Pages

Subscribe:

Ads 468x60px

Featured Posts

Get 300-101 Practice Exam Questions With 100% Assurance


All of us are acutely aware of the Cisco Implementing Cisco IP Routing (ROUTE) exam and its growing importance in the IT job marketplace. The candidates of this Cisco Implementing Cisco IP Routing (ROUTE) had to prepare technically and in an in-depth way because of the diverse topics and sophisticated technologies used in the 300-101 exam. In this connection, your success can’t be completed with aid and assistance of our highly useful products. The 300-101 exam dumps are offered by our company are organized in such a way that they can l of us are acutely aware of the Cisco Implementing Cisco IP Routing (ROUTE) exam and its growing importance in the IT job marketplace. The candidates of this Cisco Implementing Cisco IP Routing (ROUTE) had to prepare technically and in an in-depth way because of the diverse topics and sophisticated technologies used in the 300-101 exam. In this connection, your success can’t be completed with aid and assistance of our highly useful products. The 300-101 exam dumps are offered by our company are organized in such a way that they can fulfill the requirements of the Cisco 300-101 exam in the best possible manner. Passing the Implementing Cisco IP Routing (ROUTE) on the very first try is a tough job but according to the facts, most of our customers have actually passed the Implementing Cisco IP Routing (ROUTE Exam) in first the try which indeed exhibits the quality of our developed products. We are providing 100% complete success assurance to all our customers, otherwise money back guarantee is also offered.


300-101 PDF Dumps Questions And Answers

Today, the Implementing Cisco IP Routing (ROUTE) exam candidates want to get 300-101 dumps pdf to study at their own pace, and we fully respect the demands of our valued customers, thus offer the 300-101 PDF dumps questions sample question and answer feature to the customers for the 300-101. The 300-101 sample questions PDF of the files is instant and easy to download in nature which can be used afterward anytime and anywhere by the candidates. All the Implementing Cisco IP Routing (ROUTE) exam instructions are clearly mentioned so that the customers by following these instructions can quickly download and access the exam content and preparation material.
Keeping in view the importance of Cisco 300-101 certification exam, we have reduced 300-101 braindumps prices to flat 30% discount. The discount is already applied on Implementing Cisco IP Routing (ROUTE) exam products for the ultimate convenience and assistance of the customers. The 300-101 test questions for customers are also free to use the free 300-101 before investing into the products.


Guaranteed Success With Verified 300-101 Answers

Marks4sure 300-101 braindumps questions come with quick and comprehensive pdf format that are being utilized and introduced by our company, so that they can fulfill the technicalities of the Cisco Implementing Cisco IP Routing (ROUTE) requirements in a short time period. The 300-101 new questions and practice exam questions are offered by our Cisco certified professional is equally supportive and effective for all the candidates, either those who have got the relevant work experience or those who are new to this field. The 300-101 pdf products are user-friendly and can be used in any device by the customers.





How to Pass Cisco 820-605 Exam - Marks4sure


Preparation of any exam is not easy, especially when a person wants to pass it with a good score, same is the case with Cisco 820-605 VCE Exam as it not only requires hard work, but also the practice questions which will assist in the preparation of the Implementing Cisco IP Routing exam. Preparing for the Cisco Customer Success Manager (CSM) 820-605 certification Exam by getting the 820-605 Questions Answers from a reliable source makes a candidate confident which makes him/her able to score high because confidence is required for gaining success in everything in life. The 820-605 Braindumps are great in a sense that they can turn the weakness of a candidate of not feeling fully prepared for the Cisco Implementing Cisco IP Routing exam into the strength of feeling fully prepared and able to solve every single question no matter how tough it is.

 820-605 Practice Test


The individual who wants to get the guidance and assistance for passing the 820-605 Test with high score can go for signing up the websites which offer the 820-605 Real Exam Questions because it is the only way to get successful in the Cisco Customer Success Manager (CSM) exam. The candidates who are going to appear in the exam can download 820-605 Exam Dumps from the website offering them because it helps them in getting ready for the tough Implementing Cisco IP Routing exam. A person should not think that the 820-605 Exam Questions that they will be given to answer will be tough and they will feel worried when the Cisco Customer Success Manager (CSM) exam questions will be shown to them because the Cisco 820-605 Practice Test is the perfect thing which not only prepares a person for scoring high, but also makes him/her feel confident about how to Pass 820-605 Exam. https://www.marks4sure.com/820-605-exam.html

There is a special assistance available on any website for the candidates who want to pass the 820-605 Test for which they offer their service by arranging and giving free 820-605 Dumps that are good for the student’s preparation.  Not only the dumps, but there are also free 820-605 Exam Questions which are not a hectic task to download. The Cisco 820-605 Dumps enhances the performance level of the individuals who are struggling to get the Implementing Cisco IP Routing exam certification and it is a good idea to get the help of the Cisco Questions available for the practice because it is the only way through which a person can know that he/she is ready to perform well in the Implementing Cisco IP Routing exam. There are some sources available which provides the 820-605 Test Engine for determining if the person is ready for taking the Cisco Customer Success Manager (CSM) exam.

The country in which a person lives don’t matter, individuals living in any corner of the world can get the Cisco 820-605 Practice Exam as there is only a requirement of having an internet connection through which a person can download 820-605 Test Questions. So, there is no need to take tension if the person is not the resident of USA or Canada. Marks4Sure offer to download the Implementing Cisco IP Routing 820-605 PDF while the others have different processes through which they provide the Cisco 820-605 Study Material to those who need it for the perfect performance and to get the Cisco Customer Success Manager (CSM) certification with good marks.





Predict the data flow between two hosts across a network

Determine the path between two hosts across a network
Once you create an internetwork by connecting your WANs and LANs to a router, you’ll need to configure logical network addresses, such as IP addresses, to all hosts on the internetwork so that they can communicate across that internetwork.

The term routing is used for taking a packet from one device and sending it through the network to another device on a different network. Routers don’t really care about hosts—they only care
about networks and the best path to each network. The logical network address of the destination host is used to get packets to a network through a routed network, and then the hardware address of the host is used to deliver the packet from a router to the correct destination host.

If your network has no routers, then it should be apparent that you are not routing. Routers route traffic to all the networks in your internetwork. To be able to route packets, a router must know,
at a minimum, the following:

  • Destination address
  • Neighbor routers from which it can learn about remote networks
  • Possible routes to all remote networks
  • The best route to each remote network
  • How to maintain and verify routing information


The router learns about remote networks from neighbor routers or from an administrator. The router then builds a routing table (a map of the internetwork) that describes how to find the remote networks. If a network is directly connected, then the router already knows how to get to it.


If a network isn’t directly connected to the router, the router must use one of two ways to learn how to get to the remote network: static routing, meaning that someone must hand-type all network locations into the routing table, or something called dynamic routing. In dynamic routing, a protocol on one router communicates with the same protocol running on neighbor routers. The routers then update each other about all the networks they know about and place this information into the routing table. If a change occurs in the network, the dynamic routing protocols automatically inform all routers about the event. If static routing is used, the administrator is responsible for updating all changes by hand into all routers. Typically, in a large network, a combination of both dynamic and static routing is used.

Figure 1.10 shows a simple two-router network. Lab_A has one serial interface and three LAN interfaces.
Looking at Figure 1.10, can you see which interface Lab_A will use to forward an IP datagram to a host with an IP address of 10.10.10.10?



By using the command show ip route, we can see the routing table (map of the internetwork) that Lab_A uses to make forwarding decisions:



The C in the routing table output means that the networks listed are “directly connected,” and until we add a routing protocol—something like RIP, EIGRP, or the like—to the routers in our
internetwork (or use static routes), we’ll have only directly connected networks in our routing table.

So let’s get back to the original question: By looking at the figure and the output of the routing table, can you tell what IP will do with a received packet that has a destination IP address of
10.10.10.10? The router will packet-switch the packet to interface FastEthernet 0/0, and this interface will frame the packet and then send it out on the network segment.

Because we can, let’s do another example: Based on the output of the next routing table, which interface will a packet with a destination address of 10.10.10.14 be forwarded from?

First, you can see that the network is sub-netted and each interface has a different mask. And I have to tell you—you just can’t answer this question if you can’t subnet! 10.10.10.14 would be a
host in the 10.10.10.8/29 subnet connected to the FastEthernet0/1 interface.

Figure 1.11 shows a LAN connected to Router A, which is, in turn, connected via a WAN link to RouterB. RouterB has a LAN connected with an HTTP server attached.



The critical information you need to glean from this figure is exactly how IP routing will occur in this example. Okay—we’ll cheat a bit. I’ll give you the answer, but then you should go back
over the figure and see if you can answer example 2 without looking at my answers.

1. The destination address of a frame, from HostA, will be the MAC address of the F0/0 interface of the RouterA router.
2. The destination address of a packet will be the IP address of the network interface card (NIC) of the HTTP server.
3. The destination port number in the segment header will have a value of 80.

That example was a pretty simple one, and it was also very to the point. One thing to remember is that if multiple hosts are communicating to the server using HTTP, they must all use a
different source port number. That is how the server keeps the data separated at the Transport layer.

Let’s mix it up a little and add another internetworking device into the network and then see if you can find the answers. Figure 1.12 shows a network with only one router but two switches


What you want to understand about the IP routing process here is what happens when HostA sends data to the HTTPS server:

1. The destination address of a frame, from HostA, will be the MAC address of the F0/0 interface of the RouterA router.
2. The destination address of a packet will be the IP address of the network interface card (NIC) of the HTTPS server.
3. The destination port number in the segment header will have a value of 443.

Notice that the switches weren’t used as either a default gateway or another destination. That’s because switches have nothing to do with routing. I wonder how many of you chose the
switch as the default gateway (destination) MAC address for HostA? If you did, don’t feel bad— just take another look with that fact in mind. It’s very important to remember that the destination MAC address will always be the router’s interface—if your packets are destined for outside the LAN, as they were in these last two examples.

Before we move into some of the more advanced aspects of IP routing, let’s discuss ICMP in more detail, as well as how ICMP is used in an internetwork. Take a look at the network shown
in Figure 1.13. Ask yourself what will happen if the LAN interface of Lab_C goes down.

Lab_C will use ICMP to inform Host A that Host B can’t be reached, and it will do this by sending an ICMP destination unreachable message. Lots of people think that the Lab_A router
would be sending this message, but they would be wrong because the router that sends the message is the one with that interface that’s down is located.


Let’s look at another problem: Look at the output of a corporate router’s routing table:



What do we see here? If I were to tell you that the corporate router received an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3, what do you
think the Corp router will do with this packet?

If you said, “The packet came in on the FastEthernet 0/0 interface, but since the routing table doesn’t show a route to network 192.168.22.0 (or a default route), the router will discard the
packet and send an ICMP destination unreachable message back out interface FastEthernet 0/0,” you’re a genius! The reason it does this is because that’s the source LAN where the packet
originated from.

Understanding Ethernet and Switch Operations

Ethernet was developed in the 1970s by Digital Equipment Corporation (DEC), Intel, and Xerox. Later, the IEEE defined new standards for Ethernet called Ethernet 802.3. 802.3 is the standard that is in use today.

Ethernet 
Ethernet is one of the most widely used LAN standards. As Figure 3-1 shows, Ethernet operates at Layers 1 and 2 of the OSI model.

Figure 3-1 Physical and Data Link Layers


The physical layer (Layer 1) defines cabling, connection specifications, and topology.
The data link layer (Layer 2) has the following functions:
  • Provides physical addressing
  • Provides support for connection-oriented and connectionless services
  • Provides frame sequencing and flow control
One sublayer performs data-link functions: the MAC sublayer. Figure 3-2 shows the Media Access Control (MAC) sublayer (802.3). The MAC sublayer is responsible for how data is sent over the wire. The MAC address is a 48-bit address expressed as 12 hex digits.

Figure 3-2 MAC Sublayer


The MAC sublayer defines the following:
  • Physical addressing
  • Network topology
  • Line discipline
  • Error notification
  • Orderly delivery of frames
  • Optional flow control

Ethernet LAN Connection Media
The term Ethernet encompasses several LAN implementations. Physical layer implementations vary, and all support various cabling structures. The following four main
categories of Ethernet exist:
  • Ethernet (DIX) and IEEE 802.3: Operate at 10 Mbps over coaxial cable, unshielded twisted-pair (UTP) cable, or fiber. The standards are referred to as 10BASE2, 10BASE5, 10BASE-T, and 10BASE-F.
  • Fast Ethernet or 100-Mbps Ethernet: Operates over UTP or fiber.
  • Gigabit Ethernet: An 802.3 extension that operates over fiber and copper at 1000 Mbps, or 1 gigabit per second (Gbps).
  • 10-Gigabit Ethernet: Defined in 802.3ae, runs in full-duplex mode only, over fiber.
Network Media Types
Network media refers to the physical path that signals take across a network. The most common types of media are as follows:
Twisted-pair cable: Used for telephony and most Ethernet networks. Each pair makes up a circuit that can transmit signals. The pairs are twisted to prevent interference (crosstalk). The two categories of twisted-pair cables are unshielded twisted-pair (UTP) and shielded twisted-pair (STP). UTP cable is usually connected to equipment with an RJ-45 connector. UTP (see Figure 3-3) has a small diameter that can be an advantage when space for cabling is at a minimum. It is prone to electrical noise and interference because of the lack of shielding. Examples of categories of UTP cable exist: CAT 1, CAT 2, CAT 3, CAT 4, CAT 5, CAT 5e, CAT 6, CAT 6a, CAT 7, and so on

Figure 3-3 UTP


Fiber-optic cable: Allows the transmission of light signals. This offers better support in bandwidth over other types of cables. The two types of fiber-optic cables are multimode and single-mode, defined as follows:
Multimode: With this type of fiber, several modes (or wavelengths) propagate down the fiber, each taking a slightly different path. Multimode fiber is used primarily in systems with transmission distances less than 2 km.
Single-mode: This type of fiber has only one mode in which light can propagate. Single-mode fiber is typically used for long-distance and high-bandwidth applications.

UTP Implementation
An RJ-45 connector is used with UTP cabling. Figure 3-4 shows an RJ-45 connector and its pin connections, following the T568B standards.
Figure 3-4 RJ-45 Connector

The two types of Ethernet cables are straight-through and crossover. Straightthrough cables are typically used to connect different devices (data terminal equipment [DTE] to data communications equipment [DCE]), such as switch-to-router connections. Figure 3-5 shows the pins for a straight-through cable.

Figure 3-5 Straight-Through Wiring

Crossover Ethernet cables are typically used to connect similar devices (DTE to DTE or DCE to DCE), such as switch-to-switch connections. Exceptions to this rule are switch-to-hub connections or router-to-PC connections, which use a crossover cable. Figure 3-6 shows the pins for a crossover cable.

Figure 3-6 Crossover Wiring


Role of CSMA/CD in Ethernet
All stations on an Ethernet segment are connected to the same media. Therefore, all devices receive all signals. When devices send signals at the same time, a collision occurs. A scheme is needed to detect and compensate for collisions. Ethernet uses a method called carrier sense multiple access collision detect (CSMA/CD) to detect and limit collisions.

In CSMA/CD, many stations can transmit on the Ethernet media, and no station has priority over any other. Before a station transmits, it listens to the network (carrier sense) to make sure that no other station is transmitting. If no other station is transmitting, the station transmits across the media. If a collision occurs, the transmitting stations detect the collision and run a backoff algorithm. The backoff algorithm computes a random time that each station waits before retransmitting.

Ethernet LAN Traffic
Three major types of network traffic exist on a LAN:
  • Unicasts: The most common type of LAN traffic. A unicast frame is a frame intended for only one host.
  • Broadcasts: Intended for all hosts. Stations view broadcast frames as public service announcements. All stations receive and process broadcast frames.
  • Multicasts: Traffic in which one transmitter tries to reach only a subset, or group, of the entire segment.
Ethernet Addresses
The Ethernet address, or MAC address, is the Layer 2 address of the network adapter of the network device. Typically burned into the adapter, the MAC address is usually displayed in a hexadecimal format such as 00-0d-65-ac-50-7f. As shown in Figure 3-7, the MAC address is 48 bits and consists of the following two components:

Organizational Unique Identifier (OUI): 24 bits. This is IEEE assigned and identifies the manufacturer of the card. Vendor-assigned: 24 bits. Uniquely identifies the Ethernet hardware.
Figure 3-7 MAC Addresses

Switching Operation
Ethernet switches perform four major functions when processing packets: learning, forwarding, filtering, and flooding.
Switches perform these functions by the following methods:
  • MAC address learning: Switches learn the MAC addresses of all devices on the Layer 2 network. These addresses are stored in a MAC address table.
  • Forwarding and filtering: Switches determine which port a frame must be sent out to reach its destination. If the address is known, the frame is sent only on that port, filtering other ports from receiving the frame. If it’s unknown, the frame is flooded to all ports except the one it originated from.
  • Flooding: Switches flood all unknown frames, broadcasts, and some multicasts to all ports on the switch except the one it originated from.
A switch uses its MAC address table when forwarding frames to devices. When a switch is first powered on, it has an empty MAC address table. With an empty MAC address table, the switch must learn the MAC addresses of attached devices. This learning process is outlined as follows using Figure 3-8: 
1. Initially, the switch MAC address table is empty

Figure 3-8 Frame Forwarding by a Switch

2. Station A with the MAC address 0260.8c01.1111 sends a frame to station C. When the switch receives this frame, it does the following:
a. Because the MAC table is empty, the switch must flood the frame to all other ports (except E0, the interface the frame was received).
b. The switch notes the source address of the originating device and associates it with port E0 in its MAC address table entry.
3. The switch continues to learn addresses in this manner, continually updating the table. As the MAC table becomes more complete, the switching becomes more efficient, because frames are forwarded to specific ports rather than being flooded out all ports.

Overview of the TCP/IP Networking Model

Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models

The TCP/IP model both defines and references a large collection of protocols that allow computers to communicate. To define a protocol, TCP/IP uses documents called Requests for Comments (RFC). (You can find these RFCs using any online search engine.) The TCP/IP model also avoids repeating work already done by some other standards body or vendor consortium by simply referring to standards or protocols created by those groups.

For example, the Institute of Electrical and Electronic Engineers (IEEE) defines Ethernet LANs; the TCP/IP model does not define Ethernet in RFCs, but refers to IEEE Ethernet as an option. An easy comparison can be made between telephones and computers that use TCP/IP. You go to the store and buy a phone from one of a dozen different vendors. When you get home and plug in the phone to the same cable in which your old phone was connected, the new phone works. The phone vendors know the standards for phones in their country and build their phones to match those standards.

Similarly, when you buy a new computer today, it implements the TCP/IP model to the point that you can usually take the computer out of the box, plug in all the right cables, turn it on, and it connects to the network. You can use a web browser to connect to your favorite website. How?
Well, the OS on the computer implements parts of the TCP/IP model. The Ethernet card, or wireless LAN card, built into the computer implements some LAN standards referenced by the TCP/IP model. In short, the vendors that created the hardware and software implemented TCP/IP.


To help people understand a networking model, each model breaks the functions into a small number of categories called layers. Each layer includes protocols and standards that relate to that category of functions. TCP/IP actually has two alternative models, as shown in Figure 1.9. Figure 1.9 The Two TCP/IP Networking Models

The model on the left, the original TCP/IP model, breaks TCP/IP into four layers. The top layers focus more on the applications that need to send and receive data, whereas the lower layers focus more on the need to somehow transmit the bits from one device to another. The model on the right is a newer version of the model, formed by expanding the network access layer on the left into two separate layers: data link and physical. Note that the model on the right is used more often today.

Many of you will have already heard of several TCP/IP protocols, like the examples listed in Table 1.3 TCP/IP Architectural Model and Example Protocols


Table 1.3 TCP/IP Architectural Model and Example Protocols

TCP/IP Application Layer
TCP/IP application layer protocols provide services to the application software running on a computer. The application layer does not define the application itself, but it defines services that applications need. For example, application protocol HTTP defines how web browsers can pull the contents of a web page from a web server. In short, the application layer provides an interface between software running on a computer and the network itself.

Table 1.3 TCP/IP Architectural Model and Example Protocols Arguably, the most popular
TCP/IP application today is the web browser. Many major software vendors either have already
changed or are changing their application software to support access from a web browser.

OSI Layers and Their Functions
Cisco requires that CCNAs demonstrate a basic understanding of the functions defined by each OSI layer, as well as remembering the names of the layers. You understand which layers of the OSI model most closely match the functions defined by that device or protocol.

Today, because most people happen to be much more familiar with TCP/IP functions than with OSI functions, one of the best ways to learn about the function of different OSI layers is to think about the functions in the TCP/IP model, and correlate those with the OSI model. If you use the five-layer TCP/IP model, the bottom four layers of OSI and TCP/IP map closely together. The only difference in these bottom four layers is the name of OSI Layer 3 (network) compared to TCP/IP (Internet). The upper three layers of the OSI reference model (application, presentation, and session—Layers 7, 6, and 5) define functions that all map to the TCP/IP application layer. Table 1.4 defines the functions of the seven layers.

Table 1.4 OSI Reference Model Layer Definitions


Table 1.5 lists most of the devices and protocols covered in the CCNA exams and their comparable OSI layers. Note that many network devices must actually understand the protocols at multiple OSI layers, so the layer listed in Table 1.5 actually refers to the highest layer that the device normally thinks about when performing its core work. For example, routers need to think about Layer 3 concepts, but they must also support features at both Layers 1 and 2.

Besides remembering the basics of the features of each OSI layer (as in Table 1.4), and some example protocols and devices at each layer (as in Table 1.5), you should also Layer Functional Description 4 Layer 4 protocols provide a large number of services, “Fundamentals of TCP/IP Transport, Applications, and Security.” Although OSI Layers 5 through 7 focus on issues related to the application, Layer 4 focuses on issues related to data delivery to another computer (for instance, error recovery and flow control).

3 The network layer defines three main features: logical addressing, routing (forwarding), and path determination. Routing defines how devices (typically routers) forward packets to their final destination. Logical addressing defines how each device can have an address that can be used by the routing process. Path determination refers to the work done by routing protocols to learn all possible routes, and choose the best route.

2 The data link layer defines the rules that determine when a device can send data over a particular medium. Data link protocols also define the format of a header and trailer that allows devices attached to the medium to successfully send and receive data.

1 This layer typically refers to standards from other organizations. These standards deal with the physical characteristics of the transmission medium, including connectors, pins, use of pins, electrical currents, encoding, light modulation, and the rules for how to activate and deactivate the use of the physical medium.\

Table 1.5 OSI Reference Model—Example Devices and Protocols


Memorize the names of the layers. You can simply memorize them, but some people like to use a mnemonic phrase to make memorization easier. In the following three phrases, the first letter of each word is the same as the first letter of an OSI layer name, in the order specified in parentheses:
  • All People Seem To Need Data Processing (Layers 7 to 1)
  • Please Do Not Take Sausage Pizzas Away (Layers 1 to 7)
  • Pew! Dead Ninja Turtles Smell Particularly Awful (Layers 1 to 7)

Identify common applications and their impact on the network

Identify common applications and their impact on the network
Describe the impact of applications (Voice over IP and Video over IP) on a network
The main purpose of the Host-to-Host layer is to shield the upper-layer applications from the complexities of the network. This layer says to the upper layer, “Just give me your data stream, with any instructions, and I’ll begin the process of getting your information ready to send.”

  • Transmission Control Protocol (TCP)
  • User Datagram Protocol (UDP)

By understanding how TCP and UDP work, you can interpret the impact of applications on
networks when using Voice and Video over IP.

Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP) takes large blocks of information from an application and breaks them into segments. It numbers and sequences each segment so that the destination’s TCP stack can put the segments back into the order the application intended. After these segments are sent, TCP (on the transmitting host) waits for an acknowledgment of the receiving end’s TCP virtual circuit session, retransmitting those that aren’t acknowledged.

Before a transmitting host starts to send segments down the model, the sender’s TCP stack contacts the destination’s TCP stack to establish a connection. What is created is known as a virtual circuit. This type of communication is called connection-oriented. During this initial handshake, the two TCP layers also agree on the amount of information that’s going to be sent before the recipient’s TCP sends back an acknowledgment. With everything agreed upon in advance, the path is paved for reliable communication to take place.

TCP is a full-duplex, connection-oriented, reliable, and accurate protocol, but establishing all these terms and conditions, in addition to error checking, is no small task. TCP is very complicated and, not surprisingly, costly in terms of network overhead. And since today’s networks are much more reliable than those of yore, this added reliability is often unnecessary.

TCP Segment Format
Since the upper layers just send a data stream to the protocols in the Transport layers, I’ll demonstrate how TCP segments a data stream and prepares it for the Internet layer. When the Internet layer receives the data stream, it routes the segments as packets through an internetwork. The segments are handed to the receiving host’s Host-to-Host layer protocol, which rebuilds the data stream to hand to the upper-layer applications or protocols.


Figure 1.7 shows the TCP segment format. The figure shows the different fields within the TCP header.


The TCP header is 20 bytes long, or up to 24 bytes with options. You need to understand what
each field in the TCP segment is:

  • Source port the port number of the application on the host sending the data.
  • Destination port The port number of the application requested on the destination host.
  • Sequence number A number used by TCP that puts the data back in the correct order or retransmits missing or damaged data, a process called sequencing.
  • Acknowledgment number The TCP octet that is expected next.
  • Header length The number of 32-bit words in the TCP header. This indicates where the data begins. The TCP header (even one including options) is an integral number of 32 bits in length. Reserved Always set to zero.
  • Code bits Control functions used to set up and terminate a session.
  • Window The window size the sender is willing to accept, in octets.
  • Checksum The cyclic redundancy check (CRC), because TCP doesn’t trust the lower layers and checks everything. The CRC checks the header and data fields.
  • Urgent A valid field only if the Urgent pointer in the code bits is set. If so, this value indicates the offset from the current sequence number, in octets, where the first segment of non-urgent data begins.
  • Options May be 0 or a multiple of 32 bits, if any. What this means is that no options have to be present (option size of 0). However, if any options are used that do not cause the option field to total a multiple of 32 bits, padding of 0s must be used to make sure the data begins on a 32-bit boundary.

Data Handed down to the TCP protocol at the Transport layer, which includes the upperlayer headers.

Let’s take a look at a TCP segment copied from a network analyzer:
TCP - Transport Control Protocol




Did you notice that everything I talked about earlier is in the segment? As you can see from the number of fields in the header, TCP creates a lot of overhead. Application developers may opt for efficiency over reliability to save overhead, so the User Datagram Protocol was also defined at the Transport layer as an alternative.

User Datagram Protocol (UDP)
If you were to compare the User Datagram Protocol (UDP) with TCP, the former is basically the scaled-down economy model that’s sometimes referred to as a thin protocol. Like a thin person on a park bench, a thin protocol doesn’t take up a lot of room—or in this case, much bandwidth on a network.

UDP doesn’t offer all the bells and whistles of TCP either, but it does do a fabulous job of transporting information that doesn’t require reliable delivery—and it does so using far fewer network resources. (UDP is covered thoroughly in Request for Comments 768.) 


There are some situations in which it would definitely be wise for developers to opt for UDP rather than TCP. Remember the watchdog SNMP up there at the Process/Application layer? SNMP monitors the network, sending intermittent messages and a fairly steady flow of status updates and alerts, especially when running on a large network. The cost in overhead to establish, maintain, and close a TCP connection for each one of those little messages would reduce what would be an otherwise healthy, efficient network to a dammed-up bog in no time!

Another circumstance calling for UDP over TCP is when reliability is already handled at the Process/Application layer. Network File System (NFS) handles its own reliability issues, making the use of TCP both impractical and redundant. But ultimately, it’s up to the application developer to decide whether to use UDP or TCP, not the user who wants to transfer data faster.

UDP does not sequence the segments and does not care in which order the segments arrive at the destination. But after that, UDP sends the segments off and forgets about them. It doesn’t follow through, check up on them, or even allow for an acknowledgment of safe arrival—complete abandonment. Because of this, it’s referred to as an unreliable protocol.

This does not mean that UDP is ineffective, only that it doesn’t handle issues of reliability. Further, UDP doesn’t create a virtual circuit, nor does it contact the destination before delivering information to it. Because of this, it’s also considered a connectionless protocol.

Since UDP assumes that the application will use its own reliability method, it doesn’t use any. This gives an application developer a choice when running the Internet Protocol stack: TCP for reliability or UDP for faster transfers.

So if you’re using Voice over IP (VoIP), for example, you really don’t want to use UDP, because if the segments arrive out of order (very common in IP networks), they’ll just be passed up to the next OSI (DoD) layer in whatever order they’re received, resulting in some seriously garbled data. On the other hand, TCP sequences the segments so they get put back together in exactly the right order—something that UDP just can’t do.

UDP Segment Format
Figure 1.8 clearly illustrates UDP’s markedly low overhead as compared to TCP’s hungry usage. Look at the figure carefully—can you see that UDP doesn’t use windowing or provide for acknowledgments in the UDP header?

It’s important for you to understand what each field in the UDP segment is: Source port Port number of the application on the host sending the data Destination port Port number of the application requested on the destination host Length Length of UDP header and UDP data Checksum Checksum of both the UDP header and UDP data fields Data Upper-layer data

UDP, like TCP, doesn’t trust the lower layers and runs its own CRC. Remember that the Frame Check Sequence (FCS) is the field that houses the CRC, which is why you can see the FCS information. The following shows a UDP segment caught on a network analyzer: