Networking and Data
Networking and Data
First, let's briefly define an access network. An access network is the part of a
telecommunications network that connects subscribers (like you, at home or in your office) to
their immediate service provider. It's the "last mile" or "local loop" that brings the internet, phone,
or TV service to your premises.
What is DSL?
DSL (Digital Subscriber Line) is a technology that provides internet access by transmitting digital
data over the standard copper telephone lines that already exist in most homes and businesses.
It's a way of getting broadband internet using the same wires your landline phone uses, but
without interfering with your phone calls.
1. Utilizing Existing Infrastructure: The most significant advantage and defining
characteristic of DSL is its use of the Public Switched Telephone Network (PSTN)'s
existing copper twisted-pair wiring. This means no new cabling needs to be laid to your
home, which made it a popular and relatively inexpensive option for broadband
deployment.
2. Frequency Division Multiplexing (FDM): This is crucial to how DSL works. DSL uses
different frequency bands for different purposes on the same copper wire:
○ Voice (POTS - Plain Old Telephone Service): Uses a very low frequency band
(typically 0-4 kHz).
○ Upstream Data: Uses a higher frequency band for data going from your home to
the internet (e.g., uploading files, sending emails).
○ Downstream Data: Uses an even higher frequency band for data coming from
the internet to your home (e.g., Browse websites, streaming videos).
○ Because these frequencies don't overlap, you can use your phone and the
internet simultaneously without interference.
3. DSL Modem: At your home, you need a DSL modem. This device modulates and
demodulates the digital signals so they can travel over the analog copper lines and then
be converted back into digital signals for your computer.
4. DSLAM (Digital Subscriber Line Access Multiplexer): At the other end, typically at
the telephone company's central office (CO) or a local exchange, there's a DSLAM. The
DSLAM aggregates the DSL lines from many subscribers and separates the voice traffic
from the data traffic. The data traffic is then routed to the internet service provider's (ISP)
network, while voice traffic goes to the PSTN.
1. Hybrid Fiber-Coaxial (HFC) Network: This is the most important concept to understand
about modern cable networks. They are not purely coaxial cable.
○ Fiber Optic Backbone: From the Internet Service Provider's (ISP) core network,
high-capacity fiber optic cables run to neighborhood distribution hubs called
Optical Nodes. These fiber segments provide very high bandwidth and reliability.
○ Coaxial Cable Last Mile: From the Optical Node, coaxial cables branch out to
individual homes and businesses. This "last mile" is typically coaxial, which is
why it's called "cable internet."
2. Shared Access Network: This is a critical distinction from DSL.
○ Homes Share the Coaxial Segment: Unlike DSL, where each subscriber
typically has a dedicated copper pair back to the central office (or DSLAM), in a
cable network, a single coaxial cable segment is shared by a group of homes in a
neighborhood.
○ Bandwidth Sharing: This means that the total bandwidth available on that
coaxial segment is shared among all active users in that segment. If many users
are actively downloading or uploading at the same time, the available bandwidth
per user can decrease, leading to slower speeds during peak usage hours. This
is often referred to as a "contention ratio."
3. Cable Headend:
○ This is the central facility of the cable operator. It's where the signals for TV
channels, internet data, and phone services originate, are processed, and then
sent out over the HFC network.
○ The headend contains crucial equipment like the CMTS (Cable Modem
Termination System).
4. CMTS (Cable Modem Termination System):
○ This is the equivalent of a DSLAM for cable networks.
○ Located at the cable headend (or sometimes distributed closer to the optical
nodes), the CMTS is responsible for communicating with all the cable modems in
subscribers' homes.
○ It modulates and demodulates data signals, manages bandwidth allocation, and
routes internet traffic between the subscribers' cable modems and the ISP's core
network.
5. Cable Modem:
○ At the subscriber's home, a cable modem (like your DSL modem) is required.
This device converts the digital signals from your computer into signals suitable
for transmission over the coaxial cable and vice-versa.
6. Frequency Division Multiplexing (FDM):
○ Similar to DSL, cable networks also use FDM to carry different types of services
(TV, internet, phone) over the same coaxial cable by assigning them different
frequency bands.
○ They also use different frequency ranges for upstream (upload) and downstream
(download) data. Typically, downstream speeds are much higher than upstream
speeds (asymmetric).
● Infrastructure:
○ Cable: Uses a Hybrid Fiber-Coaxial (HFC) network. Fiber to the optical node,
then coaxial to the home.
○ DSL: Uses the existing copper twisted-pair telephone lines directly from the
central office/DSLAM to the home.
● Sharing Model:
○ Cable: Homes share the access network (specifically, the coaxial segment)
back to the cable headend/CMTS. This means bandwidth is shared among
neighbors.
○ DSL: Each home generally has a dedicated copper pair (local loop) to the
central office/DSLAM. While the DSLAM itself is shared, the physical access line
to your home is not shared with a neighbor in the same way as cable's coaxial
segment.
● Headend vs. Central Office:
○ Cable: Connects to a Cable Headend (where the CMTS resides).
○ DSL: Connects to a Central Office (CO) or remote terminal (where the DSLAM
resides).
● Performance and Distance:
○ Cable: Less susceptible to distance degradation over the coaxial segment
compared to DSL's copper pair, especially due to the fiber-optic backhaul.
However, performance can be affected by the number of active users on a
shared segment.
○ DSL: Highly sensitive to distance from the DSLAM.
A home network is a local area network (LAN) set up within a residential property to connect
various electronic devices, such as computers, smartphones, tablets, smart TVs, gaming
consoles, smart home devices, and network printers. The primary purpose of a home network is
to allow these devices to:
● Share a single internet connection: This is its most common and crucial function in the
context of an access network.
● Share files and resources: E.g., sharing documents, photos, or printers among family
members.
● Communicate with each other: E.g., casting content from a phone to a smart TV,
controlling smart home devices.
1. Application Layer
● Function: This is the layer that interacts directly with user applications. It provides
services to the applications that need to communicate over the network. It handles the
details of how specific applications exchange data.
● Key Services/Protocols:
○ FTP (File Transfer Protocol): Used for transferring files between a client and a
server. (e.g., uploading a webpage to a web server).
○ SMTP (Simple Mail Transfer Protocol): Used for sending and receiving email
messages. (e.g., when you click "send" in your email client).
○ HTTP (Hypertext Transfer Protocol): The foundation of data communication for
the World Wide Web. Used for accessing web pages. (e.g., when your browser
requests a webpage).
○ DNS (Domain Name System): Translates human-readable domain names (like
https://www.google.com/search?q=google.com) into numerical IP addresses.
○ SSH (Secure Shell): Secure remote login and file transfer.
2. Transport Layer
● Key Services/Protocols:
○ TCP (Transmission Control Protocol):
■ Connection-Oriented: Establishes a connection before data transfer
begins and terminates it afterwards.
■ Reliable: Guarantees delivery of data, retransmits lost packets, and
provides error checking.
■ Flow Control: Prevents a fast sender from overwhelming a slow receiver.
■ Congestion Control: Manages traffic to prevent network overload.
■ Used for: Web Browse (HTTP), email (SMTP), file transfer (FTP), secure
shell (SSH), etc., where reliability is paramount.
○ UDP (User Datagram Protocol):
■ Connectionless: Does not establish a connection beforehand.
■ Unreliable: Does not guarantee delivery; no retransmissions or error
checking (beyond basic checksum).
■ Faster: Less overhead than TCP.
■ Used for: Real-time applications like streaming video/audio, online
gaming, DNS queries, where speed is more important than absolute
reliability (as retransmitting would cause unacceptable delays).
● Function: Responsible for routing datagrams (packets) from the source host to the
destination host across multiple interconnected networks. It determines the best path for
data to travel.
● Key Services/Protocols:
○ IP (Internet Protocol):
■ The core protocol of the internet. It defines the addressing scheme (IP
addresses) and how packets are structured and forwarded.
■ Connectionless and Unreliable: IP itself does not guarantee delivery;
reliability is left to higher layers (like TCP).
■ IPv4 and IPv6: The two primary versions of IP addresses.
○ Routing Protocols:
■ RIP (Routing Information Protocol), OSPF (Open Shortest Path
First), BGP (Border Gateway Protocol): These protocols are used by
routers to exchange routing information with each other to build and
maintain routing tables, which dictate the best paths for packets.
5. Physical Layer
● Function: Deals with the physical characteristics of the transmission medium and the
actual transmission of raw bits (0s and 1s) over that medium. It defines voltage levels,
cable specifications, connector types, data rates, etc.
● Key Aspects:
○ Cabling: Copper wires (Ethernet cables), fiber optic cables.
○ Wireless Signals: Radio waves (for Wi-Fi).
○ Connectors: RJ-45, fiber optic connectors.
○ Voltage levels, light pulses, radio frequencies: How bits are physically
represented and transmitted.
When data is sent, it goes down the stack. At each layer, the previous layer's data is
encapsulated (wrapped) with a new header specific to that layer.
● Application data (e.g., an HTTP request)
● Transport header (e.g., TCP header) + Application data = Segment/Datagram
● Network header (e.g., IP header) + Segment/Datagram = Packet/Datagram
● Link header + Link trailer (e.g., Ethernet header/trailer) + Packet/Datagram = Frame
● Physical layer converts the Frame into bits to be sent over the wire/air.
When data is received, it goes up the stack, and each layer decapsulates (unwraps) its
respective header, passing the payload up to the next higher layer until the original application
data is delivered.
HTTP (Hypertext Transfer Protocol) is the foundation of data communication for the World
Wide Web. It's an application layer protocol (as you correctly noted in the Internet Protocol
Stack), meaning it sits at the top of the TCP/IP stack and interacts directly with web browsers
and web servers.
● Role: HTTP defines the rules and methods for how web clients (like your browser) and
web servers communicate with each other to exchange web content.
● What it transfers: Primarily "Hypertext" (HTML documents), but also images, videos,
stylesheets, scripts, and any other type of file that makes up a web page or web
application.
● How it relates to the stack: HTTP relies on the Transport Layer (specifically TCP) to
provide reliable, connection-oriented data transfer. This means when your browser
makes an HTTP request, TCP ensures that the request reaches the server completely
and correctly, and that the server's response reaches your browser completely and
correctly.
2. Client/Server Model:
HTTP operates strictly on a client/server model. This is a fundamental architectural style for
distributed applications.
● Stateless: This is a very important characteristic. Each HTTP request and response pair
is independent of all other requests and responses. The server does not store any
information about previous client requests.
○ Implication: If you need to maintain "state" (e.g., items in a shopping cart, user
login status), mechanisms like cookies, session IDs, or URL rewriting are used
on top of HTTP to achieve this.
● Uses Port 80 (default): HTTP communication typically occurs over TCP port 80.
● HTTPS (HTTP Secure): This is the secure version of HTTP. It's HTTP layered on top of
TLS/SSL (Transport Layer Security/Secure Sockets Layer) for encryption and
authentication. HTTPS typically uses TCP port 443.
Example Scenario:
The first digit of the status code indicates the general class of response:
● 1xx: Informational
○ The request was received, continuing process. (Less common in everyday
Browse)
● 2xx: Success
○ The action was successfully received, understood, and accepted.
● 3xx: Redirection
○ Further action needs to be taken by the user agent (browser) to fulfill the request.
● 4xx: Client Error
○ The request contains bad syntax or cannot be fulfilled. (The client made a
mistake)
● 5xx: Server Error
○ The server failed to fulfill an apparently valid request. (The server encountered a
problem)
DNS is essentially the "phonebook of the Internet." It's a distributed database system that
translates human-readable domain names into machine-readable IP addresses, and vice-versa.
DNS is organized hierarchically, like an inverted tree, with the root at the top. This distributed
nature is what makes it so scalable and resilient.
● Definition: An authoritative name server for a specific hostname (or domain) is the DNS
server that stores the definitive and official records for that name. It's the ultimate
source of truth for a particular part of the DNS namespace.
● Function: When a DNS query reaches an authoritative name server, it can certainly
provide the answer to that query because it directly manages the records for that
domain. It doesn't need to ask another server for that specific information.
● Example: As you mentioned, uwindsor.ca's DNS servers are the authoritative name
servers for www.uwindsor.ca, cs.uwindsor.ca, etc. They hold the actual IP
addresses for these hosts.
● The Root Zone (.): The very top of the DNS hierarchy, containing pointers to all the
TLD servers.
● Number: There are 13 logical root name servers. (It's important to note that these are
logical servers. In reality, each of these 13 logical servers is replicated globally using
anycast IP addresses, meaning there are hundreds of physical root server instances
around the world, providing redundancy and reducing latency).
● Function: Their primary role is to provide the nameserver information about all
Top-Level Domains (TLDs). They don't know the IP address for www.example.com,
but they know which TLD servers (e.g., .com servers) to ask next.
● Starting Point of DNS Queries: When a local DNS server cannot resolve a query from
its cache, it often starts the resolution process by querying a root DNS server. The root
server then directs it to the appropriate TLD server, and the process continues down the
hierarchy until an authoritative server is reached.
● Resource: The https://www.internic.net/domain/root.zone link is excellent!
It contains the actual list of root server names and their IP addresses.
There are two fundamental transport layer protocols in the Internet Protocol Suite: TCP and
UDP.
● The Interface: As you stated, "Application processes sends messages to (or receives
messages from) transport layer through socket." A socket is a software endpoint for
network communication. It's the interface between the application layer and the transport
layer.
● Socket Programming: "Socket programming is for this purpose: socket.send(M)
and M=socket.recv()." Programmers use socket APIs (Application Programming
Interfaces) in languages like Python, Java, or C/C++ to create and manage these
endpoints.
○ socket.send(M): The application passes a message M to the transport layer
via the socket.
○ M=socket.recv(): The application retrieves a message M that the transport
layer has delivered from the network via the socket.
● Purpose: Sockets abstract away the complexities of the underlying network protocols,
allowing applications to simply "send" or "receive" data without needing to know the
low-level details of how TCP or UDP operate.
Multiplexing/Demultiplexing in TCP/UDP
This is the core mechanism by which the transport layer provides process-to-process delivery
using port numbers.
For TCP, a connection (and thus a unique socket on each end) is uniquely identified by a
4-tuple:
This 4-tuple ensures that when a segment arrives, the receiving host knows exactly which
specific TCP connection (and thus which specific socket and application process) it belongs to,
even if multiple applications are communicating with the same remote host or different
applications on the same host are using the same port (e.g., multiple web browsers connecting
to different web servers).
While TCP uses the full 4-tuple for demultiplexing, UDP typically uses just the destination IP
address and destination port number to demultiplex incoming datagrams to the correct
socket. The source IP and source port are still present in the UDP header but are not strictly
part of the "socket ID" for basic demultiplexing. This is because UDP is connectionless; it just
delivers datagrams to a specific port on a specific IP, without needing to track a full "connection."
At this point, a full-duplex TCP connection is established, and both the client and server can
now send and receive application data.
Sequence Numbers:
● Initial Sequence Number (ISN): As seen in the handshake, the initial sequence number
chosen by each side (x and y) can be any random number. This randomness helps
prevent "old" segments from a previous connection (that might still be lingering in the
network) from being misinterpreted as part of a new connection.
● Purpose: A sequence number identifies the first byte of data carried in a TCP segment.
● Calculation:
○ Seq # (current packet): The sequence number of the very first byte of
data in the current segment.
○ Seq # (next packet) = Seq # (current packet) + #databytes
(current packet): If a segment carries N bytes of application data, the
sequence number for the next segment that the sender will transmit should start
N bytes after the current segment's sequence number.
○ Next seq # > current seq #: Sequence numbers are always increasing
(wrapping around eventually, but conceptually increasing) to track the flow of
data.
● Packet Order Recovery: If segments arrive out of order at the receiver, the sequence
numbers allow the receiver to buffer them and reassemble them into the correct order
before passing the data to the application.
Let's trace a simplified example, like the "User types 'C'" scenario:
Assume:
● Client's ISN = x
● Server's ISN = y
1. Connection Setup (3-way handshake):
○ Client -> Server: SYN, Seq=x
○ Server -> Client: SYN, Seq=y, ACK=x+1
○ Client -> Server: ACK=y+1, Seq=x+1 (Now connection ESTABLISHED)
2. User types 'C' (Client sends data to Server):
○ Client sends a segment with data 'C'.
○ Client -> Server: PUSH, ACK=y+1, Seq=x+1, Data='C' (assuming
'C' is 1 byte, so it consumes 1 sequence number)
○ Client's next expected seq for its own data: x+2
○ Client's current ack for server data: y+1
3. Host ACKs receipt of 'C' (Server acknowledges data):
○ Server receives 'C' (which was seq x+1).
○ Server acknowledges receipt of 'C'.
○ Server -> Client: ACK=x+2, Seq=y+1 (Server's own sequence number,
not consuming data if just an ACK)
○ Server's current ack for client data: x+2 (expects next byte 'x+2')
○ Server's next expected seq for its own data: y+1
4. Host ACKs receipt of 'C', echoes back 'C' (Client receives ACK, Server sends
echoed 'C'):
○ The "host ACKs receipt of 'C'" likely refers to the client processing the server's
ACK for 'C'.
○ The "echoes back 'C'" means the server is now sending 'C' back to the client.
○ Server -> Client: PUSH, ACK=x+2, Seq=y+1, Data='C' (Server
sends its 'C' back)
○ Server's current ack for client data: x+2
○ Server's next expected seq for its own data: y+2
5. Client ACKs receipt of echoed 'C':
○ Client receives the echoed 'C' (which was seq y+1).
○ Client -> Server: ACK=y+2, Seq=x+2 (Client acknowledges receipt of
server's echoed 'C')
○ Client's current ack for server data: y+2
○ Client's next expected seq for its own data: x+2
This continuous exchange of sequence and acknowledgment numbers is how TCP ensures
reliability, confirming that data has been received and indicating what data is expected next.
You're touching upon a core concept in IP routing: Longest Prefix Matching (also known as
Longest Match Routing or Classless Inter-Domain Routing - CIDR). This is crucial for how
routers make forwarding decisions.
Concept: When a router receives an IP packet, it needs to decide which outgoing interface to
send that packet on to get it closer to its destination. It does this by looking at the destination IP
address (DA) in the packet's header.
Routers maintain a forwarding table (also called a routing table). This table contains entries
that map network prefixes to outgoing interfaces (and sometimes next-hop IP addresses).
When looking for a forwarding table entry for a given destination address, use
the entry that has the longest address prefix that matches the destination
address.
Example Analysis
DA: 11001000 00010111 00010110 10100001 (This is a 32-bit IPv4 address in binary) In
dotted decimal, this is: 200.23.22.161
Export to Sheets
Now, let's compare the Destination Address (DA: 11001000 00010111 00010110
10100001) against each prefix in the table:
Which Interface?
● The prefix is the leftmost part of the IP address that is significant for identifying the
network.
● The prefix length (e.g., /24) tells you how many bits from the left of the IP address
constitute the network prefix.
Subnet (Subnetwork)
A subnet (short for subnetwork) is a logical division of an IP network. It's a smaller,
manageable segment of a larger network.
Subnetting involves borrowing bits from the host portion of an IP address to create a new
subnet portion. The subnet mask defines where the network/subnet bits end and the host bits
begin.
Questions:
1. What is the purpose of the Initial Sequence Number (ISN) in TCP?
a) To identify the destination port
b) To prevent old segments from being misinterpreted in new connections
c) To determine the checksum value
d) To set the window size
2. If a TCP segment carries 100 bytes of data and has a sequence number of 5000,
what will be the sequence number of the next segment?
a) 5000
b) 5001
c) 5100
d) 4900
3. During the TCP three-way handshake, what does the server send in response to
the client’s SYN (Seq=x)?
a) SYN, Seq=y, ACK=x
b) SYN, Seq=y, ACK=x+1
c) SYN, Seq=x+1, ACK=y
d) ACK=x+1, Seq=y
4. If a client sends a TCP segment with Seq=2000 and 50 bytes of data, what
should be the acknowledgment number in the server’s response?
a) 2000
b) 2001
c) 2050
d) 2051
5. In a TCP connection, if a segment arrives out of order, how does the receiver
handle it?
a) Discards it immediately
b) Uses sequence numbers to buffer and reorder segments
c) Sends an RST flag to terminate the connection
d) Requests retransmission of all previous segments
6. After a successful three-way handshake (Client ISN=x, Server ISN=y), what is the
client’s next sequence number when sending data?
a) x
b) x+1
c) y
d) y+1
7. If a server receives a segment with Seq=3000 and 200 bytes of data, what should
it set as the acknowledgment number in its reply?
a) 3000
b) 3001
c) 3200
d) 3201
8. In TCP, sequence numbers are always:
a) Decreasing
b) Random
c) Increasing (until wrap-around)
d) Fixed for the entire connection
9. What happens if a TCP acknowledgment (ACK) is lost in transit?
a) The sender retransmits the segment immediately
b) The connection is terminated
c) The sender continues sending new data
d) The receiver sends a duplicate ACK
10.During data transfer, if a client sends a segment with Seq=1500 and 30 bytes of
data, what is the next expected sequence number from the server’s perspective?
a) 1500
b) 1501
c) 1530
d) 1531
Answer Key:
1. b
2. c
3. b
4. d
5. b
6. b
7. c
8. c
9. a
10.d
Routing Protocols
Routing Protocol Goal: As you stated, the primary goal of routing protocols is to determine
"good" paths (equivalently, routes) from a sending host to a receiving host, through a
network of interconnected routers.
● "Good" Defined: The definition of "good" can vary depending on the routing protocol
and network administrator's objectives, but common metrics include:
○ Least "cost": This often refers to a metric assigned to a link (e.g., bandwidth,
delay, administrative preference). A lower cost is better.
○ "Fastest": Implies minimizing propagation and transmission delay.
○ "Least congested": Aims to avoid heavily utilized paths.
○ Other metrics could include reliability, number of hops (simplest measure), or a
combination of these.
1. Information Exchange: Routers use routing protocols to exchange network reachability
information with their neighboring routers. They tell each other about the networks they
can reach and the "cost" to reach them.
2. Routing Table Construction: Based on the information received from other routers
(and their own directly connected networks), each router builds and maintains a routing
table (or forwarding table). This table contains entries that map network destinations to
the next-hop router and outgoing interface required to reach that destination, along with
the "cost" of that path.
3. Path Selection: When a router receives an IP packet, it consults its routing table. It uses
the destination IP address of the packet to find the best matching entry (using longest
prefix matching, as we discussed earlier) and forwards the packet out the specified
interface to the next-hop router.
The Link Layer (Layer 2 in the TCP/IP model or Data Link Layer in the OSI model) is
responsible for transferring data between physically connected neighboring network elements
(nodes) over a specific link.
Terminology:
● Transfer frame from one node to physically connected neighbor over a link: The
Link Layer's scope is strictly local. It ensures that a frame successfully traverses a single
link segment from one direct neighbor to another. It does not deal with end-to-end
delivery across multiple links; that's the Network Layer's job.
Question: How to obtain the MAC address of an IP address? Answer: ARP protocol
This is ARP's sole and critical purpose. The IP layer works with IP addresses, but the Link layer
needs MAC addresses to deliver frames on the local segment. ARP acts as the translator
between these two layers.
1. A host (or router) wants to send an IP packet to another device on the same local
network segment.
2. It knows the destination's IP address, but it needs its MAC address to construct the
Link Layer frame.
3. The host broadcasts an ARP Request onto the local network segment. This request
basically says: "Who has IP address X.X.X.X? Tell me your MAC address."
4. The ARP Request is sent in a Link Layer frame with a special broadcast MAC address
(FF:FF:FF:FF:FF:FF), meaning all devices on the local segment will receive it.
5. Only the device that owns X.X.X.X will respond. It sends an ARP Reply directly back to
the requesting host, saying: "I have X.X.X.X, and my MAC address is
YY:YY:YY:YY:YY:YY."
6. The requesting host stores this IP-to-MAC mapping in its ARP cache for future use (for
a limited time).
The Ethernet frame is the basic unit of data transferred over an Ethernet network. It
encapsulates the higher-layer packet (like an IP datagram) with its own header and trailer to
ensure reliable delivery on the local link.
Ethernet switches are intelligent devices that operate primarily at the Link Layer (Layer 2).
Unlike old hubs (which simply broadcast everything), switches efficiently forward frames only to
the specific interface where the destination device is connected. They achieve this through a
process called self-learning or forwarding table learning.
● Switch Table (MAC Address Table / CAM Table):
○ A switch maintains a table (often called a MAC address table or Content
Addressable Memory - CAM table) that maps MAC addresses to the specific
physical port (interface) on the switch where that device is connected.
● How a Switch Learns:
○ When an incoming frame arrives from a sending host:
■ The switch examines the source MAC address of the incoming frame.
■ It then notes which interface (port) that frame arrived on.
■ The switch records (or updates) the (MAC address, interface) pair in
its switch table.
■ Example: If a frame with Source MAC: AA arrives on Interface 1,
the switch adds or updates an entry: AA -> Interface 1.
○ Purpose of Learning: By learning the source MAC address and its incoming
port for every frame it receives, the switch builds a dynamic map of where
devices are located on its network segments.
● How a Switch Forwards (using its table):
○ When the switch receives a frame, it looks at the destination MAC address in
the frame's header.
○ If the destination MAC address is found in its table: The switch forwards the
frame only out the specific interface associated with that destination MAC
address. This is called unicast forwarding.
○ If the destination MAC address is not found in its table (or if it's a
broadcast/multicast address): The switch floods the frame. This means it
sends the frame out all interfaces except the one it came in on. This ensures the
frame reaches its intended recipient even if the switch hasn't learned its location
yet (or if it's a broadcast). Once the destination replies, the switch will learn its
MAC and port.
This self-learning process is what makes Ethernet switches so efficient and intelligent,
drastically reducing unnecessary traffic compared to hubs. It's a key reason why modern LANs
are built around switches.
1. Which access network technology primarily utilizes existing copper telephone lines for
broadband internet?
A. Cable Network B. Fiber Optic C. Digital Subscriber Line (DSL) D. Satellite Internet
2. A key characteristic of a cable access network is that homes in a neighborhood typically:
A. Have a dedicated fiber optic line to the ISP router. B. Share the coaxial cable segment
back to the cable headend. C. Each have a dedicated copper pair to the central office. D.
Connect directly to the internet without a modem.
3. What is the primary function of a home network in relation to an ISP's access network?
A. To provide the "last mile" connection from the ISP to the home. B. To manage routing
between different cities. C. To connect devices within the home to each other and share
a single internet connection. D. To replace the need for a modem.
4. Which device is essential for connecting devices within a home network wirelessly?
5. Which layer of the Internet Protocol stack is responsible for the routing of datagrams
from a source host to a destination host across multiple networks?
6. FTP, SMTP, and HTTP are examples of protocols at which layer of the Internet Protocol
stack?
7. Which layer of the Internet Protocol stack encapsulates datagrams into frames?
A. Physical Layer B. Data Link Layer (Link Layer) C. Network Layer D. Transport Layer
8. The "bits on the wire" are primarily the concern of which layer of the Internet Protocol
stack?
10.Which HTTP status code indicates that the request succeeded and the requested object
is in the message body?
A. The server is currently unavailable. B. The requested document was not found. C.
The client's request message was not understood by the server. D. The server has
moved the requested object.
12.Which HTTP status code suggests that the requested object has been permanently
relocated to a new URL?
A. It caches DNS queries for local users. B. It is the DNS server that definitively provides
the answer for that hostname. C. It directs queries to the root servers. D. It performs
MAC-to-IP address resolution.
A. 1 B. 7 C. 13 D. Hundreds
19.A socket is an interface between which two layers of the Internet Protocol stack?
A. Physical and Link B. Network and Transport C. Transport and Application D.
Application and Physical
20.When a TCP segment arrives at a receiving host, which unique identifier is primarily
used for demultiplexing it to the correct application process?
21.If a sender transmits a TCP segment with Sequence Number = 500 and the segment
contains 100 bytes of application data, what is the sequence number of the next byte the
sender will transmit?
22.A TCP receiver sends an Acknowledgement (ACK) number of 750. What does this
indicate?
24.When a router needs to forward an IP packet, and multiple entries in its forwarding table
match the destination IP address, which rule does it follow? A. Randomly choose one
matching entry. B. Choose the entry with the shortest prefix match. C. Choose the entry
with the longest prefix match. D. Prioritize the default route.
25.What is the primary characteristic of devices within the same subnet?
A. They are always in different physical locations. B. They can communicate directly
without an intervening router. C. They must have different network prefixes in their IP
addresses. D. They are connected only by wireless links.
A. The length of the frame. B. The priority of the frame. C. The higher layer protocol
encapsulated in the frame. D. The error checking result.
29.If a Link Layer switch receives a frame with a destination MAC address not found in its
forwarding table, what will it do? A. Discard the frame immediately. B. Send an ARP
request to find the destination. C. Flood the frame out all interfaces except the one it
arrived on. D. Send an ICMP error message back to the source.
30.Which of the following statements about MAC addresses is true? A. They change as a
packet travels from source to destination across multiple networks. B. They are logical
addresses configured by software. C. They are primarily used for global routing across
the Internet. D. They are fixed to the network interface hardware and remain the same
for a device regardless of the network it connects to.
Answers:
1. C
2. B
3. C
4. C
5. C
6. D
7. B
8. D
9. B
10.C
11.C
12.D
13.B
14.C
15.B
16.C
17.C
18.C
19.C
20.C
21.C
22.B
23.B
24.C
25.B
26.B
27.C
28.C
29.C
30.D