Networking Concepts Quiz
46 Questions
7 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of device is a router classified as at the network layer?

  • Ethernet switch
  • Packet switch (correct)
  • Hub
  • Bridge

Which of the following statements about hosts in a network is true?

  • Hosts can forward IP datagrams.
  • Hosts usually connect multiple interfaces at a time.
  • Hosts operate at the data link layer.
  • Hosts typically use a single network interface at a time. (correct)

What is the primary function of routers in a network?

  • To operate at the application layer
  • To provide wireless access to devices
  • To establish circuit-switching connections
  • To forward datagrams between networks (correct)

In IP routing, what is the role of the routing table?

<p>To store the paths and next router for datagrams (D)</p> Signup and view all the answers

What type of switch operates at the data link layer?

<p>Ethernet switch (A)</p> Signup and view all the answers

What is the main purpose of transport protocols in the Internet?

<p>To send data between application processes on source and destination hosts (B)</p> Signup and view all the answers

Which of the following statements correctly describes Transmission Control Protocol (TCP)?

<p>It includes features for error control and flow control. (D)</p> Signup and view all the answers

How is a transport protocol identified in communications?

<p>By an 8-bit protocol number in the IP header (A)</p> Signup and view all the answers

What role do ports play in Internet communications?

<p>They identify application processes on a host. (C)</p> Signup and view all the answers

Which of the following is NOT a feature of the Transmission Control Protocol?

<p>Streamlined design for minimal data overhead (C)</p> Signup and view all the answers

What is the primary role of a WAN?

<p>To interconnect LANs over a larger distance (C)</p> Signup and view all the answers

What technology is commonly used to connect LANs of similar types?

<p>Bridges (C)</p> Signup and view all the answers

Which layer do WANs typically operate at?

<p>Layer 1 and 2 (B)</p> Signup and view all the answers

What is the main purpose of internetworking?

<p>To allow independent communication between different networks (C)</p> Signup and view all the answers

What type of connection does a WAN's point-to-point link often utilize?

<p>Network-based packet or circuit switching (A)</p> Signup and view all the answers

Which of the following best describes an internetworking protocol?

<p>It facilitates data delivery across different types of networks (D)</p> Signup and view all the answers

Which statement is true regarding LANs?

<p>They can use routers to connect to WANs (D)</p> Signup and view all the answers

Which component is essential for interconnecting a WAN to a LAN?

<p>A device that supports both LAN and WAN technologies (A)</p> Signup and view all the answers

Which range of port numbers is classified as well-known ports?

<p>0–1023 (C)</p> Signup and view all the answers

For web browsing, which transport protocol is most commonly utilized?

<p>TCP (C)</p> Signup and view all the answers

What system manages port assignments on a host?

<p>Operating System (C)</p> Signup and view all the answers

Which of the following is a registered port number?

<p>3306 (A)</p> Signup and view all the answers

What range of port numbers do clients typically use for dynamic ports?

<p>49152–65535 (C)</p> Signup and view all the answers

Which of the following applications would NOT commonly use TCP for its operation?

<p>DNS resolution (B)</p> Signup and view all the answers

Which port number is assigned to SSH by default?

<p>22 (A)</p> Signup and view all the answers

What is the highest number in the range for well-known ports?

<p>1023 (D)</p> Signup and view all the answers

What is the primary purpose of the IP Datagram in Internet networking?

<p>To encapsulate data for transmission over a network. (B)</p> Signup and view all the answers

Which IP address range is classified as a private IP range?

<p>192.168.0.0—192.168.255.255 (A), 10.0.0.0—10.255.255.255 (D)</p> Signup and view all the answers

What does the source address represent in an IP Datagram?

<p>The address where the data originated from. (C)</p> Signup and view all the answers

What is a loopback address and its purpose?

<p>An address used for local testing, primarily 127.0.0.1. (C)</p> Signup and view all the answers

What is indicated by the destination address in a directed broadcast?

<p>A broadcast to all devices in a specific subnet. (A)</p> Signup and view all the answers

Which of the following subnet masks corresponds to a /24 notation?

<p>255.255.255.0 (B)</p> Signup and view all the answers

In the context of network addressing, what is meant by a startup source address of 0.0.0.0?

<p>It signifies that the device has not yet assigned itself an IP address. (C)</p> Signup and view all the answers

Which of the following defines a unicast communication?

<p>Data sent from one sender to one receiver directly. (B)</p> Signup and view all the answers

What range do the address 172.16.0.0—172.31.255.255 fall under?

<p>Private IP range. (B)</p> Signup and view all the answers

To which category does the IP address 255.255.255.255 belong?

<p>Local broadcast address. (A)</p> Signup and view all the answers

What does the CWR flag in a TCP segment indicate?

<p>Congestion Window Reduced (D)</p> Signup and view all the answers

During the TCP three-way handshake, what does the second segment sent by B contain?

<p>Flags=SYN,ACK (D)</p> Signup and view all the answers

What is indicated by the SYN flag in a TCP segment?

<p>Synchronized the sequence numbers (D)</p> Signup and view all the answers

Which of the following is NOT a purpose of TCP segment flags?

<p>Initiate a secure connection (C)</p> Signup and view all the answers

Which control method is primarily used in TCP for error control?

<p>Go-Back-N style (B)</p> Signup and view all the answers

What happens when the FIN flag is set in a TCP segment?

<p>No more data will be sent from the sender (C)</p> Signup and view all the answers

What aspect of TCP affects the speed of data transfer?

<p>Flow control techniques (A)</p> Signup and view all the answers

What is the function of the PSH flag in a TCP segment?

<p>To prompt the receiver to push buffered data to the application (D)</p> Signup and view all the answers

What does the presence of lost segments indicate during data transfer in TCP?

<p>Network is saturated and sender should reduce speed (D)</p> Signup and view all the answers

Which protocol is NOT related to the Application layer protocols mentioned?

<p>IP (C)</p> Signup and view all the answers

Flashcards

Router

A network layer device that forwards data packets.

Host

An end device (computer or device) on a network.

IP Datagram

A unit of data transmitted over an IP network.

IP Routing

Process of finding the best path for data packets on a network.

Signup and view all the flashcards

Routing Table

A table used by routers to store destination and next-hop information.

Signup and view all the flashcards

Internetworking

Connecting multiple local area networks (LANs) and wide area networks (WANs) to allow communication between any computer, regardless of their network type.

Signup and view all the flashcards

LANs

Local Area Networks; networks that connect devices within a limited geographical area, like a home, office, or school.

Signup and view all the flashcards

WANs

Wide Area Networks; networks that connect devices over a larger geographical area, like across cities, countries, or continents.

Signup and view all the flashcards

Internetworking Protocol

A protocol that enables data delivery across different types of networks (LANs and WANs).

Signup and view all the flashcards

IP

Internet Protocol. A fundamental protocol for internetworking, used to deliver internet packets across networks.

Signup and view all the flashcards

IP Addresses

Unique numerical labels assigned to devices on a network that enables routing of data packets.

Signup and view all the flashcards

Internet

A global system of interconnected computer networks.

Signup and view all the flashcards

Different network technologies

Different methods of connecting computers – e.g. different types of cables, connections, protocols used by LANs/WANs.

Signup and view all the flashcards

Subnet Mask

A mask that distinguishes the network portion of an IP address from the host portion. Think of it as a highlighter.

Signup and view all the flashcards

Unicast

Transmission of data packets from a single sender (source) to a single receiver (destination). Like sending a letter to one person.

Signup and view all the flashcards

Directed Broadcast

A transmission of data packets to all devices within a specific subnet. Imagine a community announcement.

Signup and view all the flashcards

Startup Source

Indicates the source of a data packet at the initial stage of network communication.

Signup and view all the flashcards

Local Broadcast

A transmission of data packets to all devices on a network. It's like shouting to everyone.

Signup and view all the flashcards

Loopback Address

A special IP address: 127.0.0.1, used for testing network connections within the same device. It's like talking to yourself

Signup and view all the flashcards

Private IP Addresses

IP addresses reserved for internal networks. These ranges are not routable on the public internet and help with security and resource efficiency

Signup and view all the flashcards

NAT (Network Address Translation)

A technique that allows multiple private IP addresses on a network to use a single public IP address for internet access. Think of it as a shared address book.

Signup and view all the flashcards

Internet Protocol (IP)

A core network protocol that defines how data is addressed and routed across the internet.

Signup and view all the flashcards

What identifies a specific application process on a host?

Ports are unique numbers assigned to applications on a host, differentiating them from other applications using the same transport protocol.

Signup and view all the flashcards

What are the 5 addresses needed for end-to-end communication?

  1. Source IP: Identifies where the data originates.
  2. Destination IP: Shows where the data should go.
  3. Protocol number: Specifies the transport protocol used (TCP, UDP, etc.).
  4. Source Port: Identifies the specific application sending the data.
  5. Destination Port: Identifies the specific application receiving the data.
Signup and view all the flashcards

What role does the protocol number play?

The protocol number identifies the specific transport protocol being used, enabling the receiving host to handle the data correctly.

Signup and view all the flashcards

How do hosts identify the transport protocol used?

The protocol number, embedded within the IP header, informs both the sending and receiving hosts about the transport protocol being utilized.

Signup and view all the flashcards

What is TCP?

Transmission Control Protocol (TCP) is a connection-oriented transport protocol that offers reliable, ordered delivery of data with error control, flow control, and congestion control.

Signup and view all the flashcards

TCP Segment Flags

Special bits within a TCP segment that control the connection and data transfer between sender and receiver.

Signup and view all the flashcards

CWR Flag

Indicates that the sender is reducing its congestion window, likely due to network congestion.

Signup and view all the flashcards

ECE Flag

Used to acknowledge an Explicit Congestion Notification (ECN) from the receiver.

Signup and view all the flashcards

URG Flag

Specifies that the segment contains urgent data, requiring priority delivery.

Signup and view all the flashcards

ACK Flag

Confirms that the receiver has received some previous segment.

Signup and view all the flashcards

PSH Flag

Instructs the receiver to immediately pass the data to the application layer, bypassing the buffer.

Signup and view all the flashcards

RST Flag

Used to reset the connection abruptly, typically due to an error.

Signup and view all the flashcards

SYN Flag

Initiates the TCP connection by synchronizing sequence numbers.

Signup and view all the flashcards

FIN Flag

Signals the sender's intention to close the connection after sending all data.

Signup and view all the flashcards

Three-Way Handshake

A process used to establish a TCP connection, involving three segments exchanged between the sender and receiver.

Signup and view all the flashcards

Destination Port

A unique number assigned to a specific application or process on a receiving device, allowing data to be correctly routed to that application.

Signup and view all the flashcards

Source Port

A unique number assigned to a specific application or process on the sending device, allowing the receiving device to identify the source of the data.

Signup and view all the flashcards

Well-known Ports

Designated port numbers (0-1023) reserved for widely recognized internet services, like HTTP (80) and FTP (20/21).

Signup and view all the flashcards

Registered Ports

Port numbers (0-49151) assigned to less frequently used internet services and sometimes specific applications.

Signup and view all the flashcards

Dynamic Ports

Port numbers (49152-65535) used by applications or processes on a sending device, assigned by the operating system.

Signup and view all the flashcards

TCP (Transmission Control Protocol)

A reliable, connection-oriented transport protocol used for internet communication. It establishes a connection between devices before transferring data, ensuring accuracy and ordering of data.

Signup and view all the flashcards

IP (Internet Protocol)

The fundamental protocol used for internetworking. It defines how data is packaged and addressed for delivery across networks.

Signup and view all the flashcards

Why are Port Numbers Important?

Port numbers allow multiple applications on a device to communicate simultaneously through a single network connection, separating traffic for each service.

Signup and view all the flashcards

Study Notes

Course Information

  • Course Number: CS461
  • Course Title: Computer Networks
  • Topic: Internet and Transport Protocols
  • Covered Topics: Internet, Internetworking, IP, IP Addresses, Internet Apps, TCP, Application

Contents

  • Course Content includes: Internetworking, The Internet Protocol, IP Addressing, Internet Applications, Transmission Control Protocol, Application Layer Protocols, LANs and WANs, and Connecting Multiple LANs and WANs
  • Various concepts and topics regarding Computer Networks are covered in CS461

LANs and WANs

  • LANs (Local Area Networks):
    • Different types, topologies, and technologies.
    • Operate at layers 1 and 2 (Physical and Data Link Layer) using switches and hubs.
    • Connected by bridges
  • WANs (Wide Area Networks):
    • Connect LANs over a large distance.
    • Employ point-to-point links (e.g., ADSL, PDH) or networks (e.g., ATM, SDH, telephone) using packet or circuit switching.
    • Devices connecting WAN to LAN need to support both technologies.
    • Primarily operate at layers 1 and 2.

Connecting Multiple LANs and WANs

  • Organizations require various network technologies.
  • Aim: allow any computer to communicate with any other computer, regardless of their LAN/WAN connection.
  • Internetworking: connecting the many types of networks (LANs/WANs) together.
  • An internetworking protocol supports data delivery across different networks.
  • Example: Internet Protocol (IP)

Internetworking with Routers

  • Internetworking is accomplished using routers.
  • Routers connect two or more LANs or WANs.
  • Routers are packet switches that operate at the network layer.

The Internet Protocol (IP)

  • The core internetworking protocol for the Internet.
  • Implemented in hosts and routers.
  • Features:
    • Datagram packet switching
    • Connectionless
    • Addressing
    • Fragmentation-and-reassembly
  • IP version 4 (IPv4) is most prevalent; IPv6 is available.
  • IP does not provide:
    • Connection control
    • Error control
    • Flow control (TCP)
    • Status reporting (ICMP)
    • Priority, QoS (DiffServ, IntServ)
    • Security (IPsec)

Terminology

  • Routers: Nodes connecting networks (LANs/WANs); operate at the network layer.
  • Subnetworks: Individual networks (LANs and WANs).
  • Internetworking: Connects two or more networks using routers, creating an internetwork/internet.
  • The Internet: A global internetwork using IP.
  • Routing: Locating a path from source to destination across a network.
  • Forwarding: Moving data along a network path.
  • Packet Switch: A generic device performing switching in a packet switching network; routers are packet switches at the network layer.
  • Circuit Switch: A generic device performing circuit switching in a circuit switching network
  • Ethernet switch: An IEEE 802.3 switch (Ethernet, Fast Ethernet, or Gigabit Ethernet) that operates at the data link layer.

IP Datagram

  • Variable-length header and variable-length data.
  • Header (20 Bytes): Required fields and optional fields (may reach 60 bytes).
  • Data: Multiple of 8 bits. Max size: 65,536 bytes.
  • Field details include Version, Header Length, DiffServ/ECN, Identification, Time to Live, Protocol, Flags, Total Length, Fragment Offset, Header Checksum, Source IP Address, Destination IP Address, Options, Padding.

IP Datagram Fields

  • Version (4 bits): Current value = 4 (IPv4)
  • Header Length (4 bits): Measured in 4 byte words.
  • DiffServ (6 bits): Used for quality of service.
  • ECN (2 bits): Used for congestion notification.
  • Total Length (16 bits): Length of the entire datagram (including the header) measured in bytes.
  • Identification (16 bits): Sequence number for datagrams.
  • Flags (3 bits): Used for fragmentation and reassembly.
  • Fragment Offset (13 bits): Information about fragmented packets.
  • Time To Live (8 bits): Datagram lifetime.
  • Protocol (8 bits): Identifies the next higher layer protocol.
  • Header Checksum (16 bits): Error-detecting code.
  • Source and Destination Addresses (32 bits each): IP addresses of source and destination hosts.
  • Options: Variable-length fields.
  • Padding: Ensures datagram length is a multiple of 4 bytes.
  • Data: Variable length containing data to be transmitted.

IP Routing and Forwarding

  • Routing Tables: Store destination addresses and next node. Created manually or by routing protocols.
  • Routing Protocols: Collect network information, calculate least cost paths, and update routing tables. Adaptive protocols (OSPF, RIP, EIGRP, BGP).
  • Forwarding: Routers relay IP datagrams from the source to the destination host, based on destination addresses in routing tables.

Other Features

  • IP includes:
    • Fragmentation and reassembly (fragmentation on source and reassembly on destination).
    • Time to Live (TTL).
    • ICMP (error reporting, ping).
    • ARP (mapping IP addresses to Ethernet addresses).
    • IPv6
    • Multicasting
    • Quality of Service (DiffServ)
    • Mobility (Mobile IP)
    • Security (IPsec)

IPv4 Addresses

  • 32 bits long
  • Split into network and host portions
  • Network portion: identifies the subnet.
  • Host portion: identifies the specific device (host/router) within that subnet.
  • All subnets have unique network portions.
  • Devices in the same subnet have the same network portion but different host portions.
  • Classful, subnet, and classless addressing schemes (focus on classless addressing)
  • Why split? Allows hierarchical addressing, making routing in the Internet scalable.

Representing IPv4 Addresses

  • Written in dotted decimal notation (e.g., 192.168.1.1).
  • Each part represents a byte.

Classless IP Addressing

  • Subnet masks or address masks identify the split between network and host portion in an IP address.
  • 32 bits long
  • Bit 1 in the mask indicates network portion; Bit 0 indicates host portion.
  • Represented in dotted decimal form or shortened form (counting the number of 1 bits from left).

Special Case IP Addresses

  • Network Address: All bits in the host portion are 0 (identifies a subnet).
  • Directed Broadcast Address: All bits in the host portion are 1 (sent to all hosts on a specific subnet).
  • Local Broadcast Address: Identifies all hosts on the current subnet.
  • Loopback Address: Identifies the current host (e.g., 127.0.0.1, also called localhost).
  • Start-up Source Address: Identifies a host that does not yet have an assigned address (all bits are 0).
  • Selected Addresses: Reserved for private networks (not connected to the Internet; behind NAT). Ranges include 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255

Obtaining an IP Address

  • IANA (Internet Assigned Numbers Authority) manages IP address assignment.
  • IANA delegates IP network ranges to regional and national authorities.
  • Organizations obtain addresses from national/local registries.
  • Organizations can freely assign addresses within their allocated block.
  • Manual IP configuration is possible, but automatic configuration via protocols like DHCP is more common.

Internet Applications

  • Most follow a client/server model.
  • Server waits for client to initiate communication.
  • Client initiates communication. Data can flow in both directions.
  • Examples: web browsers, email clients, instant messaging clients, and various other applications.

Issues with Client/Server Applications

  • How to simplify application programming without needing in-depth communication details?
  • Employing transport protocols (e.g., TCP and UDP) to implement common functions across applications.
  • Facilitating communication between applications written in different languages and operating systems using common APIs like Sockets.
  • Distinguishing various applications residing on the same computer utilizing port numbers.

Transport Protocols

  • Transfer data between application processes at different hosts

  • End-to-end communications

  • Transmission Control Protocol (TCP):

    • Widely used, connection-oriented, error control, flow control, and congestion control.
    • Connection-oriented: Establishes a connection before data transfer.
    • Stream-oriented: Treats data as a continuous stream of bytes; uses sequence numbers.
    • Full duplex: Data can flow in both directions.
    • Flow and error control: Go-Back-N style.
  • User Datagram Protocol (UDP): Older protocol, connectionless

    • Domain-specific protocols
  • Other transport protocols: SCTP, DCCP

TCP Segment

  • Header (20 bytes): Includes source and destination ports, sequence numbers, acknowledgment numbers, window size (flow control), checksum (for error checking), and urgent pointer (for critical data).
  • Optional fields and padding
  • Fields detailed as follows: Length, Reserved, Flags, Advertised Window, Checksum, Urgent Pointer, Options and padding

TCP Segment Fields

Source/Destination ports Sequence/Acknowledgement numbers Header Length Window: flow control Checksum: error checking Urgent pointer: critical data Options: features like maximum segment size and window scaling

TCP Segment Flags

  • CWR: Congestion window reduced
  • ECE: Explicit congestion notification echo
  • URG: Urgent data (use urgent pointer field)
  • ACK: Acknowledgement (use ACK field)
  • PSH: Push function
  • RST: Reset connection
  • SYN: Synchronize sequence numbers
  • FIN: No more data from sender

TCP Connection Establishment (3-way handshake)

  • Initiator selects Initial Sequence Number (ISNA).
  • B acknowledges ISNA and selects its own Initial Sequence Number (ISNB); also includes acknowledgement(ACK).
  • After 2 way handshake, data transfer can start; optionally the 3rd segment can contain data.

TCP Data Transfer

  • Segments hold varying amounts of data.
  • ACK flags used for acknowledgement. Piggybacking of ACK are common.
  • Speed depends on flow control (sliding window), error control (Go-Back-N), and congestion control (sender slowing down during congestion).

Application Layer Protocols

  • Various protocols support different applications.
  • Examples: HTTP, FTP, SMTP, SSH, Telnet, BitTorrent, SIP, IMAP, RDP, SMB.
  • Protocols for network operation: DNS, DHCP, BOOTP, NTP, SNMP.

Port Numbers

  • Ports are 16-bit whole numbers used to identify applications on a host
  • Source/destination port number is included in transport layer header
  • Well-known ports (0-1023): Commonly used by server applications: e.g., http = 80, https = 443, ftp = 20/21, smtp = 25, dns = 53, ssh = 22, dhcp = 67/68.
  • Registered ports (1024-49151): Reserved for specific servers by convention
  • Dynamic ports (49152-65535): Assigned dynamically to client applications by the OS.

Additional Topics

  • Unicast
  • Directed Broadcast
  • Local Broadcast
  • Startup Source Address

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on essential networking concepts, including routers, transport protocols, and the role of WANs. This quiz covers various aspects of network layers, internetworking protocols, and their functionalities within a networked environment.

More Like This

Week 10-11 Routing Protocols
45 questions
Networking Fundamentals Quiz
13 questions
Use Quizgecko on...
Browser
Browser