Data Transmission on WAN
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the maximum length of an IP datagram in bytes?

  • 128,000 bytes
  • 32,767 bytes
  • 512 bytes
  • 65,535 bytes (correct)
  • What is the purpose of the identification field in an IP datagram?

  • To determine the time to live of the datagram
  • To indicate the encapsulated protocol type
  • To identify and group fragments of a datagram (correct)
  • To define the length of the datagram
  • Which flag indicates that the datagram is a fragment?

  • The identification number
  • The time to live value
  • The fragment offset value
  • The first bit of the flags field (correct)
  • How is the order of fragments in a fragmented datagram maintained?

    <p>Through the fragment offset (C)</p> Signup and view all the answers

    What happens to a datagram when its time to live field reaches zero?

    <p>It is discarded (C)</p> Signup and view all the answers

    What length is specified by the time to live field?

    <p>The number of hops a datagram can take (B)</p> Signup and view all the answers

    What information does the protocol field in an IP datagram provide?

    <p>The type of encapsulated protocol (D)</p> Signup and view all the answers

    What is the default setting for the time to live field in most applications?

    <p>30 or 32 (A)</p> Signup and view all the answers

    What does the Finish Flag (FIN) indicate in a TCP segment?

    <p>Last data from the sender (A)</p> Signup and view all the answers

    What does the Windows field in the TCP header represent?

    <p>Number of unacknowledged segments allowed on the network (A)</p> Signup and view all the answers

    What information is included in the TCP Pseudo header for Checksum calculation?

    <p>Source IP, Destination IP, Zero, IP Protocol, and TCP Length (B)</p> Signup and view all the answers

    What is the purpose of the Urgent Pointer in a TCP segment?

    <p>To point to the sequence number of the octet following urgent data (D)</p> Signup and view all the answers

    Which option is NOT a valid Kind for TCP options?

    <p>Kind 3 - Congestion Window Size (C)</p> Signup and view all the answers

    How does the User Datagram Protocol (UDP) ensure reliability?

    <p>It relies on upper layer protocols for error correction (B)</p> Signup and view all the answers

    What role does Padding play in the TCP header?

    <p>To ensure TCP header aligns on a 32-bit boundary (D)</p> Signup and view all the answers

    Which statement best describes UDP?

    <p>It provides a connectionless service at the Transport layer. (D)</p> Signup and view all the answers

    What is the primary purpose of the Sequence Number in TCP segments?

    <p>To track the order of transmitted segments (D)</p> Signup and view all the answers

    What does the Acknowledgement Number represent in a TCP connection?

    <p>The sequence number of the next segment expected (B)</p> Signup and view all the answers

    Which of the following best describes the Offset field in a TCP header?

    <p>It shows where the Data field starts in the TCP header (A)</p> Signup and view all the answers

    Which flag in the TCP Flags field indicates that immediate data delivery is required?

    <p>PSH (B)</p> Signup and view all the answers

    If the sender does not receive an acknowledgement for a segment, what action is taken?

    <p>The sender will time-out and retransmit (A)</p> Signup and view all the answers

    What does the RST flag in the TCP header signify?

    <p>The connection has been reset (B)</p> Signup and view all the answers

    What is the minimum value of the Offset field in a TCP header?

    <p>5 (C)</p> Signup and view all the answers

    Which of the following flags indicates that the Acknowledgement Number is being used?

    <p>ACK (A)</p> Signup and view all the answers

    What happens when a packet does not match any statements in an ACL?

    <p>The packet is dropped due to implicit deny. (D)</p> Signup and view all the answers

    How many IP ACLs can be applied to a single interface in one direction?

    <p>One IP ACL only. (C)</p> Signup and view all the answers

    What is a characteristic of a wildcard mask?

    <p>It can define specific host addresses. (C)</p> Signup and view all the answers

    Where should standard ACLs be placed in a network?

    <p>As close to the destination devices as possible. (B)</p> Signup and view all the answers

    What is the primary function of the CPU Bus in a router?

    <p>Accessing various components and transferring instructions/data (B)</p> Signup and view all the answers

    What role does the I/O Bus play in a router's architecture?

    <p>It serves as the interface between the CPU Bus and network modules. (A)</p> Signup and view all the answers

    Which numbers are designated for Standard ACLs?

    <p>1-99 and 1300-1999 (D)</p> Signup and view all the answers

    What does applying an empty ACL to an interface do?

    <p>It permits all traffic by default. (B)</p> Signup and view all the answers

    How do routers manage packet delivery to different networks?

    <p>They analyze the packet address to determine the best next relay point. (C)</p> Signup and view all the answers

    What happens when a router receives a packet not addressed to any of its connected networks?

    <p>It determines the best next relay point among its connected networks. (D)</p> Signup and view all the answers

    What is the characteristic of MPLS in telecommunications networks?

    <p>It is a highly scalable, protocol-independent mechanism. (A)</p> Signup and view all the answers

    In what way do routers differ from most stations on a network?

    <p>Routers can link to two or more networks simultaneously. (C)</p> Signup and view all the answers

    What role do labels play in an MPLS network?

    <p>They indicate the destination of the packet. (B)</p> Signup and view all the answers

    What is a critical function of routers in a local area network (LAN)?

    <p>Acting as a default gateway. (C)</p> Signup and view all the answers

    Which of the following statements best describes loop-free paths between sub-networks?

    <p>Routers learn and advertise loop-free paths to maintain efficient routing. (C)</p> Signup and view all the answers

    Which of the following components is not directly associated with the functions of a router?

    <p>User authentication system (B)</p> Signup and view all the answers

    What is the primary advantage of classless addressing over classful addressing?

    <p>It reduces waste of IP addresses. (B)</p> Signup and view all the answers

    What is the process called when classful address blocks are divided into smaller classless blocks?

    <p>Subnetting (D)</p> Signup and view all the answers

    How does super netting differ from subnetting?

    <p>Super netting combines smaller blocks into a larger network. (D)</p> Signup and view all the answers

    What is the maximum number of subnets that can be created by borrowing 2 bits from the host portion of a class C network?

    <p>2 (B)</p> Signup and view all the answers

    In a class C address, how many possible addresses are there within a single block?

    <p>256 (A)</p> Signup and view all the answers

    What is required for super netting to be accomplished?

    <p>The blocks must be contiguous without gaps. (B)</p> Signup and view all the answers

    For a given class C network address of 192.64.123.0, what is the subnet mask in binary?

    <p>11111111.11111111.11111111.00000000 (D)</p> Signup and view all the answers

    Which of the following correctly describes the range of addresses from a class C network with an address of 192.64.123.0?

    <p>192.64.123.1 through 192.64.123.254 (A)</p> Signup and view all the answers

    Flashcards

    Sequence Number

    A 32-bit number that's assigned to each transmitted TCP segment, used for segment ordering and error detection.

    Acknowledgement Number

    A 32-bit number acknowledging receipt of segments, indicating the next expected sequence number.

    TCP Header Offset

    Indicates the position of the data field in the TCP header, measured in 32-bit words.

    Minimum TCP Header Length

    The TCP header is at least 20 bytes.

    Signup and view all the flashcards

    URG Flag

    Indicates that the urgent pointer field is in use. Urgent data has priority.

    Signup and view all the flashcards

    ACK Flag

    Indicates the acknowledgement number is valid and being used.

    Signup and view all the flashcards

    PSH Flag

    Indicates immediate data delivery to the destination, bypassing buffering.

    Signup and view all the flashcards

    RST Flag

    Initiates connection reset, often due to a timeout waiting for acknowledgement.

    Signup and view all the flashcards

    What is the ISN?

    The initial sequence number (ISN) is the first sequence number assigned to a TCP segment. It's essentially the starting point for tracking data segments during a connection.

    Signup and view all the flashcards

    What does the FIN flag indicate?

    The FIN (Finish) flag signals that the sender has finished sending data, and the connection can be closed gracefully.

    Signup and view all the flashcards

    What is the 'Window' field in a TCP header?

    The Window field indicates how many unacknowledged segments the receiver can tolerate at any given time. This is a control mechanism for network congestion.

    Signup and view all the flashcards

    What is the purpose of the TCP Checksum?

    The TCP Checksum is a 16-bit value that ensures the integrity of the data during transmission. It calculates a checksum based on the TCP header and a special 'pseudo header.'

    Signup and view all the flashcards

    What is the TCP Pseudo Header?

    The TCP Pseudo Header is a special header used for checksum calculation. It includes information like the source IP, destination IP, protocol number, and TCP length.

    Signup and view all the flashcards

    What does the Urgent Pointer field indicate?

    The Urgent Pointer field identifies the sequence number of the byte following the urgent data in a TCP segment. This allows for prioritizing urgent data delivery.

    Signup and view all the flashcards

    What are TCP options?

    TCP options provide additional functionalities. They can be used for things like specifying maximum segment size or indicating end-of-options.

    Signup and view all the flashcards

    What is padding in a TCP header?

    Padding is used to ensure that the TCP header aligns correctly with the data. It adds zeros to the header to make it a multiple of 32 bits.

    Signup and view all the flashcards

    Datagram Length

    The total size of an IP datagram, including the header, measured in octets. This field determines the maximum datagram size, being 65,535 bytes.

    Signup and view all the flashcards

    Identification Field

    A unique identifier used to identify the original datagram when it is fragmented. Fragments of the same original datagram share this ID.

    Signup and view all the flashcards

    Flags

    A set of single-bit flags indicating the datagram's fragmentation status. They signal if the datagram is fragmented, allowed to be fragmented, and if it's the last fragment.

    Signup and view all the flashcards

    What is Fragment Offset?

    The starting point of a fragment within the original datagram, allowing for reassembly in the correct order.

    Signup and view all the flashcards

    Time To Live (TTL)

    A counter decrementing at each network hop, ultimately determining the datagram's lifespan. When it reaches zero, the datagram is discarded.

    Signup and view all the flashcards

    What is the Protocol?

    Indicates the type of data encapsulated within the IP datagram, determining its further handling by the receiving system.

    Signup and view all the flashcards

    Why is IP datagram fragmentation necessary?

    Fragmentation is used to split large datagrams into smaller, more manageable pieces for transmission over networks with limited packet size.

    Signup and view all the flashcards

    What is the purpose of the TTL field?

    The TTL field prevents datagrams from endlessly circulating on the network, reducing congestion by discarding them after a set timeframe.

    Signup and view all the flashcards

    What are Class Full addresses?

    IP addresses divided into blocks based on the first four bits of the first octet, categorized as Class A, B, and C.

    Signup and view all the flashcards

    What is Subnetting?

    Dividing large Class Full address blocks into smaller, more efficient Classless blocks to minimize address waste.

    Signup and view all the flashcards

    What is Supernetting?

    Merging multiple contiguous smaller IP address blocks into one larger block.

    Signup and view all the flashcards

    What is a Class C address range?

    A network address range with 256 possible addresses, typically used for smaller networks.

    Signup and view all the flashcards

    Why is Supernetting used?

    To expand network capacity beyond the original Class C address range, effectively combining smaller blocks.

    Signup and view all the flashcards

    How does Supernetting work?

    Borrows bits from the host portion of an IP address to combine multiple smaller networks into one larger network.

    Signup and view all the flashcards

    What is the difference between Subnetting and Supernetting?

    Subnetting divides larger blocks into smaller ones, while Supernetting combines smaller blocks into a larger one.

    Signup and view all the flashcards

    What is the purpose of borrowing network bits in Supernetting?

    To create a single, contiguous network address range by combining multiple smaller networks.

    Signup and view all the flashcards

    ACL Processing Order

    ACL statements are evaluated from top to bottom. The first matching rule is applied, and the rest are ignored. If no rule matches, the packet is dropped.

    Signup and view all the flashcards

    Implicit Deny

    If no matching rule is found in an ACL, the packet is blocked. This is called an implicit deny.

    Signup and view all the flashcards

    Unique ACL Identifier

    Each ACL must have a unique number or name. This helps differentiate and manage ACLs.

    Signup and view all the flashcards

    Router's Own Traffic

    A router cannot filter traffic that it originates itself.

    Signup and view all the flashcards

    Single ACL per Interface Direction

    Only one IP ACL can be applied to an interface in each direction (inbound or outbound).

    Signup and view all the flashcards

    Empty ACL Result

    An empty ACL allows all traffic by default. To have an implicit deny, you need at least one permit or deny statement.

    Signup and view all the flashcards

    Standard ACL Number Range

    Standard ACLs use number ranges 1–99 and 1300–1999.

    Signup and view all the flashcards

    Extended ACL Number Range

    Extended ACLs use number ranges 100–199 and 2000–2699.

    Signup and view all the flashcards

    CPU Bus

    The connection within a router that the CPU uses to access other components, like memory, and transfer instructions and data.

    Signup and view all the flashcards

    I/O Bus

    The bridge between the CPU bus and the system bus, connecting the CPU to network modules and other interface boards.

    Signup and view all the flashcards

    Router's Role in Networks

    Routers act as packet forwarders between multiple networks, directing packets along the best route to reach their destination. They can connect different types of networks like LANs and WANs.

    Signup and view all the flashcards

    Router vs. Station

    While stations typically belong to only one network, routers connect to two or more networks, acting as gateways for packets.

    Signup and view all the flashcards

    Packet Routing Process

    When a packet arrives at a router, the router identifies the best next network to send the packet towards based on the destination address. This process continues until the packet reaches its final destination.

    Signup and view all the flashcards

    Router Functions

    Routers perform various tasks like restricting broadcasts to the local LAN, acting as the default gateway, and learning the most efficient paths between networks to prevent routing loops.

    Signup and view all the flashcards

    What does a router do with broadcasts?

    Routers restrict broadcasts - messages sent to all devices on a network - to the local LAN, preventing them from flooding other networks.

    Signup and view all the flashcards

    Why are loop-free paths important?

    Routers learn efficient paths between networks to avoid creating loops, which can result in packets getting stuck in a cycle and never reaching their destination.

    Signup and view all the flashcards

    Study Notes

    Data Transmission on WAN

    • WAN (Wide Area Network) is a network that extends over a large geographical area, connecting intranets or the internet.
    • TCP/IP protocol is the set of network protocols that form the internet protocol suite, referring to both the global wide area network and the protocols.
    • TCP (Transmission Control Protocol) is responsible for reliable end-to-end delivery of data segments.
    • TCP operates at the Transport layer of the OSI model.
    • Segments are acknowledged by the destination to the source upon receipt, and a sliding window is used.
    • Data is broken into numbered segments (sequenced) during transmission.
    • Destination TCP layers re-sequence the received segments for proper order.
    • Lost data is re-requested by the destination.
    • Segments are checked for integrity (32 Bit CRC).
    • Source/Destination port numbers redirect data to the upper-level services.
    • TCP headers have specific fields (source port, destination port, sequence number, acknowledgement number, offset, flags, window, urgent pointer, checksum, options, and padding, data).

    User Datagram Protocol (UDP)

    • UDP (User Datagram Protocol) is a connectionless host-to-host service.
    • Error correction and reliable service aren't guaranteed.
    • Primarily used for DNS and TFTP.
    • UDP headers include source port, destination port, length, and checksum fields.
    • UDP adds port addressing to the IP header, addressing the datagram to the correct application on the host.

    IP Communication

    • IP Datagram (packet) is a chunk of IP data with a defined structure (version, IHL, TOS, total length, identification, flags, fragment offset, TTL, protocol, header checksum, source and destination IP addresses, options, and payload).
    • Source and destination IP addresses are crucial for determining the destination of the IP datagram.
    • IP routing is vital for data transmission through a network, directing packets via intermediary networks toward their destination.
    • Different IP addressing methods (Classful and Classless) and concepts of subnetting and supernetting are available.
    • Subnetting allows borrowing bits and breaking up large networks into smaller, more manageable subnets.

    IP Addresses

    • Every device connected to the internet has a unique IP address (e.g., 204.25.183.4).
    • IP addresses are used to identify computers and other devices on a network.
    • IP addresses consist of four numbers (each from 0 to 255) separated by periods.
    • Network and host portions of IP addresses identify the network and device respectively.
    • Classes of IP addresses divide the address space into ranges (e.g., Class A, Class B, Class C).

    Special IP Addresses

    • Network addresses (all host bits are 0): used for network communication.
    • Broadcast addresses (all host bits are 1): used for sending to all devices on a network.
    • Loopback address (127.0.0.1): used for testing the local network interface.
    • Private addresses (e.g., 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16): used within private networks.
    • Multicast addresses (Class D): used for one-to-many communication.

    Routing Methods (Static and Dynamic)

    • Static routing involves manually configuring routes using commands on each device.
    • Dynamic routing uses protocols to discover and update routes automatically in response to changes in the network infrastructure.
    • Examples of dynamic routing protocols include RIP, OSPF, BGP, etc.
    • Choice of static or dynamic routing depends on network size and stability.

    Routing Protocols

    • RIP (Routing Information Protocol): A distance-vector protocol that uses hop count as a routing metric.
    • OSPF (Open Shortest Path First): A link-state protocol that computes the shortest paths efficiently.
    • BGP (Border Gateway Protocol): Used for routing between autonomous systems across the Internet.

    WAN Devices and Concepts

    • Routers are communication devices connecting multiple networks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Data Transmission on WAN PDF

    Description

    This quiz covers the fundamentals of data transmission over Wide Area Networks (WAN), focusing on TCP/IP protocols. You will learn about TCP's role in ensuring reliable data delivery, the segmenting process, and how data integrity is maintained during transmission. Test your knowledge on these essential networking concepts.

    More Like This

    Use Quizgecko on...
    Browser
    Browser