TCP/IP Model Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of the Application layer in the TCP/IP model?

  • It manages the delivery of data between hosts.
  • It terminates network connections.
  • It provides error checking for packet delivery.
  • It ensures a connection to an appropriate network port. (correct)

Which transport protocol in the TCP/IP model is connection-oriented?

  • TCP (correct)
  • SYN
  • UDP
  • FTP

What type of packet is exchanged first when establishing a TCP connection?

  • Data packet
  • SYN packet (correct)
  • SYN + ACK packet
  • ACK packet

Which of the following accurately describes TCP's role in data transmission?

<p>Establishes the connection and manages data transfer. (B)</p> Signup and view all the answers

What is the third packet exchanged in a TCP handshake?

<p>ACK packet (A)</p> Signup and view all the answers

What does ICANN stand for?

<p>Internet Corporation for Assigned Names and Numbers (A)</p> Signup and view all the answers

Which key function is NOT provided by TCP?

<p>Data compression (A)</p> Signup and view all the answers

How many total layers are there in the TCP/IP model?

<p>4 (D)</p> Signup and view all the answers

What frequency do microwave ovens operate on that is also used by 802.11b/g/n devices?

<p>2.4GHz (B)</p> Signup and view all the answers

What should you consult to determine the optimum load capacity for users connecting to an access point?

<p>Access point documentation (C)</p> Signup and view all the answers

Which command can be used to verify the IP address assigned by an access point?

<p>ipconfig (D)</p> Signup and view all the answers

What is a potential issue when connecting your wireless device to a public hotspot?

<p>Data traffic visibility to unauthorized users (D)</p> Signup and view all the answers

Which wireless channel is the default for 802.11b and 802.11g routers?

<p>Channel 6 (B)</p> Signup and view all the answers

What can obstruct the signal of a wireless antenna?

<p>Metal surfaces (C)</p> Signup and view all the answers

What should you do if you re-configured your SSID while traveling and want to return to your home network?

<p>Reset your SSID (A)</p> Signup and view all the answers

Which of these security protocols should be enabled to protect data traffic on a public network?

<p>WPA2 (B)</p> Signup and view all the answers

What is the primary role of an access point in a wireless network?

<p>To manage the connection between mobile devices and the internet (C)</p> Signup and view all the answers

Which factor is most critical before installing a wireless network?

<p>Potential RF interferences (A)</p> Signup and view all the answers

What is one way to troubleshoot a non-responsive access point?

<p>Reboot the access point by unplugging it and plugging it back in (C)</p> Signup and view all the answers

What should be measured to ensure a good connection in a wireless network?

<p>Signal strength (D)</p> Signup and view all the answers

How can physical obstructions affect a wireless network?

<p>They can cause a loss in signal strength (C)</p> Signup and view all the answers

Which of these devices is NOT typically considered a part of a wireless LAN setup?

<p>Network switches (B)</p> Signup and view all the answers

What is a common source of frequency interference in a wireless network?

<p>Microwave ovens (A)</p> Signup and view all the answers

Why is planning important for a multipoint wireless distribution?

<p>It helps in optimizing signal strength and coverage (D)</p> Signup and view all the answers

What type of protocol is UDP?

<p>Connectionless protocol (B)</p> Signup and view all the answers

What happens when the host at port 21 acknowledges the FIN packet?

<p>The TCP connection is closed. (C)</p> Signup and view all the answers

In which type of applications is UDP especially useful?

<p>Videoconferencing and audio feeds (B)</p> Signup and view all the answers

How are UDP packets typically transferred over the network?

<p>Without establishing a connection (D)</p> Signup and view all the answers

What is the length of the packets 138, 139, and 140 during the UDP transfer?

<p>789 bytes (B)</p> Signup and view all the answers

What is the primary characteristic of UDP concerning acknowledgment of data packets?

<p>It does not send any acknowledgements back. (D)</p> Signup and view all the answers

Which protocols are defined as part of the TCP/IP Internet Layer?

<p>IP, ARP, ICMP, IGMP (C)</p> Signup and view all the answers

What characterizes the termination of a UDP data transfer?

<p>The source stops sending data packets. (D)</p> Signup and view all the answers

What is the purpose of the packet identified as 'SYN' in the TCP handshake?

<p>It synchronizes sequence numbers between the hosts. (A)</p> Signup and view all the answers

Which port number is designated as the source port in the initial connection setup for FTP?

<p>1054 (A)</p> Signup and view all the answers

What role does the destination port 21 play in the context of establishing a TCP connection?

<p>It is the typical port for FTP operations. (B)</p> Signup and view all the answers

How many packets are exchanged in the initial TCP handshake process?

<p>Three (A)</p> Signup and view all the answers

In the TCP handshake, which packet follows the 'SYN' packet sent by the initiating host?

<p>SYN-ACK (A)</p> Signup and view all the answers

What does the abbreviation 'TCP' stand for in networking?

<p>Transmission Control Protocol (A)</p> Signup and view all the answers

Which host in the example initiates the TCP connection for an FTP transfer?

<p>Host A (A)</p> Signup and view all the answers

What is the relationship between the source and destination ports in a TCP packet?

<p>The source port identifies the sender, while the destination port identifies the receiver. (D)</p> Signup and view all the answers

What does the ACK number indicate in the TCP communication process?

<p>The acknowledgement of packet receipt (C)</p> Signup and view all the answers

What is the function of the FIN packet in the TCP termination process?

<p>To indicate that data transmission is complete (D)</p> Signup and view all the answers

Which packet is sent by Host A to indicate that it received packet 2 from Host B?

<p>Packet 3 (B)</p> Signup and view all the answers

How many packets are exchanged in the initial TCP handshake?

<p>Three (C)</p> Signup and view all the answers

What is the correct order of steps for terminating a TCP connection?

<p>FIN from Host B, ACK from Host A, FIN from Host A, ACK from Host B (A)</p> Signup and view all the answers

In the context of a TCP packet, what does SEQ# represent?

<p>The unique identifier for each packet in sequence (C)</p> Signup and view all the answers

Which host initiates the TCP termination process by sending the first FIN packet?

<p>Host B (D)</p> Signup and view all the answers

What does the sequence number increment by during the acknowledgment process?

<p>One (A)</p> Signup and view all the answers

Flashcards

Wireless Network Operating Characteristics

The specific ways wireless networks function, including signal strength, interference, and coverage area.

Access Point Function

A central hub for wireless devices to connect to a wired network.

Wireless LAN Adapter

A device that allows a computer or other device to connect to a wireless network.

Wireless Bridge Purpose

Connects two or more wireless networks together.

Signup and view all the flashcards

Basic Site Survey

A preliminary assessment of a location to determine optimal wireless network placement and signal strength.

Signup and view all the flashcards

User Mobility in Wireless Networks

The ability to connect to a wireless network from different locations while maintaining connectivity.

Signup and view all the flashcards

Troubleshooting Hardware Issues

Diagnosing and fixing problems with the wireless network hardware, primarily the access point.

Signup and view all the flashcards

RF Interference

Electromagnetic disturbances that can disrupt the signal of a wireless device.

Signup and view all the flashcards

TCP/IP Layers

A set of four protocol layers (Application, Transport, Network, Network Interface) used for network communication, that corresponds to the seven layers of the OSI Model.

Signup and view all the flashcards

TCP

A connection-oriented transport protocol in TCP/IP that ensures data delivery and handles errors.

Signup and view all the flashcards

UDP

A connectionless transport protocol. Data packets are sent without a guaranteed connection or delivery acknowledgement.

Signup and view all the flashcards

TCP Handshake

The three-step process (SYN, SYN-ACK, ACK) used to establish a TCP connection between two hosts.

Signup and view all the flashcards

SYN Packet

The first packet sent in a TCP handshake, signaling a connection request.

Signup and view all the flashcards

SYN-ACK Packet

The second packet in a TCP handshake, acknowledging the SYN packet and requesting approval for connection.

Signup and view all the flashcards

ACK Packet

The third packet in a TCP handshake, confirming the acknowledgment in the previous packet.

Signup and view all the flashcards

Network Port

A unique address on a network device that helps direct data to specific applications.

Signup and view all the flashcards

TCP Packet 1

The initial packet in a TCP handshake, sent by the host initiating a connection.

Signup and view all the flashcards

Source Port (SP)

The port number on the sending computer.

Signup and view all the flashcards

Destination Port (DP)

The port number on the receiving computer.

Signup and view all the flashcards

Initial TCP Connection

The process of starting a TCP network connection between two computers.

Signup and view all the flashcards

File Transfer

A process of moving data from one computer to another.

Signup and view all the flashcards

Host A

The computer initiating the TCP connection in a particular example.

Signup and view all the flashcards

Microwave oven frequency

Microwave ovens operate at 2.4 GHz, the same frequency band used by 802.11b/g/n devices.

Signup and view all the flashcards

Wireless user load capacity

Too many users connecting to the same access point at once can cause slowness and packet drops. Check the manufacturer's documentation for optimal capacity.

Signup and view all the flashcards

Wireless IP address

Access points assign IP addresses in the 192.168.0.x range to connected clients.

Signup and view all the flashcards

SSID reconfiguration

SSID configuration on a computer usually doesn't require reconfiguration, but changing networks may require resetting the SSID to connect to your home network.

Signup and view all the flashcards

Wi-Fi security protocols

Wireless systems often support multiple security protocols like different versions of WPA/WEP.

Signup and view all the flashcards

Default 802.11b/g channel

Channel 6 is the default for 802.11b and 802.11g routers.

Signup and view all the flashcards

Extending wireless range

Place antennas high and clear of metal obstructions. Concrete and brick attenuate signals.

Signup and view all the flashcards

Channel selection for Wi-Fi

Use alternative channels (1 or 11) to avoid interference, as these channels in 802.11b and 802.11g do not overlap.

Signup and view all the flashcards

SEQ Number

A sequence number assigned to each packet to ensure proper ordering and prevent data loss during transmission.

Signup and view all the flashcards

What is the role of the ACK packet in the TCP handshake?

The ACK packet serves as a confirmation that the previous packet has been successfully received. It is essential for reliable communication.

Signup and view all the flashcards

What does the TCP handshake achieve?

The TCP handshake establishes a reliable connection between two hosts. It ensures that packets are delivered in order and that all data is received.

Signup and view all the flashcards

What is the purpose of the FIN packet in TCP?

The FIN packet is used to signal the end of data transmission. It initiates the termination process for a TCP connection.

Signup and view all the flashcards

How does SEQ number contribute to reliable communication?

The SEQ number ensures packets are received in the correct order. It prevents data loss and allows the receiver to reassemble the message accurately.

Signup and view all the flashcards

What is UDP?

The User Datagram Protocol (UDP) is a connectionless protocol that transmits data packets over a network without establishing a connection or requiring acknowledgements. It's suitable for applications like video conferencing and audio streams where data loss is less critical.

Signup and view all the flashcards

TCP Connection

A TCP connection is a reliable connection between two devices, where data packets are exchanged with acknowledgements and error checking. This ensures that data is delivered correctly and in order.

Signup and view all the flashcards

UDP packet transfer

A UDP packet transfer involves sending data without establishing a dedicated connection or requiring acknowledgements. The source either stops sending data or the client terminates the connection.

Signup and view all the flashcards

What's special about UDP packets?

UDP packets are connectionless, meaning they are sent without establishing a connection or requiring acknowledgements. This makes them suitable for applications where fast delivery is more important than reliable delivery.

Signup and view all the flashcards

TCP/IP Internet Layer

The TCP/IP Internet Layer defines the protocols that manage address and routing of data packets. Some key protocols within this layer include IP, ARP, ICMP, and IGMP.

Signup and view all the flashcards

Study Notes

Chapter 4-4 - Bluetooth, WiMAX, RFID, and Mobile Communications

  • This chapter examines three wireless technologies: Bluetooth, WiMAX, and RFID.
  • Bluetooth uses the 802.15 standard to connect computers, mobile phones, and devices.
  • Data transmission occurs over the 2.4 GHz ISM frequency band, which is also used by 802.11b, g, n.
  • Three output power classes exist for Bluetooth, with varying maximum output power and operating distances (see Table 11-5).
  • When a Bluetooth device is enabled, it uses an inquiry procedure to discover available Bluetooth devices.
  • The paging procedure synchronizes the connection between two Bluetooth devices, forming a piconet.
  • A piconet is an ad-hoc network of up to eight devices, with one device acting as the master.
  • WiMAX (Worldwide Interoperability for Microwave Access) is a broadband wireless system designed for fixed and mobile broadband access.
  • WiMAX operates in the 2 GHz to 66 GHz frequency range.
  • Fixed station WiMAX access can cover up to 30 miles, while mobile access is 3-10 miles.
  • WiMAX offers adaptable channel sizes (3.5 MHz, 5 MHz, 10 MHz), which ensures compatibility globally and optimizes data transfer rates.
  • The WiMAX MAC layer differs from Wi-Fi, as WiMAX units only need one access attempt.
  • WiMAX has a range of up to 31 miles and operates in both point-to-point and point-to-multipoint configurations.
  • WiMAX is useful for last-mile connections, providing a cost-effective alternative.
  • RFID (Radio Frequency Identification) uses radio waves to track and identify people, animals, objects, and shipments using the principle of modulated backscatter.
  • The RFID system consists of RFID tags (transponders) with integrated antennas and radio electronics, and readers (transceivers) that transmit radio waves to activate tags.
  • RFID systems have three parameters: powering the tag, frequency of operation, and communications protocol.
  • RFID tags are classified as passive, semi-active, or active based on their power source.
  • RFID operation frequencies include LF (125/134 kHz), HF (13.56 MHz), and UHF (860-960 MHz and 2.4 GHz).
  • The Slotted Aloha protocol is used for RFID communications, reducing data collisions.
  • Mobile communication technologies like CDMA (Code Division Multiple Access) and LTE (Long Term Evolution - 4G) are briefly introduced.
  • 3G/4G and HSPA+ provide broadband wireless services.

Chapter 4-5 - Configuring a Point-to-Point Wireless LAN - A Case Study

  • The chapter presents a proposal for a point-to-multipoint wireless network for a company.
  • Company administrators want a wireless connection for employees back to the company's network.
  • A site survey of the proposed antenna site on a hill 1 km from the home network is conducted.
  • The site has a tower for mounting the antenna and clear views for 6 km in any direction.
  • A wireless bridge connects the home network to the distribution point.
  • Three antenna options (Omni, Yagi, Dish) are considered. Each has various costs and ranges.
  • The administrators choose antenna A (omni-directional) for the site tower and this provides enough coverage for the 2 Mbps link needed for the remote users.
  • An RF site survey verifies the signal quality of the selected antenna.
  • Detailed measurements are taken from multiple locations within the planned coverage area.
  • Remote user installations require a directional antenna (Yagi) plus a mount, lightning arrestor, and wireless bridge; this data link is for a 2 Mbps connection.
  • The chosen antenna (Yagi) provides sufficient RF signal level for remote users.
  • Each remote user needs a wireless bridge and switch to connect multiple users.

Chapter 4-6 - Troubleshooting Wireless Networks

  • This section explains common techniques for troubleshooting wireless networks.

  • Wireless networks, though easier to use, can sometimes fail.

  • Checking hardware-related issues in wireless networks often involves the access point as the primary device.

  • Pinging the access point's IP address helps verify network connectivity.

  • Unplugging and replugging the access point resets it, in case of connectivity failures.

  • Measuring signal strength ensures a "good" signal at the receiving location.

  • Interference from electrical devices like microwave ovens (2.4 GHz) can affect signal strength.

  • Maintaining a baseline measurement of signal strength helps in identifying issues.

  • Wireless users share channels; large numbers of users can cause performance issues and packet drops due to heavy loads. Checking the access point's load capacity specifications may help.

  • Access points usually assign 192.168.0.x IP addresses to clients.

  • Using the command "ipconfig" verifies the assigned IP address.

  • Resetting the SSID (Service Set Identifier) is valuable for connecting to or disconnecting your wireless device from a particular network.

  • Most wireless systems support multiple security protocols (e.g., different versions of WPA/WEP).

  • Ensuring the client and access point use the same security mode is crucial.

  • Selecting a non-overlapping channel (e.g. channels 1 or 11) in Wi-Fi can reduce interference problems.

  • Antenna placement (high up, unobstructed by metal) and avoiding physical obstructions improve signal range.

  • Understanding that metal surfaces and thick materials can interfere with the signal range.

  • Wireless client compatibility (hardware and software) and using the same wireless network standard is essential.

  • Checking basic cable connections solves some unexpected problems

Chapter 6-2 - The TCP/IP Layers

  • The TCP/IP model lists 4 layers: Application, Transport, Internet, and Network Interface.

  • The Application layer defines the applications used to process requests, relevant ports and sockets.

  • The Transport Layer defines connection types between hosts and acknowledgement methods.

  • The Internet Layer defines protocols for addressing and routing data packets.

  • The Network Interface Layer specifies how hosts connect to the network.

  • The TCP/IP protocol was established before the OSI model, with the four layers correlating to the seven layers in the OSI model.

  • TCP/IP supports application layer protocols like Telnet, FTP, SMTP, DNS, and SNMP for communication.

  • Port numbers (Table 6-2) are reserved and assigned.

  • Common application ports, like Telnet (23), FTP (20, 21), SMTP (25), DNS (53), DHCP (67, 68), TFTP (69), and HTTP(80) are included in Table 6-3.

  • The transport layer is vital for establishing network connections, managing data transfer, and completing the connection.

  • Two key transport protocols are TCP (connection-oriented) and UDP (connectionless).

  • Establishing a TCP connection follows a three-way handshake (SYN, SYN+ACK, and ACK).

  • TCP specifies the rules for establishing, managing, and terminating a connection; it handles error checking and data packet recovery.

  • The UDP protocol is connectionless, which means data packets are sent without waiting for an acknowledgement; this is suitable for applications like streaming.

  • The Internet layer defines protocols used for addressing and routing data packets through a network.

Chapter 6-4 - IPv4 Addressing

  • IPv4 addresses use a 32-bit structure.

  • IPv4 address classes (A, B, C, D, E) have specific numerical ranges and characteristics, influencing how they are used within a network to define network portions and host portions.

  • Private IP addresses are allocated for internal networks (Intranets).

  • ARIN is involved in assigning IP address blocks.

  • Different address classes partition their 32-bit addresses differently (Table 6-8 & 6-9) showing how many bits are used for the network portion and how many bits are used for the host portion.

  • Private IP addresses (Table 6-10) are not used for routing on the Internet.

  • ARIN (the American Registry for Internet Numbers) is the organisation that assigns IP address space.

Chapter 6-5 - Subnet Masks

  • Subnetting divides networks into smaller networks (subnets) using subnet masks.
  • The subnet mask defines which bits of an IP address identify the network/subnet and host portion.
  • Subnets are created by borrowing bits from the host portion of the IP address.
  • The subnet mask defines the network/subnet bits, allowing routers to forward traffic to the appropriate subnet.
  • Equations are used to calculate the total number of subnets created and the number of usable host addresses per subnet.
  • A subnet has a network address and a broadcast address; these addresses are different from typical host addresses in the subnet.
  • Subnet masks are used to distinguish whether traffic is directed to a host on the same local area network or routed to a gateway.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

TCP/IP and OSI Model Overview
37 questions
Networking Protocols and Functions Quiz
46 questions
TCP/IP Networking Model Quiz
41 questions

TCP/IP Networking Model Quiz

ExcitedMossAgate3075 avatar
ExcitedMossAgate3075
Use Quizgecko on...
Browser
Browser