1. Trang chủ
  2. » Công Nghệ Thông Tin

CCNA 1 and 2 Companion Guide, Revised (Cisco Networking Academy Program) part 51 ppt

10 370 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 545,93 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

protocol stack A set of related communications protocols that operate together and, as a group, address communication at some or all of the seven layers of the OSI refer-ence model.. Not

Trang 1

protocol stack A set of related communications protocols that operate together and,

as a group, address communication at some or all of the seven layers of the OSI

refer-ence model Not every protocol stack covers each layer of the model, and often a single

protocol in the stack addresses a number of layers at once TCP/IP is a typical protocol

stack

routed protocol Any network protocol that provides enough information in its

net-work layer address to allow a packet to be forwarded from one host to another host

based on the addressing scheme

router A network-layer device that uses one or more metrics to determine the optimal

path along which network traffic should be forwarded Routers forward packets from

one network to another based on network-layer information contained in routing

updates Occasionally called a gateway (although this definition of gateway is becoming

increasingly outdated)

Routing Information Protocol (RIP) An IGP supplied with UNIX BSD systems The

most common IGP in the Internet RIP uses hop count as a routing metric

routing metric A method by which a routing algorithm determines that one route is

better than another This information is stored in routing tables and is sent in routing

updates Metrics include bandwidth, communication cost, delay, hop count, load,

MTU, path cost, and reliability Sometimes simply called a metric.

routing protocol A protocol that accomplishes routing through the implementation of

a specific routing algorithm Examples of routing protocols are IGRP, OSPF, and RIP

routing table A table stored in a router or some other internetworking device that

keeps track of routes to particular network destinations and, in some cases, metrics

associated with those routes

subnet address A portion of an IP address that is specified as the subnetwork by the

subnet mask

subnet mask A 32-bit address mask used in IP to indicate the bits of an IP address

that are used for the subnet address Sometimes simply called a mask.

subnetwork 1 In IP networks, a network sharing a particular subnet address

Sub-networks are Sub-networks arbitrarily segmented by a network administrator to provide

a multilevel, hierarchical routing structure while shielding the subnetwork from the

addressing complexity of attached networks Sometimes called a subnet 2 In OSI

net-works, a collection of ESs and ISs under the control of a single administrative domain

and using a single network access protocol

Trang 2

Check Your Understanding

Complete all the review questions to test your understanding of the topics and con-cepts in this chapter Answers are listed in Appendix C, “Check Your Understanding Answer Key.”

1. How many bits are in an IP address?

D. None of the above

2. What is the maximum value of each octet in an IP address?

D. None of the above

3. The network number plays what part in an IP address?

A. It specifies the network to which the host belongs

B. It specifies the identity of the computer on the network

C. It specifies which node on the subnetwork is being addressed

D. It specifies which networks the device can communicate with

4. The host number plays what part in an IP address?

A. It designates the identity of the computer on the network

B. It designates which node on the subnetwork is being addressed

C. It designates the network to which the host belongs

D. It designates which hosts the device can communicate with

5. What is the decimal equivalent of the binary number 101101?

Trang 3

6. Convert the decimal number 192.5.34.11 to its binary form.

A. 11000000.00000101.00100010.00001011

B. 11000101.01010111.00011000.10111000

C. 01001011.10010011.00111001.00110111

D. 11000000.00001010.01000010.00001011

7. Convert the binary IP address 11000000.00000101.00100010.00001011 to its

decimal form

A. 190.4.34.11

B. 192.4.34.10

C. 192.4.32.11

D. None of the above

8. What portion of the Class B address 154.19.2.7 is the network address?

B. 154.19

C. 154.19.2

D. 154.19.2.7

9. What portion of the IP address 129.219.51.18 represents the network?

A. 129.219

D. 1

10. Which of the following addresses is an example of a broadcast address on the

network 123.10.0.0 with a subnet mask of 255.255.0.0?

A. 123.255.255.255

B. 123.10.255.255

C. 123.13.0.0

D. 123.1.1.1

Trang 4

11. How many host addresses can be used in a Class C network?

12. How many subnets can a Class B network have?

D. None of the above

13. What is the minimum number of bits that can be borrowed to form a subnet?

A. 1

B. 2

C. 4

D. None of the above

14. What is the primary reason for using subnets?

A. To reduce the size of the collision domain

B. To increase the number of host addresses

C. To reduce the size of the broadcast domain

D. None of the above

15. How many bits are in a subnet mask?

D. None of the above

16. Performing the Boolean function as a router would on the IP addresses 131.8.2.5

and 255.0.0.0, what is the network/subnetwork address?

A. 131.8.1.0

B. 131.8.0.0

C. 131.8.2.0

D. None of the above

Trang 5

17. How many bits can be borrowed to create a subnet for a Class C network?

A. 2

B. 4

C. 6

D. None of the above

18. With a Class C address of 197.15.22.31 and a subnet mask of 255.255.255.224,

how many bits have been borrowed to create a subnet?

A. 1

B. 2

C. 3

D. None of the above

19. Performing the Boolean function as a router would on the IP addresses

172.16.2.120 and 255.255.255.0, what is the subnet address?

A. 172.0.0.0

B. 172.16.0.0

C. 172.16.2.0

D. None of the above

20. Which of the following best describes one function of Layer 3, the network layer,

in the OSI model?

A. It is responsible for reliable network communication between nodes

B. It is concerned with physical addressing and network topology

C. It determines which is the best path for traffic to take through the network

D. It manages data exchange between presentation layer entities

21. What function allows routers to evaluate available routes to a destination and to

establish the preferred handling of a packet?

A. Data linkage

B. Path determination

C. SDLC interface protocol

D. Frame Relay

Trang 6

22. How does the network layer forward packets from the source to the destination?

A. By using an IP routing table

B. By using ARP responses

C. By referring to a name server

D. By referring to the bridge

23. What are the two parts of a network layer address that routers use to forward traffic through a network?

A. Network address and host address

B. Network address and MAC address

C. Host address and MAC address

D. MAC address and subnet mask

Trang 8

Upon completion of this chapter, you will be able to

■ Describe the functions of the TCP/IP transport layer

■ Describe flow control

■ Describe the processes of establishing a connection between peer systems

■ Describe windowing

■ Describe acknowledgment

■ Identify and describe transport layer protocols

■ Describe the Transmission Control Protocol (TCP) header format and port numbers

■ Describe the User Datagram Protocol (UDP) header format and port numbers

Trang 9

Chapter 9

TCP/IP Transport and Application Layer

The transport layer uses the services provided by the network layer, such as best-path selection and logical addressing, to provide end-to-end communication between source and destination This chapter describes how the transport layer regulates the flow of information from source to destination reliably and accurately The primary characteristics

of the transport layer are discussed, including the following:

■ The transport layer data stream is a logical connection between the endpoints of a network

■ End-to-end control and reliability are provided by sliding windows, sequencing numbers, and acknowledgments

■ Layer 4 protocols TCP and UDP use portnumbers to keep track of different conver-sations that cross the network at the same time, and to pass information to the upper layers

The primary characteristics of the TCP/IP application layer include the following:

■ End-user applications reside at this layer

■ Commonly used applications include NFS, DNS, ARP, rlogin, talk, FTP, NTP, and traceroute

Please be sure to look at this chapter’s associated e-Lab Activities, Videos, and Photo-Zooms that you will find on the CD-ROM accompanying this book These CD elements are designed to supplement the material and reinforce the concepts introduced in this chapter

Trang 10

Understanding the TCP/IP Transport Layer

The phrase “quality of service” often is used to describe the purpose of Layer 4, the transport layer UDP, which is covered later, also operates at Layer 4 and provides con-nectionless transport services However, the primary protocol operating at this layer

is connection-oriented TCP Its main function is to transport and regulate the flow of information from source to destination reliably and accurately The primary duties of the transport layer are to provide end-to-end control, to provide flow control via slid-ing windows, and to ensure reliability via sequencslid-ing numbers and acknowledgments

To understand reliability and flow control, think of a person who speaks really fast In conversation, the listener might need to ask this person to repeat some words if they are not understood (for reliability) and to speak slowly, so the listener can catch the words (flow control), as shown in Figure 9-1

Figure 9-1 Transport Layer Analogies

The transport layer provides transport services from the source host to the destina-tion host It constitutes a logical connecdestina-tion between the endpoints of the network Transport services segment and reassemble data that is sent by several upper-layer

applications onto the same transport layer data stream This transport layer data

stream provides end-to-end transport services

The transport layer data stream is a logical connection between the endpoints of a net-work The transport layer defines end-to-end connectivity between host applications Figure 9-2 illustrates the transport layer

Spanish (Primary Language) English (One Year of Study)

Slower Language Comprehensive Speed

English (Only Language)

Ngày đăng: 04/07/2014, 18:20

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN