Chapter 7 - TCP/IP Basics Flashcards

1
Q

Define Protocol Suite

A

a set of rules for developers/manufacturers to follow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Protocol Stack

A

Software on a system that enables a specific protocol suite to function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Internet Control Message Protocol and its purpose.

A

Features are called automatically by applications as needed without the user knowing. i.e. Ping utility used ICMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many fields does a full IP packet have

A

14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is a simple IP header constructed

A

Ver - defines IP address; 4/IPV4, 6/IPV6
Header length: size of IP portion (32 bits)
DSCP - Differentiated services code point; contains data for bandwidth sensitive application; type of service
TTL - Time to Live; max 255, avg 128; counts each loop through the router
TCP/UDP - identifies what is inside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does TCP require

A

Process of ACK/NACK Both the sending & receiving machine need to acknowledge each others presence and readiness to send and receive data. Also chops data into segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a client know where to return the data

A

The client remembers the source port number to assign it to the proper application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give example of a TCP/UDP header

A

Source Port
Destination Port
Sequence Number
ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of the Sequence/ACK numbers

A

To keep track of various pieces of data moving in and out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do we use flags

A

Give individual bits detailed information about the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do we use a checksum

A

checks the TCP header for errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two important protocols that use UDP

A

Domain Name System

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe a UDP header

A

Source Port
Destination Port
Length
checksum`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where does TCP chop up the data

A

Transport Layer; UDP only gets a header at this stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a computer interpret a IP address as

A

32 Bit binary address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is another name for a router

A

Default Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why do we use network IDs

A

to connect to multiple LANs

18
Q

What is required when sending data to another computer

A

MAC address

19
Q

What is a subnet mask

A

a string of ones and zeroes always totalling 32 bits

20
Q

How do you pick out the host ID in a subnet mask

A

Line up a IP address and a subnet mask. The portion that aligns with the ones of the Subnet mask is the network ID.

  1. 168.5.23 -> 11000000.10101000.00000101.00010111
  2. 255.255.0 -> 11111111.11111111.11111111.00000000

Network: 11000000.10101000.00000101.x
Host: x.x.x.00010111

21
Q

What is the first step to sending data out

A

The computer compares the destination IP to its own address using the subnet mask.

22
Q

Define Address Resolution Protocol (ARP)

A

How a TCP/IP network figures out the MAC address based on the destination IP address

23
Q

What does an ARP frame look like

A
Hardware type
Protocol type
Hardware length
Protocol length
Operatjon
Sender hardware address
Sender protocol address
Target hardware address
Target protocol address
24
Q

How is the shorthand of a MAC address used

A

Using a /# (i.e. /24) to indicate the number of ones.

25
What purpose does IANA have
Formed to track and disperse IP addresses to those who need them. They hand out contiguous chunks called network blocks
26
What is the range of a Class A address
1.0.0.0 - > 126.255.255.255 | 16,277,214 Hosts / ID
27
What is the range of a Class B address
128.0.0.0 - > 191.255.255.255 | 64, 534 Hosts / ID
28
What is the range of a Class C address
192.0.0.0 - > 223.255.255.255 | 254 Hosts / ID
29
What is the range of a Class D address
224.0.0.0 - > 239.255.255.255 | Multicast
30
What is the range of a Class E address
240.0.0.0 - > 254.255.255.255 | Experimental
31
What are the three ways to send a packet
Broadcast: every computer hears Unicast: one to one Multicast: sends to a group
32
What is the difference between subnetting and CIDR
Subnetting breaks a single block of addresses into multiple subnets CIDR takes a block of IP addresses and passes them out
33
What are two important things to remember about subnetting
Start with the given subnet mask and move to the right until you have the correct number of subnets Forget the dots, they don't mean anything to the computer
34
How do you calculate the number of hosts in a subnet mask
2^x - 2 | x= number of zeroes
35
Outline the process of Subnetting
OG subnet: 111111111111111111111111 | 00000000 Network extension: 111111111111111111111111 | 0 | 0000000 New sub net 111111111111111111111111 | 10000000 = 255.255.255.128
36
Outline the process of making 3 new subnets
Translate subnet mask into 3 new subnets 11000000.10101000.00000100.00000000 110000001010100000000100 | 00 | 000000 110000001010100000000100 | 00 | 000001 (host) 110000001010100000000100 | 00 | 000010 (host) 110000001010100000000100 | 01 | 000000 110000001010100000000100 | 01 | 000001 (host) 110000001010100000000100 | 01 | 000010 (host) 110000001010100000000100 | 10 | 000000 110000001010100000000100 | 10 | 000001 (host) 110000001010100000000100 | 10 | 000010 (host) 110000001010100000000100 | 11 |000000 110000001010100000000100 | 11 | 000001 (host) 110000001010100000000100 | 11 | 000010 (host) Converted back to dot-dec 192. 168.4.0 /26 192. 168.4.64 /26 192. 168.4.128 /26 192. 168.4.192 /26
37
How do you calculate a 8 bit binary value to a number
128 64 32 16 8 4 2 1 1 0 0 1 0 1 1 0 ------------------------------ Add the ones 128 + 16 + 4 + 2 = 150
38
What ports does DCHP use
67 & 68
39
What IP address should you tell you there is an error
169.254.0.0 (network ID) | Generated by a version of Zero-config networking (APIPA)
40
What is the loopback address
127.0.0.1
41
What are considered to be private IP addresses
10. 0.0.0 - > 10.255.255.255 172. 16.0.0 -> 172.31.255.255.255 192. 168.0.0 -> 192.168.255.255