TCP/IP Addressing and Data Delivery Flashcards

1
Q

Give all the Connection Orientated Protocols

A

Connections are established before data is sent.
Data is received in the same order as it was sent.

Three phases:
A connection is established, and devices negotiate parameters.
Data is transferred.
The connection is released.

Can function only in bidirectional communication environments.

TCP is connection-oriented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give all the connectionless protocols

A

No connections were established prior to data transmission.

Data can be delivered out of order.
Data can be transferred over different paths.

Always in the data transfer phase.

Information is sent to the destination without checking to see if the destination is ready to receive it. The sender might need to retransmit information multiple times before the destination receives a complete message.

UDP is connectionless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Definition of TCP

A

(Transmission Control Protocol) A connection-oriented, guaranteed-delivery protocol is used to send data packets between devices over a network, like the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give all the functions of TCP

A

Part of the TCP/IP protocol suite.
Ensures end-to-end delivery between distinct nodes.
Creates connection prior to transmission.
At the source node, breaks data into segments, sends it, and waits for acknowledgment.
At the destination node, reassembles segments into original data.
Resends any data lost in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition of UDP

A

(User Datagram Protocol) A connectionless Transport-layer protocol is one of the protocols in the Internet protocol suite and is used with IP. Also called the Universal Datagram Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give all the functions of UDP

A
Used with IP.
Best-effort delivery.
Faster service than TCP:
Smaller, simpler header.
Do not wait for an acknowledgment.
Used for:
VoIP.
Real-time video.
Network management applications.
Used when performance is more important than the ability to receive all data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definition of IP

A

(Internet Protocol) A Network-layer protocol that is responsible for sending data packets across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give all the functions of IP

A

Responsible for packet formatting, routing individual datagrams, and the logical addressing scheme.
Acts as an intermediary between higher protocol layers and the network.
Carries a TCP or UDP payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition of ICMP

A

(Internet Control Message Protocol) A protocol is used with IP that attempts to report on the condition of a connection between two hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give all the functions of ICMP

A

The common use is the ping utility for checking connectivity.
Also, traceroute
Connectionless.
Works at Layer 3 of the OSI model.
Messages report on error conditions.
Source quench requests a slower data transfer rate.
Routers can send Destination unreachable or Expired in-transit messages.
The ping utility uses Echo request and Echo reply messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definition of ARP

A

Address Resolution Protocol) A communication protocol that resolves IP addresses to MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Functions of ARP

A
Works at Layer 2 of the OSI model
Encapsulated by Ethernet header
Dynamic mapping of IP and MAC addresses
IP to MAC address resolution
Routing (local vs. remote network)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definition of port mirroring

A

The practice of duplicating all traffic on one port in a switch to a second port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Functions of port mirroring

A

Local or remote
Local port mirroring sends all data to the node connected to the second switch port.
Remote port mirroring sends data to the port on a different device.
Diagnostic tool
Enables traffic monitoring without a big performance hit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give a full description of Dotted Decimal Notation

A

How IP addresses are usually displayed.
Four decimal numbers are separated by three dots.
Octets represent eight binary bits.
Numbers range from 0 to 255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Give a description and example of IP address

A

A dotted-decimal number that is unique to the network.

Eg 192.168.1.150

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Give a description and example of the subnet mask

A

A dotted-decimal number that identifies the host and network portions of the IP address.
Eg 255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Give a description and example of the default gateway

A

The dotted decimal number corresponds to the network device that connects the hosts on the current network to another network.
Eg 192.168.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Definition of IP addresses

A

A unique binary address is assigned to a device so that it can communicate with other devices on a TCP/IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Give a full description of IP addresses

A

32 bits long
Expressed in dotted decimal notation
Network address and host address
Apply a subnet mask to identify network and host addresses
All IP addresses on a network must be unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Definition of subnet masks

A

A number is assigned to each host for dividing the IP address into network and host portions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Definition of subnetting

A

Subnetting: The process of logically dividing a network into smaller subnetworks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Definition of a subnet

A

Subnet: A logical subset of a larger network created by an administrator to improve network performance or to provide security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Description of subnet

A

Each subnet has a unique network address.
IP addresses are divided into three levels:
Network ID
Subnet ID
Host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Give all the benefits of subnetting

A

Conserve IP addresses
Improve network performance
Provide a more secure network environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Give a full description of Conserve IP addresses

A

If more IP addresses than hosts on a network, IP addresses go to waste. Subnetting reduces IP addresses available for a subnetwork, making the unused addresses available for other subnetworks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Give a full description of improved network performance

A

The administrator divides the network into groups of devices that frequently interact with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Give a full description of providing a more secure network environment

A

The administrator divides the network based on severs that host restricted applications or sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Max number of hosts in the IP address class A

A

16 million

30
Q

Max number of hosts in the IP address class B

A

64 000

31
Q

Max number of hosts in the IP address class C

A

254

32
Q

Max number of hosts in the IP address class D

A

N/A

33
Q

Max number of hosts in the IP address class E

A

N/A

34
Q

Give a description of Available Host and Network Addresses

A

Network and host addresses can’t be all 1s or all 0s.
Reserved IP addresses.
Calculating the number of available host addresses:
2n-2
n is the number of host bits.
Calculating the number of available network addresses:
2a
a is the number of network bits.

35
Q

Definition of a Private IP Address

A

An address is used for a node that needs IP connectivity only within the enterprise network, but not external connections to the Internet.

36
Q

Give a full description of a Private IP Address

A

Reserved as private IP addresses:
Class A: 10.0.0.0 to 10.255.255.255
Class B: 172.16.0.0 to 172.31.255.255
Class C: 192.168.0.0 to 192.168.255.255
Not routable—not forwarded outside the network.
Used freely on internal networks:
Without contacting an Internet registry or the ICANN.
Not injected into the global Internet routing system.
Different organizations can use the same addresses.
Partially solves the IP address shortage issue.
Any IP addresses that are not private IP address ranges are considered public addresses (globally routable unicast IP addresses).

37
Q

Definition of default gateways

A

An IP address is assigned to a router that forwards remote traffic from its local subnet to remote networks.

38
Q

Give a description of default gateways

A

Often equivalent to the IP address connected to the Internet.
Required for all communication other than that restricted to the local network.

39
Q

Definition of custom defaults

A

A collection of IP addresses that are divided into smaller groups to serve a network’s needs.

40
Q

Give a description of custom subnets

A

Custom subnet applied to an IP address.
The host sees only a subset of the entire network as local.
Default gateway configured for each subnet to route traffic between them.

41
Q

Definition of custom subnet masks

A

A number is applied to an IP address to divide a single block of addresses into multiple subnets. Sometimes referred to as variable-length subnet masks (VLSMs).

42
Q

Definition of Classless Inter-Domain Routing

A

An IP addressing scheme that treats its custom subnet mask like a 32-bit binary word. Also referred to as supernetting.

43
Q

Give a full description of Classless Inter-Domain Routing

A

VLSM lengthens the mask to create multiple subnets out of a single network.
CIDR shortens the mask to aggregate smaller networks into a larger network for routing purposes on the Internet.

44
Q

Give the description of IPv4 Address Space Limitations

A

A theoretical maximum of approximately 4,295 billion separate addresses.
The division of the address space into fixed classes:
Node addresses falling either between classes or between subnets are unavailable for assignment.
IP address classes provide a small number of node addresses.
Depletion of Class A and Class B IP address assignments.
Unassigned and unused address ranges within existing Class A and Class B blocks.

45
Q

Give a description of IPv6

A

340 trillion, trillion, trillion addresses.
New features:
Simplified address headers.
Hierarchical addressing.
Support for time-sensitive network traffic.
Required security.
New structure for unicast addressing.
Benefits include:
Smaller IP headers.
Stateless auto-reconfiguration of hosts.
The new IP header field enables IP to guarantee the allocation of network resources.
Implements Network-layer encryption and authentication with IPSec.

46
Q

Give examples and a description of Unicast

A

Similar to IPv4 unicast address.
One address identifies one interface.

Examples:
Link-local: FE80::/64
Unspecified address: ::

47
Q

Give examples and a description of Multicast

A

A packet sent to a multicast address is delivered to all interfaces in the group.
Targeted message goes only to members of the multicast group.
Replaces IPv4 broadcast addressing.

Example:
FF01:0:0:0:0:0:0:1

48
Q

Give examples and a description of Anycast

A

Data goes from a server to the nearest host in an anycast group.
Host imitates another anycast and sends data to the next nearest host until all hosts in the anycast group have the data.
Hosts that are not part of the anycast group ignore the transmission.

Example:
2001:1::1/128

49
Q

Give a description of global addresses

A

Globally routable public addresses.
Also known as aggregatable global unicast addresses.
Designed so that they can be summarized for efficient routing.
Equivalent to the entire IPv4 public address space.

50
Q

Give a description of site-local addresses

A

Used for internal networks that are not routable on the Internet.
The equivalent of IPv4 private, non routable address blocks.
Begin with FEC0::/10.
Replaced with “unique local addresses” in the block fc00::/7.
fd00::/8 is set aside for use in internal networks.

51
Q

Give a description of link-local addresses

A

Used to communicate within a network segment or broadcast domain.
Automatically assigned on private network segments with no router.
Usually, begin with FE80, but can range up to FCFF.
The equivalent of self-assigned IPv4 APIPA addresses.

52
Q

Give a description of IPv6 transitional addresses.

A

Used on mixed networks to support routing of IPv6 data across IPv4 networks.
Will be phased out when all routers convert to IPv6.

53
Q

Definition of IPv6 Addresses

A

A 128-bit hexadecimal number is assigned to a device on a TCP/IP network.

54
Q

Give a description of IPv6 Addresses

A

An IPv6 address is usually separated into eight groups of four hexadecimal digits. Each quartet of four hexadecimal digits equals 16 bits.

(only an example)
2001:0db8:85a3:0000:0000:8a2e:0370:7334

You can omit any leading zeros from the address notation.

(only an example)
2001:db8:85a3:0:0:8a2e:370:7334

You can compress contiguous sets of 0 blocks by using the double colon notation::

(only an example) 2001:db8:85a3::8a2e:370:7334

CIDR notation is used for each part of the address.

(Site prefix )(subnet)(interface id )
id
2001:0db8:85a3:0000:0000:8a2e:0370:7334/64

55
Q

Definition of IPv6 Prefixes

A

The leftmost bits of an IPv6 address is used for routing IPv6 packets.

56
Q

Give a full description of IPv6 Prefixes

A

Equivalent to IPv4 network addresses.

CIDR notation signifies prefix length.

57
Q

What are all the reversed prefixes of IPv6

A

Reserved prefixes

2001: db8::/32 for documentation.
2002: :/16 for 6to4 routing.
fe80: :/10 for link-local addresses.
ff00: :/8 for multicast addresses.

58
Q

What is IPv6 Tunneling

A

A data transport technique in which a data packet is transferred inside the frame or packet of another protocol, enabling the infrastructure of one network to be used to travel to another network.

59
Q

Give a full description of IPv6 Tunneling

A

Envelops data packets in a form acceptable to the carrier.
IPv6 packets can traverse IPv4 networks like the Internet.
6to4 enables IPv6 packet transmission without configuring explicit tunnels.
Relay servers enable 6to4 networks to communicate with IPv6 networks.
4to6 enables IPv4 packets to travel on IPv6 networks.

60
Q

Give an example of IPv6 Tunneling

A

Microsoft DirectAccess is an example of IPv6 tunneling.
“Always On” VPN is established between the client and the destination network.
The client encapsulates IPv6 into IPv4 packets via Teredo or Miredo tunneling.
Destination network removes IPv4 wrapper.

61
Q

What is EUI-64

A

Extended Unique Identifier
MAC address is padded in the center with FFFE to extend it to 64 bits in length.
While not a requirement, most vendors are adopting this format.

62
Q

Give a full description of router solicitation and advertising

A
RA messages (ICMP Type 134) are sent to the all-nodes multicast address ff02::1.
RS messages (ICMP Type 133) are sent to all routers on the link (ff02::2).
63
Q

Definition of Neighbor Discovery

A

The IPv6 process determines the link-layer address of a neighbor on the same network (local link), verifies the reachability of a neighbor, and tracks neighboring devices.

64
Q

How do you determine the link-layer addresses of neighbors on the local link:

A

1) A host sends a neighbor solicitation message (ICMP Type 135) to the local link.
2) Target replies with a neighbor advertisement message (ICMP Type 136).
3) On receipt of the neighbor advertisement message, the host and target can communicate.

65
Q

Give a description of Neighbor Discovery

A

Reachability is verified by sending unicast messages to neighboring hosts.
If a host’s link-layer address changes, it will send a neighbor advertisement message to the all-nodes multicast address.

66
Q

Definition of Protocol binding

A

The assignment of a protocol to a NIC.

67
Q

Description of Protocol binding

A

Creates the path for data flow.
Can bind multiple protocols to a NIC.
Features:
Dual-stack: side-by-side implementation of IPv4 and IPv6 alleviates the need for tunneling.
Sequential test of available protocols until response received.
Linux if config command shows all protocols being used and editing /etc/sysctl.conf disables IPv6.
Windows enables you to set bind orders.

68
Q

Give a description of the parameter, address length

A

IPv4 addresses use 32 bits, whereas IPv6 addresses use 128 bits.

69
Q

Give a description of the parameter, Header information structure

A

IPv6 headers are simpler, but expandable if you need to include options.

70
Q

Give a description of the parameter, Loopback address

A

On an IPv4 network, it is 127.0.0.1, and on an IPv6 host, it is :1.

71
Q

Give a description of the parameter, Default route address (anything unknown is sent to the default gateway)

A

The IPv4 default route address is 0.0.0.0/0, and the IPv6 default route address is::/0.