Previous Page TOC Next Page



— Appendix F —
Answers to Quizzes



Chapter 2


  1. Draw the layered architectures of both the OSI Reference Model and TCP/IP. Show how the layers correspond in each diagram.

    The layered architecture of both the OSI-RM and TCP/IP are shown in Figure 2.2.

  2. Show the layered Internet architecture, explaining each layer's purpose.

    The layers of the Internet architecture are shown in Figure 2.5.

  3. Show how a datagram is transferred from one network, through one or more gateways, to the destination network. In each device, show the layered architecture and how high up the layered structure the datagrams goes.

    This process is shown in Figure 2.6.

  4. Draw the IP header and an Ethernet frame, showing the number of bits used for each component. Explain each component's role.

    The IP header and Ethernet frame structure is shown in Figure 2.8. The text in that section explain the role of each component.

  5. Explain what an ARP Cache is. What is its structure and why is it used?

The ARP cache is used to hold IP addresses and physical addresses The layout of an ARP cache is shown in Figure 2.10. Each row corresponds to one device, with four pieces of information for each device.

Chapter 3


  1. Explain why IP is important to the proper transmission of data.

    IP's primary task is the addressing of datagrams. Without IP, routing information would have to be constructed at a higher layer in the architecture.

  2. Show the construction of the IP header and the meaning of each element within the header structure.

    The IP header is shown in Figure 3.1. The meaning of each field within the header is explained in the text accompanying the figure.

  3. ICMP headers are quite small. Show the structure of a typical message header and the meaning of the bits within it.

    The ICMP header is shown in Figure 3.4. The meaning of each field and their valid values are explained in the accompanying text.

  4. Explain the different EGP message formats and when they are used.

    There are four EGP message formats in use: neighbor acquisition and neighbor reachability (both of which indicate the presence and status of neighbor devices); poll (to verify that a neighbor is active); and error (for reporting error conditions).

  5. Show the EGP message format, explaining the contents of the header and the network reachability information.

    The format of the EGP message headers is shown in Figures 3.6 and 3.7. The text accompanying the figures explains the meaning of the fields within the header.


Chapter 4


  1. Draw a diagram showing the binding of port tables when three machines are sending information to each other.

    This is shown in Figure 4.3.

  2. Draw the TCP protocol data unit (PDU) and explain the meaning of each field.

    The TCP PDU is shown in Figure 4.5. The fields are all explained in the accompanying text.

  3. Use a diagram to show the signals involved with two machines establishing a TCP connection. Then, show how data is transferred. Finally, show the termination process.

    The diagrams for all three steps are shown in Figures 4.6, 4.7, and 4.8.

  4. What is a TCP connection table? How is it used?

    TCP uses a connection table to keep track of all the active connections. Each existing connection has an entry in the table that shows information about the end-to-end connection. The layout of the TCP connection table is shown in Figure 4.9.

  5. Draw the UDP header and explain the fields it contains.

    The UDP header is shown in Figure 4.10. The accompanying text explains the purpose of each field.

  6. What are the advantages of using UDP over TCP? When would you not want to use UDP?

    UDP is connectionless, hence a little faster. It is not as reliable as TCP, though, so is not useful for applications when a connection must be maintained for long periods or when reliability of transfer is important.


Chapter 5


  1. Explain what a network virtual terminal is.

    A network virtual terminal (NVT) is used to define both ends of a connection. It has a logical keyboard and a logical printer (display). NVTs are necessary to allow a connection to exist.

  2. Draw diagrams showing two- and three-party FTP sessions, indicating the port numbers used by each machine.

    These diagrams are shown in Figures 5.4 and 5.5.

  3. Why would you want to enable anonymous FTP access? Are there any reasons for disallowing it?

    Anonymous FTP access enables users to upload and download files to your system without having to log in. This can be useful when you want to share information without worrying about user IDs. Anonymous FTP should be disabled if you do not plan to share information globally, because there are several possible security concerns with a poorly administered anonymous FTP setup.

  4. TFTP enables files to be transferred without logging in. What problems can this cause?

    TFTP's capability to transfer files without a login can enable a remote user to transfer a file to or from your system without your specific knowledge, as long as the security system and file permissions are set to enable this. A well-run system controls TFTP's access considerably.

  5. What are the Berkeley Utilities?

    The Berkeley Utilities are a set of useful utility programs developed for TCP/IP at the University of California at Berkeley. The tools are known as the Berkeley Utilities in honor of their developers.


Chapter 7


  1. Define the role of gateways, routers, bridges, and brouters.

    A gateway performs routing functions between networks and can translate protocols. A bridge connects two or more networks using the same protocol. A router is a network device that forwards datagrams around the network. A brouter performs the functions of both the bridge and the router.

  2. What is a packet-switched network?

    A packet-switched network is one where all transfers of information are based on self-contained packets (like TCP/IP's datagrams).

  3. What is the difference between interior and exterior neighbor gateways?

    Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.

  4. What are the advantages and disadvantages of the three types of routing tables?

    The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be manually modified every time there is a change. A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine's table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the table's contents can change without the administrator being aware of the change.

  5. What is the HELLO protocol used for?

    The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol.


Chapter 8


  1. What protocol is used by DNS name servers? Why is that a good choice?

    DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.

  2. What is a DNS resource record?

    A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.

  3. Show a sample entry in an IN-ADDR-ARPA file and explain what the fields mean.

    An entry in an IN-ADDR-ARPA file would look like this:

    merlin IN A 143.12.2.46

    The line contains the machine name, the class of machine (IN means Internet), A to show it is an address resource record, and the IP address.

  4. BOOTP helps a diskless workstation boot. How does it get a message to the network looking for its IP address and the location of its operating system boot files?

    BOOTP sends a UDP message with a subnetwork broadcast address and waits for a reply from a server that gives it the IP address. The same message might contain the name of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server.

  5. What is the Network Time Protocol? Why is it used?

    The Network Time Protocol is designed specifically to ensure that all internal timers are synchronized and have similar settings.


Chapter 9


  1. Show how the NFS layers compare to the OSI Reference Model.

    This is shown in Figure 9.1. The NFS layers comprise the top three layers of the architecture, including the application layer protocols (mount, yp, and so forth), XDR (External Data Representation) in place of the presentation layer, and RPC (Remote Procedure Call) in place of the session layer.

  2. Explain how a port mapper assigns ports.

    The port mapper controls assignment of ports based on requests from applications. The port mapper maintains a table of ports and the RPC programs that are using them. When the port mapper receives a request for a port, it checks for an available port, then completes a table entry for the port and application, returning the port number with a status message.

  3. What is External Data Representation?

    External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent.

  4. What does the Mount protocol do?

    The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request.

  5. What is REX? What advantage does REX offer other similar utilities?

    The Remote Execution Service (REX) is designed to enable users to run commands on other machines without logging in and without the overhead of larger utilities like Telnet. Because REX preserves the full shell environment, it is better than other remote procedures.


Chapter 10


  1. What components make up a Medium Attachment Unit (MAU) and what are their roles?

    The MAU is composed of the Physical Medium Attachment (PMA) and the Medium Dependent Interface (MDI). The MAU manages the connection of the machine to the network medium itself.

  2. What is FDDI? Why is it popular?

    FDDI is Fiber Distributed Data Interface, popular because it provides very high transmission speeds over a fiber optic cable.

  3. What is the role of the Discard service?

    The Discard service discards everything it receives, returning nothing back to the sender.

  4. The Time protocol is often used by network devices. What is its role?

    The Time protocol is used to synchronize devices on a network so their clocks are consistent. If they were not consistent, some packet information involving actual times would be meaningless.

  5. Does the presence of a second network protocol (like IPX) affect the basic TCP/IP protocol suite's operations?

    TCP/IP can function over other network protocols (like IPX) by replacing parts of the TCP/IP layered architecture with the other network protocol's layers. Some duplication and crossover of functionality can be expected, but TCP/IP can function properly with many different networks.


Chapter 11


  1. How many devices are enabled on a Class B network (the most common)?

    Class B networks use two bytes for the device portion of the IP address. This enables 65,534 different devices.

  2. What is the difference between the BSD UNIX TCP/IP broadcast address setting and the one normally used?

    The BSD UNIX TCP/IP broadcast address uses all 0s, whereas the Internet standard (and most other TCP/IP implementations) uses all 1s. The Internet system is the most widely used except in locations that have run BSD UNIX for many years and have not made the switch.

  3. What is a pseudo tty?

    A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no connection can take place.

  4. What does the following .rhosts file do?

    # .rhosts
    artemis tparker
    artemis goof
    artemis aarmenakis
    mig rmaclean

    This file enables three users from the system artemis and one user from the system mig to log in to the host system without using passwords. The user IDs that can be used are specified after the machine name.

  5. What is anonymous FTP and why would you use it?

    Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.


Chapter 13


  1. What are the five parts of the OSI Reference Model dealing with network management (called the Specific Management Functional Areas)?

    The OSI-RM defines the five aspects of network management as accounting, configuration, faults, performance, and security.

  2. What is a Management Information Base (MIB)?

    A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device's status, its performance, connections, and configuration. The MIB is queried by SNMP.

  3. What is ping?

    Ping is the Packet Internet Groper. It sends out an ICMP request to a destination and waits for a response. Ping is a simple utility used to check connectivity.

  4. Assume a LAN has some machines using Ethernet and others using IEEE 802.3. Can they communicate?

    Not unless there is a translation system in place. The datagrams for Ethernet and IEEE 802.3 are slightly different. This is a common problem because most users think that IEEE 802.3 is Ethernet.

  5. What is Kerberos?

    Kerberos is a network security system developed at MIT. It provides encryption and validation services that are very difficult to break.


Chapter 14


  1. What are the six basic socket commands?

    The basic socket commands are open, send, receive, status, close, and abort.

  2. A Transmission Control Block performs what function?

    A TCB is a complex data structure that contains a considerable amount of information about a connection. There is a TCB for each connection.

  3. What is the difference between an unspecified passive open and a fully specified passive open?

    An unspecified passive open has the server waiting for a connection request from a client. A fully specified passive open has the server waiting for a connection from a specific client.

  4. What command displays status information about a socket?

    The command getsockopt queries a socket and displays all information returned about the socket.

  5. What is a fork?

    A fork is a UNIX process that creates a copy of the existing application, then executes it.

Previous Page Page Top TOC Next Page