Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - networkloser

#1




I tried googling in books dot google dot com for related materials on this, but was unable to find any. This is from kurose ross book and it's a bit convoluted. Can anyone guide me here a bit? I don't need exact answer but a way/place to look into.
#3
Host a sends data 92 to 100.
Again host a sends 100 to 120.

The acknowledgement from b hasn't arrived and doesn't arrive within specified timeout interval.

Now my question is why doesn't host a retransmits both 92 to 100 and 100 to 120 when next timer starts. I know it does to make sure it doesn't applies too much pressure in network and wants to verify if there is some problems with receiver. But i forgot where i had read it. Can u send me?

I was following kurose ross networking book but can't find that specific line there no matter how much i searched so far...
#4
Thanks 🙏
#5
The kurose ross book says udp provides error detection is an example of end to end principle in system design. I want to further research humanly on this. Pls 🙏 guide
#6
https://d3s.mff.cuni.cz/teaching/nswi106/202324/reading/internetworking/

Something like this could prove beneficial. I prefer academically written textbooks.
#7
l to learn these topics? I mean I just want to learn this exact chapter from a book, what topics should I seek? I am trying to implement it on k3s.
#8
Network Security: Types of Computer Security, Types of Security Attacks, Principles of cryptography, RSA Algorithm, Digital Signatures, securing e-mail (PGP), Securing TCP connections (SSL), Network layer security (IPsec, VPN), Securing wireless LANs (WEP), Firewalls


This is the part of 20 subject syllabus for exam. It's subjective exam meaning answers are written instead of tick marks.


I am starting to learn this. What should I be learning in digital signatures? That benefit me in the long run as well as help me in exam? What about PGP? What practical scenarios can I implement on my own? Or is it left untouched because there're APIs that handle it for me these days? I'd love your insights on any of the topics.

#9
DVR shares entire routing table to neighbours periodically.

For loops prevention, it uses just hop count metric.

It uses bellman ford algorithm for implementation.


LSR doesn't send entire routing table to others, just share the LSA(Link State Advertisement).

To prevent looping various metric along with hop count is used.

Djikstra's shortest path finding algorithm is used here.
#10
I read the networking explained book and it has covered this description neatly.
#11
I've been searching my entire day for exercises. And finally went to chatpgt. It gave me some exercises but without context. Here's what it told me:


2. Solve Theoretical Problems
Practice questions and scenarios:

Analyze a network graph and calculate routing tables manually.
Trace how routing tables evolve over time in a distance-vector protocol.
Compute shortest paths using Dijkstra's algorithm for link-state routing.
Compare and contrast RIP vs. OSPF through theoretical scenarios.


About where to find problems it told me "CCNA" would have such problems as a part of exam. Can you point me towards it? Because I can merely find anything on my own so far.
#12
I see. You recommend I buy networklessons course or buy this book?
#13
What kind of labs can I do? And what kind of books to study. THere are cisco books but I could not figure out which one is good. Please tell.
#14
The next screen capture shows the Ethernet portion of the DHCP ack packet.
The Ethernet destination address is FFFFFFFFFFFF, which is the broadcast hard-
ware address, and the Ethernet source address is 005004744FFF, which is the
hardware address of the DHCP server

The DHCP portion of the DHCP ack packet contains information about the IP
address and the lease parameters. The following screen capture shows the DHCP
portion with all the DHCP options. After the DHCP client receives this acknowledg-
ment, then the client has an IP address. Now that the client has a valid lease on an
IP address, the client finishes building its TCP/IP stack.


Taken from TCP/IP foundations by andrew G blank
#15
Let's discuss the "DORA" of DHCP.

1) Discover
Client broadcasts that "I want IP address".
Destination IP address=All 0s.
Destination hardware address=All Fs.
Source hardware address=DHCP Client address

2) Offer

Server/s makes an offer.
Destination hardware address=client's mac address
So that client knows the offer is for it.
It also should contain server's IP address/es.

3) Request

Client broadcasts DHCP request packet.

This includes,
DHCP Server's IP address so that other can cool down their IP address so client gets from who it wants.
Client's hardware address so that client hardware->IP address mapping can be done.
Destination address is All Fs, so that all hosts receive the notification.

4) Acknowledgement.

I am following TCP/IP foundations by Black and I'm confused how will the client know that the acknowledgement came for it?