CCC NET 125 Chapter 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

169.254.1.5

Match each description with an appropriate IP address: a link-local address

127.0.0.1

Match each description with an appropriate IP address: a loopback address

198.133.219.2

Match each description with an appropriate IP address: a public address

240.2.6.255

Match each description with an appropriate IP address: an experimental address

FF02::1

Match the IPv6 address with the IPv6 address type: all node multicast

2001:DB8::BAF:3F57:FE94

Match the IPv6 address with the IPv6 address type: global unicast

::1

Match the IPv6 address with the IPv6 address type: loopback

FF02::1:FFAE:F85F

Match the IPv6 address with the IPv6 address type: solicited node multicast

This network portion of the address is assigned by the provider.

Match the description to the IPv6 addressing component: global routing prefix

This part of the address is the equivalent to the host portion of an IPv4 address.

Match the description to the IPv6 addressing component: interface ID

This part of the address is used by an organization to identify subnets.

Match the description to the IPv6 addressing component: subnet ID

80

Match the port number with its associated protocol. HTTP

443

Match the port number with its associated protocol. HTTPS

143

Match the port number with its associated protocol. IMAP

25

Match the port number with its associated protocol: SMTP

23

Match the port number with its associated protocol: Telnet

The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?

selective acknowledgement - SACK

Optional TCP feature that makes it possible for the destination to acknowledge bytes in discontinuous segments. With this, the source host would only need to retransmit the specific unacknowledged data rather than retransmitting all data since the last acknowledged data.

53

Port number associated with DNS

21

Port number associated with FTP

80

Port number associated with HTTP

143

Port number associated with IMAP

520

Port number associated with RIP

25

Port number associated with SMTP

161

Port number associated with SNMP

69

Port number associated with TFTP

23

Port number associated with Telnet

Well-known ports, reserved for services and applications.

Port number range 0 to 1023

Registered ports, assigned to user processes or applications

Port number range 1024 to 49151

Dynamic or private ports, also known as ephemeral ports, usually assigned dynamically to client applications when the client initiates a connection to a service.

Port number range 49152 to 65535

Transmission Control Protocol - TCP

A Layer 4 protocol of the TCP/IP model, TCP lets applications guarantee delivery of data across a network.

Header

A ________, used for data reassembly, is added to each block of data. This ______is used to track the data stream.

reliable

A characteristic of a protocol that uses mechanisms such as handshaking, timers, acknowledgement messages, and dynamic windowing to help ensure that data received is the same as the data sent. These kind of protocols require additional overhead on the network in terms of much larger segment headers.

client sends FIN server sends ACK server sends FIN client sends ACK

A client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur.

FTP makes use of TCP, so as soon as segments are lost in transit, the receiving device will send a decreased window size in returning segments.

A client is downloading a large file from a server using FTP. One of the segments is lost during transit. What will happen?

User Datagram Protocol - UDP

A connectionless transport layer protocol in the TCP/IP protocol stack. This is a simple protocol that exchanges datagrams without acknowledgements or guaranteed delivery, requiring that error processing and retransmission be handled.

ephermeral or private

A dynamic port in the range of 49152 to 65535 is also known as an _____ port

socket

A logical communications end point within a network device. It is typically represented by a Layer 3 address and a Layer 4 port number.

multiplexing

A process where multiple digital data streams are combined into one signal.

session

A related set of communications transactions between two or more network devices.

to test that the host has the capability to reach hosts on other networks

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?

expectational acknowledgement

Acknowledgement used by TCP where the ACK number is sent back to the source to indicate the next byte that the receiver expects to receive.

all IPv6 enabled devices on the local link​ or network

An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?​

TCP is appropriate when segments must arrive in a very specific sequence to be processed successfully and/or when all data must be fully received before any of it is considered useful. Examples are databases, web browsers, and email clients.

Application developers must choose which transport protocol type is appropriate based on the requirements of the applications. What are two examples of where a TCP is more appropriate.

Domain Name System - DNS Simple Network Management Protocol - SNMP Dynamic Host Configuration Protocol - DHCP Routing Information Protocol - RIP Trivial File Transfer Protocol - TFTP IP telephony or Voice over IP - VoIP Online games

Application layer protocols that use UDP include:

window size

As filed in the TCP header that is set in a sent segment, signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgement. Used for flow control.

conversation

At the transport layer, each particular set of data flowing between a source application and a destination application is known as a ____________________________.

port numbers

Both TCP and UDP use _____ to separate multiple communications on the same channel.

Transport

Chapter 7 focused on the ______________ layer. That layer is above the Network layer and below the session layer in the OSI Model.

header

Control information added before data during the encapsulation for network transmission.

best-effort delivery

Describes a network system that does not use a sophisticated acknowledgement system to guarantee reliable delivery of information.

TCP is considered a reliable, full-featured transport layer protocol, which ensures that all the data arrives at the destination. In contrast, UDP is a very simple transport layer protocol that does not provide any reliabilty.

Explain how TCP and UDP differ from each other

After a period of transmission with no data losses or constrained resources, the receiver begins to increase the window field, which reduces the overhead on the network, because fewer acknowledgements must be sent. The window size continues to increase until there is data loss, which causes the window size to decrease.

Explain how dynamic window sizes work.

Flow control is accomplished by limiting the amount of data segments forwarded at one time and by requiring acknowledgements of receipt prior to sending more.

Explain how flow control is accomplished.

Flow control helps maintain the reliability of TCP transmission by adjusting the rate of data flow between source and destination for a given session.

Explain the purpose of flow control.

The transport layer provides a method of delivering data across the network in a way that ensures that the data can be properly put back together on the receiving end, and provides the segmentation of data and the controls necessary to reassemble these segments into the various communication streams.

Explain the purpose of the transport layer.

The initiating client requests a client-to-server communication session with the server. The server acknowledges the client-to-server communication session and requests a server-to-client communication session. The initiating client acknowledges the server-to-client communication session.

Explain the three steps in TCP connection establishment.

The three-way handshake: Establishes that the destination device is present on the network Verifies that the destination has an active service and is accepting requests on the destination port number that the initiating client intends to use for the session. Informs the destination device that the source client intends to establish a communication session on that port number.

Explain what occurs during a three-way handshake.

Denying the establishment of TCP sessions. Only allowing sessions to be established for specific services. Only allowing traffic as a part of already established sessions.

How can security be added to the data network?

By numbering and sequencing the segments, TCP can ensure that segments are reassembled into the proper order.

How does TCP ensure that its segments are reassembled into the proper order?

The three-way handshake starts when a client device sends an ISN to the server. The server responds with an acknowledgement of the ISN+1 and its own ISN. The last step in the process is when the client acknowledges the server ISN by responding with a value of the server ISN+1.

If a client sends an ISN of 2 to a server and a server responds with an ISN of 1 to the client, what is the final stage of the TCP three-way handshake?

User Datagram Protocol ( UDP)

In TCP/IP, the segmentation and reassembly processes can be achieved using two different transport layer protocols: Transmission Control Protocol ( TCP) and _________.

Multiplexing

_____ is the term used to describe the interweaving of data from multiple users on the same network.

port

In networking, this term is used in several ways. With Ethernet hub and switch hardware, this is simply another name for interface, which is a physical connector in the switch into which a cable can be connected. With TCP and UDP, this is a software function that uniquely identifies a software process on a computer that uses TCP or UDP. With PCs, this can be a physical connector on the PC, as in parallel or USB.

SLAAC

In which alternative to DHCPv6 does a router dynamically provide IPv6 configuration information to hosts?

sequence number

Information placed in a data header to ensure correct sequencing of the arriving data.

UDP

Label each of the following delivery method characteristics as either TCP or UDP: Fast transmission requirements

TCP

Label each of the following delivery method characteristics as either TCP or UDP: Guaranteed delivery

UDP

Label each of the following delivery method characteristics as either TCP or UDP: Less overhead

UDP

Label each of the following delivery method characteristics as either TCP or UDP: connectionless

TCP

Label each of the following delivery method characteristics as either TCP or UDP: flow control

UDP

Label each of the following delivery method characteristics as either TCP or UDP: no acknowledgement of receipt

UDP

Label each of the following delivery method characteristics as either TCP or UDP: no ordered delivery

TCP

Label each of the following delivery method characteristics as either TCP or UDP: ordered delivery

TCP

Label each of the following delivery method characteristics as either TCP or UDP: sequenced message segments

TCP

Label each of the following delivery method characteristics as either TCP or UDP: session establishment

UDP

Label the following application protocols with its correct transport layer delivery method. Either TCP, UDP, or Both: DHCP

Both

Label the following application protocols with its correct transport layer delivery method. Either TCP, UDP, or Both: DNS

TCP

Label the following application protocols with its correct transport layer delivery method. Either TCP, UDP, or Both: FTP

TCP

Label the following application protocols with its correct transport layer delivery method. Either TCP, UDP, or Both: HTTP

UDP

Label the following application protocols with its correct transport layer delivery method. Either TCP, UDP, or Both: IPTV

TCP

Label the following application protocols with its correct transport layer delivery method. Either TCP, UDP, or Both: SMTP

Both

Label the following application protocols with its correct transport layer delivery method. Either TCP, UDP, or Both: SNMP

UDP

Label the following application protocols with its correct transport layer delivery method. Either TCP, UDP, or Both: TFTP

TCP

Label the following application protocols with its correct transport layer delivery method. Either TCP, UDP, or Both: Telnet

UDP

Label the following application protocols with its correct transport layer delivery method. Either TCP, UDP, or Both: VoIP

UDP is appropriate when an application can tolerate some data loss during transmission over the network, but delays in transmission are unacceptable. Examples are streaming audio, video, and VoIP.

List the applications where UDP is the preferred transfer protocol.

Connectionless. Unreliable delivery. No ordered data recontruction. No flow control.

List the features used to describe UDP.

datagram

Logical grouping of information sent as a network layer unit over a transmission medium without prior establishment of a virtual circuit. IP these are the primary information units in the Internet. The terms frame, message, packet, and segments are also called these.

initial sequence number - ISN

Randomly chosen number and is used to begin tracking the flow of data from the client to the server for this session. This in the header of each segment is increased by one for each byte of data sent from the client to the server as the data conversation continues.

All of these items listed are properties of TCP.

Select the best answer. Which of these is not a property of TCP? Select one: a. Ordered data reconstruction b. All of these items listed are properties of TCP. c. Connection oriented conversations d. Flow Control e. Reliable Delivery

Reliable Delivery

Select the item that is not considered a feature or property of UDP. Select one: a. No Flow Control b. Connectionless c. Reliable Delivery d. No ordered data reconstruction

True

TCP breaks up a message into small pieces known as segments. The segments are numbered in sequence and passed to the IP process for assembly into packets. TCP keeps track of the number of segments that have been sent to a specific host from a specific application.

Source and destination - ports Sequencing for same order delivery Acknowledgement of received segments Flow control and congestion management

TCP header provides for:

A connection-oriented protocol is one that negotiates and establishes a permanent connection, or session, between source and destination devices prior to forwarding any traffic.

TCP is a connection-oriented protocol. Explain what a connection-oriented protocol is.

False

TCP provides just the basic functions for delivering data segments between the appropriate applications, with very little overhead and data checking. TCP is known as a best- effort delivery protocol.

window sizes

TCP uses ________ to attempt to manage the rate of transmission to the maximum flow that the network and destination device can support, while minimizing loss and retransmissions.

Connection-oriented conversations by establishing sessions. Reliable delivery. Ordered data reconstruction. Flow control.

TCP was initially described in RFC 793. In addition to supporting the basic functions of data segmentation and reassembly, TCP also provides:

Additional overhead and possible delays in transmission.

TCP's reliability functions provide more robust communication between applications. What are two possible issues that can be incurred by this reliability?

Transmission Control Protocol - TCP and User Datagram Protocol - UDP

TCP/IP provides two transport layer protocols. These are:

connection-oriented

Term used to describe data transfer that requires the establishment of a virtual circuit.

00000111

The 8-digit binary value of the last octet of the IPv4 address 172.17.10.7 is:

false

The combination of the source and destination IP addresses and the source and destination port numbers is known as a datagram.

The socket is used to identify the server and service being requested by the client.

The combination of the source and destination IP addresses and the source and destination port numbers is known as a socket. What is a socket used for?

connection-oriented

The key distinction between TCP and UDP is reliability. The reliability of TCP communication is obtained through the use of _______________________________ sessions.

10.15.25.254/24

The last host address on the 10.15.25.0/24 network is:

172.16

The network portion of the address 172.16.30.5/16 is

UDP

______ is a very simple transport layer protocol that does not provide any reliability.

Negotiates the signalling mechanism used by the medium

The primary responsibilities of the Transport layer are all these except for this. Select the answer that does not belong. Select one: a. Tracking the individual communication between applications on the source and destination hosts b. Segmenting data for manageability and reassembling segmented data into streams of application data at the destination c. Negotiates the signalling mechanism used by the medium. d. Identifying the proper application for each communication stream

three-way handshake

The process used by TCP to establish a session.

2001:DB8:0:1470::200

The shortest compressed format of the IPv6 address is:

Applications that can tolerate some data loss, but require little or no delay. Applications with simple request and reply transactions. Unidirectional communications, where reliability is not required or can be handled by the application.

There are three types of applications that are best suited for UDP. Explain each.

port

There can be many applications or services running on each host in the network. The transport layer assigns each application an identifier. This identifier is called a _________.

Dynamic or private ports - Numbers 49152 to 65535

These are usually assigned dynamically to client applications when the client initiates a connection to a service.

Well-known ports - Numbers 0 to 1023

These numbers are reserved for services and applications. They are commonly used for applications such as HTTP ( web server), Internet Message Access Protocol ( IMAP)/ Simple Mail Transfer Protocol ( SMTP) ( email server), and Telnet.

Registered ports - Numbers 1024 to 49151

These port numbers are assigned to user processes or applications. These processes are primarily individual applications that a user has chosen to install, rather than common applications that would receive a lower port number.

A FIN segment and an ACK segment.

To end each one-way TCP session, a two-way handshake is used which consists of...

stateful

Tracking of actual conversations and their state of the communication session for a protocol, such as TCP.

Source and destination - ports

UDP header provides for:

UDP is a stateless protocol, meaning that neither the client nor the server is obligated to keep track of the state of the communication session.

UDP is a stateless protocol. Explain what this means.

When an application has data to send, it simply sends the data.

UDP is said to be transaction-based. What does this mean?

netstat

What DOS command can be used to see which active TCP connections are open and running on a networked host?

The destination host can acknowledge bytes in discontinuous segments and the source host would only need to retransmit the missing data.

What advantage does selective acknowledgements (SACKs) offer?

The pieces of communication in UDP are called datagrams.

What are the pieces of communication in UDP called?

The transport layer is responsible for segmenting data, adding the port number to identify the proper application, and keeping track of individual conversations. MAC addresses are added by the data link layer, and IP addresses and routing are handled by the network layer.

What are the primary purposes of the transport layer?

Tracking the individual communication between applications on the source and destination hosts. Segmenting data for manageability and reassembling segmented data into streams of application data at the destination. Identifying the proper application for each communication stream.

What are the primary responsibilities of transport layer protocols?

The sequence number - SEQ - and the acknowledgement number - ACK - are used together to confirm receipt of the bytes of data contained in the transmitted segments.

What are the sequence (SEQ) number and acknowledgement (ACK) numbers used together for?

TCP

______ is considered a reliable, full- featured transport layer protocol, which ensures that all the data arrives at the destination.

Meeting the reliability requirements of applications, if any. Multiplexing multiple communication streams from many users or applications on the same network. Identifying the applications and services on the client and server that should handle transmitted data.

What are three responsibilities of the transport layer?

UDP reassembles the data in the order received and passes it to the application. It is up to the application to sort out the data. UDP has no mechanism for reordering of datagrams or requesting retransmission.

What does UDP do when receiving messages that are more than one datagram in length?

the amount of data that can be sent before an acknowledgment is required

What does the value of the window size specify?

Sequence numbers

What information is assigned to each header to ensure that it is reassembled in the correct order?

TCP uses acknowledgements and windowing to offer flow control and reliable delivery. UDP is connectionless and does not resend lost datagrams.

What is a characteristic of UDP?

A stateful protocol is a protocol that keeps track of the state of the communication session. TCP is considered a stateful protocol.

What is a stateful protocol?

UDP communication requires less overhead.

What is an advantage of UDP over TCP?

UDP does not track conversations and has the advantage of low overhead relative to TCP.

What is an advantage that UDP has over TCP?

Source port addresses are assigned by the transport layer to identify the individual conversation and destination port addresses to identify the service being looked for.

What is assigned by the transport layer to identify an application or service?

/27

What is the prefix length notation for the subnet mask 255.255.255.224?

to request that a source decrease the rate at which it transmits data

What is the purpose of the TCP sliding window?

The source port number is randomly generated by the sending device to identify a conversation between two devices. The separate conversations are tracked based on the source ports.

What is the purpose of the source port number?

to keep track of multiple conversations between devices

What is the purpose of using a source port number in a TCP communication?

The FIN control bit indicates that there is no more data from the sender.

Which TCP header control bit is set on to terminate a TCP conversion?

The acknowledgement number indicates that the data has been received, the header length indicates the length of the TCP segment header, the window size specifies the number of segments that can be received before an acknowledgement is required, and the checksum is used for error-checking the segment header and data.

Which TCP header field specifies the number of segments that can be accepted before an acknowledgement is required?

The client randomly selects a source port number.

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

Hypertext Transfer Protocol - HTTP File Transfer Protocol - FTP Simple Mail Transfer Protocol - SMTP Telnet

Which applications use TCP?

tunneling

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

192.168.1.1:80

Which number or set of numbers represents a socket?

TCP 3-way handshake

Which transport layer feature is used to guarantee session establishment?

web servers, printers

Which two types of devices are typically assigned static IP addresses?

link-local address

Which type of IPv6 address is not routable and used only for communication on a single subnet?

Applications that are simple request and reply transactions, those sensitive to delay, and those that are unidirectional in nature make use of UDP. Applications requiring reliable delivery and that can tolerate delay associated with protocol overhead make use of TCP

Which types of applications would use UDP?

The client places a destination port number in the segment to tell the destination server what service is being requested.

Why does a client place a destination port number in a segment?

Dividing application data into segments both ensures that data is transmitted within the limits of the media and that data from different applications can be multiplexed on to the media.

Why is dividing application data into segments necessary?

transport

With UDP, there are no ___________________ layer processes that inform the sender if successful delivery has occurred.


Conjuntos de estudio relacionados

Anthropology 101:Final Exam-Unit 2 Guide

View Set

Lesson 4 Estructura 4.1 Practica adonde van

View Set

MGMT 365 Chapter 5 Connect Test Questions

View Set

Chapter 49: Assessment and Management of Patients With Hepatic Disorders

View Set

SHRM Learning System Practice Exam

View Set

CITI - SoCRA - GCP for Clinical Trials with Investigational Drugs and Biologics (ICH Focus)

View Set

Unit Five - Heat of Vaporization & Heat of Fusion & Chemical Properties

View Set

Unit 2: The Rise of Industrialization, Urbanization, and Immigration

View Set