Computer Networking (Study Guide)
User Data Protocol (UDP) only allows a 1-to-1 interaction in which the application exchanges messages with exactly one other application.
False
What is the purpose of the Transaction-ID in the DHCP packets?
Provides a value that a client can use to determine if an incoming response matches its request.
An internet address is a unique binary number assigned to a host and used for all communication with the host.
True
IPv6 assigns a unique address for each connection between a computer and a physical network.
True
In the Internet, the Transmission Control Protocol (TCP) is a transport-layer protocol that provides reliability.
True
The IPv6 divides header information into a base header and a series of smaller, optional extension headers.
True
When a fragment is lost the entire packet must be retransmitted.
True
What IP address indicates the absence of a DHCP Relay Agent?
0.0.0.0
What is the source IP address in the Discover packet?
0.0.0.0
How many bits does an IPv6 address occupy
128
What is the network address for the address 172.16.170.112/18?
172.16.128.0
What is the network address for the address 192.168.148.61/23?
192.168.148.0
What CIDR is need to provide 600 host addresses?
22
How many possible suffixes (host addresses) are available in an IPv4 Class C Address?
254
What is the subnet mask for 10.0.0.0/12?
255.240.0.0
What is the subnet mask for CIDR /17?
255.255.128.0
What subnet mast is required to provided addressing for 300 hosts?
255.255.254.0
Which source port number is used as the source port by the server in the Offer and ACK DHCP packets?
67
Which port number is used as the source port by the client in the Discover and Request DHCP packets?
68
UDP is a connection-oriented communication paradigm and that needs to pre-establish communication before sending data.
A CLR is used to clear a connection of congestion
When is an IP address to the client confirmed in the DHCP process?
At the end of the four-message exchange.
A host that connects to multiple networks is called_____.
Multihomed
The primary motivation for the newer version of IP addressing arose from?
The need for a larger address space
Are DHCP messages sent over UDP or TCP?
UDP
A device on a local area network is assigned 192.168.151.200/25. Which of the following apply to this LAN?
•Broadcast address 192.168.151.255 •Network address 192.168.151.128 •Range of available host addresses 192.168.151.129 - 192.168.151.254 •Subnet mask is 255.255.255.128
The IP address scheme guarantees that each computer on the Internet is assigned_____.
A unique address
The User Data Protocol (UDP) can not distinguish among multiple application programs running on a given computer.
False
The User Datagram Protocol (UDP) is a transport-layer protocol that provides reliability.
False
The fundamental delivery method used on the Internet is connection-oriented service.
False
The number of entries in a router's forwarding table is proportional to the number of hosts in the Internet.
False
The technique known as sliding window is a flow control that permits a steady stream of data to be continuously transmitted on the Internet.
False
DCHP does not require each individual network to have a server. Instead, a DHCP ___________ forwards requests and responses between a client and the server.
Relay agent
How does TCP handle packet loss?
Retransmission
What is the subnet mask for CIDR /28?
255.255.255.240
What is the subnet mask for a CIDR /29?
255.255.255.248
What is the destination IP address in the Discover packet?
255.255.255.255
Address Resolution Protocol forms a conceptual boundary in the protocol stack: layers below ARP use IP addresses, and layers above ARP use MAC addresses.
False
Which IP address class provides the largest number of host identifiers?
Class A
Address Resolution Protocol is used for address binding for IPv4 and IPv6 addressing.
False
Address masks in an Internet forwarding table can never overlap.
False
An IPv4 address identifies an application on a specific computer.
False
The IP source address and the __________________________ field is used to reassemble fragments that arrive out-of-order in an IP datagram.
Identification
Colon hexadecimal notation is used to
Reduce the number of characters used to write an address
In the TCP 3-way handshake the following are all true except.
Virtual Connections
To control the flow of data, TCP uses a ____________ to measure in bytes the amount of buffer space available.
Window
What is the subnet mask for CIDR /26?
255.255.255.192
The IP address 127.0.0.1 is commonly used to test network applications and is called ______________________ .
A loopback address
Address resolution is
A mapping between a protocol address and a hardware address.
What is the purpose of the Dynamic Host Configuration Protocol (DHCP)?
DHCP allows a computer to move to a new network and obtain configuration data without manually making the changes.
A packet sent across a TCP/IP Internet is called an IP
Datagram
An IPv4 address that contains all zeros is used to indicate _____.
Default router
Software displays IPv4 addresses in a notation that is more convenient for humans to understand called ____________ notation.
Dotted decimal
The purpose of the mask field in a forwarding table is to ____________________________________ .
Extract the network portion of an address
Classless Inter-Domain Routing (CIDR) is used for routing data through an autonomous system.
False
Hardware failure is the most common reason for delay and packet loss.
False
IPv4 is being replaced by IPv6 due to a variety of flaws associated with the original IPv4 address schema.
False
Replay errors occur when a duplicate packet arrives causing packets to arrive out of sequence.
False
The IPv4 datagram has a variable length header which makes header processing efficient.
False
The SOURCE ADDRESS in an IP datagram contains a list of addresses for all intermediate routers a packet passes through as it travels across the Internet.
False
User Data Protocol (UDP) offers application programs a stream-oriented interface.
False
What is the purpose of the TIME TO LIVE field in the IP header?
It prevents a datagram from circulating forever in a circular path.
The User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) are end-to-end protocols and are in which layer of the TCP/IP model?
Layer 4 Transport
Transmission Control Protocol (TCP) is a connection oriented because an application.
Must request that TCP form a connection before it can transfer data and close the connection when transfer is complete.
The User Datagram Protocol is characterized as end-to-end protocol. How does UDP identify an application program as an endpoint?
Protocol Port Numbers
Transport protocols use _____ to handle duplicate packets and out-of-order packet deliveries.
Sequencing
What is the purpose of the lease time provided in the DHCP ACK packet?
The amount of time a user can connect to the network using this IP address.
What is the purpose of the header in an IP datagram?
The header contains information used to forward the datagram
In the IP address assignment 10.53.113.0/24, what does the number 24 represent?
The number of bits assigned to the network address
A host computer with multiple network connections is said to be multi-homed.
True
A virtual packet is hardware independent and each host or router on the Internet contains protocol software that recognizes these Internet packets.
True
Address Resolution Protocol (ARP) cannot be used to resolve the address of another computer on a remote network.
True
Each User Data Protocol datagram is encapsulated in an IP datagram for transmission across the Internet.
True
Each packet of data that crosses the Internet travels independently and contains information that identifies the intended recipient.
True
Network Address Translation (NAT) allows multiple computers at a site to share a single, globally valid IP address.
True
Ping and traceroute commands are both forms of Internet Control Message Protocol messages.
True
The Internet Corporation for Assigned Names and Numbers (ICANN) handles IP address assignment and dispute resolution.
True
The User Data Protocol (UDP) does not divide a message into multiple packets, and does not combine messages for delivery-- each message that an application sends is transported across the Internet and delivered to the receiver.
True
The User Data Protocol (UDP) is less complex and easier to understand than the Transmission Control Protocol (TCP).
True
The appropriate response to congestion consists of reducing the rate at which packets are being transmitted.
True
To handle ambiguity that arises from overlapping address masks, Internet forwarding uses a longest prefix match.
True
Transport protocols do more than detect errors; sophisticated transport protocols employ techniques that can repair or circumvent problems.
True
User Data Protocol (UDP) only suffices for applications such as voice or video that can tolerate delivery errors.
True
Zero compression is used to reduce the size of the IP address by replacing sequences of zeros with two colons in IPv6 addressing.
True
Connections provided by TCP are achieved in software and are called
Virtual connections.
An optimization that replaces sequences of zeroes in a IPv6 addresses is called_____.
Zero compression
Because IP is designed to operate over all types of network hardware, including hardware that experiences problems, IP datagrams may be.
•Lost •Duplicated •Delayed or delivered out of order •Delivered with corrupted data
Internet Control Message Protocol is used to _______________________ and ___________________________.
•Send relay error messages •Send informational messages
IPv6 has three address types _____________, _____________ and _____________ .
•Unicast •Multicast •Anycast