hapter 5 Flashcards
The network layer sits directly between the application layer and the data link layer in
the Internet five-layer network model.
F
The network layer provides guaranteed end-to-end delivery of the message.
F. The transport layer responsible moving messages from source to destination ( End-to-end delivery of message)
The transport layer routes messages through the network selecting the best path from
the source to the destination station.
F. The router ( network layer)
The transport layer process running on the destination computer, reassembles the
fragmented application message before passing it up to the application layer
T
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.
a. physical
b. transport
c. session
d. presentation
e. data link
B
__________ is not an important function of the transport layer.
a. End-to-end delivery of the message
b. Taking messages from the application layer
c. Routing
d. Breaking long messages into smaller segments
e. Interfacing with the network layer
C. Router is in layer 3 ( network layer)
_______ is the dominant network protocol today and is in use in virtually every LAN and WAN in the world.
a. SDLC
b. SNA
c. IPX/SPX
d. TCP/IP
e. X.25
D
Transmission Control Protocol/Internet Protocol was developed for ________ in
1974.
a. ARPANET
b. IBM
c. Hewlett-Packard
d. Kennesaw State University
e. Xerox
A
Breaking a network into smaller parts is called network:
a. fragmentation
b. segmentation
c. localization
d. allocation
e. mitigation
B
What is the primary function of the Transport layer?
a) Linking the application layer to the network
b) Segmenting data
c) Session management
d) Routing packets
A,B,C
What is the primary responsibility of linking the application layer to the network?
a) Encoding data
b) Moving messages from source to destination
c) Authenticating users
d) Generating cryptographic keys
B
What does session management primarily involve in network communication?
a) Encrypting data during transmission
b) Establishing an end-to-end connection between sender and receiver
c) Managing network hardware devices
d) Monitoring network traffic patterns
B
What is the primary function of the network layer (L3) in a computer network?
a) Encoding data for transmission
b) Handling physical connections
c) Routing messages through the network
d) Ensuring end-to-end delivery
C
What is the primary responsibility of the network layer in a computer network?
a) Managing physical connections
b) Ensuring data encryption
c) Finding the address of the next computer
d) Establishing end-to-end connections
C
What task does the network layer perform in relation to addressing?
a) Assigning IP addresses to devices
b) Converting domain names to IP addresses
c) Finding the address of the next hop
d) Managing MAC addresses
C
What is the primary function of routing in a computer network?
a) Encrypting data packets
b) Managing physical connections
c) Selecting the best path from computer to computer
d) Formatting data for presentation
C
Which layer of the OSI model is responsible for ensuring
flow control so that the destination station does not
receive more packets that it can process at any given
time?
a. presentation Layer
b. transport Layer
c. physical Layer
d. session Layer
e. application Layer
B
Which layer of the OSI model is responsible for ensuring
that all packets sent are received by the destination
station by dealing with end-to-end issues?
a. presentation Layer
b. transport Layer
c. physical Layer
d. session Layer
e. application Layer
B
The _________ layer is responsible for routing of messages
from the sender to the final destination.
a. data communication layer
b. resident layer
c. application layer
d. network layer
e. physical layer
D
Which set of protocols is widely used at the transport and network layers of the TCP/IP model?
a) UDP/IP
b) SMTP/POP3
c) TCP/IP
d) HTTP/HTTPS
C
TCP/IP is a data link protocol that is used on the Internet
F
Where is TCP/IP predominantly used?
a) In local area networks (LANs) only
b) In wide area networks (WANs) only
c) In the Internet and almost all backbone and wide area networks
d) In satellite communication networks only
C
Which protocol is capable of providing reasonably efficient and error-free transmission, performs error checking, transmits large files with end-to-end delivery assurance, and is compatible with a variety of data link layer protocols?
A) UDP/IP
B) FTP
C) TCP/IP
D) HTTP
C
TCP/IP provides
reasonably efficient and error-free transmission, performs error checking, transmits large files with end-to-end delivery assurance, and is compatible with a variety of data link layer protocols
Which component of the TCP/IP protocol suite handles error checking and segments data into segments?
A) TCP
B) IP
C) UDP
D) HTTP
A
Which aspect of the TCP/IP protocol suite manages the addressing and routing of data packets?
A) TCP
B) IP
C) UDP
D) HTTP
B
TCP software is only active at the sender and receiver, managing data at the application layer
T
IP is responsible for error-free delivery of packets on a TCP/IP network
F. TCP
The TCP portion of TCP/IP performs linking to the application layer
T
The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to.
F. The destination port
What role does the source port play in TCP communication?
a) It identifies the type of packet
b) It directs the packet to the destination IP address
c) It indicates the destination application layer program
d) It identifies the application layer program from which the packet originates
D
What information does the destination port provide to the TCP software at the destination?
a) The source IP address
b) The application layer program to which the packet should be directed
c) The encryption method used
d) The packet sequence number
B
What is the typical size of control information in a TCP segment?
a) 192 bytes
b) 24 bytes
c) 192 bits
d) 24 bits
A. A typical TCP segment has a 192 b (24 B) of control information
TCP includes a sequence number so that the packets can be reassembled at the
destination in the correct order.
T
Why is the sequence number crucial in TCP communication?
a) To determine the destination port
b) To ensure no segment is lost during transmission
c) To encrypt the data being sent
d) To identify the source IP address
B
What is the size of the TCP header length when there is no “options” field?
a) 160 bytes
b) 160 bits
c) 20 bytes
d) 20 bits
B. ( 20 Bytes)
What protocol, included in the Internet Protocol Suite, is used for sending single small packets without segmentation or reassembly?
a) Transmission Control Protocol (TCP)
b) User Datagram Protocol (UDP)
c) Internet Protocol (IP)
d) Hypertext Transfer Protocol (HTTP)
B
UDP is not a protocol used at the application layer
T
Which fields are included in the UDP header?
A) Destination port, Source port, Length
B) Destination port, Source port, Length, CRC-16
C) Destination port, Length, CRC-16
D) Source port, Length, CRC-16
B
What protocol is commonly used for transmitting DNS requests?
A) TCP
B) HTTP
C) UDP
D) FTP
C
What distinguishes User Datagram Protocol (UDP) from Transmission Control Protocol (TCP) in terms of message delivery?
a) UDP ensures reliable delivery of messages.
b) UDP checks for lost messages.
c) UDP does not check for lost messages, unlike TCP.
d) UDP retransmits lost messages automatically.
C
UDP is not commonly used for:
a. network management control messages
b. RIP messages
c. DHCP addressing messages
d. HTTP requests
e. DNS requests
D
Which characteristic best describes the use of User Datagram Protocol (UDP) in the TCP/IP suite?
a) It employs acknowledgments (ACKs) for reliable data transfer.
b) It is connection-oriented with flow control mechanisms.
c) It operates on a connectionless basis without acknowledgments or flow control.
d) It guarantees the ordered delivery of packets.
C
For what purpose is UDP commonly used within the TCP/IP suite?
a) Large data transfers requiring reliability
b) Video streaming with real-time playback
c) File transfer with congestion control
d) Control messages, particularly small ones like DNS queries
D
What type of applications are suitable for using UDP due to its characteristics?
a) Applications requiring strict ordering of data packets
b) Applications with large data transfers and extensive error correction
c) Applications where occasional packet loss can be tolerated, such as video streaming
d) Applications involving secure and encrypted data transmission
C
Who ultimately decides whether to use TCP or UDP for a particular application within the TCP/IP protocol suite?
a) The transport layer protocol
b) The network administrator
c) The engineer writing the application
d) The hardware manufacturer
C
TCP is the network layer protocol used on the Internet today
F. IP is the network layer protocol, and its PDUs are called packets.
IP is responsible for error-free delivery of packets on a TCP/IP network.
F
What is the size of the header in bits for IP version 4 (IPv4)?
a) 192 bits
b) 24 bits
c) 32 bits
d) 64 bits
A
How many bytes are there in the header of IPv4?
a) 192 bytes
b) 24 bytes
c) 32 bytes
d) 64 bytes
B
What type of addresses does IPv4 use?
a) 16-bit addresses
b) 32-bit addresses
c) 64-bit addresses
d) 128-bit addresses
B. Source address: 32 bits
Destination: 32 bits
What is the size of the header in bits for IPv4 when the “Options” field is not utilized?
a) 160 bits
b) 192 bits
c) 20 bits
d) 24 bits
A
The latest version of IP is IPv7, which increases the address space from 128 bits to 256 bits
F. the latest is IPv6: ( increased address size from 32 bits to 132 buts)
A destination port number at the transport layer identifies which application on a
computer should receive the data transmission
T
Source port address is the logical address used to identify the application that is
sending the data.
T
What advantage does IPv6 offer in terms of packet structure compared to IPv4?
a) Increased header size for added information
b) Enhanced error-checking mechanisms
c) Simpler packet structure facilitating routing
d) More complex packet structure for better security
A,C
What is the size of the IPv6 header in bits?
a) 320 bits
b) 40 bits
c) 320 bytes
d) 40 bytes
A. ( 40 Bytes)
What is the theoretical maximum number of addresses that IPv4 can accommodate?
a) 1.7 billion
b) 4.3 billion
c) 8.6 billion
d) 16.8 billion
B
How many addresses are reserved within the IPv4 address space?
a) 500,000
b) 500 million
c) 5 million
d) 5 billion
B
What mathematical formula represents the calculation of the total number of combinations for IPv4 addresses?
a) 2^(# of bits) = # of combinations
c) # of combinations = 2 * (# of bits)
d) # of combinations = 2^2 * (# of bits)
A
What conclusion is drawn regarding the necessity of IPv6 based on the statement?
a) IPv6 is essential due to the imminent depletion of IPv4 addresses.
b) IPv6 is unnecessary since there is little chance of exhausting the IPv6 address space.
c) IPv6 is critical for future network scalability and growth.
d) IPv6 adoption is irrelevant to the availability of IPv4 addresses.
B
How many bytes are there in an IPv4 address?
a) 1 byte
b) 2 bytes
c) 3 bytes
d) 4 bytes
D