1.4 Subnet & IP's Flashcards

1
Q

RFC1918

A

RFC1918 defines private IP address ranges that are reserved for use within internal networks and are not routable on the public internet. These address ranges are used in home, business, and enterprise networks, allowing devices to communicate without requiring globally unique IP addresses. The three address ranges defined by RFC1918 are:

  • 10.0.0.0 to 10.255.255.255 (Class A)
  • 172.16.0.0 to 172.31.255.255 (Class B)
  • 192.168.0.0 to 192.168.255.255 (Class C)

For the exam, you should know that RFC1918 addresses are commonly used with Network Address Translation (NAT) to allow private networks to communicate with public networks. Understanding these address ranges and their role in private network configurations is important for network design, troubleshooting, and managing IP address allocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Network address translation (NAT)
A

Network Address Translation (NAT) is a process used in networking to modify IP address information in packet headers as they pass through a router or firewall. NAT allows multiple devices on a private network to share a single public IP address when accessing the internet. It translates private IP addresses (like those defined by RFC1918) to a public IP, enabling communication between internal devices and external networks.

For the exam, you should understand that NAT is essential for conserving public IP addresses and enhancing network security by masking internal IP addresses. You may also encounter terms like Static NAT (one-to-one mapping) and Dynamic NAT (many-to-one mapping), as well as Port Address Translation (PAT), which maps multiple private IP addresses to a single public IP using different ports. Knowing how NAT works, its types, and its role in network security and IP conservation is critical for network management and troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Port address translation (PAT)
A

Port Address Translation (PAT) is a type of Network Address Translation (NAT) that allows multiple devices on a local network to share a single public IP address while using different port numbers to distinguish between connections. PAT works by modifying the source IP address and port number of outbound packets, enabling the router to track active connections from various internal devices.

For the exam, you should know that PAT is often referred to as “NAT overload” because it overloads a single public IP address with multiple internal IP addresses. This method is widely used in home and enterprise networks to conserve public IP addresses while allowing multiple devices to access the internet simultaneously. Understanding how PAT operates, its benefits in managing network traffic, and its role in enhancing security by obscuring internal IP addresses is important for effective network design and troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Automatic Private IP Addressing (APIPA)

A

Automatic Private IP Addressing (APIPA) is a feature in Windows operating systems that automatically assigns a private IP address to a device when it fails to obtain an IP address from a DHCP server. APIPA uses the address range of 169.254.0.1 to 169.254.255.254, allowing devices on the same local network to communicate without requiring manual configuration.

For the exam, you should know that APIPA is beneficial in small networks where a DHCP server may be unavailable, enabling devices to communicate locally even without a configured IP address. However, devices using APIPA cannot communicate with devices outside their local network, as these addresses are not routable on the internet. Understanding the circumstances under which APIPA is used and its limitations is essential for troubleshooting connectivity issues in network environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Extended unique identifier (EUI-64)
A

Extended Unique Identifier (EUI-64) is a standard for creating unique 64-bit identifiers for network interfaces, particularly in IPv6 addressing. EUI-64 is derived from a device’s MAC (Media Access Control) address, which is typically 48 bits long. To convert a MAC address to an EUI-64 format, the process involves inserting a fixed 16-bit value in the middle and flipping the seventh bit of the first byte.

For the exam, you should know that EUI-64 allows devices to automatically generate their own IPv6 addresses by appending the EUI-64 identifier to the network prefix. This process simplifies address configuration and ensures uniqueness across devices in a network. Understanding the significance of EUI-64 in IPv6 addressing, its creation process from MAC addresses, and its role in Stateless Address Autoconfiguration (SLAAC) is important for comprehending IPv6 networking and addressing schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Multicast
A

Multicast is a method of data transmission where information is sent from one source to multiple destinations simultaneously. Unlike unicast, which sends data to a single recipient, or broadcast, which sends data to all devices in a network, multicast allows for efficient use of network resources by sending a single copy of the data to a specified group of interested receivers.

For the exam, you should know that multicast uses specific IP address ranges, typically from 224.0.0.0 to 239.255.255.255 in IPv4. It is commonly used in applications such as video conferencing, streaming media, and online gaming, where data needs to be delivered to multiple users at once. Understanding multicast addressing, the role of multicast groups, and how protocols like Internet Group Management Protocol (IGMP) manage multicast traffic is essential for effective network design and resource management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Unicast
A

Unicast is a method of data transmission where information is sent from one sender to one specific recipient over a network. This one-to-one communication ensures that the data packets are directed to a single device’s unique IP address, making it the most common form of data transfer used in various applications, including web browsing, file transfers, and email.

For the exam, you should know that unicast communication is characterized by its direct, dedicated nature, which can lead to increased bandwidth consumption when multiple devices request the same data, as each device requires its own separate stream. Understanding the concept of unicast, its advantages in straightforward communication, and its limitations in terms of scalability and efficiency in high-demand scenarios is important for effective network design and performance optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Anycast
A

Anycast is a network addressing and routing method in which data is sent from a source to the nearest or best destination within a group of potential receivers that share the same IP address. In an anycast setup, multiple devices (usually servers) can share the same IP address, and the network routes the data to the closest or most optimal server based on routing metrics.

For the exam, you should know that anycast is commonly used in content delivery networks (CDNs) and DNS services to improve response times and load balancing. It enhances redundancy and resilience, as traffic can be automatically rerouted to another server in the event of a failure. Understanding how anycast differs from unicast and multicast, along with its applications and benefits in network design, is crucial for optimizing performance and resource utilization in distributed systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Broadcast
A

Broadcast is a method of data transmission where a message is sent from one sender to all devices in a network segment. In a broadcast, the data packets are sent to a special broadcast address that all devices on the local network recognize and process. This means every device receives the broadcast message, regardless of whether it is the intended recipient.

For the exam, you should know that broadcast communication is commonly used in local area networks (LANs) for tasks such as address resolution protocol (ARP) requests and network discovery. However, broadcast traffic can lead to network congestion if overused, as every device must process the incoming packets. Understanding the implications of broadcast communication, its uses, and its limitations in larger or segmented networks is essential for effective network management and design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Link local
A

Link-local addresses are IP addresses that are automatically assigned to network interfaces for communication within a single local network segment. In IPv4, link-local addresses range from 169.254.0.0 to 169.254.255.255 (commonly used in APIPA). In IPv6, link-local addresses always start with the prefix fe80::/10. These addresses are used when a device cannot obtain an IP address through DHCP or other means but still needs to communicate with other devices on the same local network.

For the exam, you should know that link-local addresses are only valid within the local network segment and are not routable beyond it, meaning they cannot be used for communication across different networks. Understanding how link-local addressing works, especially in the context of troubleshooting network connectivity issues and identifying automatic address assignment processes, is important for managing both IPv4 and IPv6 networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Loopback

A

Loopback refers to a special network interface that allows a device to send and receive data to and from itself. The loopback address in IPv4 is 127.0.0.1, and in IPv6, it is represented as ::1. This interface is commonly used for testing and troubleshooting purposes, as it enables software applications and network configurations to be validated without needing to send traffic over a physical network.

For the exam, you should know that loopback addresses are essential for diagnosing network issues, testing server applications, and verifying that the TCP/IP stack is functioning correctly. Understanding how loopback interfaces operate and their significance in network diagnostics is crucial for effective network management and troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Default gateway
A

A default gateway is a network node that serves as an access point or router for devices on a local network to communicate with external networks, such as the internet. It is the IP address of the router or device that traffic is sent to when a device does not have a specific route for a destination IP address. Typically, devices on the same local network segment will have the same default gateway address.

For the exam, you should know that configuring a default gateway is essential for enabling communication between local devices and external networks. Without a correctly set default gateway, devices can only communicate with others on the same local network and cannot access resources outside of it. Understanding how to identify, configure, and troubleshoot default gateway settings is vital for effective network connectivity and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Classless (variable-length
subnet mask)

A

Classless Inter-Domain Routing (CIDR), often associated with variable-length subnet masking (VLSM), is a method for allocating IP addresses and managing network routing more efficiently than the traditional class-based system. CIDR allows for flexible subnetting by permitting subnet masks of varying lengths, which means network administrators can create subnets of different sizes based on actual needs rather than being restricted to fixed classful boundaries (Class A, B, or C).

For the exam, you should know that CIDR is represented in notation using the IP address followed by a slash and the subnet mask length (e.g., 192.168.1.0/24). This flexibility in subnetting improves address space utilization and reduces waste of IP addresses. Understanding CIDR and VLSM is crucial for designing scalable networks, optimizing routing tables, and efficiently managing IP address allocations across various network segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Classful IPv4 Subnetting - A

A

Classful addressing is a method of allocating IP addresses based on predefined classes that dictate how the address space is divided among networks. Class A is one of these classes, designated for large networks. It uses the first octet (8 bits) for network identification and the remaining three octets (24 bits) for host identification, allowing for over 16 million possible host addresses within a single Class A network.

For the exam, you should know that Class A addresses range from 1.0.0.0 to 126.0.0.0. The first bit of a Class A address is always set to 0, which identifies it as a Class A address. Class A is primarily used by very large organizations or service providers that need to assign a vast number of IP addresses to devices within a single network. Understanding the structure of Class A addresses, their range, and their application in network design is important for grasping the fundamentals of IP addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Classful IPv4 Subnetting - B

A

Classful addressing defines a structure for IP addresses, and Class B is one of the primary classes used to allocate IP space. Class B addresses are designed for medium to large networks, utilizing the first two octets (16 bits) for network identification and the remaining two octets (16 bits) for host identification. This allows for up to 65,536 possible hosts within a single Class B network.

For the exam, you should know that Class B addresses range from 128.0.0.0 to 191.255.255.255. The first two bits of a Class B address are set to “10,” which distinguishes it from other classes. Class B is typically used by organizations that require a significant number of IP addresses but do not need as many as a Class A network provides. Understanding the structure, range, and application of Class B addresses is essential for effective IP address management and network design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Classful IPv4 Subnetting - C

A

Classful addressing is a scheme that categorizes IP addresses into different classes based on their intended use and the number of hosts they can accommodate. Class C addresses are primarily used for small networks, such as local area networks (LANs), where fewer hosts are required. In Class C, the first three octets (24 bits) are designated for network identification, while the last octet (8 bits) is used for host identification, allowing for up to 256 possible host addresses per network.

For the exam, you should know that Class C addresses range from 192.0.0.0 to 223.255.255.255. The first three bits of a Class C address are set to “110,” which helps identify it as a Class C address. Class C is commonly used by small businesses and organizations that do not require a large number of IP addresses. Understanding the structure, range, and typical applications of Class C addresses is crucial for managing IP address allocation and network design effectively.

17
Q

Classful IPv4 Subnetting - D

A

Classful addressing includes a variety of classes for different networking needs, and Class D is specifically designated for multicast groups rather than traditional host addressing. Class D addresses use the first four bits set to “1110,” and they do not allocate any bits for host identification.

For the exam, you should know that Class D addresses range from 224.0.0.0 to 239.255.255.255. These addresses are used to send data to multiple recipients simultaneously, making them ideal for applications like video conferencing, streaming media, and other multicast traffic. Class D is not used for standard host-to-host communication but rather for scenarios where data needs to be delivered to a group of devices. Understanding the purpose and range of Class D addresses is essential for grasping multicast communication principles in networking.

18
Q

Classful IPv4 Subnetting - E

A

Class E addressing is reserved for experimental purposes and research, and it is not used for regular IP address assignments in standard networking. This class allows for future expansion and experimentation with new networking technologies and protocols. Class E addresses do not conform to the typical rules of classful addressing regarding network and host identification.

For the exam, you should know that Class E addresses range from 240.0.0.0 to 255.255.255.255. The first four bits of a Class E address are set to “1111,” indicating that it is a reserved class. Because Class E is not intended for general use in routing or addressing, it is essential to understand its purpose as a reserved space for experimental and future networking applications. Familiarity with Class E and its limitations helps provide a comprehensive understanding of the classful addressing scheme.

19
Q
  • Classless Inter-Domain Routing (CIDR) notation
A

Classless Inter-Domain Routing (CIDR) notation is a method used to specify IP addresses and their associated routing prefixes. Instead of relying on traditional classful addressing, CIDR allows for variable-length subnet masks (VLSM), which enhances IP address allocation efficiency. In CIDR notation, an IP address is followed by a slash (/) and a number representing the number of bits in the subnet mask (e.g., 192.168.1.0/24).

For the exam, you should know that CIDR notation enables more granular control over IP address allocation and routing, allowing for subnets of different sizes based on actual needs rather than fixed classes. This flexibility helps optimize the use of IP address space and reduces routing table size in network devices. Understanding CIDR notation is crucial for effective network design, IP address management, and routing in both IPv4 and IPv6 networks.

20
Q

IPv6 - Tunneling

A

Tunneling in IPv6 is a technique that allows IPv6 packets to be transmitted over an existing IPv4 network infrastructure. This is particularly useful for transitioning from IPv4 to IPv6, enabling IPv6-enabled devices to communicate over an IPv4-only network. Tunneling encapsulates IPv6 packets within IPv4 packets, allowing them to traverse IPv4 routers and networks until they reach an IPv6-enabled endpoint.

For the exam, you should know that several tunneling protocols exist, including 6to4, Teredo, and ISATAP. Each of these protocols has specific use cases and configurations for different network environments. Understanding how tunneling works, its role in IPv6 transition strategies, and the various tunneling protocols is essential for effective network design and management during the ongoing migration from IPv4 to IPv6.

21
Q

IPv6 - Dual stack

A

Dual stack is a networking approach that enables devices to run both IPv4 and IPv6 protocols simultaneously. This allows devices to communicate with both IPv4 and IPv6 networks, facilitating a smooth transition from IPv4 to IPv6 without disrupting existing services. In a dual stack environment, each device is assigned both an IPv4 address and an IPv6 address, allowing for flexible communication with both types of networks.

For the exam, you should know that dual stack is considered one of the most straightforward and effective methods for transitioning to IPv6, as it ensures compatibility with legacy IPv4 applications while gradually enabling IPv6 capabilities. Understanding the concept of dual stack, its benefits for network management, and how it supports the coexistence of both protocols is crucial for network design and troubleshooting during the IPv4 to IPv6 migration process.

22
Q

IPv6 - Shorthand notation

A

Shorthand notation, also known as abbreviated or compact notation, is used in IPv6 addressing to simplify the representation of lengthy hexadecimal addresses. IPv6 addresses are typically 128 bits long, expressed as eight groups of four hexadecimal digits separated by colons. Shorthand notation allows for two specific types of simplifications: zero compression and leading zero suppression.

For the exam, you should know that zero compression permits the replacement of contiguous groups of zeros with a double colon (::) to simplify the address, but this can only be done once in an address. Leading zero suppression allows omitting leading zeros in each group, making the address more concise. For example, the address 2001:0db8:0000:0000:0000:0000:0000:0001 can be shortened to 2001:db8::1. Understanding how to use shorthand notation for IPv6 addresses is important for efficient address representation and helps in reducing human error when configuring or documenting IPv6 networks.

23
Q

IPv6 - Router advertisement

A

Router Advertisement (RA) is a key component of the Neighbor Discovery Protocol (NDP) in IPv6 networking. It allows routers to inform devices on the network about their presence and provide essential information, such as the network prefix, default gateway, and other configuration parameters. RAs are sent periodically by routers or in response to Router Solicitation (RS) messages from hosts.

For the exam, you should know that RAs facilitate Stateless Address Autoconfiguration (SLAAC), enabling devices to automatically configure their own IPv6 addresses based on the information received from RAs. This process simplifies network configuration by allowing devices to join the network without manual settings. Understanding how Router Advertisements work, their role in SLAAC, and the information they provide is crucial for effective IPv6 network management and addressing.

24
Q

IPv6 - Stateless address autoconfiguration (SLAAC)

A

Stateless Address Autoconfiguration (SLAAC) is a method used in IPv6 networks that allows devices to automatically configure their own IPv6 addresses without requiring a DHCP server. This process relies on information provided through Router Advertisements (RAs) sent by routers on the network.

For the exam, you should know that SLAAC works by enabling devices to create their IPv6 addresses using the network prefix received in the RA and appending their own unique identifier, typically derived from their MAC address using the EUI-64 format. SLAAC simplifies network configuration by allowing devices to join the network seamlessly and automatically, making it especially useful in dynamic environments. Understanding how SLAAC operates, its reliance on RAs, and its advantages and limitations compared to stateful configurations like DHCPv6 is essential for effective IPv6 network design and management.

25
Q

Virtual IP (VIP)

A

A Virtual IP (VIP) is an IP address that does not correspond to a specific physical network interface but instead serves as an alias or abstraction for one or more real IP addresses. VIPs are commonly used in load balancing and failover scenarios, allowing multiple servers or devices to share a single IP address. This ensures that client requests can be directed to different servers without requiring changes in client configurations.

For the exam, you should know that VIPs facilitate high availability and scalability in network design. In load balancing, the VIP can distribute incoming traffic among multiple backend servers, enhancing performance and redundancy. In failover configurations, a VIP can seamlessly switch from a failed server to a backup server, minimizing downtime. Understanding the concept of Virtual IP addresses and their applications in load balancing and failover strategies is essential for designing resilient and efficient network architectures.

26
Q

Subinterfaces

A

Subinterfaces are virtual interfaces created on a physical network interface of a router or switch. They allow for the segmentation of a single physical interface into multiple logical interfaces, each with its own unique IP address and configuration. This enables more efficient use of network resources and supports different VLANs (Virtual Local Area Networks) or routing protocols on the same physical connection.

For the exam, you should know that subinterfaces are commonly used in situations where a single physical interface needs to support multiple network segments or VLANs. For example, in a router configured to connect multiple VLANs, each VLAN can be assigned a separate subinterface with its own IP address, allowing for inter-VLAN routing. Understanding how to configure and utilize subinterfaces is crucial for effective network segmentation, routing, and management, especially in complex network environments.