Sie sind auf Seite 1von 22

CCNA CCNA shaiklakpathi09@gmail.

com/ +91 9493679209


1
1. What is OSI Layer Model?

OSI is the Open Systems Interconnection is a reference model which defines the standards of
communication between the computer systems/applications over the network. It is not implemented in
the real world but taken as the reference to how computers communicate with each other using
various protocols defined in each layer. There are 7 layers in the OSI model.

2. List the layers of OSI Model?

There are 7 layers in the OSI model i.e. :


1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data Link Layer
7. Physical Layer

3. Is there any other alternative model to the OSI model? If yes, explain it.

We have TCP/IP as an alternate model which also explains the standards of communication between
computers/application over the network. It is a much more simple model as compared to the OSI
layer model and also contains fewer details of protocols than the OSI model.

TCP/IP model has 4 layers whereas the OSI model is 7 layer architecture model. The 4 layers
of the TCP/IP model are Application Layer, Transport Layer, Internet Layer, Network Access
Layer.TCP-IP Model vs OSI Model

4. Explain the difference between TCP and UDP?

Comparison chart between TCP and UDP protocols

Difference between TCP and UDP

5. Explain the functions of Data Link, Network and Transport Layer?

6. Data Link Layer

a. It is the second layer of the OSI model.


b. It is responsible for the physical transformation data. It ensures the message delivery to the right
device on the basis of the MAC address.
c. It helps in generating error notification and flow control.
d. It provides services to the upper layer i.e. Network Layer by transforming packets into frames.
e. Data link layer adds the customized header into the messaging which contains hardware source
and destination MAC address.

7. Network Layer

a. It is the third layer of the OSI model.


b. It manages the network devices on the basis of IP address.
c. It is responsible for packet forwarding, routing and addressing.
d. It transmits data segments between networks in the form of packets.
e. It also determines the best path for the packet delivery between the Source IP Address and
Destination IP address.

Page |1
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
2
8. Transport Layer

a. Transport Layer is the fourth layer of the OSI model


b. It receives data from the Session Layer and segments it.
c. Each segment is made up of Source and Destination Port number, Protocol/Services
and Sequence number.
d. Transport layer has two well-known protocols— TCP and UDP.
e. It performs error checking. If any data segment is lost, it re-transmits the same.
f. It provides the feature of Data Integrity by maintaining flow control.

9. Explain the Physical Layer of the OSI model?

a. It is the 1st layer of the OSI model.


b. It converts the binary data received from Data Link Layer into signals and transmits them over the
local media which can be electrical signals, light etc. depending over the local media.
c. All the hardware such as NIC, Ethernet, ADSL, Bluetooth are the protocols of Physical Layer.

10. What is the difference between Half-Duplex and Full-Duplex?

Half-Duplex: In half-duplex data can travel in both directions but not at the same time. Either device
can send the data or can receive the data at a single point of time.

Full-Duplex: In Full-Duplex scenario, Data can travel in both direction at the same time. Data can
travel in both directions simultaneously.

11. Explain the difference between Flow Control and Error Control?

Flow Control: Flow Control is the function of adjusting the flow of data from one device to another
device in between adjacent OSI layers. It is used for ensuring that receiving device can handle all
incoming data. It is particularly used when sending device is capable of transmitting the data as a
much faster rate as compared to receiving a device.

Error Control: Error Control is the process of detecting and controlling the errors which arrive during
the transformation of data both the bit level and packet level errors.

During the transformation of data from one computer/application to another involves many steps,
each step can subject to error. With the Error Detection and Error Control process we can be that the
transmitted and received data is identical.

12. List the different protocols works at each layer of the OSI model?

1. Application Layer Protocols:

Telnet, FTP, TFTP, SMTP, DNS, BOOTP, SNMP, CMOT

2. Presentation Layer Protocols:

Page |2
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
3
Apple Filing Protocol (AFP), Independent Computing Architecture (ICA), Lightweight Presentation
Protocol(LPP), NetWare Core Protocol(NCP), Network Data Representation(NDR)

3. Session Layer Protocols:

Apple Talk Data Stream Protocol (ADSP), Apple Talk Session Protocol (ASP), H.245, Layer 2
Forwarding Protocol (L2F), NetBIOS, PAP, PPTP, RPC, RTCP, SMPP, SCP, SOCKS, ZIP, SDP

4. Transport Layer Protocols:

TCP, UDP, SST, SPX, SCTP, RUDP, MPTCP, FCP, CUDP, ATP

5. Network Layer Protocols:

IPv4, IPv6, RIP, EIGRP, ICMP, IGMP, EGP, DDP, CLNS, IPSec, IPX, PIM

6. Data Link Layer Protocols:

Ethernet, CDP, ATM, ARCnet, CAN, Econet, EAPS, FDDI, Frame Relay, HDLC, LAPD, LLDP, PPP,
NDP, SpaceWire, Token Ring, MPLS

7. Physical Layer:

Analog Transmission, Asynchronous Serial Communication, IEEE802.3, Repeater, Circuit switching,


Serial Communication, Passband, PHY, PhoneNet, Modem, CoaXpress

Top 50 Networking CCNA Interview Questions & Answers?

13. What is Port Number and Define the Range of Port Numbers?

A port number is a unique identification 16-bit unsigned number that is put in a header appended to a
message unit. They identify a specific process or network services.
When any message is received by the server or endpoints, it needs the mechanism to identify
for forwarding the message to right process, to identify the process we use the Port Numbers.

The range of Port Numbers:


a. Well Known Ports: 0 to 1023
b. Registered Ports: 1024 to 49151
c. Private or Open Ports: 49152 to 65535

14. Difference between Data Encapsulation and Data de-encapsulation?

When data is transfer from the higher layer to the lower layer. Each layer adds its header to the
original packet. This is known as Data Encapsulation.

When data is transferred from the lower layer to the higher layer, each layer removes the information
added by the other layers. It will remove the headers added by other layers and will insert its own

Page |3
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
4
header. This is known as Data de-encapsulation.

15. What is CRC? On which layer CRC works?

CRC is Cyclic Redundancy Check. It is used to detect errors in a network. It works at Data Link
Layer.
16. What is TCP Three-Way Handshake?

A TCP Three-way Handshake is a method to establish a connection between the client/localhost and
server. It has three steps in which client and server exchange their SYN and ACK packets before
data transfer take place. For Further Reading Please visit below Links:

DHCP Interview Questions and Answers ( Dynamic Host Control Protocol)


What is a Network Firewall? Why do we Need Network Firewall?
Cisco Learning Platform– OSI modelFeel free to share your views. Keep sharing and Keep Learning
!!
17.
1. List the layers of OSI?

The layers are stacked this way:

Application. Presentation. Session.

Transport. Network. Data link. Physical.

2. What are the responsibilities of data link layer?

The data link layer is also responsible for logical link control, media access control, hardware addressing,
error detection and handling and defining physical layer standards. It provides reliable data transfer by
transmitting packets with the necessary synchronization, error control and flow control.

3. What are the responsibilities of network layer?

The network layer is responsible for packet forwarding including routing through intermediate routers, since
it knows the address of neighboring network nodes, and it also manages quality of service (qos), and
recognizes and forwards local host domain messages to the transport layer (layer4).

4. What are the responsibilities of transport layer?

Major duties of transport layer are:

1. Creating an end-to-end connection between hosts in different network,

2. Error recovery,

3. Flow control,

4. Ensuring complete data transfer in tcp

5. Congestion avoidance

Major transport layer protocols

1. Tcp ( transmission control protocol)

2. Udp (user datagram protocol)


Page |4
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
5
3. Dccp (datagram congestion control protocol)

4. Sctp (stream control transmission protocol).

5. Routers work at which osi layer?

Routers operate on the third layer of the osi model, the network-control layer. Rather than passing packets
based on the media access control (mac) layer addresses (as bridges do), a router examines the packet's data
structure and determines whether or not to forward it.

6. Switches work at which osi layer?

A switch works at layer 2 of the osi model (data-link). It is a lan device that can also be called a multi-port
bridge. A switch switches ethernet frames between ethernet devices. Switches do not care about ip addresses
nor do they even examine ip addresses as the frames flow through the switch.

7. What is a window in networking terms?

A window refers to the number of segments that is allowed to be sent from source to destination before an
acknowledgement is sent back.

8. What is the role of the llc sub layer in data link layer?
18.

The logical link control (llc) data communication protocol layer is the upper sub-layer of the data link
layer (which is itself layer 2, just above the physical layer) in the seven-layer osi reference model. It
provides multiplexing mechanisms that make it possible for several network protocols (ip, ipx) to
coexist within a multipoint network and to be transported over the same network media, and can
also provide flow control mechanisms.

The llc sub-layer acts as an interface between the media access control (mac) sublayer and the
network layer.

As the ethertype in an ethernet ii framing formatted frame is used to multiplex different protocols on
top of the ethernet mac header it can be seen as llc identifier.

Operation the llc sublayer is primarily concerned with:


19.

Multiplexing protocols transmitted over the mac layer (when transmitting) and decoding them (when
receiving).

Providing flow and error control

The protocol used for llc in ieee 802 networks, such as ieee 802.3/ethernet (if the ethertype field isn't
used), ieee 802.5, and ieee 802.11, and in some non-ieee 802 networks such as fddi, is specified by the
ieee 802.2 standard.
Some non-ieee 802 protocols can be thought of as being split into mac and llc layers. For example,
while hdlc specifies both mac functions (framing of packets) and llc functions (protocol multiplexing,
flow control, detection, and error control through a retransmission of dropped packets when
indicated), some protocols such as cisco hdlc can use hdlc-like packet framing and their own llc
protocol.
Another example of a data link layer which is split between llc (for flow and error control) and mac
(for multiple access) is the itu-t g.hn standard, which provides high-speed local area networking over
existing home wiring (power lines, phone lines and coaxial cables).
Page |5
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
6
An llc header tells the data link layer what to do with a packet once a frame is received. It works like
this: a host will receive a frame and look in the llc header to find out where the packet is destined for -
for example, the ip protocol at the network layer or ipx.

The gprs llc layer also does ciphering and deciphering of sn-pdu (sndcp) packets.

9. What is the function of the application layer in networking?

The application layer is a layer in the open systems interconnection (osi) seven-layer model and in
the tcp/ip protocol suite. It consists of protocols that focus on process-to-process communication
across an ip network and provides a firm communication interface and end-user services.

10. What is the port no of dns and telnet?


20 ftp data (file transfer protocol)

21 ftp (file transfer protocol)

22 ssh (secure shell)

23 telnet

25 smtp (send mail transfer protocol)

53 dns (domain name service)

68 dhcp (dynamic host control protocol)

80 http (hypertext transfer protocol)

110 pop3 (post office protocol, version 3)

115 sftp (secure file transfer protocol)

119 nntp (network new transfer protocol)

123 ntp (network time protocol)

139 netbios

143 imap (internet message access protocol)

161 snmp (simple network management protocol)

220 imap3 (internet message access protocol 3)

389 ldap (lightweight directory access protocol)

443 ssl (secure socket layer)

11. Which service use both tcp and udp?

Dns and some other services work on both the protocols. We will take an example of dns service. Two
protocols are somewhat different from each other. Tcp is a connection-oriented protocol and it
requires data to be consistent at the destination and udp is connection-less protocol and doesn't

Page |6
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
7
require data to be consistent or don't need a connection to be established with host for consistency of
data.
20.
Udp packets are smaller in size. Udp packets can not be greater then 512 bytes. So any application
needs data to be transferred greater than 512 bytes require tcp in place. For example, dns uses both
tcp and udp for valid reasons described below. Note that udp messages are not larger than 512 bytes
and are truncated when greater than this size. Dns uses tcp for zone transfer and udp for name
queries either regular (primary) or reverse. Udp can be used to exchange small information whereas
tcp must be used to exchange information larger than 512 bytes. If a client doesn't get response from
dns it must re-transmit the data using tcp after 3-5 seconds of interval.

There should be consistency in dns zone database. To make this, dns always transfer zone data using
tcp because tcp is reliable and make sure zone data is consistent by transferring the full zone to other
dns servers who has requested the data.

The problem occurs when windows 2000 server and advanced server products uses dynamic ports
for all above 1023. In this case your dns server should not be internet facing i.e. Doing all standard
queries for

client machines on the network. The router (acl) must permitted all udp inbound traffic to access any
high udp ports for it to work.

Ldap always uses tcp - this is true and why not udp because a secure connection is established
between client and server to send the data and this can be done only using tcp not udp. Udp is only
used when finding a domain controller (kerberos) for authentication. For example, a domain client
finding a domain controller using dns.

12. In which layer term “frames” is used?

Data link layer

13. In which layer term “packets” is used?

Network layer

14. In which layer term “segments” is used?

Transport layer

21.

22. 15. Give some example for protocols work at application layer?
Bgp,dhcp,dns ftp http imap ldap mgcp nntp ntp pop onc/rpc rtp rtsp rip sip smtp snmp ssh telnet
tls/ssl xmpp

16. What is crc? Which layer crc works?

A cyclic redundancy check (crc) is an error-detecting code commonly used in digital networks and
storage devices to detect accidental changes to raw data. Blocks of data entering these systems get a
short check value attached, based on the remainder of a polynomial division of their contents. On
retrieval, the calculation is repeated and, in the event the check values do not match, corrective action
can be taken against data corruption.it work on data link layer

17. What is the purpose of the data link?

Page |7
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
8
It makes sure the appropriate physical protocol is assigned to the data. The data link layer is the
second layer in the osi model. The three main functions of the data link layer are to deal with
transmission errors, regulate the flow of data, and provide a well-defined interface to the network
layer.

18. Which one is reliable – tcp or udp?

Tcp

19. What is the port number of ftp (data) and ftp?


23.
24. FTP(Data) - 20
25. FTP - 21

20. Which layer provides logical addressing that routers will use for path determination?

Network layer

21. Which layer specifies voltage, wire speed, and pinout cables and moves bits between
devices?
Physical layer

22. Which layer combines bits into bytes and bytes into frames, uses mac addressing, and
provide error detection?

Data link layer

23. Which layer is responsible for keeping the data from different applications separate on the
network?

The session layer creates sessions between different hosts’ applications

24. Which layer segments and resembles data into a data stream?

Transport layer

25. Which layer provides the physical transmission of the data and handless error notification,
network topology, and flow control?

Data link layer

26. Which layer manages device addressing, tracks the location of devices on the network,
and determines the best way to move data?

Network layer

27. How data breaks down on each layer from top to bottom?

Table 1: pdu names on the layers of the osi model

Osi layer Pdu name

Application Data

Presentation Data

Page |8
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
9
Session Data

Transport Segment

Network Packet

Data link Frame

Physical Bits

28. Mac address works on which layer? What are the differences of mac sub layer and llc sub
layer?

Data link layer

29. Which layer is responsible for converting data packets from the data link layer into
electrical signals?

Physical layer

30. At which layer is routing implemented, enabling connections and path selection between
two end systems?

Network layer

31. Which layer defines how data is formatted, presented, encoded, and converted for use on
the network?

Presentation layer

32. Which layer is responsible for creating, managing and terminating sessions between app?

The session layer sets up, maintains, and terminates sessions between applications.

33. Dns uses which protocol? Why?

Dns queries consist of a single udp request from the client followed by a single udp reply from the server.
The transmission control protocol (tcp) is used when the response data size exceeds 512 bytes, or for
tasks such as zone transfers. Some resolver implementations use tcp for all queries.

34. Which layer is closer to the user?

Application layer

35. Differentiate between forward lookup and reverse lookup in dns?

Forward dns lookup is used to convert the human meaningful name (domain name) which is in easy to
understand format to computer meaningful name (ip address), however reverse dns lookup works in
reverse way to convert ip address to domain name.

36. What is ipsec?

Ipsec is an internet engineering task force (ietf) standard suite of protocols that provides data
authentication, integrity, and confidentiality as data is transferred between communication points across
ip networks. Ipsec provides data security at the ip packet level.

Page |9
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
10
37. What is the way to establish a tcp connection?

The tcp three-way handshake intransmission control protocol (also called the tcp-handshake; three
message handshake and/or syn-syn-ack) is the method used by tcp set up a tcp/ip connection over
aninternet protocol based network. Tcp's three way handshaking technique is often referred to as "syn-
syn-ack" (or more accurately syn, syn-ack, ack) because there are three messages transmitted by tcp to
negotiate and start a tcp session between twocomputers. The tcp handshaking mechanism is designed so
that two computers attempting to communicate can negotiate the parameters of the network tcp socket
connection before transmitting data such as ssh and http web browser requests.

This 3-way handshake process is also designed so that both ends can initiate and negotiate separate tcp
socket connections at the same time. Being able to negotiate multiple tcp socket connections in both
directions at the same time allows a single physical network interface, such as ethernet, to bemultiplexed
to transfer multiple streams of tcp data simultaneously.

38. What is the difference between flow control and error control?

Flow control and error control are the control mechanism at data link layer and transport layer.
Whenever the sends the data to the receiver these two mechanisms helps in proper delivering of the
reliable data to the receiver. The main difference between the flow control and error control is that the
flow control observes the proper flow of the data from sender to receiver, on the other hand, the error
control observes that the data delivered to the receiver is error free and reliable.

Most Common Interview Questions on OSI model

If you are looking for a Network Engineer, Network Administrator or any other IT
administrator job. OSI model is one the most common topic for the interviewer to ask you.
Today I am going to cover-up most of the interview questions related to OSI model.

(Q) What is OSI Model?

Ans:- Check my article The OSI Model’s Seven Layers Defined and Functions Explained

(Q) What is TCP?

TCP (Transmission Control Protocol) is a set of rules (protocol) used along with the Internet
Protocol (IP) to send data in the form of message units between computers over the
Internet. While IP takes care of handling the actual delivery of the data, TCP takes care of
keeping track of the individual units of data (called packets) that a message is divided into
for efficient routing through the Internet.

TCP provides end-to-end reliability between the application process running on one
computer system to another computer system by adding services on top of IP.

Basic Features of TCP:-

Some of the basic features of TCP are:-

• Data Transfer
• Reliability

P a g e | 10
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
11
• Connections
• Flow Control
• Precedence and security
• Multiplexing
How it Works:-

There are four distinct elements that uniquely identify a TCP connection. They are:-

• IP address of the Sender


• IP address of the receiver
• TCP port of the sender
• TCP port of the receiver
To establish a TCP session, the two computers participating in the session must first go
through what is known as the ” three-way handshake“. There are two scenarios where a
three-way handshake would take place, namely:-

• Establishing a connection ( an active open )


• Terminating a connection ( an active close)

The steps in the connection establishment are as follows:-

• Client:- sends a message with the SYN flag on


• Server:- Replies to the client with a message that has SYN and ACK flag on.
• Client:- replies on the server’s SYN/ACK message with an ACK message.
TCP Header:-

The standard TCP Header is defined in RFC 791 and the TCP packet structure is illustrated
as below picture:-

P a g e | 11
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
12
The TCP header is 20 bytes long, or up to 24 bytes with options. You need to understand
each field in the TCP segment is:-

Source Port:- The port number of the application on the host sending the data.

Destination port:- The port number of the application requested on the destination host.

Sequence Number:- A number used by TCP that puts the data back in the correct order or
re-transmits missing or damaged data, a process called sequencing.

Acknowledgment Number:- The TCP octet that is expected next.

Header length:- The number of 32-bit words in the TCP header. This indicates where the
data begins. The TCP header (Even one including options ) is an integral number of 32-bits
in length.

Reserved:- Always set to Zero

Code bits:- Control functions used to set up and terminate a session.

Window:- The window size the sender is willing to accept, in octets.

Checksum:-The cyclic redundancy check (CRC), because TCP doesn’t trust the lower layers
and checks everything. The CRC checks the header and data fields.

Urgent:- A valid field only if the urgent pointer in the code bits is set. If so, this value
indicates the offset from the current sequence number, in octets, where the first segment of
non-urgent data begins.

Options:- May be 0 or a multiple of 32-bits if any.

Data:- Handed down to the TCP protocol at the Transport layer, which includes the Upper
layer headers.

You can easily view all the TCP header information with Wireshark.

P a g e | 12
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
13
Error Recovery:-

Also known as reliability, TCP provides error recovery during data transfer sessions between
two end devices who have established a connection. The sequence and acknowledgment
fields in the TCP header are used to track every byte of data transfer and ensure that
missing bytes are retransmitted.

In below image, the Acknowledgment field sent by the web client (4000) implies the next
byte to be received; this is called forward acknowledgment.

TCP Acknowledgment Without Errors:-

TCP Acknowledgment With Errors:-

Flow Control:-

Flow control is handled by TCP through a process called windowing. The two end devices
negotiate the window size when initially establishing the connection; then they dynamically
renegotiate window size during the life of the connection, increasing its size until it reaches
the maximum window size of 65,535 bytes or until errors occur. The window size is
specified in the window field of

P a g e | 13
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
14
the TCP header. After sending the amount of data specified in the window size, the source
must receive an acknowledgment before sending the next window size of data.

What are differences between TCP and UDP?

What is User Datagram Protocol ( UDP):-

User Datagram Protocol is a protocol that is used at the Transport layer for connectionless,
non-guaranteed communications. Unlike TCP, UDP does not setup a connection and does
not use acknowledgments. UDP is given the Internet Protocol number of 17 and is defined
in RFC 768 .

UDP uses 16-bit port numbers similar TCP. When a UDP packet is sent to a port that is not
listening, it will respond with an ICMP port unreachable message to the packet sender.

Common network applications that use UDP include Domain Name System (DNS),
Streaming Media Applications, Voice over IP, Trival File Transfer Protocol ( TFTP) and online
Games.

UDP Header Format:-

The UDP header consists of four 16-bit fields ( 4 * 16), which makes a total of 8-bytes in
total length. The UDP header comes immediately after the IP header. Th details of
individual fields are as follows:-

Source Port:- A 16-bit field whose values can range from 0 to 65,535 specifying the source
port.

P a g e | 14
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
15
Destination Port:- A 16-bit field whose values can range from 0 to 65,535 specifying the
destination port.

Length:- A 16-bit field whose values can range from 0 to 65,535. it is the length of the UDP
header and the UDP data in bytes. The minimum value for this field is 8 bytes.

UDP Checksum:- A 16-bit field whose values can range from 0 to 65,535. The UDP
checksum covers the UDP header and the UDP data. With UDP the checksum is optional,
while the TCP it is mandatory.

Differences between TCP and UDP:-

TCP UDP

Sequenced Unsequenced

Reliable Unreliable

Connection-oriented Connectionless

Virtual Circuit Low Overhead

Acknowledgments No Acknowledgments

Windowing flow control No Windowing of flow control

Brief Explanation of Differences between TCP and UDP:-

Attributes TCP UDP

Acronym for Transmission Control Protocol User Datagram Protocol or


Universal Datagram Protocol

Function As a message makes its way UDP is also a protocol used in


across the internet from one message transport or transfer.
computer to another. This is This is not connection based
connection based. which means that one
program can send a load of
packets to another and that

P a g e | 15
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
16
would be the end of the
relationship.

Usage TCP is used in case of non- UDP is used for games or


time critical applications. applications that require fast
transmission of data. UDP’s
stateless nature is also useful
for servers that answer small
queries from huge numbers of
clients.

Examples HTTP, HTTPs, FTP, SMTP DNS, DHCP, TFTP, SNMP, RIP,
Telnet etc… VOIP etc…

Ordering of data TCP rearranges data packets UDP has no inherent order as
packets in the order specified. all packets are independent of
each other. If ordering is
required, it has to be
managed by the application
layer.

Speed of transfer The speed for TCP is slower UDP is faster because there is
than UDP. no error-checking for packets.

Reliability There is an absolute There is no guarantee that the


guarantee that the data messages or packets sent
transferred remains intact would reach at all.
and arrives in the same order
in which it was sent.

Header Size TCP header size is 20 bytes UDP Header size is 8 bytes.

Common Header Source port, Destination Source port, Destination port,


Fields port, Check Sum Check Sum

Streaming of data Data is read as a byte Packets are sent individually


stream, no distinguishing and are checked for integrity
indications are transmitted to only if they arrive. Packets
signal message (segment) have definite boundaries
boundaries. which are honored upon
receipt, meaning a read
operation at the receiver
socket will yield an entire
message as it was originally
sent.

Weight TCP requires three packets to UDP is lightweight. There is no


set up a socket connection ordering of messages, no
P a g e | 16
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
17
before any user data can be tracking connections, etc. It is
sent. TCP handles reliability a small transport layer
and congestion control. designed on top of IP.

Data Flow Control TCP does Flow Control. TCP UDP does not have an option
requires three packets to set for flow control
up a socket connection
before any user data can be
sent. TCP handles reliability
and congestion control.

Error Checking TCP does error checking UDP does error checking, but
no recovery options.

Fields 1. Sequence Number, 2. AcK 1. Length, 2. Source port, 3.


number, 3. Data offset, 4. Destination port, 4. Check
Reserved, 5. Control bit, 6. Sum
Window, 7. Urgent Pointer 8.
Options, 9. Padding, 10.
Check Sum, 11. Source port,
12. Destination port

Acknowledgement segments No Acknowledgment

Source for brief Explanation:- http://www.diffen.com/difference/TCP_vs_UDP

Popular Protocols that are supporting both TCP and UDP:-

DNS:- DNS uses TCP for Zone exchanges between server and UDP when a client is trying
to resolve a hostname to an IP-address.

LDAP:- LDAP always uses TCP – this is true and why not UDP because a secure connection
is established between client and server to send the data and this can be done only using
TCP, not UDP. UDP is only used when finding a domain controller (Kerberos) for
authentication. For example, a domain client finding a domain controller using DNS.

List of TCP and UDP port numbers

(Q) Which layer is responsible for converting data packets from the Data Link layer into electrical signals?

Ans:- Physical Layer

Explanation:- The Physical layer takes frames from the Data Link Layer and encodes the 1s
and 0s into a digital signal for transmission on the network medium.

(Q) At which layer is routing implemented, enabling connections and path selection between two end
systems. ?

P a g e | 17
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
18
Ans:- Network Layer

Explanation:- The Network layer provides routing through an inter-network and logical
addressing.

(Q) Which layer defines how data is formatted, presented, encoded, and converted for use on the
network?

Ans:- Presentation Layer

Explanation:- The Presentation layer makes sure that data is in a readable format for the
application layer.

(Q) Which layer is responsible for creating, managing and terminating sessions between applications?

Ans:- Session

Explanation:- The Session layer setup, maintains and terminates session between
applications.

(Q) Which layer provides logical addressing that routers will use for path determination?

Ans:- Network Layer

Explanation:- The Network layer provides logical addressing, typically IP addressing and
routing.

(Q) Which layer specifies voltage, wire speed, and pinout cables and moves bits between devices?

Ans:- Physical Layer

Explanation:- The Physical layer is responsible for the electrical and mechanical connections
between devices.

(Q) Which layer combines bits into bytes and bytes into frames, uses MAC addressing, and provide error
detection?

Ans:- Data Link Layer

Explanation:- The Data-link layer is responsible for the framing of data packets.

(Q) Which layer is responsible for keeping the data from different applications separate on the network?

Ans:- Session layer

Explanation:- The Session layer creates sessions between different host applications.

(Q) Which layer segments and resembles data into a data stream?
P a g e | 18
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
19
Ans:- Transport

(Q) Which layer provides the physical transmission of the data and handless error notification, network
topology, and flow control?

Ans:- Data Link Layer

(Q) Which Layer manages device addressing, tracks the location of devices on the network, and
determine the best way to move data?

Ans:- Network layer

(Q) How Data breaks down on each layer from top to bottom?

(Q) What is Data Encapsulation ? or Order of Encapsulation ? or Which layer is represented by


frames? Which layer is represented by segments? Which layer is represented by Packets? Which
Layer is represented by bits?

Ans:- Data encapsulation is the process that takes place when one host on a network needs
to send data to another host. As data is prepared for transit, it flows down through each
layer of the OSI model. At each layer, extra control information is added to the data before
being passed to the layer below. This process continues until the data reaches the physical
layer where the data is passed onto the network medium as a series of 0’s and 1’s.

P a g e | 19
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
20

(Q) DNS uses which protocol? Why?

DNS is using both TCP and UDP protocol. TCP for Zone exchanges between server
and UDP when a client is trying to resolve a hostname to an IP-address.

(Q) What are the differences between OSI and TCP/IP model?

• OSI is a reference model and TCP/IP is an implementation of OSI model.


• OSI has 7 layers whereas TCP/IP has only 4 layers The upper 3 layers of the OSI
model is combined with the TCP/IP model.
• OSI has physical layer, data link layer, network layer, transport layer, session
layer, presentation layer and application layer TCP/IP has: Network layer, Internet
layer, transport layer, and application layer.
(Q) MAC address works on which layer? What are the differences of MAC sublayer and LLC sublayer?

Ans:- MAC address works on the data-link layer.

MAC sublayer(802.3):- defines how to transmit data on physical layer

P a g e | 20
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
21
LLC sublayer(802.2):- responsible for identifying different protocol logically & encapsulate
them.

P a g e | 21
CCNA CCNA shaiklakpathi09@gmail.com/ +91 9493679209
22

P a g e | 22

Das könnte Ihnen auch gefallen