Network Protocols Overview

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary function of network protocols?

  • They manage user interfaces for network applications.
  • They ensure data security during transmission.
  • They standardize hardware components across networks.
  • They dictate how to format, transmit, and receive data between devices. (correct)

How long is an IPv4 address in bits?

  • 64 bits
  • 16 bits
  • 32 bits (correct)
  • 128 bits

What type of address format do IPv6 addresses typically use?

  • Hexadecimal format (correct)
  • Binary format
  • Decimal format
  • Octal format

What happens when there are four hexadecimal zeros in a row in an IPv6 address?

<p>They can be abbreviated to a single colon. (B)</p> Signup and view all the answers

What is the bit length of an IPv6 address?

<p>128 bits (D)</p> Signup and view all the answers

What is the primary function of the Transmission Control Protocol (TCP)?

<p>To turn an unreliable network into a reliable network (B)</p> Signup and view all the answers

Which field in the TCP header is responsible for controlling flow to avoid overwhelming the receiving station?

<p>Window Value (A)</p> Signup and view all the answers

What purpose does the Urgent Pointer serve in TCP?

<p>It designates high-priority data for immediate transmission (B)</p> Signup and view all the answers

Which function involves creating a connection with a specific application on a machine?

<p>Create a connection (C)</p> Signup and view all the answers

How does TCP ensure error recovery in data transmission?

<p>By numbering each byte and checking for continuity (B)</p> Signup and view all the answers

What does the multiplexing function of TCP contribute to data transmission?

<p>It creates separate connections through different port numbers (B)</p> Signup and view all the answers

Which of the following is NOT a function performed by TCP?

<p>Ensure data encryption (A)</p> Signup and view all the answers

When dissolving a connection, which process does TCP undertake?

<p>It sends a final acknowledgment packet to the receiver (C)</p> Signup and view all the answers

What is the primary function of the Internet Control Message Protocol (ICMP)?

<p>Error reporting for the Internet Protocol (A)</p> Signup and view all the answers

Which of the following fields is NOT present in the header of the User Datagram Protocol (UDP)?

<p>Session ID (B)</p> Signup and view all the answers

Which protocol is responsible for translating an IP address into a MAC address?

<p>ARP (A)</p> Signup and view all the answers

What is the default time limit for the temporary assignment of an IP address by a DHCP server?

<p>1 hour (A)</p> Signup and view all the answers

Which of the following statements about Dynamic Host Configuration Protocol (DHCP) is true?

<p>It issues an IP request when a workstation needs to connect. (A)</p> Signup and view all the answers

What aspect of UDP does NOT make it suitable for certain network services like DNS?

<p>It establishes a connection before sending data. (A)</p> Signup and view all the answers

How does the DHCP server select an IP address for assignment?

<p>From a static table of IP addresses. (A)</p> Signup and view all the answers

Which field of an ICMP message provides additional specific information about the message type?

<p>Code (B)</p> Signup and view all the answers

What function does NAT perform in a corporate network?

<p>It allows a router to represent a local network using a single IP address. (B)</p> Signup and view all the answers

What is a characteristic of a Virtual Private Network (VPN)?

<p>It uses tunneling protocols to maintain privacy over public networks. (B)</p> Signup and view all the answers

How does a switch function in a switched network?

<p>It creates temporary connections between devices linked to the switch. (C)</p> Signup and view all the answers

What occurs to messages sent through a packet-switched network?

<p>They are divided into packets of fixed or variable size. (C)</p> Signup and view all the answers

Which protocol is an example of a tunneling protocol used for secure connections?

<p>Point-to-Point Tunneling Protocol (PPTP) (C)</p> Signup and view all the answers

When is DHCP involved in a network?

<p>When negotiating for a renewal of temporary IP assignments. (D)</p> Signup and view all the answers

What is the primary purpose of encryption techniques used by retailers?

<p>To secure transactions involving private information. (D)</p> Signup and view all the answers

Why is it important to have packet size determined by the governing protocol in data communications?

<p>To avoid delays similar to needing a reservation at a restaurant. (C)</p> Signup and view all the answers

What characterizes a datagram network?

<p>Each packet is treated independently. (C)</p> Signup and view all the answers

How is the routing table in a datagram network generated?

<p>It is dynamic and updated periodically based on destination addresses. (A)</p> Signup and view all the answers

What is a key advantage of datagram networks compared to circuit-switched networks?

<p>They allocate resources only when packets are being transferred. (C)</p> Signup and view all the answers

What information does the header of a packet in a datagram network contain?

<p>The destination address of the packet. (D)</p> Signup and view all the answers

What type of network combines aspects of circuit-switched and datagram networks?

<p>Virtual-circuit network. (C)</p> Signup and view all the answers

In what layer is the virtual-circuit network typically implemented?

<p>Data-link layer. (C)</p> Signup and view all the answers

What is a typical disadvantage of a datagram network?

<p>There can be greater delays compared to virtual-circuit networks. (B)</p> Signup and view all the answers

Which of the following statements about addressing in a virtual-circuit network is correct?

<p>It utilizes two types of addressing methods. (C)</p> Signup and view all the answers

What is the primary role of the routing processor in a packet switch?

<p>To perform functions of the network layer (D)</p> Signup and view all the answers

Which switching fabric is considered the simplest type?

<p>Crossbar Switch (D)</p> Signup and view all the answers

What does the output port number indicate in the functions performed by the routing processor?

<p>The address of the next hop for the packet (B)</p> Signup and view all the answers

What is the main disadvantage of the Banyan switch?

<p>Internal collisions can occur even for different output ports (D)</p> Signup and view all the answers

What activity is sometimes referred to as table lookup in networking?

<p>Determining the output port for the packet (D)</p> Signup and view all the answers

What structure is typically placed between a Batcher switch and a Banyan switch to prevent collisions?

<p>Trap (B)</p> Signup and view all the answers

Which statement is true about the role of switching fabrics in packet switching?

<p>They move packets from input queue to output queue. (C)</p> Signup and view all the answers

What techniques do sorting switches commonly use to handle packet movement?

<p>Hardware merging techniques (D)</p> Signup and view all the answers

Flashcards

Network Protocols

Established rules for how computer networks format, transmit, and receive data.

IP Datagram

A unit of data transmitted over a network using the Internet Protocol (IP).

IPv4 Address

A 32-bit address used to identify devices on an IPv4 network, written in dotted-decimal notation.

IPv6 Address

A 128-bit address (compared to 32 bits for IPv4), providing many more possible addresses.

Signup and view all the flashcards

Dotted-Decimal Notation

A way to represent an IPv4 address using decimal numbers separated by dots. Each part signifies 8 bits.

Signup and view all the flashcards

TCP connection creation

TCP uses port numbers to identify specific applications on a machine when establishing a connection.

Signup and view all the flashcards

TCP's primary function

Making an unreliable network reliable by preventing lost or duplicate packets.

Signup and view all the flashcards

TCP flow control

TCP uses the 'Window value' to regulate data transmission, preventing the sender from overwhelming the receiver.

Signup and view all the flashcards

TCP connection release

TCP closes a connection after data transfer is complete.

Signup and view all the flashcards

TCP multiplexing

TCP allows multiple connections by assigning different port numbers.

Signup and view all the flashcards

TCP error recovery

TCP verifies data integrity using sequence numbers to ensure all transmitted data arrives correctly.

Signup and view all the flashcards

TCP sequence numbers

TCP assigns a unique number to each byte of data for error detection.

Signup and view all the flashcards

TCP Header's role

Provides instructions for TCP transport functions to the receiving workstation.

Signup and view all the flashcards

ICMP

Internet Control Message Protocol; reports errors for IP and used by routers.

Signup and view all the flashcards

ICMP message fields

Type (identifies message), Code (provides detail), 8 bytes of IP datagram.

Signup and view all the flashcards

UDP

User Datagram Protocol; a simple transport protocol without connection.

Signup and view all the flashcards

UDP header fields

Source Port, Destination Port, Length, and Checksum.

Signup and view all the flashcards

ARP

Address Resolution Protocol; translates IP addresses to MAC addresses.

Signup and view all the flashcards

DHCP

Dynamic Host Configuration Protocol; assigns IP addresses dynamically.

Signup and view all the flashcards

DHCP assignment methods

Static (pre-defined) and dynamic (from a pool) IP address assignment.

Signup and view all the flashcards

DHCP IP assignment time

Temporary, usually one hour.

Signup and view all the flashcards

DHCP Renewal

A process where a DHCP client requests an extension of its IP address lease before it expires, if still connected to the network and needing the address.

Signup and view all the flashcards

NAT (Network Address Translation)

A protocol that lets a router represent a local network with a single global IP address to the internet.

Signup and view all the flashcards

Tunneling Protocol

A set of commands that create secure connections over public networks using encryption for privacy.

Signup and view all the flashcards

VPN (Virtual Private Network)

A network connection using public infrastructure but maintaining privacy and security through tunneling and encryption protocols.

Signup and view all the flashcards

Switched Network

A network of interconnected switches creating temporary connections between devices.

Signup and view all the flashcards

Packet Switching

A network method dividing messages into smaller packets for transmission. It acts like a restaurant reservation.

Signup and view all the flashcards

Packet Size

The size of a data packet. Determined by the network and protocol.

Signup and view all the flashcards

Network Switches

Devices creating temporary connections in a switched network. Think of them as pathways.

Signup and view all the flashcards

Packet Queuing

The process of storing outgoing packets in a temporary holding area before transmission.

Signup and view all the flashcards

Packet Encapsulation

Wrapping a packet within a frame for transmission.

Signup and view all the flashcards

Routing Processor

The part of a network device that handles network layer functions, such as finding the next hop for a packet.

Signup and view all the flashcards

Routing Table Lookup

The process of finding the best path for a packet by consulting a table of network destinations and corresponding addresses.

Signup and view all the flashcards

Switching Fabric

The part of a packet switch responsible for moving packets from input to output queues.

Signup and view all the flashcards

Crossbar Switch

A simple switching fabric using a matrix.

Signup and view all the flashcards

Banyan Switch

A multistage switch for routing packets based on binary output port addresses.

Signup and view all the flashcards

Batcher-Banyan Switch

A switch that helps avoid collisions in a banyan switch by utilizing a sorting technique.

Signup and view all the flashcards

Datagram Network

A packet-switched network where each packet (datagram) is handled independently. Routing decisions are made for each packet individually, without a pre-established connection.

Signup and view all the flashcards

Datagram

An individual packet in a datagram network.

Signup and view all the flashcards

Connectionless Network

A network type where no dedicated connection is established between sender and receiver for each packet transmission.

Signup and view all the flashcards

Routing Table

A table in a packet switch that maps destination addresses to forwarding ports.

Signup and view all the flashcards

Destination Address

The address in a packet indicating the intended recipient.

Signup and view all the flashcards

Virtual-Circuit Network

A packet-switched network that establishes connections between nodes before transmitting packets. A path is identified and used for all data transmitted from source to destination.

Signup and view all the flashcards

Addressing (Virtual Circuit)

In virtual circuits, two types of addressing are involved. One for identifying the sender and receiver of the overall communication and another identifying the nodes along with the transmission path for the specific virtual circuit.

Signup and view all the flashcards

Efficiency (Datagram)

Datagram networks effectively allocate resources based on immediate packet transfer demands rather than pre-allocated resources.

Signup and view all the flashcards

Network layer

The layer in the network architecture responsible for routing packets.

Signup and view all the flashcards

Study Notes

Network Protocols

  • Network protocols are rules for data formatting, transmission, and reception by computer network devices.
  • Protocols ensure communication regardless of underlying infrastructure differences.
  • Protocols can be built into software, hardware, or both.

Internet Protocol (IP)

  • IP provides a connectionless data transfer service.
  • IP datagrams pass through heterogeneous networks.
  • IPv4 addresses are 32 bits long (e.g., 128.156.14.7).
  • IPv4 datagram format includes various fields: version, header length, service type, total length, identification, flags, fragment offset, time to live, protocol, header checksum, source IP address, destination IP address, options, and padding.
  • IPv6 addresses are 128 bits long, offering virtually unlimited addresses (e.g., 6A3E:BA91:7221:0:OIFC:922C:877B:FFEF).

Transmission Control Protocol (TCP)

  • TCP turns unreliable networks into reliable networks by handling lost or duplicate packets.
  • Key functions include creating, releasing connections, flow control, multiplexing, error recovery and establishing priority.
  • TCP datagram format includes source port, destination port, sequence number, acknowledgment number, header length, reserved, flags, window, checksum, urgent pointer, options, and variable-length padding and data.

Internet Control Message Protocol (ICMP)

  • ICMP helps in reporting errors for IP and is commonly utilized by routers.
  • ICMP messages have three fields: type, code, and the first eight bytes of the IP datagram, causing the ICMP message generation.

User Datagram Protocol (UDP)

  • UDP is a simple transport protocol with no connection establishment or ordering of data packets.
  • Features include source port, destination port, length, and checksum fields in the header.

Address Resolution Protocol (ARP)

  • ARP translates IP addresses to medium access control (MAC) addresses for local area network delivery.

Dynamic Host Configuration Protocol (DHCP)

  • DHCP handles dynamic IP address assignment to workstations.
  • Two methods for assigning IP addresses: static and dynamic.

Network Address Translation (NAT)

  • NAT lets a router show a whole local area network to the Internet like a single IP address.
  • The user workstation's IP address is substituted by a global corporate IP address in outgoing packets.

Tunneling Protocols

  • Tunneling protocols secure connections through public networks.
  • Example: Point-to-Point Tunneling Protocol (PPTP).

Network Switching

  • Switches in networks create temporary connections between nodes.
  • Switches are capable of creating and managing connections.
  • Packet switching networks divide messages into packets.
  • Datagram networks process packets independently.

Routing Table

  • Routing table in each switch (or packet) is based on destination address information.
  • Routing tables are periodically updated dynamically.

Virtual-Circuit Networks

  • They combine features of circuit-switched and datagram networks.
  • Virtual-circuit networks use a virtual-circuit identifier (VCI) for data transfer.

Switch Structure

  • Space-division switching: paths separated spatially; example: crossbar and multistage switches.
  • Time-division switching: uses time-division multiplexing (TDM) inside the switch.
  • Time-space-time (TST) switches combine spatial and time-based optimizations.

Routing Processor

  • The routing processor performs network-layer functions.
  • Determines the next hop and port number for a packet.
  • Uses a routing table to look up the appropriate path.
  • Switching fabrics handle packet transfer between input and output queues.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Protocolos de Red: TCP/IP y TCP
8 questions
Modelo TCP/IP - Camadas e Protocolos
13 questions
IT2050 - Computer Networks Lecture 5
34 questions
Introduzione al Network Layer e Protocollo IP
24 questions
Use Quizgecko on...
Browser
Browser