innovator


{ City } kolkata
< Country > india
* Profession * it
User No # 23087
Total Questions Posted # 9
Total Answers Posted # 24

Total Answers Posted for My Questions # 58
Total Views for My Questions # 87612

Users Marked my Answers as Correct # 23
Users Marked my Answers as Wrong # 19
Answers / { innovator }

Question { HCL, 8100 }

Is it possible that in a switched network that any port of
the switch can be infected with any kind of viruses that
jamed and create more traffic in network which cause slow
network performance?


Answer

Dear all,
if we ping a host on network by increasing the "bytes=32"
is that cause the problem? like some days ago I read an
article saying that Ping of Death can jam your host and also
the network too and even we can crash the machine...
how much is true ?

Is This Answer Correct ?    1 Yes 1 No

Question { HCL, 6887 }

HI I am Rajveersinh. I am Leaving in Ahmedabad-gujarat. I
am Hardware & Networking Stundent In JETKING. my Intersted
in CICKO Side. Please send ME totel detail in CICKO
surtifiction my E-mail ID IS as_raj@ymail.com


Answer

I have answer : Z Y X W V U T S
R Q P O N M
L K J I H G
F E D C B A
once you wright these letters in right order...you will get
the answer... :D

Is This Answer Correct ?    0 Yes 0 No


Question { 7117 }

How the STP determinw that which Port should be Root Port,
which port should be Designeted Port , Blocking Port and
Forwarding Port in Layer 2 STP topology........

Hi friends Thanks for posting the answer of above given
questions i agree with all of you that BPDU is the Protocol
that are used to determine this is clear to me..

But I want to Know the Process like Why it Blocked the port
Fa0/1 Insted of Fa0/2

waiting for Answer Posting ....
Thanks in Advance


Answer

Sir ji...complete kariye..mai waiting list mei hu...ye
question pehle bhi kahi suna suna lagta hai...do it asap... :)

Is This Answer Correct ?    0 Yes 0 No

Question { 5931 }

Urgent reply plz donot have time to serch on google plz
reply
the questions is how to remove newfolder.exe virus from my
windows 2003 server
i have all ready tried quick heal.spy hunter mcafee server .
plz reply


Answer

try autoruneater...

Is This Answer Correct ?    0 Yes 0 No

Question { IBM, 23950 }

what is difference between designated router and backup
designated router and explain feature of both router.


Answer

DR=primary Domain Cont
BDR=secondary domain......lolzzzz

further from top 3 answers r correct..

Is This Answer Correct ?    0 Yes 3 No

Question { Patni, 6854 }

Based on the DR AND BDR discussion i want to put one question
the question is
what is the name of protocol which is responsible;e for DR
and BDR selection


Answer

DR and BDR election is done via the Hello protocol. Hello
packets are exchanged via IP multicast packets (Appendix B)
on each segment. The router with the highest OSPF priority
on a segment will become the DR for that segment. The same
process is repeated for the BDR. In case of a tie, the
router with the highest RID will win. The default for the
interface OSPF priority is one. Remember that the DR and BDR
concepts are per multiaccess segment. Setting the ospf
priority on an interface is done using the ip ospf priority
interface command.

A priority value of zero indicates an interface which is not
to be elected as DR or BDR. The state of the interface with
priority zero will be DROTHER.
Src : Cisco

Note: OSPF is routing protocol not a DR Or BDR selection
protocol...This is mine concern..nw waiting for the any
other concept if it is there..Gtech

Is This Answer Correct ?    1 Yes 0 No

Question { Wipro, 7164 }

What is wide-mouth frog?


Answer

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    1 Yes 0 No

Question { Wipro, 7164 }

What is wide-mouth frog?


Answer

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    0 Yes 0 No

Question { Wipro, 7164 }

What is wide-mouth frog?


Answer

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    0 Yes 0 No

Prev    1    [2]