In the diagram above showing the representation of a TCP header, identify the fields that allow TCP to carry out its main function:
Using the following two lists, match each numbered item with the correct letter.
sequencing
flow control
multiplexing
error detection
a.check-sum/acknowledgement
b.sequence number
c.window/acknowledgement
d.source/destination port
Read the description of broadcast transmission in the box above. Can ARP use a broadcast to return information to PC1?
ARP could use a broadcast, but it will be able to identify PC1 using the source MAC address it finds in the frame carrying the ARP request, so it will use this instead.
In the previous example, the source address used in the frame identified R1 G0/0 as the source of the frame. Can you work out which source MAC address will be used when PC3 replies to PC1a?
PC3 will need to direct the frame to its default gateway using the MAC address of R1 G0/0 – 00:00:00:00:00:00.
TCP/IP protocols use check-sums to detect errors in the data they are responsible for transmitting. But how do errors occur and can we do anything about them?
Errors can creep into to an electrical signal at many points in a communication. They are caused by electrical interference and create electrical noise on the line, which can corrupt data. A digital ‘1’ may become a ‘0’, or a ‘0’ may become a ‘1’.
We have several techniques for detecting when an error occurred, and some techniques can say where the error occurred in the data. If we know where it occurred, we can simply ‘flip’ the bit back over.
Play CS Unplugged’s activity to learn more about one such technique.
Complete the activities in the Black Lab Book to put into practice what you have learned in this course about the complex interaction between the TCP/IP suite protocols.
You will need:
For more information, take a look at the following resources.
Now it’s time to test what you’ve learned in a quiz.
Grateful acknowledgement is made to the following sources:
Figure 1: Birmingham City University (BCU)
Figure 2: Birmingham City University (BCU)
Figure 3: Birmingham City University (BCU)
Figure 4: Birmingham City University (BCU)
Figure 5: Birmingham City University (BCU)
Figure 6: Birmingham City University (BCU)
Figure 7: Birmingham City University (BCU)
Figure 8: Birmingham City University (BCU)
Figure 9: Birmingham City University (BCU)
Figure 10: Birmingham City University (BCU)
Figure 11: Birmingham City University (BCU)
Figure 12: Birmingham City University (BCU)
Figure 13: Birmingham City University (BCU)
Figure 14: Cisco
Figure 15: Cisco
Figure 16: Jonas Bjork This file is licensed under the Creative Commons Attribution-Share Alike Licence http://creativecommons.org/ licenses/ by-sa/ 2.0/
Figure 17: Birmingham City University (BCU)
Figure 18: Birmingham City University (BCU)
Figure 19: Birmingham City University (BCU)
Figure 20: Cisco
Figure 21: Birmingham City University (BCU)
Figure 22: Birmingham City University (BCU)
Figure 23: Birmingham City University (BCU)
Figure 24: Birmingham City University (BCU)
Figure 25: Birmingham City University (BCU)
Figure 26: Cisco NetAcad/Birmingham City University (BCU)
Figure 27: Birmingham City University (BCU)
Figure 28: Birmingham City University (BCU)
Figure 29: Birmingham City University (BCU)
Figure 30: Birmingham City University (BCU)
Figure 31: Birmingham City University (BCU)
Figure 32: Birmingham City University (BCU)
Figure 33: Birmingham City University (BCU)
Figure 34: Birmingham City University (BCU)
Figure 35: Birmingham City University (BCU)
Every effort has been made to contact copyright holders. If any have been inadvertently overlooked the publishers will be pleased to make the necessary arrangements at the first opportunity.