Transmission Control Protocol Show Two basic categories of protocols Connection oriented and connection less protocols Describe connection oriented protocols Require a logical connection before transfer of data. Describe connection less protocols Do not establish a connection between devices. Internet Protocol Describe the IP Data packet delivery process The process of delivering a data packet by IP consists of three steps the IP address is then passed from the transport layer to the Internet layer. IP uses a subnet mask to determine if the receiving node is in the same subnet and delivers the packet User Datagram Protocol Address Resolution Protocol Name the steps,ARP takes to in address resolution ARP receives an IP address from IP If ARP has the MAC address in its cache it returns it to IP. If not it issues a broadcast to resolve the IP address A target node with the corresponding IP address responds with a unicast that includes its MAC address. The MAC address is added to ARPs caches and sent to the IP as requested. Internet Control Message Protocol Internet Group Management Protocol A unit data transfer between computers that communicate over a network. Contains three parts. Header, data, footer or trailer. In OSI model frames occur at In OSI Model packets occur at What the difference between packets and datagrams A Datagram is a self contained independent piece of data able to move from a source to a destination. What is a network address A protocol specific Identifier assigned to a node. Includes two parts. Part one identifies the network part two identifies the node. A name assigned to a node to help users and technicians recognize the device easier Making services that Mao network names to network addresses DNS.
domain name system. Used on the Internet A unique 32 bit binary address assigned to a computer so that it can communicate with other devices on a TCP/IP network 32 bit binary addresses separated by dots into four 8 bit octets converted into a single decimal value ranging from 0 to 255 The process of logically dividing a network into smaller subnetworks that each have a unique address. What are the two main benefits of creating subsets To improve performance and to provide a more secure network environment A 32 bit number assigned to each host for dividing the 32bit binary IP address into network and node portions. Uses the binary AND operation to remove the node ID from the IP address leaving the network portion. The first number must be 255. The remaining three can be any if the following : 255,254,252,248,240,224,192,128,0 What are the default subnet mask and their corresponding values of the first octet 255.0.0.0 is 1-126 What are the IP address assignment rules Each node must have a unique IP address To apply a subnet mask both the IP address and the subnet mask are converted to binary. The two binary numbers are ANDed together. The zeros in the subnet mask convert all bits in the node portion of the IP address to zeros leaving the network portion of the address intact
Internet Corporation for Assigned Names and Numbers Class A. Used by extremely large networks. Class B Class C Class D Class E What are private IP addresses Address they organizations use for nodes within enterprise networks for IP connectivity. Not routable and packets are not forwarded outside of the network Private nonroutable IP address ranges 10.0.0.0 to 10.255.255.255 What is a default gateway The IP address of a router that router remote traffic from the computers local subnet to remote subnets. The address of the Router connected to the Internet. Describe custom TCP/IP subnets A class of leased addresses that are divided into smaller groups to serve a networks needs. Has a custom subnet mask ANDed to the IP address. A default gateway is configured for each subnet to rout traffic between subnets What is a custom subnet mask
Borrows node bits in a contiguous block from the left side to the node portion of the address and uses them as network bits. This divides a single network address into multiple networks each containing a few nodes. What is variable length subnet masks VLSM can be used for creating subnets that have different numbers of nodes. Applies the custom subnet mask which provides the number of nodes required for each subnet What is classless inter domain routing CIDR A classless addressing method that considers a VLSM as a 32 bit binary word. Mask bits can move in one bit increments to provide the exact number of nodes and networks required. The notation combined a network address with a number to represent the number of one bits on the mask. The successor of IPv4. An addressing scheme that increases the available pool of IP addresses by implementing 128 bit binary address space A 128 bit binary number assigned to a computer on a TCP/IP network. Some bits represent the network and others the host. Separated by colons into eight groups of four hexadecimal digits. Leading zeros are omitted. Consecutive zeros replaced with two colons. A virtual link between two nodes established for the duration of a communication session. Provide flow control, packet sequencing and error recovery functions to ensure reliable communications between nodes. Three types of connection services Unacknowledged connectionless Three commonly used connection modes Simplex. One way transmission of information. No return path. Uses the full bandwidth of the medium for transmission. Ex radio & tv broadcasts Half duplex. Permits two eat communication but in only one direction at a time. One device sends the other must receive. Then switch roles. Uses full bandwidth of the medium Full duplex. Permits simultaneous two way communication. devices send and receive data simultaneously. Can occur over different channels or in the same channel. Not able to use the full bandwidth. Ex telephone systems A technique for optimizing data exchange between systems. Buffering and data windows are two commonly used in computer networking. A flow control technique in which data received is stored on a temporary memory location called a buffer until the main system components are ready to work with the data. On disk or RAM the buffer is called a cache. What is a cache controller A specialized processor chip that manages caching so the processor doesn't have to What is flooding in terms of data transmission. How can it be avoided Data arrives too quickly to be handled. Receiving devices send a squelch signal to the sender when the buffer is 75% full A flow control technique in which multiple packets are sent as a unit called a block or a window. The recipient ACKs each window resulting in higher throughput. Describe the two types of data windows Fixed length. Every block contains the same number of packets Sliding windows use variable block sizes. Packets in the block sent steadily increase in size until the receiver sends the squelch. Window size is continually reevaluated to send the largest window possible Determining if transmitted data has been received correctly and completely. Extra bits called Error Detection Code EDC are attached to the footer to indicate its original content. The recover generates an EDC and compares to determine if the data has been altered en route. Also include a correction component called Error Detection And Correction EDAC that helps receiver rebuild the data of an error occurs A process used to detect errors in memory or data communication. A computer checks the data word by word. The sender adds in bit to each word and transmits. The receiver compares the number of ones within a transmitted byte to those received. If matches data is valid. If not determined to be corrupt retransmission request sent What is Cyclic Redundancy Check. CRC An error detection method in which a predefined mathematical operation is used to calculate a CRC Code. The sender attaches the CRC to a block of data and transmits. The receiver calculate its own CRC for the data and compares to the transmitted CRC. if values match then considered unaltered Which protocol is used by communication between two machines?TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP is also used as a communications protocol in a private computer network (an intranet or extranet).
What is TCP used for?TCP is used for organizing data in a way that ensures the secure transmission between the server and client. It guarantees the integrity of data sent over the network, regardless of the amount. For this reason, it is used to transmit data from other higher-level protocols that require all transmitted data to arrive.
What is TCP and HTTP?Hypertext Transfer Protocol (HTTP) and Transmission Control Protocol (TCP) are both computer protocols involved in the transfer of data, but while they individually serve their own purpose, they have a close relationship.
What is TCP and UDP protocol in networking?TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. A key difference between TCP and UDP is speed, as TCP is comparatively slower than UDP. Overall, UDP is a much faster, simpler, and efficient protocol, however, retransmission of lost data packets is only possible with TCP.
|