MIS 140-Chapter 5
The _____ address range is reserved for a computer to communicate with itself and is called the loopback. 121 127 239 254 111
127
IPv6 is based upon _________ -byte addresses. 32 24 4 16 8
16
A typical TCP segment has a _______ header of control information. 32-bit 64-bit 120-byte 192-bit 32-byte
192-bit
The older version of IP has a ________ header of control information. 128-bit 192-bit 1024-bit 120-bit 320-bit
192-bit
The older version of IP has a ________ header of control information. 128-bit 192-bit 1024-bit 120-bit 320-bit
192-bit
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. 11111111.0.0.0 255.255.255.0 255.0.0.0 255.255.0.0 255.255.255.255
255.255.0.0
IPv4 uses ________ bytes per Internet address. 4 32 8 24 16
4
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974. ARPANET IBM Hewlett-Packard University of Minnesota Xerox
ARPANET
Dynamic addressing: assigns a permanent network layer address to a client computer in a network. Makes network management more complicated in dial-up networks. Has only one standard, bootp is always performed for servers only. Can solve many updating headaches for network managers who have large, growing, changing networks.
Can solve many updating headaches for network managers who have large, growing, changing networks.
A majority of routers use the following operating system: Windows 95 Red Hat Linux Windows Server 2008 Cisco Internetwork Operating System Linksys OSI System
Cisco Internetwork Operating System
______________ communication is most commonly used when the application data or message can fit into one single packet. Frame-oriented Connection-oriented Connectionless Physical-oriented Byte-oriented
Connectionless
When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server. broadcast message DNS request packet SNA packet IPX message X.25 packet
DNS request packet
Server name resolution is done using the: Address Resolution Protocol Border Gateway Protocol Internet Control Message Protocol Routing Information Protocol Domain Name Service
Domain Name Service
A multicast message can be used to send a message to a maximum of two other computers. True False
False
A routing protocol used inside an autonomous system is called an exterior routing protocol. True False
False
Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver. True False
False
IP is responsible for error-free delivery of packets on a TCP/IP network. True False
False
TCP is the network layer protocol used on the Internet today. True False
False
TCP/IP is a data link protocol that is used on the Internet. True False
False
TCP/IP is a data link protocol that is used on the Internet. True False
False
The latest version of IP is IPv7, which increases the address space from 128 bits to 256 bits. True False
False
The network layer provides guaranteed end-to-end delivery of the message. True False
False
The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model. True False
False
The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to. True False
False
The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to. True False
False
The standard port number for Telnet is 53. True False
False
There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing. True False
False
UDP is not commonly used for: network management control messages RIP messages DHCP addressing messages HTTP requests DNS requests
HTTP requests
IGMP refers to: Internet Giga Memory Parameters Interchange Group Management Parameters Internet Guided Meta Protocol Internet Group Management Protocol Interchange Guided Meta Protocol
Internet Group Management Protocol
Which of the following is not a component of a router? CPU Interface Memory Keyboard Port
Keyboard
_______________ is a type of dynamic routing. Static routing Circuitous routing Centralized routing Link state X.25 routing
Link state
___________ is the process of determining the path that a message will travel from sending computer to receiving computer. Routing Addressing Interfacing Broadcasting Packetizing
Routing
___________ is the translation of application layer addresses into IP addresses. Network interface card reversal IPv6 Server name resolution Subnet masking Name service coding
Server name resolution
____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. Adaptive routing Dynamic routing Static routing Distance vector routing Link state routing
Static routing
The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. network layer address resolution one way handshake SNA message TCP connection DNS server request
TCP connection
_______ is the dominant network protocol today and is in use in virtually every LAN and WAN in the world. SDLC SNA IPX/SPX TCP/IP X.25
TCP/IP
One drawback to dynamic routing is: Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages It cannot be used with non-government networks. The transmission of status information "wastes" network capacity that could be used to send user messages. It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. It requires less processing by each computer than static routing.
The transmission of status information "wastes" network capacity that could be used to send user messages
An Address Resolution Protocol message is broadcast to all computers in a subnet to find the data link layer address of a host whose IP address is known but whose MAC address is unknown. True False
True
An autonomous system is a network operated by one organization. True False
True
An example of an application layer address is www.indiana.edu. True False
True
Domain Name Servers provide the resolution of application layer addresses to their corresponding network layer address. True False
True
Domain Name Servers provide the resolution of application layer addresses to their corresponding network layer address. True False
True
Quality of Service routing is a special type of routing in which different connections are assigned different priorities. True False
True
Quality of Service routing is a special type of routing in which different connections are assigned different priorities. True False
True
Routing is the process of determining the path or route through the network that a particular message will follow from the sender to the recipient. True False
True
Source port address is the logical address used to identify the application that is sending the data. True False
True
Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet. True False
True
The TCP portion of TCP/IP performs linking to the application layer. True False
True
The data link layer address is generally encoded in a network card by the card's manufacturer. True False
True
The data link layer address is generally encoded in a network card by the card's manufacturer. True False
True
Translating an application layer address to a network layer address and finally to a data link layer address is called address resolution. True False
True
Which of the following is not a protocol used at the application layer. HTTP SMTP FTP Telnet UDP
UDP
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information? application layer address subnet mask its own IP address IP address of its DNS server IP address of a gateway, router, or a switch outside of its subnet
application layer address
ICANN: developed the IPX/SPX network layer protocol assigns data link layer addresses approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet developed X.25 network layer protocol refers to Interchange Computer Addressing Networks and Nodes
approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet
A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a: unicast message multicast message broadcast message guided message radiated message
broadcast message
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. physical layer packet multicast message X.25 message broadcast message application layer packet
broadcast message
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. physical layer packet multicast message X.25 message broadcast message application layer packet
broadcast message
The three fundamental approaches to routing are: circuitous, flat, and direct routing connectionless, static, and connection-oriented subordinate, master, and insubordinate routing host, client, and client-server routing centralized, static routing, and dynamic routing
centralized, static routing, and dynamic routing
A TCP three-way handshake is used to establish a ___________ messaging method. asynchronous connection-oriented frequency division application net connectionless
connection-oriented
A TCP three-way handshake is used to establish a ___________ messaging method. asynchronous connection-oriented frequency division application net connectionless
connection-oriented
With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors. circuitous decentralized distance vector indirect link state
distance vector
A client computer is typically assigned a data link layer address by a: hardware manufacturer software manufacturer middleware manufacturer network manager who configure a file in a computer's network layer software package ISO
hardware manufacturer
The newer form of IP, version 6 (IPv6): Is running out of address space to support the growth of the Internet has a 20 byte header has an increased address size from 32 bits to 128 bits does not include version number in its header does not include hop limit in its header
has an increased address size from 32 bits to 128 bits
IP: performs segmentation of the data does not have a header is currently in use with only one packet form or structure is utilized during routing functions performs error control functions
is utilized during routing functions
IP addresses from 224 to 239 belong to Class D and are reserved for the government ISPs multicasting broadcasting private networks
multicasting
TCP/IP: is the least commonly used network protocol for LANs because it cannot be combined with Ethernet performs packetizing, as well as routing and addressing functions is not very efficient and is prone to errors is compatible with only one type of data link protocol, SDLC refers to Telephone Control Procedures/Inter-exchange Procedures
performs packetizing, as well as routing and addressing functions
__________ is not an important function of the transport layer. end-to-end delivery of the message taking messages from the application layer routing breaking long messages into smaller segments interfacing with the network layer
routing
An advantage of centralized routing is: Routing does reflect changing network conditions, such as computers that are overloaded by many messages. If anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function. Routing decisions are simple. The routing tables are stored at all computers in the network. It requires more processing by each computer or router in the network than dynamic routing.
routing decisions are simple
In its simplest form, the __________ has two columns: the first column lists every destination network, while the second column lists the interface on which that computer should send messages, if they are destined for the network in the first column. linking loader routing table configuration listing bus header assignment list file allocation table
routing table
The _____________ is used by a computer to determine how messages will travel through the network. routing table configuration listing linking loader bus header assignment list file allocation table
routing table
TCP uses _____________ so that the destination station can reassemble the packets into the correct order. IP addresses sequence numbers port numbers packet numbers reassembly value
sequence numbers
A(n) ________ refers to a group of computers that are logically grouped together by IP number. IPv6 group subnet data link group TCP group application net
subnet
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. physical transport session presentation data link
transport
A type of message that is used when sending a message from one computer to another computer is called a: unicast message multicast message broadcast message guided message radiated message
unicast message
The source port identifier of the received TCP segment tells the destination station _____________. which computer sent the TCP packet. which application layer program that the packet should be sent which application layer process the packet is from. the IP address of the source computer. the IP address of the destination computer.
which application layer process the packet is from.
An application layer address using TCP/IPv4 looks like: 128.192.78.5 www.cba.uga.edu [email protected] 00-0F-00-81-14-00 Building 4, Room 2, User 3
www.cba.uga.edu