Guide to TCP/IP Ch. 1-3
TCP/IP's Design Goals based on the government's needs
1. A desire for communications network with the ability to withstand a potential nuclear strike 2. a desire to permit different kinds of computer systems to communicate easily with one another 3. a need to interconnect systems across long distances
For an IPv6 multicast address, how many bits are assigned to the group ID?
112
The decimal equivalent of binary 10000000 is ______.
128
Which RFC covers Classless Inter-Domain Routing (CIDR)?
1519
The broadcast address for the Class B network 172.16.0.0 is _____
172.16.255.255
What is the decimal value of 11110000 (a four-bit subnet mask)?
240
What is the default subnet mask for a Class B IP address?
255.255.0.0
An IPv6 unicast address is made up of a ___-bit interface ID and a ___-bit network portion.
64, 64
What is the loopback address using IPv6?
::1
Advanced Research Projects Agency (ARPA)
A U.S. Department of Defense agency that created the first global computer network.
IPv6 requires each device on the network to have its own unique address or identifier with one exception: 1. Mobile devices may use multiple identifiers because they frequently move from one network zone to the next 2. Network devices in a multicast group all use a single, unique identifier for their interfaces. 3. There are no exceptions. 4. A host with multiple interfaces providing dynamic load balancing can use a single identifier for ll interfaces. 5. Multiple devices on a local network may share the same anycast identifier.
A host with multiple interfaces providing dynamic load balancing can use a single identifier for ll interfaces.
Packet Switched Network
A message's pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic
protocol suite
A set of protocols that are commonly used together and operate at different levels of the OSI seven-layer model.
Switches make their decisions with specialized hardware known as ___.
ASIC
_______ is provided by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server.
Address masquerading, address substitution, and NAT
Which IP addresses includes the most networked addresses?
Class C
____ addresses are used for multicast communications, in which a single address may be associated with more than one network host machine.
Class D
________ allows IPv4 addresses from class A, B, or C to be combined and treated as a larger address space, or subdivided arbitrarily, as needed.
Classless Inter-Domain Routing (CIDR)
Local Area Network (LAN)
Connects a group of computers in close proximity, such as in an office building, school, or home
Which of the following features are typical for most protocol analyzers? (Choose all that apply.) a. Decodes may be applied to packets in the trace buffer. b. Packet filters display various statistical reports and graphs based on traffic analysis. c. Alarms may be set to flag unusual network events or conditions. d. Packet filters include built-in trend analysis and capacity-planning tools. e. Packet filters may be applied to incoming data before capture, or to store data after capture.
Decodes may be applied to packets in the trace buffer, packet filters display various statistical reports and graphs based on traffic analysis, Alarms may be set to flag unusual network events or conditions, Packet filters may be applied to incoming data before capture, or to store data after capture.
Which of the following IPv6 addresses are the same based on the correct use of zero compression? (Choose all that apply.) a. FE80::2D57:C4F8:0:80D7 b. FE80:0000:2D57:C4F8:0000:80D7 c. FE8::2D57:C4F8::8D7 d. FE80:0:0:0:2D57:C4F8:0:80D7
FE80::2D57:C4F8:0:80D7, FE80:0:0:0:2D57:C4F8:0:80D7
A Best Current Prctice (BCP) RFC is a special form of Standard RFC. (T or F)
False
CIDR addresses are commonly applied to Class A addresses. (T or F)
False
Providing a narrower address space is the primary design goal for IPv6. (T or F)
False
RFC 5000 describes how an RFC is created and what processes it must go through to become an official standard, adopted by the IETF. (T or F)
False
The Session layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver. (T or F)
False
Formerly, addresses were under the auspices of ________.
IANA
____ manages Internet domain names and network addresses.
ICANN
A(n) _______ is the router or other device that will forward traffic to the host's physical network.
IP gatewaay
A _______ is a device that interconnects multiple IP networks or subnets.
IP gateway
What version of IP supports 128-bit addresses?
IPv6
The ____ is responsible for the more forward-looking activities of the ISOC, and handles research and development work for topics too far-out or impractical for immediate implementation, but which may (or may not) have a role to play on the Internet some day. 1. Internet Society 2. ICANN 3. Internet Research Task Force 4. ISO 5. Internet Engineering Task Force
Internet Research Task Force
The ______ is the parent organization for all the various Internet boards and task forces. 1. ISO 2. Internet Engineering Task Force 3. ICANN 4. Internet Architecture Board 5. Internet Society
Internet Society
The _______ is the parent organization for all the various Internet boards and task forces.
Internet Society
Which of the following TCP/IP network model layer(s) maps most nearly to single layers in the ISO/OSI network reference model? (Choose all that apply.) a. Network Access b. Application c. Internet d. Transport
Internet, Transport
Which of the following tools or techniques helped to alleviate IPv4 scarcity? (Choose all that apply.) a. NAT b. IPv6 c. increased use of private IP addresses d. CIDR
NAT, increased use of private IP addresses, CIDR
Registration informs the _____ to pass packets sent to that address to the IP stack so their contents can be read, and tell the IP gateway to forward such traffic onto the physical network, where the listening network interface resides.
NIC
The primary function of the OSI Model's ____ layer is to provide a globally unique address to every host on the Internet and paths to and from hosts.
Network
The ____ is where notions of network location are addressed and where the intricacies involved in direction a PDU from sender to receiver are handled. 1. Application layer 2. Network layer 3. Data link layer and Network layer 4. Data link layer 5. Transport layer
Network layer
The ____ includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications. 1. Data link layer 2. Transport layer 3. Network layer 4. Physical layer 5. Data link layer and Network layer
Physical layer
The ___ layer manages the way data is presented to the network (on its way down the protocol stack), and to a specific machine/application combination (on its way up the protocol stack). 1. Presentation 2. Physical 3. Transport 4. Session 5. Network
Presentation
The TCP/IP application layer also is known as the ___ layer because this is where the protocol stack interfaces with applications or processes on a host machine.
Process
______ is used to translate MAC layer addresses into numeric IP addresses.
RARP
Which of the following steps must a STandard RFC go through to become an official standard? (Choose all that apply.) a. Historic Standard b. Standard (sometimes called "Internet Standard") c. Draft Standard d. Retired Standard e. Proposed Standard
Standard (sometimes called "Internet Standard"), Draft Standard Proposed Standard
Which of the following TCP/IP protocols operate at the TCP/IP Transport layer? (Choose all that apply.) a. TCP b. ARP c. PPP d. ICMP e. UDP
TCP, UDP
Which of the following milestone events for TCP/IP occurred in 1983? (Choose all that apply.) a. TCP/IP appears in the 4.2BSD UNIX distribution. b. NSF launches the NSFNET. c. Initial development of name server technology occurs. d. The Department of Defense mandates TCP/IP as the "official ARPANET protocol."
TCP/IP appears in the 4.2BSD UNIX distribution, Initial development of name server technology occurs, The Department of Defense mandates TCP/IP as the "official ARPANET protocol."
Defense Information Systems Agency (DISA)
The DoD agency that took over operation of the Internet when ARPA surrendered its control in 1983.
A card that runs in promiscuous mode can capture broadcast packets. (T or F)
True
A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software. (T or F)
True
As a frame moves from interface to interface, the IP source and destination address information is preserved. (T or F)
True
Duplication of numeric IP addresses is not allowed because that would lead to confusion. (T or F)
True
IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network. (T or F)
True
If two network interfaces are on the same physical network, they can communicate directly with one another at the MAC layer. (T or F)
True
Multicast addresses come in handy when a class of devices, such as routers, must be updated with the same information on a regular basis. (T or F)
True
On any system, only those protocol numbers for protocols that are actually in use must be defined on that system. (T or F)
True
Originally, when IP addresses were assigned for public use, they were assigned on a per-network basis. (T or F)
True
PDUs typically include "envelope information" in the form of specific headers and trailers. (T or F)
True
The Class A network address of 12.0.0.0 is written as 12.0.0.0/8 in prefix notation. (T or F)
True
The time it takes to route from one network to another is affected by the size of the routing table. (T or F)
True
When a host uses a service that employs a multicast address, it registers itself to "listen" on that address, as well as on its own unique host address (and the broadcast address). (T or F)
True
When two or more RFCs cover the same topic, they usually also share the same title. (T or F)
True
Zero compression is a method that allows a word containing contiguous zeros in an IPv6 address to be replaced by double colons. True or False?
True
____ assign a series of numbers to represent a sizable collection of TCP/IP-based network services, such as file transfer (FTP), terminal emulation (Telnet), and e-mail. 1. Datagrams 2. Data frames 3. Daemons 4. Data frames and Datagrams 5. Well-known protocols
Well-known protocols
Ethernet
a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
Many analyzers have configurable ____ that indicate unusual network events or errors.
alarms
Which kinds of devices require public IP addresses? (Choose all that apply.) a. any server whose services should be available to the internet b. any device attached directly to the Internet c. every server on an internal network d. every client on an internal network
any server whose services should be available to the internet, any device attached directly to the Internet
A ________ represents a network address that all hosts on a network must read.
broadcast address
The Session layer includes mechanisms to maintain reliable ongoing conversations, called _____.
checkpoint
Which function(s) does the Session layer provide? (Choose all that apply.) a. data format conversion b. segmentation and reassembly c. checkpoint controls d. session setup, maintenance. and tear-down
checkpoint controls, session setup, maintenance, and tear-down
The simplest form of subnet masking uses a technique called _______, in which each subnet includes the same number of stations and represents a simple division of the address space made available by subnetting into multiple equal segments.
constant-length subnet masking
Data Link layer PDUs are called _____
frames
What is the common name for PDUs at the Data Link layer? 1. segments 2. frames 3. Data Link PDUs 4. packets 5. datagrams
frames
Which term(s) represent parts of a PDU that are always present in any PDU? (Choose all the apply.) a.. checksum b. trailer c. header d. payload
header, payload
The term ______ is used to describe the data frame crossing a router.
hop
Devices that operate on the Internet are generically identified as ___.
hosts
The term ____ refers to a single logical network composed of multiple physical networks, which may all be at a single physical location, or spread among multiple physical locations
internet
Which of the following represents an improvement of IPv6 over IPv4? (Choose all that apply.) a. larger address space b. improved broadcast support c. better security d. better support for mobile IP
larger address space, better security, better support for mobile IP
Which of the following address types are used for local network communications in IPv6? (Choose all that apply.) a. link-local b. site-local c. link-layer d. local-use
link-local, site-local
Internet Protocol (IP)
manages the routing of network transmissions from sender to receiver, along with issues related to network and computer addresses, and much more
Select all valid limitation to which private IP addresses are subject. (Choose all that apply.) a. will not work with NAT software b. may not work with protocols that require secure end-to-end connections c. may not be used without permission from ICANN or an ISP d. may not be routed on the Internet
may not work with protocols that require secure end-to-end connections, may not be routed on the internet
Which address types are supported by IPv6?
multicast, anycast, unicast
The process of combining multiple outgoing protocol streams at the Transport and Network layers in TCP/IP is called ____.
multiplexing
Which of the following components operate at the Physical layer? (Choose all that apply.) a. network interface cards (NICs) b. cables c. segmentation and reassembly d. connectors
network interface cards (NICs), cables, connectors
Transmission Control Protocol (TCP)
offers reliable delivery for messages of arbitrary size, and it defines a robust delivery mechanism for all kinds of data across a network
The OSI Model's ______ layer includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications.
physical
The _______ address is a six-byte numeric address, burned into firmware (on a chip) by network interface manufacturers.
physical numeric
Each TCP/IP service has an associated ___ that uses a 16-bit number to identify a specific process or service.
port number
A packet filter that's applied to incoming data in a protocol analyzer may be called a ____________. (Choose all that apply) a. pre-filter b. capture filter c. egress filter d. data filter e. post-filter
pre-filter, capture filter
______ is the process of tapping into the network communications system, capturing packets that cross the network, gathering network statistics, and decoding the packets into readable form.
protocol analysis
Which of the following services perform address hiding? (Choose all that apply.) a. proxy b. VLSM c. IPv6 d. NAT
proxy, NAT
___________ permits the proxy server to front for servers inside the boundary by advertising only the proxy server's address to the outside world, and then forwarding only legitimate requests for service to internal servers for further processing.
reverse proxying
Which of the following items represented design goals that motivated the development of TCP/IP? (Choose all that apply.) a. robust network architecture b. reliable delivery mechanisms c. support for long-haul connections d. high performance e. ability of dissimilar systems to exchange data
robust network architecture, reliable delivery mechanisms, support for long-haul connections, ability of dissimilar systems to exchange data
_____ is a synonym for a dynamiclly assigned port address, used to service a temporary TCP/IP connection for data exchange.
socket address
___________ combines contiguous network addresses by stealing bits from the network portion and using them to create a single, larger contiguous address space for host addresses.
supernetting
Which of the following statements represent benefits of a layered approach to networking? (Choose all that apply.) a. takes a big problem and breaks it into a series of smaller interrelated problems b. allows individual layers to be insulated from one another c. permits expertise to be applied from different disciplines for different layers d. permits hardware issues to be kept separate from software issues
takes a big problem and breaks it into a series of smaller interrelated problems, allows individual layers to be insulated from one another, permits expertise to be applied from different disciplines for different layers, permits hardware issues to be kept separate from software issues
Which of the following activities may occur during the protocol analysis process? (Choose all that apply.) a. retransmitting captured packets for testing b. tapping into network communications c. decoding packets into readable form d. fathering statistics e. capturing packets "off the wire"
tapping into network communications, decoding packets into readable form, fathering statistics, capturing packets "off the wire"
Internetwork
this term refers to a single logical network composed of many physical networks, which may all be at a single physical location or may be spread around multiple physical locations
A(n) ____ is holding area for packets copied off the network. 1. layer 2. packet 3. cache 4. trace buffer 5. payload
trace buffer
Many PDUs include a characteristic closing component called a ____ that provides data integrity checks for the data portion of the PDU, known as the payload.
trailer
In IPv6, the ________ adress is all zeroes and can be represented as two colon characters (::) in normal notation.
unspecified