General discussion

  • Creator
    Topic
  • #2259435

    SENJINspace

    Locked

    by senjininternet ·

    blog root

All Comments

  • Author
    Replies
    • #3110494

      TCP/IP QUIZ

      by senjininternet ·

      In reply to SENJINspace

      CSCi16 LAB EXAM SUPPLEMENT

       

      How to Use the Ping Command

      Pinging is a command
      which tells you if the connection between your computer and a particular domain
      is working correctly.In Windows, select Start > Programs > Accessories
      > Command Prompt
      . This will give you a window like the one below.Enter
      the word ping, followed by a space, then the domain name.If the results
      show a series of replies, the connection is working. The time shows you how
      fast the connection is. If you see a “timed out” error instead of a
      reply, there is a breakdown somewhere between your computer and the domain. In
      this case the next step is to perform a traceroute.

      Ping



      How
      to use
      Ping.

      The PING command is a tool built into Windows that can give you useful
      information on the nature of your Internet connection.
      PING allows you to see if
      a particular IP address or a particular Domain name exists on the Internet and
      is actively returning
      PING requests.

      To run PING you’ll need to open a Command line.

      Once you have your command line open type in Ping, followed by a space
      and then the IP address or domain name that you want to test. e.g.

      ping pop3.xtra.co.nz
      ping 203.96.92.132

      A normal reply will give you four lines of responses, plus four lines of
      summary like this:

      Reply from
      203.96.92.132: bytes=32 time=100ms TTL=252
      Reply from 203.96.92.132: bytes=32 time=100ms TTL=252
      Reply from 203.96.92.132: bytes=32 time=100ms TTL=252
      Reply from 203.96.92.132: bytes=32 time=100ms TTL=252

      Ping statistics for 203.96.92.132:
      Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
      Approximate round trip times in milli-seconds:
      Minimum = 100ms, Maximum = 100ms, Average = 100ms

      These results tell you that four
      test packets were sent out of 32 bytes each in size and came back from
      203.96.92.132 in a time of 100ms. The TTL figure stands for time to live and
      defines how long your
      Ping requests bounce around before expiring.

      Ping Options.

      The Ping command can be used with the following switches. To add a switch to
      the command just add it after a space. e,g,

      Ping -t
      Ping -t -a

      Options:

      -t Ping the specified host until
      stopped. Stop with CTRL and C.
      -a Resolve addresses to
      hostnames.
      -n count Number of echo requests
      to send.
      -l size Send buffer size.
      -f Set Don’t Fragment flag in
      packet.
      -i TTL Time To Live.
      -v TOS Type Of Service.
      -r count Record route for count
      hops.
      -s count Timestamp for count
      hops.
      -j host-list Loose source route
      along host-list.
      -k host-list Strict source route
      along host-list.
      -w timeout Timeout in
      milliseconds to wait for each reply.

      For more help with Ping type in ping /? and press Enter
      from your command line.

      Ping Errors

      You might receive one or more of these errors when using the PING command:

      Bad IP Address
      Ping transmit failed, error code 65
      Ping transmit failed, error code 10091
      Ping transmit failed, error code 10043
      No Route to Host
      Destination Host Unreachable
      Unable to initialize Windows Socket Interface, Error Code 6

       

      How Ping was invented. The original PING command stood for “Packet Internet Groper”, and was a
      package of diagnostic utilities used by DARPA personnel
      to test the performance of the ARPANET.
      However, the modern Internet
      Ping command refers to a program was written by Mike Muuss in December, 1983, which has
      since become one of the most versatile and widely used diagnostic tools on the
      Internet. Muuss named his program after the sonar sounds used for echo-location
      by submarines and bats; just like in old movies about submarines, sonar probes
      do sound something like a metallic “ping”.

      How Ping works. The Internet Ping program works much like a sonar echo-location, sending a small packet
      of information containing an ICMP
      ECHO_REQUEST to a specified computer, which then sends an ECHO_REPLY packet in
      return. The IP address 127.0.0.1 is set by convention to always indicate your
      own computer. Therefore, a ping to that address will always ping yourself and
      the delay should be very short. This provides the most basic test of your local
      communications.

      Using the ping command>>> If you are
      having connectivity problems, you can use the ping command to check the
      destination IP address you want to reach and record the results. The ping
      command displays whether the destination responded and how long it took to
      receive a reply. If there is an error in the delivery to the destination, the
      ping command displays an error message.

      You can
      use the ping command to:

      ?

      Ping
      your computer (by address, not host name) to determine that TCP/IP is
      functioning. (Pinging your computer does not verify that your network adapter
      is functioning.)

      ?

      Ping
      the local router to determine whether the router is running.

      ?

      Ping
      beyond your local router.

       

      Ping

       

      Using the PING command allows you to check
      latency and connectivity to a known website or IP address, provided the
      destination allows ICMP requests.

      Using PING requires you to be at the Windows COMMAND Prompt:
      Windows 98: Start – Run – command
      Windows 2000: Start – Run – cmd

      Our firewall does not allow pings and tracert directly to any domain or
      server.

      Advanced Users

      The ping command helps to verify IP-level connectivity. When troubleshooting,
      you can use ping to send an ICMP echo request to a target host name or IP
      address. Use ping whenever you need to verify that a host computer can
      connect to the TCP/IP network and network resources. You can also use ping to
      isolate network hardware problems and incompatible configurations.

      It is usually best to verify that a route exists between the local computer
      and a network host by first using the ping command and the IP address of the
      network host to which you want to connect. Try pinging the IP address of the
      target host to see if it responds, as follows:

      ping 216.115.108.245

      You should perform the following steps when using ping:

      Ping the loopback address to verify that TCP/IP is installed and
      configured correctly on the local computer.

      ping 127.0.0.1

      Ping the IP address of the local computer to verify that it was added to the
      network correctly.

      ping IP_address_of_local_host

      Ping the IP address of the default gateway to verify that the default
      gateway is functioning and that you can communicate with a local host on the
      local network.

      ping IP_address_of_default_gateway

      Ping the IP address of a remote host to verify that you can communicate
      through a router.

      ping IP_address_of_remote_host

      The ping command uses Windows Sockets?style name resolution to resolve a
      computer name to an IP address, so if pinging by address succeeds, but
      pinging by name fails, then the problem lies in address or name resolution,
      not network connectivity.

      If you cannot use ping successfully at any point, confirm that:

      The computer was restarted after TCP/IP was installed and configured.

      The IP address of the local computer is valid and appears correctly on the
      General tab of the Internet Protocol (TCP/IP) Properties dialog box.

      IP routing is enabled and the link between routers is operational.

      You can use different options with the ping command to specify the size of
      packets to use, how many packets to send, whether to record the route used,
      what Time-to-Live (TTL) value to use, and whether to set the “don’t
      fragment” flag. You can type ping ?? to see these options.

      The following example illustrates how to send two pings, each 1,450 bytes in
      size, to IP address 172.16.48.10:

      C:\>ping -n 2 -l 1450 172.16.48.10
      Pinging 172.16.48.10 with 1450 bytes of data:

      Reply from 172.16.48.10: bytes=1450 time<10ms TTL=32
      Reply from 172.16.48.10: bytes=1450 time<10ms TTL=32

      Ping statistics for 157.59.8.1:
      Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
      Approximate roundtrip times in milli-seconds:
      Minimum = 0ms, Maximum = 10ms, Average = 2ms
      By default, ping waits 1,000 ms (1 second) for each response to be returned
      before displaying the “Request Timed Out” message. If the remote
      system being pinged is across a high-delay link, such as a satellite link,
      responses may take longer to be returned. You can use the ?w (wait) option to
      specify a longer time-out.

       

      To test a TCP/IP configuration by using the
      ping command

      1.

      To
      quickly obtain the TCP/IP configuration of a computer, open Command Prompt,
      and then type ipconfig. From
      the display of the ipconfig
      command, ensure that the network adapter for the TCP/IP configuration you are
      testing is not in a Media disconnected
      state.

      2.

      At
      the command prompt, ping the loopback address by typing ping 127.0.0.1.

      3.

      Ping
      the IP address of the computer.

      4.

      Ping
      the IP address of the default gateway.

      If
      the ping command fails, verify
      that the default gateway IP address is correct and that the gateway (router)
      is operational.

      5.

      Ping
      the IP address of a remote host (a host that is on a different subnet).

      If
      the ping command fails, verify
      that the remote host IP address is correct, that the remote host is
      operational, and that all of the gateways (routers) between this computer and
      the remote host are operational.

      6.

      Ping
      the IP address of the DNS server 

      If
      the ping command fails, verify
      that the DNS server IP address is correct, that the DNS server is
      operational, and that all of the gateways (routers) between this computer and
      the DNS server are operational.

      Note

      ?

      To
      open command prompt, click Start,
      point to All Programs, point
      to Accessories, and then click
      Command Prompt. 

      ?

      If
      the ping command is not found
      or the command fails, you can use Event Viewer to check the System Log and
      look for problems reported by Setup or the Internet Protocol (TCP/IP)
      service.

      ?

      The
      ping command uses Internet Control Message Protocol (ICMP) Echo Request and
      Echo Reply messages. Packet filtering policies on routers, firewalls, or
      other types of security gateways might prevent the forwarding of this
      traffic.

      ?

      The
      ipconfig command is the command-line equivalent to the winipcfg command,
      which is available in Windows Millennium Edition, Windows 98,
      and Windows 95. Windows XP does not include a graphical equivalent
      to the winipcfg command; however, you can get the equivalent functionality
      for viewing and renewing an IP address by opening Network Connections,
      right-clicking a network connection, clicking Status, and then clicking the Support tab.

      Used
      without parameters, ipconfig displays the IP address, subnet mask, and
      default gateway for all adapters.

      ?

      To
      run ipconfig, open the command prompt, and then type ipconfig.

      ?

      To
      open Network Connections, click Start,
      click Control Panel, click Network and Internet Connections,
      and then click Network Connections. 

       

       

      *** NOTE: Windows 2000, Windows XP and above users do
      not have winipcfg. Instead, use ipconfig.

       

      A response of “Request timed out” means there
      was no response to the ping attempt in the default time period of one second.
      If the latency of the response is more than one second. Use the -w option on
      the ping command to increase the time-out. For example, to allow responses
      within five seconds, use ping -w 5000.

       

      TCP/IP Basics, the PING command   >>> 

      PING Introduction
      Once you have allocated an IP address to your network card,
      it is possible to test that there is some rudimentary communication between it
      and you. To do this we can use the
      PING command.

      The PING command sends some simple TCP/IP data to the device that you specify,
      if the device is configured correctly, it will answer back. If you get an
      answer back, then there is a good chance that you have configured your card
      correctly. If there isn’t a response, then you can assume that there will be a
      problem.

      To use the PING command do the following:

      PING ip_address

      Where IP address is the IP address of the device you
      wish to test.

      For example:

      ping

      If the IP address you specify is correct, you will see
      something like this:

      ping with reply

      From this we can see that we have had a reply from the
      device (220.0.0.180). Which means that we can conclude that there isn’t a
      problem.

      There are many PING parameters, and some implementations of PING perform differently to others. For
      example, on some systems if you use the
      PING command, it will constantly send
      packets of data to the specified device until you break out of the process.
      With Windows 95 and NT, the
      PING command tries to communicate with the device four times, after which it
      gives up.

      To see how your PING command works, use the PING command on
      its own, if you’re on a Unix system enter man ping. Assuming that you’re using
      Windows 95 you will see the following:

      From this information, we can see that if we use PING command with a -t switch, the PING process will continue until the
      process is interrupted. For example, the command:
      PING 220.0.0.180 -t, will force Windows
      95 to repeatedly attempt to communicate with the device 220.0.0.180.

      Troubleshooting
      If there are problems with devices that your attempting to
      communicate, you will get error messages.

      ping timeout

      In the above example, we get four “Request timed
      out.” error messages. This tells us that there is a problem with the
      device we have tried to communicate with. There are four possible reasons for
      this:

      We did not specify the correct IP address:
      Check that the IP address that we are specifying is the same as the IP address
      of the network card.

      The IP address we specified is not set in the device we wish
      to communicate with:
      Check that the device IP address is what it is supposed to be.

      There is a problem with the cabling.
      There is a possibility that there is a problem with the cabling, if there is
      another device on the same segment of cabling that uses TCP/IP, see if you can
      communicate with that device using the
      PING command. If you can, then it is a
      card related problem, if you can’t, there is a good possibility that there is
      something wrong with your cabling.

      The device that we are attempting to communicate with is on
      the other end of a router/gateway:
      If the device is not physically attached to the segment of cabling that you are
      using, check to see if it has a gateway IP address set in the card. If it
      doesn’t then this could explain why it is not possible to communicate.

      TCP/IP QUIZ

      1)
      Which of the following is a utility used to view current network settings for
      all ip (nic) adapters on a device?


      winipcfg (correct answer) 

      Feedback:
      ipconfig/winipcfg — utilities used to view current network settings for all ip
      (nic) adapters on a device; can be used to view the MAC address, IP address,
      and gateway.


      2) Any traffic bound for a(n)  FTPTelnetSMTPDNSTFTPSNMP application uses
      the standard port number 69


      TFTP (correct answer)


       
      3) If you want to map the name “highbury” to the IP address
      120.5.235.0, which command would you use?


      ip host highbury 120.5.235.0 (correct answer)


      X) Novell’s suite of protocols IPX/SPX is the de facto standard for
      internetwork communications and is the transport protocol for the Internet.


      False (correct answer)

      Feedback:
      TCP/IP is the de facto standard for internetwork communications and serves as
      the transport protocol for the Internet, enabling millions of computers to
      communicate globally.


       
      5) What is the TCP/IP stack Internetwork Layer protocol that determines network
      addresses when data link layer addresses are known?


      RARP (correct answer)


      6) Select the 3 layers of the OSI model most closely affected by TCP/IP Choose
      all that apply.


      Layer 7 (correct answer)
      ?  Layer 4 (correct answer)
      ?  Layer 3 (correct answer)

      Feedback:
      The layers most closely affected by TCP/IP are Layer 7 (application), Layer 4
      (transport), and Layer 3 (network). Included in these layers are other types of
      protocols with a variety of purposes/functions, all of which are related to the
      transfer of information
       
       
      7) 172.10.10.6/24 is another way of writing 172.10.10.6 255.255.255.0


      True (correct answer)

      Feedback:
      Both methods indicate that 8 bits have been borrowed from the Class B network
      address


      8) Port numbers are used to keep track of different conversations that cross
      the network at the same time.


      True (correct answer)

      Feedback:
      Both TCP and UDP use port (or socket) numbers to pass information to the upper
      layers. Port numbers are used to keep track of the different conversations that
      cross the network at the same time.


      9) What is the reliable connection-oriented TCP/IP stack Application Layer
      protocol that deals with the transfer of files between systems?


      FTP (correct answer)

      Feedback:
      FTP (File Transfer Protocol) is a reliable connection-oriented service that
      uses TCP to transfer files between systems that support FTP. It supports
      bi-directional binary file and ASCII file transfers.


      10) What is the unreliable connectionless TCP/IP stack Application Layer
      protocol that enables users to remotely connect to routers to enter
      configuration commands?


      Telnet (correct answer)

      Feedback:
      Telnet is a standard terminal emulation protocol used by clients for the
      purpose of making remote terminal connections to Telnet server services;
      enables users to remotely connect to routers to enter configuration commands.


      11) Any traffic bound for a(n)  FTPTelnetSMTPDNSTFTPSNMP application uses
      the standard port number 25


      SMTP (correct answer)


      12) Any traffic bound for a(n)  FTPTelnetSMTPDNSTFTPSNMP application uses
      the standard port number 21


      FTP (correct answer)


      13) What is the TCP/IP stack Internetwork Layer protocol that determines the
      data link layer address for known IP addresses?


      ARP (correct answer)


      Feedback: To determine a destination MAC address for a datagram, a table called
      the ARP cache is checked. If the address is not in the table, ARP sends a
      broadcast that will be received by every station on the network, looking for
      the destination station.


      1X) What is the TCP/IP stack Application Layer protocol that deals with Name
      Management?


      DNS (correct answer)

      Feedback:
      Domain Naming System. System used in the Internet for translating names of
      network nodes into addresses


      15) What is the TCP/IP stack Application Layer protocol that deals with remote
      file access across a network?


      NFS (correct answer)

      Feedback:
      Network File System. As commonly used, a distributed file system protocol suite
      developed by Sun Microsystems that allows remote file access across a network.
      In actuality, NFS is simply one protocol in the suite. NFS protocols include
      NFS, RPC, XDR (External Data Representation), and others. These protocols are
      part of a larger architecture that Sun refers to as ONC.


      16) Which of the following is a utility used to troubleshoot NetBIOS name
      resolution?


      NBTstat (correct answer)

      Feedback:
      NBTSTAT — a utility used to troubleshoot NetBIOS name resolution; used to view
      and remove entries from the name cache.


      17) What does the command “no ip domain-lookup” do?


      Turns off “Name to Address Translation” (NAT) on the router (correct
      answer)

      18)
      What does the “trace” command do?


      Finds failures in the path from source to destination (correct answer)


      19) Any traffic bound for a(n)  FTPTelnetSMTPDNSTFTPSNMP application uses
      the standard port number 53


      DNS (correct answer)

      20)
      What is the TCP/IP stack Internetwork Layer protocol that provides control and
      messaging capabilities?


      ICMP (correct answer)

      Feedback:
      Internet Control Message Protocol. OSI Model Network layer Internet protocol
      that reports errors and provides other information relevant to IP packet
      processing.


      21) Which of the following is a utility that provides information about TCP/IP
      statistics?


      NETstat (correct answer)

      Feedback:
      NETSTAT — a utility that provides information about TCP/IP statistics; can be
      used to provide information about the status of TCP/IP connections and
      summaries of ICMP, TCP, and UDP.


      22) What is the TCP/IP stack Internetwork Layer protocol that provides
      connectionless, best-effort delivery routing of datagrams?


      IP (correct answer)

      Feedback:
      IP — provides connectionless, best-effort delivery routing of datagrams; is
      not concerned with the content of the datagrams; looks for a way to move the
      datagrams to their destination


      23) Any traffic bound for a(n)  FTPTelnetSMTPDNSTFTPSNMP application uses
      the standard port number 161


      SNMP (correct answer)


      2X) The TCP/IP suite of protocols was developed by DARPA


      True (correct answer)

      Feedback:
      The TCP/IP suite of protocols was developed as part of the research done by the
      Defense Advanced Research Projects Agency (DARPA). It was originally developed
      to provide communication through DARPA.


      25) What does the “telnet” command do?


      Verifies the application layer software between source and destination stations
      (correct answer)


      26) What information does the “show hosts” command display?


      displays a cached list of host names and address (correct answer)


      27) TCP/IP can only be used with LANs


      False (correct answer)

      Feedback:
      TCP/IP can be used with both LANs and WANs, it allows communication among a
      variety of interconnected networks and is the de facto standard for the
      Internet


      28) What does the command “ip domain-lookup” do?


      Turns on “Name to Address Translation” (NAT) on the router (correct
      answer)


      29) Which of the following is a Layer 4 protocol that delivers traffic but
      provides no checking and so has the advantage of speed?


      UDP (correct answer)

      Feedback:
      UDP — connectionless and unreliable; although responsible for transmitting
      messages, no software checking for segment delivery is provided at this layer.
      The advantage that UDP provides is speed. Since UDP provides no
      acknowledgments, less traffic is sent across the network, making the transfer
      faster.

      30)
      What is the TCP/IP stack Application Layer protocol that provides a means to
      monitor and control network devices?


      SNMP (correct answer)


      Feedback: SNMP (Simple Network Management Protocol) is a protocol that provides
      a means to monitor and control network devices, and to manage configurations,
      statistics collection, performance and security.

       
      31) How many bits are there in an IP address?


      32 (correct answer)

       
      32) Which of the following is a diagnostic utility used to determine whether a
      computer is properly connected to devices/Internet?


      PING (correct answer)

      Feedback:
      PING (Packet Internet Groper) is a diagnostic utility used to determine whether
      a computer is properly connected to devices/Internet.

       
      33) Any traffic bound for a(n)  FTPTelnetSMTPDNSTFTPSNMP application uses
      the standard port number 23


      Telnet (correct answer)

       
      3X) Another name for a port number is “socket” number


      True (correct answer)

      35) TCP
      sequence and acknowledgment numbers provide sequencing of segments with a
      forward reference acknowledgment; number datagrams before transmission; and
      reassemble the segments into a complete message?


      True (correct answer)

      36) The
      TCP/IP protocol suite is important in networking because: Choose all that
      apply.


      TCP/IP is a universally available protocol that you likely will use at work
      (correct answer)
      ?  TCP/IP is a useful reference for understanding other protocols because
      it includes elements that are representative of other protocols. (correct
      answer)
      ?  TCP/IP is important because the router uses it as a configuration tool.
      (correct answer)

      Feedback:
      The function of the TCP/IP protocol stack, or suite, is the transfer of
      information from one network device to another. In doing so, it closely maps
      the OSI reference model in the lower layers, and supports all standard physical
      and data link protocols

       
      37) Which of the following is a Layer 4 protocol that provides flow control and
      sequencing?


      TCP (correct answer)

      Feedback:
      TCP — a connection-oriented, reliable protocol; provides flow control by
      providing sliding windows, and reliability by providing sequence numbers and
      acknowledgments.

       
      38) What is the unreliable connectionless TCP/IP stack Application Layer
      protocol that deals with the transfer of files between systems?


      TFTP (correct answer)

      Feedback:
      TFTP (Trivial File Transfer Protocol) is a connectionless unreliable service
      that uses UDP to transfer files between systems that support the TFTP. It is
      useful in some LANs because it operates faster than FTP in a stable environment

       
      39) If a source is using a window size that is too large for the destination
      and does not receive an acknowledgement from the destination it will resend its
      data?


      True (correct answer)

       
      X0) How many bytes are there in an IP address?


      4 (correct answer)

       
      X1) How many octets are there in an IP address?


      4 (correct answer)

      X2)
      What is the TCP/IP stack Application Layer protocol that governs the
      transmission of e-mail over computer networks?


      SMTP (correct answer)

      Feedback:
      SMTP (Simple Mail Transport Protocol) governs the transmission of e-mail over
      computer networks. It does not provide support for transmission of data other
      than plain text.

       
      X3) Which of the following is a programme that traces the path a packet takes
      to a destination?


      Trace (correct answer)

      Feedback:
      Traceroute traces the path a packet takes to a destination, and is used to
      debug routing problems

      Quiz: TCP/IP

       


       

       

       

      DEFINITION– This week’s
      quiz has a slightly different format. Your goal will be to match the correct
      term in the left-hand column with its description in the right-hand column.

      How to take the quiz:
      – After reading the question, click on the answer that you think is correct
      to go to the whatis.com definition. If the answer you ve chosen is correct,
      you will see the question text somewhere in the defintion.
      OR
      – After reading the question, write down the letter of your answer choice on
      scrap paper. Check your answers by using the answer key at the end of the
      quiz.

      .a) UDP

      .e) Internet
      Protocol

      .f) Winsock

      .h) packet

      .i) stack

      .l) FTP

      .n) firewall

      .o) MBone

       .t) DHCP

       .w) Transport
      layer

      DEFINE LATER??..

      j) Transmission
      Control Protocol

      k) ping

      p) dot
      address

      q) Border
      Gateway Protocol

      r) domain
      name system

      s) Server
      Message Block Protocol

      v) subnet

      1._____ This is the
      telecommunication protocol that all computers must use to be part of the
      Internet.

      2. _____This adaptation of the Berkeley
      UNIX sockets interface (and its supporting program) handles input/output
      requests for Internet applications that use Windows.

      3._____ This works closely with a router
      program to examine each network packet and determine whether it should be
      forwarded toward its destination.

      4._____ This is one of two protocols that
      let a network administrator supervise and distribute IP addresses from a
      central point. It automatically sends a new IP address when a computer is plugged
      into a different place in the network.

      5. _____This OSI layer divides a file
      into segments that are an efficient size for routing.

      6. _____This is an application protocol
      that uses the Internet’s TCP/IP protocols to transfer Web page files to a server.
      It’s also used to download programs and other files from a server to your
      computer.

      7._____ Unlike TCP, this alternative
      method of data exchange does not provide the service of dividing a message
      into packets and reassembling it at the other end, but instead relies on
      the application program to make sure that the entire message has arrived
      and is in the right order.

      8._____ This was set up in 1994 to form a
      network within the Internet that could use TCP/IP to transmit multicasts of
      audio and video data in much the same way that radio and TV programs are
      broadcast over airwave.

      9._____ This term is sometimes used to
      describe the TCP/IP software.

      10._____ Each one of these is separately
      numbered, includes the Internet address of its destination, and travels by
      different routes through the Internet.

      ANSWER KEY: 1E; 2F; 3N; 4T; 5W; 6L; 7A; 8O; 9I; 10H

       

       

       

       

       

      1. How should you use the Ping utility to determine
      whether the NIC in your local computer is functioning properly? (Select all choices
      that are correct.)


      a. You should ping the local loopback address.

      b. You should ping your local Internet Protocol (IP) address.

      c. You should ping a node on your network.

      d. You should ping a node on a remote network.


       

      X. Which protocol allows hosts on a TCP/IP network to communicate using
      either parallel or serial connections? (Select the best choice.)


      a. DHCP

      b. PPP

      c. SLIP

      d. TCP

      Answers:

      1) Only choices b, c and d are correct. You should use
      the Ping utility to ping the IP address of your local
      computer, a node on your network or a node on a remote network to determine
      whether the computer’s NIC is functioning properly. If these troubleshooting
      steps do not work, then you can try either reinstalling TCP/IP or installing a
      new NIC in the computer. If you use the Ping utility to
      ping the local loopback address of 127.0.0.1, then you can determine whether
      the TCP/IP stack is properly configured on the local computer.

      X) Choice b is correct. Point-to-Point Protocol (PPP) allows hosts to
      communicate by using TCP/IP over serial or parallel links. PPP is easy to
      configure because, when a PPP client connects to a router, the router uses the
      Dynamic Host Configuration Protocol (DHCP) to assign the client computer an
      Internet Protocol (IP) address, a subnet mask and a default gateway. PPP is
      more processor-intensive than its predecessor, Serial Line Internet Protocol
      (SLIP). As the name suggests, SLIP is capable of serial communications only.
      TCP/IP communications can be either connection-oriented or connectionless.
      Connection-oriented communications, which guarantee packet delivery, are
      performed by Transmission Control Protocol (TCP). User Datagram Protocol (UDP)
      provides connectionless communications, which are faster but are not guaranteed
      to transmit successfully.

      MISC
      TERMS

      A

      B

      TCP/IP enables communication among any

      set of interconnected networks and is equally
      well suited for both LAN and WAN communication

      The function of the TCP/IP protocol stack, or
      suite, is

      the transfer of information from one network
      device to another

      DNS (Domain Name System) is a system used in
      the Internet for

      translating names of domains and their
      publicly advertised network nodes into addresses

      HOSTS

      a file created by network administrators and
      maintained on servers. They are used to provide static mapping between IP
      addresses and computer names

      SMTP (Simple Mail Transport Protocol)

      governs the transmission of e-mail over
      computer networks. It does not provide support for transmission of data
      other than plain text

      SNMP (Simple Network Management Protocol)

      a protocol that provides a means to monitor
      and control network devices, and to manage configurations, statistics
      collection, performance and security

      FTP (File Transfer Protocol)

      a reliable connection-oriented service that
      uses TCP to transfer files between systems that support FTP. It supports
      bi-directional binary file and ASCII file transfers

      TFTP (Trivial File Transfer Protocol)

      a connectionless unreliable service that uses
      UDP to transfer files between systems

      HTTP (Hypertext Transfer Protocol)

      is the Internet standard that supports the
      exchange of information on the World Wide Web and supports many different
      file types, including text, graphic, sound, and video

      Telnet

      a standard terminal emulation protocol used by
      clients for the purpose of making remote terminal connections

      PING (Packet Internet Groper)

      a diagnostic utility used to determine whether
      a computer is properly connected to devices/Internet.

      Traceroute

      traces the path a packet takes to a
      destination, and is used to debug routing problems

      Windows-based protocol: NETSTAT

      a utility that provides information about
      TCP/IP statistics; can be used to provide information about the status of
      TCP/IP connections and summaries of ICMP, TCP, and UDP.

      Windows-based protocol: ipconfig/winipcfg

      utilities used to view current network
      settings for all ip (nic) adapters on a device; can be used to view the MAC
      address, IP address, and gateway

      The two transport layer protocols

      TCP and UDP

      TCP

      a connection-oriented, reliable protocol;
      provides flow control by providing sliding windows, and reliability by
      providing sequence numbers and acknowledgments

      The advantage of TCP

      it provides guaranteed delivery of the
      segments

      UDP

      connectionless and unreliable; although
      responsible for transmitting messages, no software checking for segment
      delivery is provided at this layer

      The advantage of UDP

      speed

      Protocols that use UDP

      TFTP, SNMP, DNS, NFS

      Port numbers

      used to keep track of the different
      conversations that cross the network at the same time

      FTP port number

      21

      Telnet port number

      23

      DNS port number

      53

      Port numbers below 255 are

      used for public applications

      Port numbers above 1023 are

      unregulated

      TCP/IP Internet layer protocols

      IP, ICMP, ARP, RARP

      IP

      provides connectionless, best-effort delivery
      routing of datagrams

      ICMP

      provides control and messaging capabilities

      ARP

      determines the data link layer address for
      known IP addresses

      RARP

      determines network addresses when data link
      layer addresses are known

      ICMP messages are carried in IP datagrams and
      are used to

      send error and control messages

      If a router receives a packet that it is
      unable to deliver to its final destination, the router

      sends an ICMP unreachable message to the
      source

      If the destination address is not in the ARP
      table, ARP sends

      a broadcast that will be received by every
      station on the network, looking for the destination station.

      The transport layer performs two functions:

      Flow control, which is provided by sliding
      windows and reliability, which is provided by sequence numbers and
      acknowledgments

      RARP relies on the presence of a

      RARP server with a table entry or other means
      to respond to RARP requests

       

       

      TCP/IP configuration utilities

      Ipconfig, winipcfg, config, and ifconfig

      TCP/IP Route-tracing utilities:

      traceroute, tracert, and iptrace

      TCP/IP utility Packet Internet groper

      ping

      TCP/IP utility Address Resolution Protocol

      ARP

      TCP/IP utility Reverse Address Resolution
      Protocol

      RARP

      Ping can be used with either the hostname or the IP address
      to test

      IP connectivity

      Ping works by sending an

      ICMP echo request to the destination computer.

      If a computer receives an ICMP echo request or
      pint it sends back

      an ICMP echo reply message.

      It is possible to use Ping to
      find the

      IP address of a host when the name is known.

      MAC addresses are recognized in

      the local network

      ARP is the means by which networked computers
      map

      Internet Protocol (IP) addresses to physical
      hardware (MAC) addresses

      ARP builds and maintains a table called the

      ARP cache, which contains mappings of IP
      address to MAC address.

      ARP provides the protocol rules for making the

      IP – MAC correlation and providing address
      conversion in both directions.

      The ARP command arp -a

      displays the cache

      The ARP command arp -s

      adds a permanent IP to MAC mapping

      The ARP command arp -d

      deletes an entry form the ARP cache

      Machines that do not know their own IP
      addresses use

      Reverse Address Resolution Protocol (RARP).

      RARP provides the rules by which the physical
      machine in a LAN can

      request to learn its IP address from a gateway
      server Address Resolution Protocol (ARP) table or cache

      ARP maps

      IP-to-MAC addresses

      RARP maps

      maps MAC-to-IP addresses

      returns the IP address for a given hostname or
      find the host name for a specified IP address

      NSLOOKUP

      Transport >>> In the TCP/IP model this layer would deal with
      reliability, flow control, and error correction.

       TCP/IP >>> Common name for
      the suite of protocols developed by the U.S. DoD in the 1970s to support the
      construction of worldwide internetworks. TCP and IP are the two best-known
      protocols in the suite

      Protocols and
      Standards:
      Review Quiz Answers

      1.) SNMP, SMTP, FTP,
      TELNET, HTTP, NCP, SMB, and Appletalk are protocols that operate at the OSI Application layer.

      2.) The Presentation layer encodes and converts user
      information into binary data, also provides protocol conversion, encryption,
      and compression.

      3.) The Session layer opens manages, and closes
      conversations between two computers. It performs name recognition and the
      functions such as security, needed to allow two applications to comminicate
      over the network, also provides error handling.

      4.) The Network layer routes data packets across network
      segments. Translates logical addresses and names into physical addresses.

      5.) IP is the standard for data packet delivery over
      the Internet.

      6.) UDP runs on top of IP and is used as an
      alternative to TCP.

      7.) SMTP is used to tranfer mail messages between two
      remote computers. It is used on the Internet, and is part of the TCP/IP protocol
      stack.

      9.) The first digit of a
      Class C address will be a number between
      192 and 223, the network ID start bit is 110 and their default subnet mask is
      255. 255. 255.0

      10.) Most e-mail
      applications use the POP protocol,
      although some use the newer IMAP.

      11.) Telnet is short for Telecommunication Network, a
      virtual terminal protocol allowing a user logged on to one TCP/IP host to
      access other hosts on the network.

      12.) Dynamic Host
      Configuration Protocol is a server
      service. When a DHCP server is configured on a network , clients that support
      DHCP can request TCP/IP configuration
      information from the server.

      13.) Domain Name System, enables short alphabetical
      names to be assigned to IP addresses to describe where a computer is located.

      14.) The first digit of a
      Class B address will be a number between
      128 and 191, the network ID start bit is 10 and the default subnet mask is 255.
      255.0.0

      15.) If the routers that
      connect subnets are RFC 1542 compliant routers, the DHCP/BOOTP relay agent can provide IP addresses to
      clients in multiple subnets.

      16.) While DNS resolves host names to IP addresses, WINS
      resolves NetBIOS names to IP addresses.

      17.) SNMP uses small utility programs called agents to
      monitor behavior and traffic on the network, in order to gather statistical
      data.

      18.) The first digit of a
      Class A addresses will be a number
      between 1 and 126, the network ID start bit is 0 and default subnet mask is
      255.0.0.0

      19.) A gateway is a device used to connect networks using
      different protocols.

      20.) A subnet mask is used to mask a portion of the IP
      address, so that TCP/IP can tell the difference between the network ID and the
      host ID.

      21.) WAN technologies use
      either circuit switching or <

Viewing 0 reply threads