Network Protocols and Models Quiz
61 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What statement describes the use of powerline networking technology?

  • A home LAN is installed without the use of physical cabling.
  • Wireless access points use powerline adapters to distribute data through the home LAN.
  • New ‘smart’ electrical cabling is used to extend an existing home LAN.
  • A device connects to an existing home LAN using an adapter and an existing electrical outlet. (correct)
  • Investment in new infrastructure is unnecessary to access the cloud.

    False

    What type of network traffic requires Quality of Service (QoS)?

    video conferencing

    Which statement correctly describes network protocols?

    <p>They define how messages are exchanged between the source and the destination.</p> Signup and view all the answers

    The process of placing one message inside another for transfer is called __________.

    <p>encapsulation</p> Signup and view all the answers

    Using standards to develop protocols allows products from different manufacturers to interoperate successfully.

    <p>True</p> Signup and view all the answers

    Which two actions would provide minimum security requirements for a small office network?

    <p>Implementing a firewall</p> Signup and view all the answers

    At which layer of the OSI model is an IP address encapsulated?

    <p>network layer</p> Signup and view all the answers

    Match the following network characteristics with their descriptions:

    <p>Scalable network = Grows in size without impacting existing users Complex passwords = Supports data confidentiality QoS = Requires prioritization of specific traffic types Broadcast communication = Sends a message to all devices on a local area network</p> Signup and view all the answers

    A piece of data at any layer of a networking model is called a ______.

    <p>protocol data unit</p> Signup and view all the answers

    What is a characteristic of a scalable network?

    <p>Grows in size without impacting existing users</p> Signup and view all the answers

    Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

    <p>Application</p> Signup and view all the answers

    What order of the protocol stack is used by a web client to prepare a request?

    <p>HTTP, TCP, IP, Ethernet</p> Signup and view all the answers

    What is a function of Layer 4 of the OSI model?

    <p>To describe the ordered and reliable delivery of data between source and destination.</p> Signup and view all the answers

    Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

    <p>Segment</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>Application = Layer that interacts with software applications Physical = Layer responsible for the transmission of raw bit streams over a physical medium Network = Layer that handles data routing and forwarding Transport = Layer that ensures complete data transfer between devices</p> Signup and view all the answers

    Which device performs the function of determining the path that messages should take through internetworks?

    <p>A router</p> Signup and view all the answers

    Intermediary devices initiate the encapsulation process.

    <p>False</p> Signup and view all the answers

    What is the main function of end devices on a network?

    <p>They originate the data that flows through the network.</p> Signup and view all the answers

    An employee accessing confidential pricing information from internal servers at the Head Office is using an ___ network.

    <p>intranet</p> Signup and view all the answers

    Which Internet connection option does not require that physical cables be run to the building?

    <p>Satellite</p> Signup and view all the answers

    Match the network function to the device:

    <p>Router = Determines data paths Firewall = Filters unwanted traffic Switch = Connects devices within a network Server = Stores and manages data</p> Signup and view all the answers

    A converged network requires a separate network infrastructure for each type of communication technology.

    <p>False</p> Signup and view all the answers

    What networking trend involves the use of personal tools and devices for accessing resources on a business network?

    <p>BYOD</p> Signup and view all the answers

    What command should be issued to save the router configuration for automatic use after a reboot?

    <p>copy running-config startup-config</p> Signup and view all the answers

    A computer in a corporate network can communicate with the Internet if it has only an IP address and subnet mask.

    <p>False</p> Signup and view all the answers

    How will a computer send a packet to a destination host within the same LAN?

    <p>The packet will be sent directly to the destination host.</p> Signup and view all the answers

    A packet leaving PC-1 has to traverse ______ hops to reach PC-4.

    <p>X</p> Signup and view all the answers

    Match the following terms with their definitions in network communication:

    <p>Default Gateway = The IP address of the device that routes traffic from a local network to other networks Subnet Mask = A number that divides the IP address into network and host portions DNS Server = A server that translates domain names to IP addresses IP Address = A unique identifier for a device on a network</p> Signup and view all the answers

    Which two things can be determined by using the ping command? (Choose two.)

    <p>the average time it takes a packet to reach the destination and for the response to return to the source</p> Signup and view all the answers

    What is the binary equivalent of the decimal number 232?

    <p>11101000</p> Signup and view all the answers

    The transport layer uses sequence numbers to guarantee the delivery of data packets.

    <p>False</p> Signup and view all the answers

    What IPv4 header field is used to prevent a packet from traversing a network endlessly?

    <p>Time-to-Live</p> Signup and view all the answers

    Out which interface will R1 forward a packet destined for the IP address 192.168.2.10?

    <p>FastEthernet0/0</p> Signup and view all the answers

    The code 'C' in an IPv4 routing table indicates a default route.

    <p>False</p> Signup and view all the answers

    A host device sends data packets via __________ protocol to a web server.

    <p>HTTP</p> Signup and view all the answers

    Which feature allows a host device to send a large video file while providing communication to other users simultaneously?

    <p>multiplexing</p> Signup and view all the answers

    What is the next step in the router boot sequence after the IOS loads from flash?

    <p>Locate and load the startup-config file from NVRAM.</p> Signup and view all the answers

    Match the following fields in the IPv4 header with their descriptions:

    <p>Protocol = Identifies the upper layer protocol carried in the packet Identification = Used to uniquely identify fragments of an original packet Version = Indicates the IP protocol version Time-to-Live = Prevents infinite packet looping in the network</p> Signup and view all the answers

    The ______ configuration file on a Cisco router is responsible for the settings loaded at startup.

    <p>startup</p> Signup and view all the answers

    Which two pieces of information are in the RAM of a Cisco router during normal operation? (Choose two)

    <p>Cisco IOS</p> Signup and view all the answers

    What is a beneficial feature of the UDP transport protocol?

    <p>fewer delays in transmission</p> Signup and view all the answers

    Match the following IP addresses with their respective network designation:

    <p>192.168.10.10 = Network Destination 255.255.255.255 = Netmask 192.168.10.1 = Gateway 127.0.0.1 = Loopback Address 0.0.0.0 = Default Route</p> Signup and view all the answers

    What is indicated by the metric value in a routing table?

    <p>The cost associated with reaching a destination.</p> Signup and view all the answers

    The IP address 0.0.0.0 is used to indicate a valid route to a destination on a network.

    <p>False</p> Signup and view all the answers

    What will be the consequence of an incorrectly configured default gateway on a host?

    <p>The host cannot communicate with hosts in other networks.</p> Signup and view all the answers

    The subnet mask helps to determine the range of IP addresses on a local network.

    <p>True</p> Signup and view all the answers

    What does the IP address format 172.17.4.250/24 indicate?

    <p>It indicates a host address within the subnet defined by the mask /24.</p> Signup and view all the answers

    The number of bits in an IPv4 address is ______.

    <p>32</p> Signup and view all the answers

    Which two parts are components of an IPv4 address? (Choose two.)

    <p>network portion</p> Signup and view all the answers

    Match the following IP address types with their definitions:

    <p>10.1.1.1 = Private IP Address 172.16.4.4 = Private IP Address 192.167.10.10 = Public IP Address 192.168.5.5 = Private IP Address</p> Signup and view all the answers

    What characteristic best describes a multicast transmission?

    <p>A single packet can be sent to a group of hosts.</p> Signup and view all the answers

    The range of 224.0.0.0 to 224.0.0.255 is reserved for multicast groups.

    <p>True</p> Signup and view all the answers

    Which of the following describes an enhancement of IPv6 over IPv4?

    <p>IPv6 addresses are based on 128-bit flat addressing.</p> Signup and view all the answers

    NAT is essential for IPv6 because it increases security.

    <p>False</p> Signup and view all the answers

    What is the primary reason NAT is not necessary in IPv6?

    <p>The number of available IPv6 addresses is extremely large.</p> Signup and view all the answers

    The ______ field in the IPv6 header classifies packets for traffic congestion control.

    <p>Flow Label</p> Signup and view all the answers

    Which command can be used on a Windows host to display the routing table?

    <p>route print</p> Signup and view all the answers

    Match the following fields of an IPv4 header with their functions:

    <p>Differentiated Services = Defines the priority of the packet Traffic Class = Identifies the type of service Flow Label = Classifies packets for real-time applications Flags = Indicates fragmentation</p> Signup and view all the answers

    What does a router do immediately after matching the destination IP address to a network?

    <p>Switch the packet to the directly connected interface.</p> Signup and view all the answers

    IPv6 supports privacy capabilities while IPv4 does not.

    <p>True</p> Signup and view all the answers

    Study Notes

    Network Protocols

    • Network protocols define rules for exchanging messages between devices.
    • They dictate how messages are built, formatted, and transmitted.
    • They ensure interoperability between devices from different manufacturers.

    OSI Model

    • The Application layer of the OSI model is comparable to the Application layer of the TCP/IP model.
    • The presentation, session, and transport layers of the OSI model are also comparable to the Application layer of the TCP/IP model.
    • The network layer of the OSI model is where an IP address is encapsulated.

    TCP/IP Model

    • The Transport layer of the TCP/IP model processes segments, which are PDUs (Protocol Data Units) at this layer.

    Intermediary Devices

    • Intermediary devices connect end devices to the network.
    • They do not generate data, but they facilitate its flow.

    Network Types

    • An intranet is a private network that is accessible only by employees or authorized individuals within an organization.
    • An extranet is a network that allows secure access to specific external parties.
    • BYOD (Bring Your Own Device) allows employees to use personal devices to access company resources.
    • Converged networks carry voice, video, and data over the same infrastructure, combining different communication technologies.
    • Cloud computing involves accessing resources and applications over the internet.
    • Powerline networking involves using existing electrical wiring to connect devices to a LAN.

    Security

    • Security measures like firewalls, antivirus software, and intrusion prevention devices are crucial for safeguarding networks.

    Quality of Service (QoS)

    • QoS prioritizes certain types of traffic, ensuring smooth delivery for applications like video conferencing.

    Data Protection

    • Complex passwords contribute to data confidentiality, protecting sensitive information from unauthorized access.

    Scalable Networks

    • Scalable networks can accommodate growth in traffic without negatively impacting existing users.

    Network Communication

    • A broadcast message reaches all devices on a local area network.
    • Encapsulation involves wrapping data in "layers" of information for transmission.

    Protocol Stack Order

    • When a web client sends a request, the protocol stack order is HTTP, TCP, IP, Ethernet.

    Default Gateway & Network Communication

    • Incorrectly configured default gateway on a host prevents communication with hosts on other networks.
    • The default gateway is the logical address of the router interface on the same network as the host.

    Communication Types

    • Multicast communication involves a single packet being sent to a group of hosts.
    • Unicast communication involves communication between a single sender & single receiver.

    IP Addressing

    • IPv4 addresses consist of 32 bits.
    • An IPv4 address consists of a network portion and a host portion.
    • The IP address 172.17.4.250/24 represents a host address.
    • The subnet mask is used to determine the subnet to which the host belongs.
    • The slash notation /20 represents the subnet mask 255.255.240.0.
    • Multicast transmissions use source addresses within the range 224.0.0.0 to 224.0.0.255.
    • Private IP addresses include 10.1.1.1, 172.16.4.4, and 192.168.5.5.

    Network Tools

    • The ping command can be used to determine if a destination device is reachable through the network.
    • The ping command also measures the average time it takes a packet to reach the destination and return.

    Binary Conversion

    • The binary equivalent of the decimal number 232 is 11101000.
    • The decimal equivalent of the binary number 10010101 is 149.

    Multiplexing & Bandwidth Management

    • Multiplexing allows different communication streams to occur simultaneously without a single stream consuming all available bandwidth.

    Transport Layer & Port Numbers

    • The destination port number is used by the transport layer at the receiver to pass the data stream to the proper application on the server.

    UDP Protocol

    • UDP is a connectionless transport protocol, prioritizing speed over reliability.
    • UDP is less likely to incur delays in transmission compared to TCP.

    IPv4 Header Fields

    • The Time-to-Live field in the IPv4 header prevents packets from traversing a network endlessly.
    • The Protocol field in the IPv4 header identifies the upper layer protocol carried in the packet.

    Routing Table & Interface Selection

    • Based on the provided routing table details, the route with "Network Destination" 192.168.10.0, "Netmask" 255.255.255.0, and "Gateway" On-link will be used to reach PC2.
    • R1 will forward the packet destined for 192.168.2.10 out of the FastEthernet0/1 interface.

    Router Configuration & Boot Sequence

    • "C" in an IPv4 routing table on a Cisco router indicates a directly connected route.
    • The next step in the router boot sequence after the IOS loads from flash is to locate and load the startup-config file from NVRAM.
    • The RAM of a Cisco router during normal operation contains the Cisco IOS and the IP routing table.
    • The startup configuration file contains commands used to initially configure a router on startup.

    IPv6 Enhancements

    • IPv6 addresses are based on 128-bit flat addressing, unlike IPv4's 32-bit hierarchical addressing.
    • The IPv6 header is simpler than the IPv4 header, improving packet handling.

    NAT & IPv6

    • NAT is not needed in IPv6 due to the vast IPv6 address space, allowing each host to obtain a public IPv6 address.

    IPv6 Flow Label

    • The Flow Label field in the IPv6 header informs network devices to maintain the same path for real-time application packets.

    Routing Table Commands

    • The "route print" and "netstat -r" commands can be used on a Windows host to display the routing table.

    Router Forwarding Process

    • The router, after matching the destination IP address to a network on a directly connected routing table entry, will switch the packet to the directly connected interface.

    Saving Router Configuration

    • The command "copy running-config startup-config" saves the router configuration so that it is automatically used on reboot.

    Network Configuration Requirements

    • For Internet access, a device needs to be configured with the default gateway address in addition to IP address, subnet mask, and DNS server.

    Packet Transmission in LAN

    • A packet sent from a computer to a destination host within the same LAN is directly sent to the destination host.

    Packet Hops

    • A packet leaving PC-1 to reach PC-4 needs to traverse 3 hops, based on the provided network diagram detail.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Revision Questions.pdf
    Revision Questions-part 2.pdf

    Description

    Test your knowledge on network protocols and models, including the OSI and TCP/IP frameworks. This quiz covers the definitions, layers, and roles of intermediary devices in networking. Understand the fundamental concepts behind intranets and network communication.

    More Like This

    Use Quizgecko on...
    Browser
    Browser