Chap 4 network Flashcards

1
Q

Key Aspects of Network Layer

A
  1. Routing: to determine the best path for data packets.
  2. IP Addressing: to uniquely identify devices on a network.
  3. Fragmentation and Reassembly: fragment large packets into smaller ones at the source and reassembled at the destination.
  4. Error Handling: to detect and handle errors that may occur during data transmission.
  5. Logical Addressing: for communication between devices.
    1.** Packet Forwarding:** to select the next-hop router or outgoing interface.
  6. Internet Protocol (IP): responsible for addressing, routing, and fragmenting/reassembling packets.
  7. Virtual Private Networks (VPNs): to encrypt and encapsulate data packets for secure transmission.
    1.** Quality of Service (QoS):** to ensure critical applications get sufficient network resources and bandwidth for optimal performance.
    1.** Tunneling:** to encapsulate one protocol’s packets within another protocol’s packets for transmission across an intermediary network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

network layer and role

A

The Network Layer is the third layer of the OSI model.
*
It plays a crucial role in computer networks by facilitating communication and routing data between different networks.
*
It enables the Internet and other interconnected networks to function effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Routing Algorithm

A

Algorithms used by routers to determine the best path for data packets to travel.
*
Consider factors like:

  1. ◦Network topology (layout)
  2. ◦Traffic congestion
  3. ◦Delay (latency)
  4. ◦Cost (bandwidth)

Goal: Efficiently route data to its destination.
*
Categories include Static Routing and Dynamic Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Static Routing

A

Manually configured paths for data packets.
*
Simple but inflexible, requires manual updates for network changes.
*
Each entry specifies:

  1. ◦Destination network: The network to which the route applies.
  2. ◦Next hop: The next router along the path.
  3. ◦(Optional) Administrative distance: A metric influencing route selection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advantages of Static Routing

A

Simple and easy to implement: suitable for small networks or those with clearly defined routing requirements.
*
Predictable and reliable:
*
Enhanced security: tighter control over network access, restricting unauthorized traffic from entering specific areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Limitations of Static Routing

A

Scalability limitations: As a network changes, manually configuring static routes on every device becomes increasingly complex and time-consuming.
*
Lack of adaptability:
Increased maintenance overhead: .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When to Use Static Routing

A

Small, stable networks: patterns are well-defined and unlikely to change frequently.
*
Specific control needed: want to manually define allowed routes.
*
Limited resources:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dynamic Routing

A

Adapts to network changes automatically.

More complex but offers greater flexibility and efficiency.

  • Employ algorithms to discover and update network paths.
  • Rely on information exchange between routers.

Main types:

  • Distance Vector Routing (e.g., RIP)
  • Link State Routing (e.g., OSPF)
  • Hybrid Routing (combines elements of both)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Distance Vector Routing

A

Routers exchange information about the “distance” (number of hops) to reach specific destinations with neighboring routers.
*
Simple and efficient, but may not always find the optimal path.
*
Example: RIP (Routing Information Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Link State Routing

A

Routers share information about the entire network topology with all other routers.
*
Can discover the optimal path, but requires more processing power and bandwidth.
*
Example: OSPF (Open Shortest Path First)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Benefits of Dynamic Routing

A
  1. scalability:
  2. Improved Efficiency:
  3. Reduced Administrative Overhead:
  4. Increased Reliability:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Limitations of Dynamic Routing

A
  1. Increased network overhead.
  2. Complexity of configuration and management.
  3. Convergence time.
  4. Security concerns.
  5. Propagation of routing information.
  6. Impact of route flapping.
  7. Vendor interoperability issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Routing Information Protocol (RIP)

A

A distance vector routing protocol.

Routers exchange information about the “distance” (number of hops) to reach specific destinations.

  • Simple and efficient, suitable for small to medium-sized networks.
  • Two versions: RIPv1 and RIPv2
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two Main Versions of Routing Info Protocol

A

RIPv1:
* This is the original version of RIP.
* It utilizes classful routing, which can lead to inefficiencies in networks with varying subnet sizes.
* Lacks certain security features.

RIPv2:
* This version offers several improvements over RIPv1.
* Includes support for classless routing, which enables efficient routing across diverse network configurations.
* Introduces route tagging for better handling of different types of traffic.
* Provides authentication mechanisms to enhance security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RIP Working (Advertisement, Routing Updates, Routing Table Updates, Convergence)

A

Advertisement: Each router periodically broadcasts its routing table information to neighboring routers through RIP updates.

Routing Updates: These updates include details like:
1. Destination network address
1. Next hop router towards that network
1. Distance (number of hops) required to reach the destination

Routing Table Updates: Upon receiving RIP updates from neighboring routers, each router incorporates the information into its own routing table. The router selects the path with the lowest hop count for each destination network.
*
Convergence: Through this process of information exchange and table updates, the network eventually converges to a loop-free routing path, ensuring efficient and reliable data flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RIP Advantages

A
  1. Simple and easy to configure:
  2. Efficient for small to medium-sized networks:
  3. Low resource consumption
  4. Improved security (RIPv2):
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bellman-Ford Algorithm

A

Finds the shortest paths from a single source vertex to all other reachable vertices in a graph.

  1. Handles graphs with negative edge weights
  2. Iterative approach involving repeated relaxation steps to gradually refine the path estimations and eventually reach the optimal solution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bellman-Ford Working Initialization

A

The algorithm begins by assigning an initial distance of positive infinity to all vertices in the graph except the source vertex.
*
The source vertex is typically assigned a distance of 0, signifying its starting point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bellman-Ford Working Relaxation

A

The core operation of the algorithm lies in the relaxation step.
*
This step iterates through each edge in the graph, examining the potential for a shorter path.
*
For each edge connecting vertex u to vertex v, the algorithm checks whether the total distance from the source vertex to v through vertex u (distance(source) + weight(u, v)) is shorter than the currently known distance of v.
*
If this condition is true, the distance of v is updated to reflect the shorter path, and the predecessor of v is also updated to point to vertex u (as u becomes the preceding vertex in the newly discovered shorter path)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Bellman-Ford Working Iterations

A

The relaxation step is repeated V-1 times, where V represents the total number of vertices in the graph.
*
This repetitive process ensures that the algorithm has sufficient opportunities to discover and update paths throughout the graph, eventually converging to the optimal solution

21
Q

Bellman-Ford Applications

A
  1. Network routing: Finding the shortest paths for data packets to travel across network connections.
  2. Logistics: Determining the most efficient routes for transportation and delivery services.
  3. Financial modeling: Calculating the minimum cost paths in financial networks with weighted edges representing risks or benefits.
  4. Geographic information systems (GIS): Identifying the shortest routes for navigation within a map network
22
Q

Key Aspects of Network Layer (Quality of Service (QoS): )

A

to ensure applications get sufficient network resources and bandwidth for optimal performance.

23
Q

Key Aspects of Network Layer (tunneling)

A

: to encapsulate one protocol’s packets within another protocol’s packets for transmission across an intermediary network

24
Q

Key Aspects of Network Layer (VPN)

A

to encrypt and encapsulate data packets for secure transmission.

25
Q

IP Addressing

A

system used to uniquely identify devices (such as computers, servers, routers, etc.) on a network.

It serves** two primary purposes**: Host/Network Identification and Location Addressing.

26
Q

2 Versions of IP Addresses

A

The two main versions of IP addresses are IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6).

27
Q

2 Purposes of IP Address

A

Host or Network Identification: IP addresses are used to identify either a network interface (host) or an entire network. A host IP uniquely identifies a specific device within a network. A network IP identifies a group of devices connected to the same network segment.

Location Addressing: IP addresses help in routing data packets across networks. They indicate the source and destination of data packets, facilitating proper transmission

28
Q

Breakdown of IPv4 Addresses

A

Format: Typically represented as X.X.X.X, where each X is an octet (8 bits) ranging from 0 to 255. This is known as dotted-decimal notation.

Uniqueness: Each IPv4 address must be unique within a network or subnetwork.

Classes (Historical): Historically divided into Class A, B, and C based on network size, with Class D for multicasting and Class E reserved. Classful addressing is no longer widely used due to CIDR (Classless Inter-Domain Routing).

Subnet Mask: Used with the IP address to define the network portion and the host portion of the address.

Private vs. Public: Private addresses are for use within private networks and are not routable on the public Internet. Public addresses are globally unique and routable on the Internet.

DHCP (Dynamic Host Configuration Protocol): Commonly used to dynamically assign IPv4 addresses to devices.

NAT (Network Address Translation): A technique used to conserve IPv4 address space by allowing multiple private devices to share a single public IP

29
Q

3 Key Parts of IPv4 Address

A

Network address: Identifies the specific network to which a device belongs.

Subnet mask: Acts like a divider, separating the network and host portions of the address.

Host address: Uniquely identifies a specific device within a network

30
Q

IPv4 Advantages

A
  1. Familiarity:dominant for a long time,
  2. Ease of Implementation
  3. Compatibility: with older networking protocols.
  4. Large Address Space (for its time): .
  5. Efficiency in Certain Use Cases: efficient for small-scale
31
Q

IPv4 Limitations

A
  1. Address Exhaustion: 32-bit address space insufficient for the growing # of devices.
  2. No Built-in Security:
  3. Fragmentation: Packets may need to be fragmented across networks .
  4. Limited Support for QoS: challenging to prioritize certain types of traffic.
  5. Hierarchical Addressing: inefficient allocation.
  6. Inflexibility: Fixed 32-bit length
32
Q

Classes in IPv4

A

Class A: 126 Networks, 1,67,77,214 Hosts per Network. For large numbers of total hosts.

Class B: 16,382 Networks, 65,534 Hosts per Network. For medium to large sized networks.

Class C: 20,97,150 Networks, 254 Hosts per Network. Used in small local area networks (LANs).

Class D: Not allocated to hosts, used for multicasting.

Class E: Not allocated to hosts, reserved for research purposes

32
Q

IPv6 Breakdown of Addresses

A

Format: Represented as eight groups of four hexadecimal digits separated by colons

Shorthand Notation: Leading zeros in each group can be omitted, and consecutive groups of zeros can be replaced with a double colon (::) once per address

Hierarchical Structure: The first 64 bits typically represent the network prefix (for routing and subnetting), and the remaining 64 bits represent the interface identifier (uniquely identifies a network interface on a segment)

32
Q

IPv6 Different Address Types

A

Unicast Addresses: Identify a single interface. Types include global unicast, link-local (communication within the same network segment), and unique local.

Multicast Addresses: Identify a group of interfaces; packets are sent to multiple recipients simultaneously.

Anycast Addresses: Identify multiple interfaces, but packets are routed to the nearest interface sharing the same address

33
Q

IPv6 Advantages

A
  1. Larger Address Space:
  2. Address Autoconfiguration (SLAAC): Devices can automatically configure addresses without manual setup
  3. Efficient Routing and Packet Processing:
  4. Improved Quality of Service (QoS):
  5. Enhanced Security Features:
  6. Simplified Header Structure:
  7. Support for Mobile Devices and IoT:
  8. Future-Proofing
34
Q

IPv6 Limitations

A
  1. Compatibility Issues: dual stack (running both IPv4 and IPv6) can be resource-intensive.
  2. Security Concerns:
  3. Deployment Challenges:
  4. Limited Support in Certain Regions:
35
Q

IPv4 Header

A
  1. Version (4 bits): Specifies IP version
  2. Header Length (4 bits): 32-bit words.
  3. Type of Service (8 bits): QoS parameters.
  4. Total Length (16 bits): Total packet length (header + payload).
  5. Identification (16 bits): For fragmentation/reassembly.
  6. Flags (3 bits): Control flags for fragmentation.
  7. Fragment Offset (13 bits): Fragment’s position in the original datagram.
  8. Time to Live (TTL) (8 bits): Max hops before discarding.
  9. Protocol (8 bits): Protocol in the payload
  10. Header Checksum (16 bits): Error detection in the header.
  11. Source IP Address (32 bits
  12. Destination IP Address (32 bits)
  13. Options (Variable): Optional fields.
  14. Payload (Data): Actual data being transmitted
36
Q

Ipv4

A

IPv4 is the older and more widely used version, employing 32-bit numerical values.

37
Q

Ipv6

A

IPv6 was developed to address the limitations of IPv4 address exhaustion and uses 128-bit hexadecimal values

38
Q

OSPF (Open Shortest Path First)

A
  • routing protocol in IP networks, used to find the best path for forwarding data packets across the network.
  • link-state routing protocol: routers exchange information about the state of their links with other routers in the network.
  • info is used to build a complete topological map of the network.
  • uses the Dijkstra algorithm
39
Q

How does OSPF calculate the shortest path?

A

Dijkstra algorithm
* calculate the shortest path tree from each router to every other router in the network.
* Each router maintains a database of link state advertisements (LSAs) received from neighboring routers, which is used to calculate the shortest path tree

40
Q

What are OSPF areas and why are they used?

A

OSPF networks are typically divided into areas
* to improve scalability
* reduce the amount of routing info that needs to be exchanged.
* Routers within the same area have detailed knowledge of the network topology within that area
* routers in different areas only have summary information about other areas

41
Q

What is OSPF hierarchical design?

A

routers organized into a hierarchy of areas.
* reduce the amount of routing information that needs to be exchanged between routers
* improves network scalability

42
Q

What are OSPF LSAs and what information do they contain?

A

Each router in an OSPF network generates Link-State Advertisements (LSAs). LSAs contain crucial information about:
*Directly connected networks
*Cost of reaching those networks (e.g., bandwidth, delay)
*Router ID and area ID (if OSPF areas are used)
LSAs are flooded throughout the OSPF area, ensuring every router possesses a complete understanding of the network layout.

43
Q

What are the benefits of OSPF?

A

OSPF benefits include:

  1. Efficient Routing:
  2. Scalability
  3. Fast Convergence: network changes, OSPF rapidly adapts: minimizing disruption.
  4. Loop Prevention
44
Q

What is Dijkstra’s link-state routing algorithm?

A
  • ensures data packets traverse the network along the most efficient paths.
  • employed in protocols like OSPF and IS-IS (Intermediate System to Intermediate System)
45
Q

How does Dijkstra’s algorithm work?

A
  1. start w set of tentative distances for each node,
  2. initially setting the distance of the
    source node to 0
    all other nodes to infinity.
  3. It iteratively selects the node with the smallest tentative distance, known as the “current node,” and updates the tentative distances of its neighboring nodes based on
    their current distances
    the weights of the edges connecting them.
  4. The algorithm continues this process until
    all nodes have been visited
    until the destination node is reached.
46
Q

What are the steps in the working of link-state routing with Dijkstra’s algorithm?

A

1.Topology Discovery: Each router maintains information about its directly connected neighbors and the state of the links to those neighbors.
2.Link-State Advertisement (LSAs):
3.Building Network Topology: use of LSA
4.Shortest Path Calculation
5.Routing Table Construction: based on 4
6.Updating and Maintenance: periodically exchange updated LSAs to reflect network changes. routers recalculate shortest paths