Lesson 5 TCP IP Addressing Flashcards
TCP IP protocol suite defines what
how applications on separate nodes establish and track connections
Why was TCP IP developed
To allow the addition of hardware and create a more flexible architecture
TCP stack has how many layers
Four
What are the TCP stack layers
Application
Transport
Internet
Network Access
Compare the OSI model to the TCP model
d
Which TCP layer adds a trailer during encapsulation
Network Access
Which TCP layers add a header during encapsulation
Application
Transport
Internet
Describe a connection-oriented protocol
The connection must be established before data is sent
TCP
Describe a connection-less protocol
The connection does not need to be established before data is sent
UDP
Connection-oriented protocols have how many stages
Three
- Connection is established and parameters are negotiated
- Devices transfer data
- Connection is released and torn down
Do connection-less protocols have stages for connections
No
Can connection-oriented protocols work in uni direction or bir directional environments
Bi-direction only
What are the two TCP/IP transport layer protocols
TCP and UDP
Name a transport protocol
TCP and UDP
TCP does what to a datagram
breaks them down into smaller segments
Reassembles them
Waits for acknowledgement of received data
Retransmits them if necessary
Describe the three-way handshake
SYN
SYN-ACK
ACK
What must happen before a client can establish an active connection
The server must perform an passive open then the client can perform an an active open
SYN
Client sends a syn packet to the serve with a sequence number
Are the three way handshake sequence numbers random
Yes – The number is random value A
SYN-ACK
The server sends a syn-ack to the client with a sequence number with a value of A+1
ACK
The client send a ack to the server with a sequence number of B+1
Describe UDP
User Datagram Protocol
Connectionless Protocol
Best effort deliverary protocol
Smaller header than TCP therefore it means faster more effcient delivery
What uses UDP
VOIP
Streaming real-time video
Network management applications
When performance is more important than delivery which protocol should you use UDP or TCP
UDP
IP works at which OSI layer
Layer 3
Describe IP
It is a connection-less protocol
Works as an intermediary between network and higher protocols
IP makes no guarantee of
Packet delivery
Corruption of data or lost packets
IP works with TCP or UDP
True
When TCP is used with IP, which one gurantees deliverary and the connection
TCP = deliverary
IP = connection
Describe ICMP
Used with IP to report the condition of connections between two nodes
ICMP reports errors
Connectionless
Works at layer 3
When a nodes buffler is being flooded, what happens
The node sends an ICMP source quench signal to the transmitting node
ICMP Destination Unreacheable Means
Destination cannot be contacted
ICMP Echo and Echo Reply are used when
Pinging a system
Is ICMP traffic usually blocked on the network
Yes
Name the IP protocols
UDP TCP IGMP ICMP ARP
Describe IGMP
Supports multicasting
OPerates at Layer 3
Provides one to many communications
IGMP is best for what
Streaming videos or deploying images to multiple systems
Describe ARP
Address Resolution Protocol
Maps IP address to a physical or MAC address
Works at Layer 2 of the OSI but encapsulated by an Ethernet header
How does ARP work
It receives an address from IP
If it knows the MAC address for that IP it will send it. If it doesn’t know the MAC address, it will send out a broadcast to resolve the IP address.
The node with that IP address will send a unicast transmission with its MAC address
Protocol Analyzer are also called
Network analyzer
Protocol analyzers can look at packets at which OSI layers
Physical
Data
Network
Transport
Can a protocol analyzer look at all channels on a wireless network at one time
NO
Can a protocol analyzer look at the complete wired network at one time
Yes or it can look at certain segments
What are some uses of protocol analyzers
Detecting network intrusions
Analyzing network traffic patterns and potential problems
Monitoring network usage and performance factors
Filtering undesirable network traffic
Launching an eavesdropping attack
Protocol Analyzers can be software or hardware
Yes
What do protocol analyzers need in order to capture all packets
Analyzers must have a network adapter
Analyzers must be placed in promiscuous mode
How can you decrease the number of ACKs on a TCP/IP network
Increase the PDU size
Administrators must configure what on a TCP/IP network
Default Gateway
Subnet mask
IP address
IP V4 address have how many bits
32
IPV6 addresses have how many bits
128
IP addresses are shown as
Dotted Decimals
What is a subnet mask
A number assigned to each host for dividing the IP address into network and node potions
First Octet from 1-127 has a default Subnet Mask of
255.0.0.0
First Octet from 128 -191 has a default Subnet Mask of
255.255.0.0
First Octet from 192-223 has a default Subnet Mask of
255.255.255.0
Are these subnet masks permitted
- 0.0.0
- 255.0.0
- 255.255.0
- 255.128.0
- 255.255.244
Yes
Are these subnet masks permitted
- 0.255.0
- 255.292.255
- 240.254.0
- 255.0.192
No