Data Transmission on WAN
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the maximum length of an IP datagram in bytes?

  • 128,000 bytes
  • 32,767 bytes
  • 512 bytes
  • 65,535 bytes (correct)
  • What is the purpose of the identification field in an IP datagram?

  • To determine the time to live of the datagram
  • To indicate the encapsulated protocol type
  • To identify and group fragments of a datagram (correct)
  • To define the length of the datagram
  • Which flag indicates that the datagram is a fragment?

  • The identification number
  • The time to live value
  • The fragment offset value
  • The first bit of the flags field (correct)
  • How is the order of fragments in a fragmented datagram maintained?

    <p>Through the fragment offset</p> Signup and view all the answers

    What happens to a datagram when its time to live field reaches zero?

    <p>It is discarded</p> Signup and view all the answers

    What length is specified by the time to live field?

    <p>The number of hops a datagram can take</p> Signup and view all the answers

    What information does the protocol field in an IP datagram provide?

    <p>The type of encapsulated protocol</p> Signup and view all the answers

    What is the default setting for the time to live field in most applications?

    <p>30 or 32</p> Signup and view all the answers

    What does the Finish Flag (FIN) indicate in a TCP segment?

    <p>Last data from the sender</p> Signup and view all the answers

    What does the Windows field in the TCP header represent?

    <p>Number of unacknowledged segments allowed on the network</p> Signup and view all the answers

    What information is included in the TCP Pseudo header for Checksum calculation?

    <p>Source IP, Destination IP, Zero, IP Protocol, and TCP Length</p> Signup and view all the answers

    What is the purpose of the Urgent Pointer in a TCP segment?

    <p>To point to the sequence number of the octet following urgent data</p> Signup and view all the answers

    Which option is NOT a valid Kind for TCP options?

    <p>Kind 3 - Congestion Window Size</p> Signup and view all the answers

    How does the User Datagram Protocol (UDP) ensure reliability?

    <p>It relies on upper layer protocols for error correction</p> Signup and view all the answers

    What role does Padding play in the TCP header?

    <p>To ensure TCP header aligns on a 32-bit boundary</p> Signup and view all the answers

    Which statement best describes UDP?

    <p>It provides a connectionless service at the Transport layer.</p> Signup and view all the answers

    What is the primary purpose of the Sequence Number in TCP segments?

    <p>To track the order of transmitted segments</p> Signup and view all the answers

    What does the Acknowledgement Number represent in a TCP connection?

    <p>The sequence number of the next segment expected</p> Signup and view all the answers

    Which of the following best describes the Offset field in a TCP header?

    <p>It shows where the Data field starts in the TCP header</p> Signup and view all the answers

    Which flag in the TCP Flags field indicates that immediate data delivery is required?

    <p>PSH</p> Signup and view all the answers

    If the sender does not receive an acknowledgement for a segment, what action is taken?

    <p>The sender will time-out and retransmit</p> Signup and view all the answers

    What does the RST flag in the TCP header signify?

    <p>The connection has been reset</p> Signup and view all the answers

    What is the minimum value of the Offset field in a TCP header?

    <p>5</p> Signup and view all the answers

    Which of the following flags indicates that the Acknowledgement Number is being used?

    <p>ACK</p> Signup and view all the answers

    What happens when a packet does not match any statements in an ACL?

    <p>The packet is dropped due to implicit deny.</p> Signup and view all the answers

    How many IP ACLs can be applied to a single interface in one direction?

    <p>One IP ACL only.</p> Signup and view all the answers

    What is a characteristic of a wildcard mask?

    <p>It can define specific host addresses.</p> Signup and view all the answers

    Where should standard ACLs be placed in a network?

    <p>As close to the destination devices as possible.</p> Signup and view all the answers

    What is the primary function of the CPU Bus in a router?

    <p>Accessing various components and transferring instructions/data</p> Signup and view all the answers

    What role does the I/O Bus play in a router's architecture?

    <p>It serves as the interface between the CPU Bus and network modules.</p> Signup and view all the answers

    Which numbers are designated for Standard ACLs?

    <p>1-99 and 1300-1999</p> Signup and view all the answers

    What does applying an empty ACL to an interface do?

    <p>It permits all traffic by default.</p> Signup and view all the answers

    How do routers manage packet delivery to different networks?

    <p>They analyze the packet address to determine the best next relay point.</p> Signup and view all the answers

    What happens when a router receives a packet not addressed to any of its connected networks?

    <p>It determines the best next relay point among its connected networks.</p> Signup and view all the answers

    What is the characteristic of MPLS in telecommunications networks?

    <p>It is a highly scalable, protocol-independent mechanism.</p> Signup and view all the answers

    In what way do routers differ from most stations on a network?

    <p>Routers can link to two or more networks simultaneously.</p> Signup and view all the answers

    What role do labels play in an MPLS network?

    <p>They indicate the destination of the packet.</p> Signup and view all the answers

    What is a critical function of routers in a local area network (LAN)?

    <p>Acting as a default gateway.</p> Signup and view all the answers

    Which of the following statements best describes loop-free paths between sub-networks?

    <p>Routers learn and advertise loop-free paths to maintain efficient routing.</p> Signup and view all the answers

    Which of the following components is not directly associated with the functions of a router?

    <p>User authentication system</p> Signup and view all the answers

    What is the primary advantage of classless addressing over classful addressing?

    <p>It reduces waste of IP addresses.</p> Signup and view all the answers

    What is the process called when classful address blocks are divided into smaller classless blocks?

    <p>Subnetting</p> Signup and view all the answers

    How does super netting differ from subnetting?

    <p>Super netting combines smaller blocks into a larger network.</p> Signup and view all the answers

    What is the maximum number of subnets that can be created by borrowing 2 bits from the host portion of a class C network?

    <p>2</p> Signup and view all the answers

    In a class C address, how many possible addresses are there within a single block?

    <p>256</p> Signup and view all the answers

    What is required for super netting to be accomplished?

    <p>The blocks must be contiguous without gaps.</p> Signup and view all the answers

    For a given class C network address of 192.64.123.0, what is the subnet mask in binary?

    <p>11111111.11111111.11111111.00000000</p> Signup and view all the answers

    Which of the following correctly describes the range of addresses from a class C network with an address of 192.64.123.0?

    <p>192.64.123.1 through 192.64.123.254</p> Signup and view all the answers

    Study Notes

    Data Transmission on WAN

    • WAN (Wide Area Network) is a network that extends over a large geographical area, connecting intranets or the internet.
    • TCP/IP protocol is the set of network protocols that form the internet protocol suite, referring to both the global wide area network and the protocols.
    • TCP (Transmission Control Protocol) is responsible for reliable end-to-end delivery of data segments.
    • TCP operates at the Transport layer of the OSI model.
    • Segments are acknowledged by the destination to the source upon receipt, and a sliding window is used.
    • Data is broken into numbered segments (sequenced) during transmission.
    • Destination TCP layers re-sequence the received segments for proper order.
    • Lost data is re-requested by the destination.
    • Segments are checked for integrity (32 Bit CRC).
    • Source/Destination port numbers redirect data to the upper-level services.
    • TCP headers have specific fields (source port, destination port, sequence number, acknowledgement number, offset, flags, window, urgent pointer, checksum, options, and padding, data).

    User Datagram Protocol (UDP)

    • UDP (User Datagram Protocol) is a connectionless host-to-host service.
    • Error correction and reliable service aren't guaranteed.
    • Primarily used for DNS and TFTP.
    • UDP headers include source port, destination port, length, and checksum fields.
    • UDP adds port addressing to the IP header, addressing the datagram to the correct application on the host.

    IP Communication

    • IP Datagram (packet) is a chunk of IP data with a defined structure (version, IHL, TOS, total length, identification, flags, fragment offset, TTL, protocol, header checksum, source and destination IP addresses, options, and payload).
    • Source and destination IP addresses are crucial for determining the destination of the IP datagram.
    • IP routing is vital for data transmission through a network, directing packets via intermediary networks toward their destination.
    • Different IP addressing methods (Classful and Classless) and concepts of subnetting and supernetting are available.
    • Subnetting allows borrowing bits and breaking up large networks into smaller, more manageable subnets.

    IP Addresses

    • Every device connected to the internet has a unique IP address (e.g., 204.25.183.4).
    • IP addresses are used to identify computers and other devices on a network.
    • IP addresses consist of four numbers (each from 0 to 255) separated by periods.
    • Network and host portions of IP addresses identify the network and device respectively.
    • Classes of IP addresses divide the address space into ranges (e.g., Class A, Class B, Class C).

    Special IP Addresses

    • Network addresses (all host bits are 0): used for network communication.
    • Broadcast addresses (all host bits are 1): used for sending to all devices on a network.
    • Loopback address (127.0.0.1): used for testing the local network interface.
    • Private addresses (e.g., 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16): used within private networks.
    • Multicast addresses (Class D): used for one-to-many communication.

    Routing Methods (Static and Dynamic)

    • Static routing involves manually configuring routes using commands on each device.
    • Dynamic routing uses protocols to discover and update routes automatically in response to changes in the network infrastructure.
    • Examples of dynamic routing protocols include RIP, OSPF, BGP, etc.
    • Choice of static or dynamic routing depends on network size and stability.

    Routing Protocols

    • RIP (Routing Information Protocol): A distance-vector protocol that uses hop count as a routing metric.
    • OSPF (Open Shortest Path First): A link-state protocol that computes the shortest paths efficiently.
    • BGP (Border Gateway Protocol): Used for routing between autonomous systems across the Internet.

    WAN Devices and Concepts

    • Routers are communication devices connecting multiple networks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Data Transmission on WAN PDF

    Description

    This quiz covers the fundamentals of data transmission over Wide Area Networks (WAN), focusing on TCP/IP protocols. You will learn about TCP's role in ensuring reliable data delivery, the segmenting process, and how data integrity is maintained during transmission. Test your knowledge on these essential networking concepts.

    More Like This

    Use Quizgecko on...
    Browser
    Browser