Exam 1

Ace your homework & exams now with Quizwiz!

Port numbers

What does TCP/IP use to identify Application-layer protocols?

Next header

What field in the basic IPv6 header is used to chain additional headers?

IPv6 is at the Network Layer of the OSI model, 128 bit addresses, hop limit instead of TTL, possibility for security, subnetting is not required but can be used for security purposes.

What is IPv6 - give 5 characteristics of it (what layer of the OSI, fields of importance, what function of network does it relate to..)

Classless Inter-Domain Routing (CIDR)

What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses?

Physical numeric address

What type of address is a six-byte numeric address, burned into firmware (on a chip) by network interface manufacturers?

The 3 goals of TCP/IP design were to have some type of communication able to withstand a nuclear strike, be able to communicate with different systems, and to be able to communicate across long distances.

What were the 3 goals of TCP/IP design, according to the book

Physical

Which OSI model layer handles the conversion of outgoing data from bits that computers use in the signals that networks use?

Application layer

Which layer defines an interface that applications can use to request network services, rather than referring directly to applications themselves?

Physical

Which layer includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications?

DSCP

Which of the following is a special marker with which traffic can be prioritized by an end device or boundary device and queued and forwarded according to this value?

Recognizes and uses multiple routes

Which of the following is a task handled at the Network layer?

Broadcast address

Which of the following represents a network address that all hosts on a network must read?

Internet Engineering Task Force (IETF)

Which organization is responsible for creating and managing RFCs, in which the rules and formats for all related protocols and services are described?

Protocol Analysis

Which process taps into the network communications system and captures packets that cross the network?

NAT

Which technology allows networks use multiple private IPv4 addresses internally and maps them to one or more public IPv4 addresses externally?

Hop

Which term is used to describe the data frame crossing a router?

You could use subnetting with CIDR to allocate address space for network, subnetwork and hosts.

Explain how you would use the bits of a 32 bit address space to allocate some for network, some for subnetwork and some for hosts.

True

A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software.

Subnet mask

A special bit pattern that "blocks off " the network portion of an IPv4 address with an all-ones pattern is known as which of the following?

True

As a frame moves from interface to interface, the IP source and destination address information is preserved.

The OSI model has seven layers-- Physical, Data Link, Network, Transport, Session, Presentation, and Application. TCP/IP has four layers-- Network Access, Internet, Transport and Application. Both serve as a reference model to divide aspects of a network up and conquer any problems it may have.

Compare the OSI Model to the TCP/IP Model - why are the models important to networking

Protocols become standards by going through the IETF . Then you can find them as RFCs assuming they made it through the proposal, draft and aren't considered obsolete and replaced by a newer standard.

How do protocols become standardized and where would you go to find out those standards

255

In IPv4, what is the maximum time to live value?

False

Providing a narrower address space is the primary design goal for IPv6.

Hop limit

The value in which of the following fields will decrement by one each time it is forwarded by a network node, and the IPv6 packet is discarded if the value in this field reaches 0?

True

The Internet Protocol (IP) primarily works to transmit and deliver data between devices on internetworks.

False

The Session layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver.

False

The entire IPv6 address space is now occupied.

True

The original ARPANET was a packet-switched network.

True

Though defined in terms of seconds, a TTL value is implemented as a number of hops that a packet can travel before being discarded by a router.


Related study sets

Chapter 7: Managing Files (Review Questions)

View Set

WGU Principles of Psychology, D167

View Set

Pathophysiology chapter 17 Control of Cardiovasvular Function

View Set

Chapter 3: Solving Problems by Searching

View Set

GCSE Computer Science: Unit 2.3 Robust Programs L1

View Set