TCP/IP Model Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of the Application layer in the TCP/IP model?

  • It manages the delivery of data between hosts.
  • It terminates network connections.
  • It provides error checking for packet delivery.
  • It ensures a connection to an appropriate network port. (correct)
  • Which transport protocol in the TCP/IP model is connection-oriented?

  • TCP (correct)
  • SYN
  • UDP
  • FTP
  • What type of packet is exchanged first when establishing a TCP connection?

  • Data packet
  • SYN packet (correct)
  • SYN + ACK packet
  • ACK packet
  • Which of the following accurately describes TCP's role in data transmission?

    <p>Establishes the connection and manages data transfer.</p> Signup and view all the answers

    What is the third packet exchanged in a TCP handshake?

    <p>ACK packet</p> Signup and view all the answers

    What does ICANN stand for?

    <p>Internet Corporation for Assigned Names and Numbers</p> Signup and view all the answers

    Which key function is NOT provided by TCP?

    <p>Data compression</p> Signup and view all the answers

    How many total layers are there in the TCP/IP model?

    <p>4</p> Signup and view all the answers

    What frequency do microwave ovens operate on that is also used by 802.11b/g/n devices?

    <p>2.4GHz</p> Signup and view all the answers

    What should you consult to determine the optimum load capacity for users connecting to an access point?

    <p>Access point documentation</p> Signup and view all the answers

    Which command can be used to verify the IP address assigned by an access point?

    <p>ipconfig</p> Signup and view all the answers

    What is a potential issue when connecting your wireless device to a public hotspot?

    <p>Data traffic visibility to unauthorized users</p> Signup and view all the answers

    Which wireless channel is the default for 802.11b and 802.11g routers?

    <p>Channel 6</p> Signup and view all the answers

    What can obstruct the signal of a wireless antenna?

    <p>Metal surfaces</p> Signup and view all the answers

    What should you do if you re-configured your SSID while traveling and want to return to your home network?

    <p>Reset your SSID</p> Signup and view all the answers

    Which of these security protocols should be enabled to protect data traffic on a public network?

    <p>WPA2</p> Signup and view all the answers

    What is the primary role of an access point in a wireless network?

    <p>To manage the connection between mobile devices and the internet</p> Signup and view all the answers

    Which factor is most critical before installing a wireless network?

    <p>Potential RF interferences</p> Signup and view all the answers

    What is one way to troubleshoot a non-responsive access point?

    <p>Reboot the access point by unplugging it and plugging it back in</p> Signup and view all the answers

    What should be measured to ensure a good connection in a wireless network?

    <p>Signal strength</p> Signup and view all the answers

    How can physical obstructions affect a wireless network?

    <p>They can cause a loss in signal strength</p> Signup and view all the answers

    Which of these devices is NOT typically considered a part of a wireless LAN setup?

    <p>Network switches</p> Signup and view all the answers

    What is a common source of frequency interference in a wireless network?

    <p>Microwave ovens</p> Signup and view all the answers

    Why is planning important for a multipoint wireless distribution?

    <p>It helps in optimizing signal strength and coverage</p> Signup and view all the answers

    What type of protocol is UDP?

    <p>Connectionless protocol</p> Signup and view all the answers

    What happens when the host at port 21 acknowledges the FIN packet?

    <p>The TCP connection is closed.</p> Signup and view all the answers

    In which type of applications is UDP especially useful?

    <p>Videoconferencing and audio feeds</p> Signup and view all the answers

    How are UDP packets typically transferred over the network?

    <p>Without establishing a connection</p> Signup and view all the answers

    What is the length of the packets 138, 139, and 140 during the UDP transfer?

    <p>789 bytes</p> Signup and view all the answers

    What is the primary characteristic of UDP concerning acknowledgment of data packets?

    <p>It does not send any acknowledgements back.</p> Signup and view all the answers

    Which protocols are defined as part of the TCP/IP Internet Layer?

    <p>IP, ARP, ICMP, IGMP</p> Signup and view all the answers

    What characterizes the termination of a UDP data transfer?

    <p>The source stops sending data packets.</p> Signup and view all the answers

    What is the purpose of the packet identified as 'SYN' in the TCP handshake?

    <p>It synchronizes sequence numbers between the hosts.</p> Signup and view all the answers

    Which port number is designated as the source port in the initial connection setup for FTP?

    <p>1054</p> Signup and view all the answers

    What role does the destination port 21 play in the context of establishing a TCP connection?

    <p>It is the typical port for FTP operations.</p> Signup and view all the answers

    How many packets are exchanged in the initial TCP handshake process?

    <p>Three</p> Signup and view all the answers

    In the TCP handshake, which packet follows the 'SYN' packet sent by the initiating host?

    <p>SYN-ACK</p> Signup and view all the answers

    What does the abbreviation 'TCP' stand for in networking?

    <p>Transmission Control Protocol</p> Signup and view all the answers

    Which host in the example initiates the TCP connection for an FTP transfer?

    <p>Host A</p> Signup and view all the answers

    What is the relationship between the source and destination ports in a TCP packet?

    <p>The source port identifies the sender, while the destination port identifies the receiver.</p> Signup and view all the answers

    What does the ACK number indicate in the TCP communication process?

    <p>The acknowledgement of packet receipt</p> Signup and view all the answers

    What is the function of the FIN packet in the TCP termination process?

    <p>To indicate that data transmission is complete</p> Signup and view all the answers

    Which packet is sent by Host A to indicate that it received packet 2 from Host B?

    <p>Packet 3</p> Signup and view all the answers

    How many packets are exchanged in the initial TCP handshake?

    <p>Three</p> Signup and view all the answers

    What is the correct order of steps for terminating a TCP connection?

    <p>FIN from Host B, ACK from Host A, FIN from Host A, ACK from Host B</p> Signup and view all the answers

    In the context of a TCP packet, what does SEQ# represent?

    <p>The unique identifier for each packet in sequence</p> Signup and view all the answers

    Which host initiates the TCP termination process by sending the first FIN packet?

    <p>Host B</p> Signup and view all the answers

    What does the sequence number increment by during the acknowledgment process?

    <p>One</p> Signup and view all the answers

    Study Notes

    Chapter 4-4 - Bluetooth, WiMAX, RFID, and Mobile Communications

    • This chapter examines three wireless technologies: Bluetooth, WiMAX, and RFID.
    • Bluetooth uses the 802.15 standard to connect computers, mobile phones, and devices.
    • Data transmission occurs over the 2.4 GHz ISM frequency band, which is also used by 802.11b, g, n.
    • Three output power classes exist for Bluetooth, with varying maximum output power and operating distances (see Table 11-5).
    • When a Bluetooth device is enabled, it uses an inquiry procedure to discover available Bluetooth devices.
    • The paging procedure synchronizes the connection between two Bluetooth devices, forming a piconet.
    • A piconet is an ad-hoc network of up to eight devices, with one device acting as the master.
    • WiMAX (Worldwide Interoperability for Microwave Access) is a broadband wireless system designed for fixed and mobile broadband access.
    • WiMAX operates in the 2 GHz to 66 GHz frequency range.
    • Fixed station WiMAX access can cover up to 30 miles, while mobile access is 3-10 miles.
    • WiMAX offers adaptable channel sizes (3.5 MHz, 5 MHz, 10 MHz), which ensures compatibility globally and optimizes data transfer rates.
    • The WiMAX MAC layer differs from Wi-Fi, as WiMAX units only need one access attempt.
    • WiMAX has a range of up to 31 miles and operates in both point-to-point and point-to-multipoint configurations.
    • WiMAX is useful for last-mile connections, providing a cost-effective alternative.
    • RFID (Radio Frequency Identification) uses radio waves to track and identify people, animals, objects, and shipments using the principle of modulated backscatter.
    • The RFID system consists of RFID tags (transponders) with integrated antennas and radio electronics, and readers (transceivers) that transmit radio waves to activate tags.
    • RFID systems have three parameters: powering the tag, frequency of operation, and communications protocol.
    • RFID tags are classified as passive, semi-active, or active based on their power source.
    • RFID operation frequencies include LF (125/134 kHz), HF (13.56 MHz), and UHF (860-960 MHz and 2.4 GHz).
    • The Slotted Aloha protocol is used for RFID communications, reducing data collisions.
    • Mobile communication technologies like CDMA (Code Division Multiple Access) and LTE (Long Term Evolution - 4G) are briefly introduced.
    • 3G/4G and HSPA+ provide broadband wireless services.

    Chapter 4-5 - Configuring a Point-to-Point Wireless LAN - A Case Study

    • The chapter presents a proposal for a point-to-multipoint wireless network for a company.
    • Company administrators want a wireless connection for employees back to the company's network.
    • A site survey of the proposed antenna site on a hill 1 km from the home network is conducted.
    • The site has a tower for mounting the antenna and clear views for 6 km in any direction.
    • A wireless bridge connects the home network to the distribution point.
    • Three antenna options (Omni, Yagi, Dish) are considered. Each has various costs and ranges.
    • The administrators choose antenna A (omni-directional) for the site tower and this provides enough coverage for the 2 Mbps link needed for the remote users.
    • An RF site survey verifies the signal quality of the selected antenna.
    • Detailed measurements are taken from multiple locations within the planned coverage area.
    • Remote user installations require a directional antenna (Yagi) plus a mount, lightning arrestor, and wireless bridge; this data link is for a 2 Mbps connection.
    • The chosen antenna (Yagi) provides sufficient RF signal level for remote users.
    • Each remote user needs a wireless bridge and switch to connect multiple users.

    Chapter 4-6 - Troubleshooting Wireless Networks

    • This section explains common techniques for troubleshooting wireless networks.

    • Wireless networks, though easier to use, can sometimes fail.

    • Checking hardware-related issues in wireless networks often involves the access point as the primary device.

    • Pinging the access point's IP address helps verify network connectivity.

    • Unplugging and replugging the access point resets it, in case of connectivity failures.

    • Measuring signal strength ensures a "good" signal at the receiving location.

    • Interference from electrical devices like microwave ovens (2.4 GHz) can affect signal strength.

    • Maintaining a baseline measurement of signal strength helps in identifying issues.

    • Wireless users share channels; large numbers of users can cause performance issues and packet drops due to heavy loads. Checking the access point's load capacity specifications may help.

    • Access points usually assign 192.168.0.x IP addresses to clients.

    • Using the command "ipconfig" verifies the assigned IP address.

    • Resetting the SSID (Service Set Identifier) is valuable for connecting to or disconnecting your wireless device from a particular network.

    • Most wireless systems support multiple security protocols (e.g., different versions of WPA/WEP).

    • Ensuring the client and access point use the same security mode is crucial.

    • Selecting a non-overlapping channel (e.g. channels 1 or 11) in Wi-Fi can reduce interference problems.

    • Antenna placement (high up, unobstructed by metal) and avoiding physical obstructions improve signal range.

    • Understanding that metal surfaces and thick materials can interfere with the signal range.

    • Wireless client compatibility (hardware and software) and using the same wireless network standard is essential.

    • Checking basic cable connections solves some unexpected problems

    Chapter 6-2 - The TCP/IP Layers

    • The TCP/IP model lists 4 layers: Application, Transport, Internet, and Network Interface.

    • The Application layer defines the applications used to process requests, relevant ports and sockets.

    • The Transport Layer defines connection types between hosts and acknowledgement methods.

    • The Internet Layer defines protocols for addressing and routing data packets.

    • The Network Interface Layer specifies how hosts connect to the network.

    • The TCP/IP protocol was established before the OSI model, with the four layers correlating to the seven layers in the OSI model.

    • TCP/IP supports application layer protocols like Telnet, FTP, SMTP, DNS, and SNMP for communication.

    • Port numbers (Table 6-2) are reserved and assigned.

    • Common application ports, like Telnet (23), FTP (20, 21), SMTP (25), DNS (53), DHCP (67, 68), TFTP (69), and HTTP(80) are included in Table 6-3.

    • The transport layer is vital for establishing network connections, managing data transfer, and completing the connection.

    • Two key transport protocols are TCP (connection-oriented) and UDP (connectionless).

    • Establishing a TCP connection follows a three-way handshake (SYN, SYN+ACK, and ACK).

    • TCP specifies the rules for establishing, managing, and terminating a connection; it handles error checking and data packet recovery.

    • The UDP protocol is connectionless, which means data packets are sent without waiting for an acknowledgement; this is suitable for applications like streaming.

    • The Internet layer defines protocols used for addressing and routing data packets through a network.

    Chapter 6-4 - IPv4 Addressing

    • IPv4 addresses use a 32-bit structure.

    • IPv4 address classes (A, B, C, D, E) have specific numerical ranges and characteristics, influencing how they are used within a network to define network portions and host portions.

    • Private IP addresses are allocated for internal networks (Intranets).

    • ARIN is involved in assigning IP address blocks.

    • Different address classes partition their 32-bit addresses differently (Table 6-8 & 6-9) showing how many bits are used for the network portion and how many bits are used for the host portion.

    • Private IP addresses (Table 6-10) are not used for routing on the Internet.

    • ARIN (the American Registry for Internet Numbers) is the organisation that assigns IP address space.

    Chapter 6-5 - Subnet Masks

    • Subnetting divides networks into smaller networks (subnets) using subnet masks.
    • The subnet mask defines which bits of an IP address identify the network/subnet and host portion.
    • Subnets are created by borrowing bits from the host portion of the IP address.
    • The subnet mask defines the network/subnet bits, allowing routers to forward traffic to the appropriate subnet.
    • Equations are used to calculate the total number of subnets created and the number of usable host addresses per subnet.
    • A subnet has a network address and a broadcast address; these addresses are different from typical host addresses in the subnet.
    • Subnet masks are used to distinguish whether traffic is directed to a host on the same local area network or routed to a gateway.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on the TCP/IP model with this quiz, covering essential concepts such as the Application layer, transport protocols, and TCP connection establishment. Assess your understanding of data transmission, frequency usage, and wireless connectivity issues.

    More Like This

    Internet Data Transmission Quiz
    5 questions

    Internet Data Transmission Quiz

    PoliteArcticTundra8232 avatar
    PoliteArcticTundra8232
    TCP/IP and OSI Model Overview
    37 questions
    Use Quizgecko on...
    Browser
    Browser