Ping is the Packet Internet Groper. It sends out an ICMP request to a destination and waits for a response. Ping is a simple utility used to check connectivity.
<BR></LI>
<BR>
<LI>Assume a LAN has some machines using Ethernet and others using IEEE 802.3. Can they communicate?
<BR>
<BR>Not unless there is a translation system in place. The datagrams for Ethernet and IEEE 802.3 are slightly different. This is a common problem because most users think that IEEE 802.3 is Ethernet.
<BR></LI>
<BR>
<LI>What is Kerberos?
<BR>
<BR>Kerberos is a network security system developed at MIT. It provides encryption and validation services that are very difficult to break.
<BR></LI>
<BR>
</OL>
<BR>
<A ID="E68E143" NAME="E68E143"></A>
<H3 ALIGN=CENTER>
<CENTER>
<FONT SIZE=5 COLOR="#FF0000"><B>Chapter 14</B></FONT></CENTER></H3>
<BR>
<OL>
<LI>What are the six basic socket commands?
<BR>
<BR>The basic socket commands are open, send, receive, status, close, and abort.
<BR></LI>
<BR>
<LI>A Transmission Control Block performs what function?
<BR>
<BR>A TCB is a complex data structure that contains a considerable amount of information about a connection. There is a TCB for each connection.
<BR></LI>
<BR>
<LI>What is the difference between an unspecified passive open and a fully specified passive open?
<BR>
<BR>An unspecified passive open has the server waiting for a connection request from a client. A fully specified passive open has the server waiting for a connection from a specific client.
<BR></LI>
<BR>
<LI>What command displays status information about a socket?
<BR>
<BR>The command getsockopt queries a socket and displays all information returned about the socket.
<BR></LI>
<BR>
<LI>What is a fork?
<BR>
<BR>A fork is a UNIX process that creates a copy of the existing application, then executes it.
<BR></LI>
<BR>
</OL>
<P><P ALIGN=CENTER>
<A HREF="tytxefi.htm" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/tytxefi.htm" TARGET="_self"><IMG SRC="blanprev.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/blanprev.gif" WIDTH = 37 HEIGHT = 37 BORDER = 0 ALT="Previous Page"></A>
<A HREF="#I0" TARGET="_self"><IMG SRC="blantop.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/blantop.gif" WIDTH = 37 HEIGHT = 37 BORDER = 0 ALT="Page Top"></A>
<A HREF="index.htm" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/index.htm" TARGET="_self"><IMG SRC="blantoc.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/blantoc.gif" WIDTH = 37 HEIGHT = 37 BORDER = 0 ALT="TOC"></A>
<A HREF="tytcat.htm" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/tytcat.htm" TARGET="_self"><IMG SRC="blannext.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/blannext.gif" WIDTH = 37 HEIGHT = 37 BORDER = 0 ALT="Next Page"></A>
</BODY></HTML>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -