Quiz X - IP Addressing & Routing (Ch. 7-8, 13) - (CANCELLED Quiz 3) Flashcards
What is the origin of the term internet?
- A short form of the technical term internetwork
- the result of interconnecting computer networks
What is The Internet?
- A network of networks
- consists of millions of private, public, academic, business, and government networks
- local to global scope
- linked by a broad array of electronic, wireless and optical networking technologies
Does the Internet have a centralized governance?
- No, The Internet has no centralized governance in either technological implementation or policies for access and usage
Is there an overarching standard for the Internet?
- No, each constituent network sets its own standards
What body maintains IP address space and DNS definitions?
- ICANN
- Internet Corporation for Assigned Names and Numbers (ICANN)
- Only the overarching definitions of the Internet Protocol (IP) address space and the Domain Name System (DNS), are directed by a maintainer organization
What agency controls the technical standards of the internet?
- IETF
- The technical underpinning and standardization of the core protocols is an activity of the Internet Engineering Task Force (IETF),
- a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.
How do you access the Internet?
you need an…
- Internet Service Provider (ISP) and an
- access line to your ISP
What does the ISP do?
Your ISP…
- gives you access and
- carries your packets
Do organizations also need to use an ISP?
- Yes, organizations also need ISPs
What comprises the Internet backbone?
- ISPs collectively comprise the Internet backbone
How do ISPs connect to each other?
- They interconnect at Network Access Points (NAPs)
How are ISPs classified?
- Tier-1 ISPs : national/international coverage
- Tier-2 ISPs : smaller, often regional coverage
- Tier-3 & Local ISPs : last hop (“access”) network (closest to end systems)
What are the relationships among different tiers of ISPs?
- Tier-2 ISP is customer of Tier-1 provider
- Local and Tier- 3 ISPs are customers of higher tier ISPs connecting them to rest of Internet
A data packet typically passes through only one network. True or False
- False, a packet passes through many networks!
How do the Network and Transport layers function in regard to the Internet?
[insert slide 9 image here]
How does the Network layer “create” the Internet?
- The network layer facilitates the interconnection of local networks establishing the Internet
What is TCP/IP?
- A set of protocols used for the Internet and other similar networks
What do TCP and IP stand for?
- TCP: Transmission Control Protocol
- IP: Internet Protocol
What types of networks does TCP/IP support?
- Supports both simple and complex networks
- Small LAN
- Multiple LANs interconnected into a WAN
What is the primary transmission responsibility of the Network layer?
- hop-by-hop
What is the primary transmission responsibility of the Transport layer?
- end-to-end
TCP operates on what OSI layer?
- TCP is the Transport layer protocol
IP operates on what OSI layer?
- IP is the Network layer protocol
When and where was TCP/IP created?
Created in the…
- 1970s at
- DARPA
Who created TCP/IP?
- Vint Cerf
- Bob Kahn
- (called “the fathers of the Internet”)

What is DARPA?
- Defense Advanced Research Projects Agency
What is an IP address?
- IP (Internet Protocol) address
- assigned to each device (e.g., computer, printer, router) participating in a computer network that uses the Internet Protocol
What versions of Internet Protocol are currently in use?
- IP Version 4: 32 bits
- IP Version 6: 128 bits
What is the length of an IPv4 address?
- 32 bits
What is the length of an IPv6 address?
- 128 bits
What is the maximum decimal number in an IPv4 address?
- 255
What is the format of IPv4?
- dotted decimal
- four decimal numbers separated by dots
- Each of the four parts represents a byte (8 bits)
Convert 129.174.1.38 into dotted decimal.
- 129.174.1.38 = 10000001.10101110.00000001.00100110
What is a static IP address?
- Manually type in all IP information (in the station)
- Every IP address must be unique
What is a dynamic IP address?
- Dynamically get address from a server using DHCP
- Automatically assigns an IP address whenever a computer connects to the network
What is the difference between static and dynamic addresses?
- static addresses do not change
- dynamic addresses are assigned when a host connects to the network
What does DHCP stand for?
- Dynamic Host Configuration Protocol
What is DHCP used for?
- Assigning IP addresses to hosts joining a network that need an IP address
How does DHCP work?
- Client requests IP address from DHCP server
- DHCP server provides address and other info

What is the difference between the network address and the physical address?
-
Physical address—refers to a particular device
- The physical address doesn’t change when the device is moved
-
Network address—refers only to the network in which the device resides
- The network address changes when the device is moved
How can a device be reached by using an IP address?
- To reach a device, there must be a mapping of its IP address to its physical address
What does ARP stand for?
- Address Resolution Protocol
What is ARP used for?
- ARP is used to
-
determine the MAC address of the destination computer
- based on its IP address
What are the steps in ARP?
- ARP broadcast by the originating router is used to determine the MAC address of the destination computer based on its IP address
- The destination computer replies with its MAC address
- The originating router records IP-Ethernet address pair in ARP cache and uses it to send future frames to the host without using ARP
What does ICMP stand for?
- Internet Control Message Protocol
What is ICMP?
- one of the core protocols of the Internet Protocol (IP) Suite
- chiefly used by the operating systems of networked computers to send error messages
- indicating, for example, that a requested service is not available or that a host or router could not be reached.
How are ICMP messages transmitted?
- ICMP messages are embedded in IP packets
- Type number—indicates kind of message problem
- Code number—specific details within type
What are subnets?
- logical networks with their own IP addresses
How are subnets created?
- created by assigning hosts to groups with their own subnet addresses
Routers are used within subnets to connect hosts
- No, hosts can physically reach each other without an intervening router
How are subnets logically defined?
- organized many ways—by building, floor, department
Can an entire subnet connect to the Internet with a single IP address?
- Yes, a single IP address can connect a whole subnet to the Internet
How are the IP addresses of subnets organized?
- IP addresses are hierarchical in a subnet
What are the first and second segments (part 1) of the IP address used for?
- Network (not always 16 bits)
- “nnn.nnn”
What is the third segment (part 2) of the IP address used for?
- Subnet (not always 8 bits)
- “nnn”
What is the fourth segment (part 3) of the IP address used for?
- Host (not always 8 bits)
- “nnn”
Can an IP address be less than 32 bits?
- No, the total of an IP address is always 32 bits
How many parts does an IP address have?
- An IP address usually has three parts
What is classful addressing?
…
How many bits are used for the network/subnet+host parts of a Class A network?
- Class A: 8/24
What is Class A addressing used for?
- For few organizations needing many host addresses
- Few bits for network addresses, many for hosts
How many bits are used for the network/subnet+host parts of a Class B network?
- Class B: 16/16
What is Class B addressing used for?
- For many companies with many hosts
- Many bits for network addresses, but also many for hosts
How many bits are used for the network/subnet+host parts of a Class C network?
- Class C: 24/8
What is Class C addressing used for?
- For the great many organizations with very few hosts
- Many bits for network addresses, few for hosts
What about other classes?
- Classes D & E are not important for individual computers
How are network classes identified in an IP address?
- Class identifier bits (prefixes) are
- included in the network address part of the split
What is the classful addressing prefix for a Class A network?
- Class A (8/24) is 0
What is the classful addressing prefix for a Class B network?
- Class B (16/16) is 10
What is the classful addressing prefix for a Class C network?
- Class C (24/8) is 110
Classful addressing diagram
Classful Addressing
What is the main limitation of classful addressing?
- Classful addressing wastes a lot of addresses
How does classful addressing waste addresses?
An organization that applies for an IPv4 address…
- Receives a network address with a block of host addresses
- The size of this block is determined by class
- If the organization can handle more addresses than it actually uses,
- the other addresses associated with the company’s block go unused
What is the main advantage of classless addressing?
- Theoretically, all of 32 bits of address space would be available without restriction
- Twice as many addresses could be created
What does CIDR stand for?
- CIDR: Classless Inter-Domain Routing
What is CIDR?
- Allows any number of leftmost bits to be assigned as a network address
- no class designation–addresses assigned based on the number of hosts a network can support
- not limited to 8,16,or 24 bit network addresses
- network address assignments can be more in line with an organization’s needs
Does CIDR waste any IP addresses?
- Still wastes addresses,
- just not as many as classful addressing
With classful addressing, if an organization requires 600 IP addresses, what class of IP addresses would the organization require? How many addresses will be wasted?
- Class B
- 2^16 - 2 = 65534 - 600 = 64,934 wasted IP addresses
With classless addressing, if an organization requires 600 IP addresses, how many host bits would the organization require?
- Need 10 bits (2^10 - 2 = 1022)
- 422 wasted IP addresses
Why are subnet masks used?
- Problem: IP must give each computer a way to understand when a packet destination is local or on the WAN
- Sending to host on same network: broadcast for MAC address
- Sending to host on another network: send to default gateway
- Solution: Subnet masks
- Sending computer uses subnet mask to determine where to send packet
What is a subnet mask?
- A mask is a series of initial ones followed by series of final zeros, for a total of 32 bits
- e.g., 11111111.11111111.11111111.00000000
- (i.e., 255.255.255.0)
- e.g., 11111111.11111111.11111111.00000000
- The bit patterns are applied to entire addresses to isolate their components
- Used to separate network, subnet, and host addresses
Subnet mask example
Subnet Mask

What is the shorthand for subnet masks?
11111111111111111111111100000000 = /24 (24 ones) 11111111111111110000000000000000 = /16 (16 ones) 11111111000000000000000000000000 = /8 (8 ones)
How can an IP address and a subnet mask be described in a single compact statement?
- An IP address followed by the / and a number describes the IP and the address in one statement
- 201.23.45.123/24 denotes IP address plus subnet mask
- IP address = 201.23.45.123
- Subnet mask = 255.255.255.0
- 184.222.4.36/16 denotes IP address plus subnet mask
- IP address = 184.222.4.36
- Subnet mask = 255.255.0.0
The length of a subnet mask is the same as that of an IP address.
True or False?
- True
The subnet mask in the notation 201.23.45.123/24 is ______
A. 201.23.45.123
B. 255.0.255.0
C. 255.255.0.0
D. 255.255.255.0
- C. 255.255.255.0
The host ID of the address 130.57.110.128/22 consists of ______ bits.
A. 5
B. 10
C. 15
D. 20
E. 22
- B. 10
- (32 bits - 22 bits = 10 bits)
The subnet mask ______ is an example of classless subnetting?
A. /8
B. /12
C. /16
D. /24
- B. /12
- (/8, /16, /24 are all classful)
How many bits long is an IPv4 address?
- 32 bits
How many possible addresses are available under IPv4?
- ≈ 4.3 billion (232) possible addresses
Why is the shift to IPv6 from IPv4 necessary?
- address space soon to be completely allocated
- developed in the 1980s, did not anticipate the enormous growth of the Internet
How many bits long is an IPv6 address?
- 128 bits
How many possible addresses are available under IPv6?
- 2128 possible addresses
What are the advantages of IPv6 over IP v4?
- increases the number of available IP addresses
- improves security by making the Internet Protocol Security (IPSec) protocol support a standard
- improves routing efficiency
How are binary IPv6 addresses divided?
- The address is divided along eight 16-bit boundaries
- 0010000111011010 0000000011010011 0000000000000000 0010111100111011 0000001010101010 0000000011111111 1111111000101000 1001110001011010
How are binary IPv6 addresses represented in hexadecimal?
- Each 16-bit block in the address is converted to hexadecimal and
- delimited with colons (called colon-hexadecimal)
- 21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A
How can the hexadecimal IPv6 address be further simplified?
The address can be further simplified by…
- removing the leading zeros within each 16-bit block
- However, each block must have at least a single digit
- 21DA:D3:0:2F3B:2AA:FF:FE28:9C5A
Can the Internet switch immediately from IPv4 to IPv6?
-
No,
- since the differences between IPv4 and IPv6 are substantial,
- the Internet cannot be changed from one to the other overnight
How is the transition from IPv4 to IPv6 being accomplished?
To permit gradual cutover and to allow for variations in timing,
- three methods have been developed that permit functioning in mixed IPv4/IPv6 environments.
What are the methods that allow functioning in mixed IPv4/IPv6 environments?
- Dual stack
- Translation
- Tunneling
Briefly describe the Dual Stack method of operating mixed IPv4/IPv6 environments.
- Dual stack = nodes contain the stacks for both IP versions
Briefly describe the Translation method of operating mixed IPv4/IPv6 environments.
- Translation = the edge router translates the IPv6 header into an IPv4 header
What is the most popular method for operating mixed IPv4/IPv6 environments?
- Tunneling
Why is the tunneling method used?
- A packet from an IPv6 node or region of nodes (a cloud) may have to travel across an IPv4 cloud to reach another IPv6 node
How does the tunneling method work?
- An IPv4 tunnel is created for it to travel through
- First it needs an IPv4 address from the IPv6 edge router at the IPv4/IPv6 border
- The IPv6 router will encapsulate it into an IPv4 packet
- At the other border, the IPv4 edge router will then decapsulate this packet
What is the primary advantage of the tunneling method?
- Avoids having to assign IPv4 addresses to IPv6-only nodes within a capsule
What is the primary disadvantage of the tunneling method?
- Additional processing at the borders
Tunneling diagram
Tunneling
IPv6 has ______ bits.
- 128
In tunneling ______ packets are encapsulated within ______ packets.
A. IPv4; IPv6
B. IPv6; IPv4
- B. IPv6; IPv4
What is the purpose of a router?
- forward traffic between networks
- is connected to two or more data lines from different networks
- forwards packets based on their destination IP address
In which layer do routers operate?
- network layer (layer 3)
What are the main functions that a router performs?
Routing involves two basic activities:
- determining the optimal path a packet should take while traveling from source to destination
- processing an individual packet and transporting it through an internetwork based on its IP address
How does a router determine how to send packets?
- Determining optimal paths can be very complex
- Each router comes with a routing table
What does a routing table do?
- Routing tables indicate where to send packets next
What are the types of routing tables?
- Static
- Dynamic
Briefly describe a static routing table.
- Static—table entries are entered manually, and do not change
Briefly describe a dynamic routing table.
- Dynamic—entries are automatically updated
How are switches organized, and how does this affect switching tables?
- Ethernet switches are organized in a hierarchy
- only one possible port to send a frame out
- only **one row per address **in a switcing table
How are routers organized, and how does this affect routing tables?
- Routers are arranged in meshes
- multiple alternative routes between hosts
- a router may send a packet out more than one interface (port) and still get the packet to its destination host
Can a routing table contain conflicting information about where to send a packet?
- Yes, multiple rows may give conflicting information about what to do with a packet
How does a router resolve conflicting information in a routing table?
Whenever a packet arrives, the router looks at the destination IP address, then…
- Step 1: Finds all row matches
- Step 2: Finds the best-match row
- Step 3: Sends the packet back out based on the best-match row
By what general method do routers determine how to route a packet?
- Optimal path determination
Describe optimal path determination.
- Routing protocols use metrics to evaluate what path will be the best for a packet to travel:
- Path length
- Reliability
- Delay
- Bandwidth
- Load
- Communication cost
- Routing algorithms initialize and maintain routing tables, which contain route information
- Route information varies depending on the routing algorithm used
Routers work at the ______ layer.
- network (layer 3)
The two main functions of an Internet router are ______ and ______ .
- determine optimal path for the packet
- send the packet along that path
The path a packet takes may depend on the routing algorithm used by the router.
True or False?
- True