Professional Documents
Culture Documents
CCNA 2 Chapter 10
Intermediate TCP
Concept Questions
Demonstrate your knowledge of these concepts by answering the following questions in
the space that is provided.
• Protocols to support file transfer, e-mail, remote login, and other applications
• Reliable and unreliable transports
• Connectionless datagram delivery at the network layer ICMP to provide
control and message functions at the network layer
1. The TCP/IP protocol stack maps closely to the lower layers of the OSI
reference model. What function do the application protocols perform?
The transport layer enables a user’s device to segment data from several upper-
layer applications for placement on the same Layer 4 data stream, and enables a
receiving device to reassemble the upper-layer application segments. The Layer 4
data stream is a logical connection between the endpoints of a network; it
provides transport services from a source host to a destination host. This service is
sometimes referred to as an end-to-end service.
Vocabulary Exercise
Define the following terms as completely as you can. Use the online curriculum or
CCNA 2 Chapter 10 from the Cisco Networking Academy Program CCNA 1 and 2
Companion Guide, Revised Third Edition, for help.
Focus Questions
OSI TCP/IP
Application Æ Application
Presentation
Session
Transport Æ Transport
Network Æ Internet
Data Link Æ Network Interface
Physical
2. Compare and contrast TCP and UDP.
3. Briefly describe everything you know about the fields in a TCP segment.
IP serves as a protocol for many of the services used on the Internet today, such
as SMTP, HTTP, DNS, Telnet, and so on. ICMP provides control and message
functions at the network layer. ICMP is implemented by all TCP/IP hosts. ARP is
used to resolve or map a known IP address to a MAC sublayer address to allow
communication on a multi-access medium, such as Ethernet. RARP is the reverse
of ARP and is used to resolve or map a known MAC sublayer address to an IP
address.
6. Briefly describe how TCP uses port numbers to keep track of conversations between
hosts.
Port numbers are used to keep track of different conversations that cross the network at
the same time. Port numbers are necessary when a host is communicating with a server
running multiple services. Both TCP and UDP use port, or socket, numbers to pass
information to the upper layers.
7. A SYN flooding denial of service attack occurs when a host sends a packet
with a spoofed IP address. Briefly describe how a network administrator
could defend against a denial of service SYN attack.
2. Which of the following best describes the purpose of TCP/IP protocol stacks?
A. They map closely to the OSI reference model in the upper layers.
B. They support all standard physical and data-link protocols.
C. They transfer information in a sequence of datagrams.
D. They reassemble datagrams into complete messages at the receiving
location.
3. Which of the following best describes the function of the application layer of the
TCP/IP conceptual layers?
A. It is responsible for breaking messages into segments and then
reassembling them at the destination.
B. It acts as a protocol to manage networking applications.
C. It exists for file transfer, e-mail, remote login, and network
management.
D. It resends anything that is not received and reassembles messages from the
segments.
11. What is the function of the three-way handshake process used by TCP?
A. It completes research for a destination address for a datagram.
B. It develops a cache of usable hosts
C. It establishes a round trip connection between hosts
D. It sends a broadcast message looking for the host TCP address.
12. How does a sender find out the destination's MAC address?
A. It consults its routing table.
B. It sends a message to all the addresses that are searching for the address.
C. It sends a broadcast message to the entire LAN.
D. It sends a broadcast message to the entire network.