TCP/IP Addressing and Data Delivery Flashcards
a connection-oriented, guaranteed-delivery protocol used to send data packets between devices over a network such as the Internet. carries the majority of traffic in today’s networks.
Transmission Control Protocol (TCP)
a connectionless Transport-layer protocol in the IP suite. Faster than TCP because it uses a smaller, simpler header than TCP does and it is a connectionless protocol so it does not wait for acknowledgment. this protocol is commonly used in streaming media such as VoIP, Real-time video and network management applications in which a device is polled regularly for its health. Used when performance is more important than the ability to receive all of the data.
User Datagram Protocol (UDP
a Network Layer protocol that is responsible for sending data packets across a network. this protocol is responsible for packet formatting, routing individual datagrams, and the logical addressing scheme. it can carry either TCP or UDP as its payload.
Internet Protocol (IP)
an IP protocol that attempts to report on the condition of a connection between two hosts. A common example of is using the ping utility to check connectivity and the traceroute command. It works at the Network Layer of the OSI model.
Internet Control Message Protocol (ICMP)
Maps an IP address to a physical or MAC address recognized within a local network. resides at the Data Link Layer (Layer 2) of the OSI model, encapsulated by an Ethernet header. enables you to dynamically discover the mapping of a Network Layer (Layer 3) IP address to a Layer 2 MAC address. supports IP by resolving IP address to MAC address.
Address Resolution Protocol (ARP)
Steps in the ARP process
- ARP (Layer 2) receives an IP address from IP (Layer 3).
- ARP checks the ARP cache for the MAC address that is associated with that IP address.
a. ) If ARP has the MAC address in its cache, it returns it to IP (Layer 3).
b. ) If not, it issues a Layer 2 broadcast (FF:FF:FF:FF) to resolve the IP address. The target host with the corresponding IP address responds with a Layer 2 unicast that includes its MAC address. - ARP adds the MAC address to its cache and then sends it to IP as requested.
the practice of duplicating all traffic on one port in a switch to a second port, effectively sending a copy of all the data to the node connected to the second port.
Port Mirroring
a unique binary address assigned to a device so that it can communicate with other devices on a TCP/IP network.
IP address
a number assigned to each host for dividing the IP address into network and host portions. This segregation makes TCP/IP routable. You use this to remove the host ID from the IP address, leaving just the network portion.
Subnet Mask
the process of logically dividing a network into smaller subnetworks or subnets, with each subnet having a unique address.
Subnetting
Benefits of Subnetting
Conserve IP addresses to be used in separating networks. Improve network performance. Provides a more secure network environment.
Benefits of Subnetting
Conserve IP addresses to be used in separating networks. Improve network performance. Provides a more secure network environment.
IP Address Assignment Rules
The host part of an IP address cannot be all 1s or all 0s. All 1s is reserved for broadcasts. All 0s is reserved for the network ID. The IP address 127.0.0.1 is reserved for testing and cannot be used as a host ID.
- range from 1.0.0.0 to 126.255.255.255.
- can have up to 126 networks, each with up to 16,777,214 hosts.
- The practical range is from 1.0.0.0 to 126.255.255.255. The actual range is from 0.0.0.0 to 127.255.255.255.
- Both 0 and 127 in the first octet are reserved for special purposes and are not assigned to hosts.
- The default subnet mask for id networks is 255.0.0.0
Class A addresses
- range from 128.0.0.0 to 191.255.255.255.
- can have up to 16,382 networks each with up to 65,534 hosts.
- The default subnet mask is 255.255.0.0.
Class B addresses
- range from 192.0.0.0 to 223.255.255.255.
- can have up to 2,097,150 networks each with 254 hosts. -The default subnet mask for a is 255.255.255.0
Class C addresses
- 224.0.0.0 to 239.255.255.255.
- addresses are set aside to support multicast transmissions.
Class D addresses
- 240.0.0.0 to 255.255.255.255.
- set aside for research and experimentation
Class E addresses
addresses that organizations use for hosts within enterprise networks requiring IP connectivity and not external connections to the Internet
Private IP addresses
Compare Public and Private IP Addresses
- Public IP addresses are issued by your ISP for use anywhere on the Internet.
- while private IP addresses are used for internal network communication only.
- You can use public IP addresses between networks, such as between your network and any other Internet address.
- Private IP addresses never leave your internal network.
an IP address assigned to a router that forwards remote traffic from its local subnet to remote networks.
Default Gateways
Custom subnet masks are sometimes referred to as this.
Variable Length Subnet Masks (VLSMs)
a classless addressing method that considers a custom subnet mask as a 32-bit binary word.
Classless inter-domain routing (CIDR)
CIDR Subnet Mask Values for a Class C address
/24
254 hosts
255.255.255.0 11111111.11111111.11111111.00000000
CIDR Subnet Mask Values for a Class B address
/16
65,534 hosts
255.255.0.0 11111111.11111111.00000000.00000000
CIDR Subnet Mask Values for a Class A address
/8
16,777,214 hosts
255.255.0.0 11111111.00000000.00000000.00000000
When you move the subnet mask one bit to the right
you are dividing one network in half, giving you two subnets
If you move the subnet mask two bits to the right
you are dividing the network twice, giving you four subnets.
If you move the subnet mask three bits to the right
you are dividing the network three times, giving you eight subnets.
Subnet ID’s resulting from moving a /24 one bit to the right
Subnet ID’s would be 192.168.1.1 /25 and 192.168.1.128 /25
includes new features, such as simplified address headers, hierarchical addressing, support for time-sensitive network traffic, required security, and a new structure for unicast addressing.
IPv6 address
IPv6 Transmission type with a single address identifying a single interface.
Unicast
IPv6 Transmission type delivered to every address in a group
Multicast
IPv6 Transmission type sent from server to the nearest host in a group which then transmits it to the next nearest host in the group.
Anycast
Type of IPv6 Unicast address that is globally routable
Global Addresses
Type of IPv6 Unicast address used for internal networks that are not routable on the internet. The equivalent of the IPv4 private, nonroutable address blocks.
Site-Local Addresses
Type of IPv6 Unicast address that is used to communicate and automatically assigned on private network segments with no router. Usually begin with FE80
Link-Local Addresses
IPv6 Address Rules/Examples
- 2001:0db8:85a3:0000:0000:8a2e:0370:7334
- (not valid if letter above F)
- (you can remove a group of 0’s but only one group)
- (you can omit any leading 0’s in an octet)
- 2001:db8:85a3:::8a2e:370:7334 (example using above rules)
IPv4 and IPv6 are not compatible. One of the ways that IPv6 can be implemented on IPv4 networks is through this process. Like encapsulation it envelops a data packet in a form that is acceptable to the carrier. In this instance, you are encapsulating IPv6 packets to traverse IPv4 networks such as the Internet.
IPv6 Tunneling
With IPv6 this is used to make sure the packets can travel across all ISP’s, the client encapsulates the IPv6 packets into IPv4
Toredo tunneling on Windows OS and Miredo tunneling on Linux and Mac OS
A host computer running IPv6 can use this IEEE standard to self-assign its interface addresses. the MAC address is padded in the center with FFFE, extending it to 64 bits in length. For instance a MAC address of 01-00-11-22-33-44 would be changed to 0100:11FF:FE22:3344 to become the last 64 bits of the host’s IPv6 address.
Extended Unique Identifier (EUI-64)
The IPv6 discovery process that uses Internet Control Message Protocol (ICMPv6) messages and solicited-host multicast addresses to:
- Determine the link-layer address of a host on the local link
- Verify that a neighbor host can be reached
- Track neighboring devices
Neighbor Discovery
Assigning a protocol to a network interface card (NIC) is referred to as this
Protocol Binding
IPv6 Loopback Address
::1
Convert the binary address 10011011 to decimal
155
Convert the decimal address 155 to binary
10011011