Professional Documents
Culture Documents
Csit416 Answers To Chapter 2 Exercise
Csit416 Answers To Chapter 2 Exercise
TRUE/FALSE
1. The Transport layer of the OSI model includes the RIP protocol.
MULTIPLE CHOICE
1. In which OSI model layer will you find the OSPF protocol?
a. Application c. Transport
b. Session d. Network
ANS: D PTS: 1 REF: 36
6. If you are subnetting a class B network, what subnet mask will yield 64 subnets?
a. 255.255.252.0 c. 255.255.224.0
b. 255.255.64.0 d. 255.255.192.0
ANS: A PTS: 1 REF: 40
7. Which of the following is the broadcast address for subnet 192.168.10.32 with subnet mask
255.255.255.240
a. 192.168.10.63 c. 192.168.10.23
b. 192.168.10.47 d. 192.168.10.95
ANS: B PTS: 1 REF: 42
9. Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet
can remain in the network before it is dropped?
a. TTL c. ECN
b. Fragment Offset d. Options
ANS: A PTS: 1 REF: 45
11. Which of the following is a reason that UDP is faster than TCP?
a. it doesn’t use port numbers c. the header is smaller
b. it has a higher priority on the network d. it doesn’t guarantee delivery
ANS: D PTS: 1 REF: 48
12. Which of the following is the first packet sent in the TCP three-way handshake?
a. RST c. ACK
b. SYN d. PSH
ANS: B PTS: 1 REF: 51
14. What should you do when configuring DNS servers that are connected to the Internet in order to
improve security?
a. disable zone transfers c. disable DNS buffers
b. delete the DNS cache d. setup DNS proxy
ANS: A PTS: 1 REF: 54
COMPLETION
ANS: Application
PTS: 1 REF: 36
2. The ______________________ is the part of the IP address that is the same among computers in a
network segment.
ANS:
network identifier
network ID
PTS: 1 REF: 37
3. The _____________ field in an IP header is a 3-bit value indicating whether a datagram is a fragment.
ANS: flags
PTS: 1 REF: 45
ANS: Anycast
PTS: 1 REF: 63
5. The ____________ command shows current sessions with associated port numbers.
ANS:
netstat
netstat -n
PTS: 1 REF: 65
MATCHING
a. broadcast f. unicast
b. datagram g. stateless autoconfiguration
c. fragmentation h. network identifier
d. multicast i. Multicast Listener Discovery
e. scopes j. Network Address Translation
1. a discrete chunk of information; each datagram contains source and destination
addresses, control settings, and data
2. unicast addresses used in IPv6 to identify the application suitable for the address
3. the part of an IP address that a computer has in common with other computers in its subnet
4. a process by which internal hosts are assigned private IP addresses and communicate with the Internet
using a public address
5. a transmission used for one-to-many communication, in which a single host can
send packets to a group of recipients
6. a transmission in which one packet is sent from a server to each client that
requests a file or application
7. enables IPv6 routers to discover multicast listeners on a directly connected link and to decide which
multicast addresses are of interest to those nodes
8. a communication sent to all hosts on a specific network
9. a feature of IPv6 in which a computer can connect to a network by determining its own IP address
based on the addressing of neighboring nodes
10. the division of packets into smaller sizes to accommodate routers with frame size limitations
SHORT ANSWER
ANS:
Application
Presentation
Session
Transport
Network
Data Link
Physical
PTS: 1 REF: 36
2. Briefly describe Network Address Translation and how it makes a network more secure.
ANS:
IP addresses are valuable commodities. If attackers can find a computer’s IP address, they can run a
port scan to look for open ports they can exploit. By hiding IP addresses, you can
prevent certain attacks. To hide the addresses of computers on your network, you can use
Network Address Translation (NAT) to translate your private network’s internal addresses
into the address of the NAT server’s external interface connected to the Internet. A private
network’s internal addresses are not routable on the Internet.
PTS: 1 REF: 38
3. List the three classes of IP address that can be assigned to network devices and their corresponding
first octet range of values.
ANS:
Class A: 1-126
Class B: 128-191
Class C: 192-223
PTS: 1 REF: 38
4. What are the three private IP address ranges and their associated subnet masks?
ANS:
10.0.0.0 255.0.0.0
172.16.0.0 255.240.0.0
192.168.0.0 255.255.0.0
PTS: 1 REF: 39
PTS: 1 REF: 39
ANS:
Networks that do not have a large number of available IP addresses can use variable length subnet
masking (VLSM), which involves applying masks of varying sizes to the same network. If an
organization has a limited number of IP addresses and subnets of varying lengths, VLSM can help it
use address space more efficiently. VLSM is a means of allocating IP addressing according to the
network’s needs. This allocation method creates subnets within subnets and multiple divisions of an IP
network.
PTS: 1 REF: 42
ANS:
CIDR is Classless Interdomain Routing which is an address notation scheme that specifies the
number of masked bits in an IP address/subnet mask combination. Instead of using standard notation
for subnet masks, with CIDR you can simply list the number of masked binary bits. The subnet mask
255.255.255.224, for example, has a total of 27 masked bits (eight in each of the first three octets and
three in the last octet). In CIDR notation, you would write the network address 192.168.6.0 with a
subnet mask of 255.255.255.224 as 192.168.6.0/27.
PTS: 1 REF: 42
ANS:
Time to Live (TTL)—This 8-bit value identifies the maximum amount of time the packet can remain
in a network before it is dropped. Each router or device through which the packet passes (hops)
reduces the TTL by a value of one. The TTL avoids congestion that results from corrupted packets
infinitely looping through the network.
PTS: 1 REF: 45
ANS:
To establish connection-oriented communication, each computer needs a way to know that the other
computer received the packets sent. Sequence and acknowledgement numbers perform
this function, as demonstrated in the way that two hosts first establish the TCP connection: the TCP
three-way handshake.
Host A includes a randomly generated initial sequence number in its first packet to Host B. This
packet is called a SYN packet because the TCP SYN flag is set. The acknowledgement number is zero
because the SYN packet is the first in the session and there is no previous packet for Host A to
acknowledge.
Host B receives the SYN packet and responds with a SYN ACK packet. This packet includes a
randomly generated initial sequence number for Host B. As a way of proving that Host B received the
SYN packet from Host A, the acknowledgement number is set to the number that Host B expects to
receive in the second packet from Host A. The first packet’s sequence number is incremented by one
and placed as the acknowledgement number.
The final packet in the three-way handshake is the ACK packet that Host A sends in response to the
SYN ACK from Host B. Now Host A increments its initial sequence number by one and sets the
acknowledgement number to be one more than the initial sequence number that Host B sent in the
SYN ACK
10. Discuss two drawbacks of IPv4 and how IPv6 addresses those drawbacks.
ANS:
IPv4 has serious drawbacks. IP addresses are now in short supply, so Internet Protocol version 6
(IPv6), which has a larger address space of 128 bits, is being deployed to allow an almost endless
supply of IP addresses. Because an IPv4 address is 32 bits long, IPv4 permits a total of 232 addresses,
which is more than 4 billion. With 128 bits, IPv6 offers 2128 addresses, which is 340 undecillion. An
undecillion is a 1 followed by 39 zeros.
IPv4 also presents problems with the routing system. Routers on the Internet backbone have
routing tables with about 90,000 entries. Routers get the job done, but because most computers are not
connected directly to the Internet backbone, a packet must traverse several extra hops along the route
to its destination. In IPv6, backbone routing tables need only the entries of other routers that are
connected directly to them. The information in an IPv6 header
contains the rest of the information needed to get a packet to its destination, so the process is
streamlined.
Security is another concern with IPv4. Although it does support IPsec (an industry standard
set of encryption and authentication protocols), IPv4 has no native encryption methods. Plenty
of encryption methods are available, but the lack of standardization can create compatibility
problems, and encryption can increase overhead on the network. IPv6, on the other hand,
has integrated support for IPsec.
Another advantage of IPv6 is that Network Address Translation (NAT) is not needed because of the
vast number of IP addresses provided. While NAT has worked well enough to deal with the decreasing
number of IP addresses in IPv4, NAT has security problems. In short, because NAT devices need to
read encapsulated IP headers, it is difficult to maintain data confidentiality for end-to-end
transmissions; typically, the packets are unencrypted by the NAT firewall and sent through the internal
network unencrypted. IPv6 obviates this problem.