What is TCP/IP And UDP? Proxy And Its Uses, IEEE Standard and NAT Explained


        
What is TCP/IP And UDP? Proxy And Its Uses, IEEE Standard and NAT Explained





      What are protocols? TCP/IP and UDP  protocol explained with examples in detail.
ANSWER
Protocols are sets of rules and instructions that computers use to communicate with each other. It is a standardized method of information transfer between devices.
Transmission Control Protocol/ Internet Protocol (TCP/IP)are two different procedures that are often linked together. TCPoperates at the Transport layer. Its function is to provide connection-oriented services and perform segment sequencing and service addressing. It also performs important error-checking functions and is considered a host-to-host protocol. SSH, FTP, telnet andSMTP are examples of TCP.
On the other hand, Internet Protocol (IP) is the main TCP/IP protocol. It is a connectionless protocol that makes routing path decisions, based on the information it receives from ARP (Address Routing Protocol). It also handles logical addressing issues through the use of IP addresses. The linking of these protocols is common since the functions of different protocols can be complementary so that together they can carry out some tasks completely. In fact, the term "TCP/IP" is normally used to refer to a whole suite of protocols, each with different functions. This suite of protocols is what carries out the basic operations of the Web. IPv4, IPv6 and IPsec are examples of IP.
When information is sent over the Internet, it is generally broken up into smaller pieces or "packets". The use of packets facilitates speedy transmission since different parts of a message can be sent by different routes and then reassembled at the destination. IP is the method used to route these messages to the proper address while TCP is the means for creating the packets, putting them back together in the correct order at the end, and checking to make sure that no packets got lost in transmission. If necessary, TCP will request that a packet be resent.
User Datagram Protocol (UDP) is a protocol used together with IP when small amounts of information are involved. It is simpler than TCP and lacks the flow-control and error-recovery functions of TCP. Thus, it uses fewer system resources.User Datagram Protocol (UDP) is considered a host-to-host protocol like TCP. It also performs functions at the Transport layer. However, it is not connection-oriented like TCP. Because of less overhead, it transfers data faster, but is not as reliable.TFTP, SNMP and IP are examples of UDP.
           




         Proxy and their uses 
ANSWER
            Proxy (server) is a cache memory for internet web pages accessed. A proxy is an intermediate server or a buffer between a computer accessing the internet and internet being accessed to provide administrative control and security. The proxy server make sure that the file(s) frequently accessed by millions of users on the network everyday are stored or saved for easier access in case another user or same
user may make such request another time. That is, the cache of a proxy server may beforehand have all the information before the time of your request and transports the information instantly once the request is made again. Therefore the quick reply made possible by proxy server ensures speedy internet connectivity.
            Besides that the proxy server can by itself server as firewall, accepting and denying requests made by the clients as well as ensuring security. This is done by anonymous proxy server. What anonymous proxy does is that it hides or conceals your IP address and any of your informationto avoid unpermitted or unofficial access to a user through the internet. For this reason, it could be called a secure gateway to the user.
Uses of Proxy Server
Request filtering: Proxy servers are also used in request filtering. Due to some privacy reasons, an organization may have to deny their users or personnel access to a particular website. Proxy server makes this possible for the organization.

Web Document Caching: Proxy makes a document caching of a frequently visited sites. That is, it saves frequently visited sites into a memory named “cache”. This makes the access to that same site/file easier for another user when requested. For instance, user A visited a particular site. Two days later, user B accessed the same site. When user A first visited the site, the files accessed were saved in a cache memory. Now, user B will have a quicker access to the same site due to the fact that his request no longer have to be furthered to the web server.

Detects Intruders:As intruders may intend to hack or gain administrative access to a user’s account via net, proxy halts that request. So as a firewall, a proxy prevents unauthorized access to a user via online.


           What is IEEE standard? 
ANSWER
Institute of Electrical Electronics Engineering (IEEE) standardcomprises a family of networking standards that cover the physical layer specifications of technologies from Ethernet to wireless.It is a collection of networks which includes CSMA/CD, token ring, and token bus. Some of the standards are as follows:
·         802.1:The main function is bridging. It works in making sure that LAN/MAN are bridged and managed. Covers management and the lower sub-layers of OSI Layer 2 (Data Link Layer), including MAC-based address bridging (Media Access Control), virtual LANs and port-based access control.
·         802.2: Commonly called the “Logical Link Control (LLC)”. It is the top sub-layer in the OSI Layer 2 (Data Link Layer).
·         802.3: This is called the Ethernet.It provides asynchronous networking using "carrier sense, multiple access with collision detect" (CSMA/CD) over coax, twisted-pair copper, and fiber media. It runs at a speed of 10Mb/s to 10Gb/s.
·         802.4: Token bus
·         802.5: This is as well called the IBM token ring. It is the original token-passing standard for twisted-pair, shielded copper cables. Supports copper and fiber cabling from 4Mb/s to 100 Mb/s.
·         802.11: This is known as the Wifi.It is a local area wireless computer networking technology that allows electronic devices to network, mainly using the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHFISM radio bands. Many devices can use Wi-Fi, e.g. personal computers, video-game consoles, smartphones, digital cameras, tablet computers and digital audio players. It can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small as a single room with walls that block radio waves, or as large as many square kilometers achieved by using multiple overlapping access points.
·         802.12: This is a mechanism that defines a different MAC mechanism for transmitting network frames.
·         802.15.1: Is the basis for the Bluetooth wireless communication technology
·         802.15.4:  This is known as ZigBee. It is a low tier, ad hoc, terrestrial, wireless standard in some ways similarto Bluetooth.
·         802.15.6: Meant for Wireless Body Area Network.
·         802.21: This is a standard designed for interoperability between 802 and non 802 networks.
·         802.22: This is a standard for Wireless Regional Area Network.





         Explain NAT in detail
      ANSWER
       Network Address Translation (NAT) is a technology used in translating and mapping public IP address (provided by internet service provider) to private IP address(Local IP address on the LAN network ) and private IP to public IP. When NAT is configured on the network, all the local users on the LAN will have access to internet resources. With the use of NAT private IP address could also be mapped with private IP. NAT also increases home network security by confining the access of external computers into the home IP network space. It is a common technology in internet connection sharing.
It     is configured or established on gateway devices like routers, on the network boundary. It can also be applied on software. Sometimes it is built in server load balancing applications on corporate networks. It does not offer all properties of a true firewall. The “software” is mainly run in servers that have other antiviruses and firewall. Let me explain the types of NAT.

·         Static NAT:This is a type of NAT a private IP address is mapped to a public IP address. That is, for each private IP address there is a public IP address. The public IP address here has a fixed private IP address. This lets an internal host like the web server to have an unregistered IP address and yet is accessible over the internet. Due to the “one public IP-one private IP”nature of Static NAT, it is called a one-to-one network translation. It is mostly useful when a particular network device needs to be accessible from outside the network.
·         Dynamic NAT:This is a type of NAT in which a pulled public IP is mapped to a private IP on the network. In the NAT router on the network is a pool of public IP addresses. So when a private IP makes a request to access the internet, the router selects an unassigned public IP and gives it to the public IP making the request. When this process is completed, it is saved in the NAT table. This type of NAT is mostly applicable where a whole IP subnet will share a group of public IP addresses.
·         NAT overload or Port Address Translation: This type of NAT maps multiple private IP to one public IP. All computers on the private network are translated to the same public IP except for different port number assignment.

 

Previous
Next Post »