TCP/IP Addressing and Data Delivery Flashcards

1
Q

a connection-oriented, guaranteed-delivery protocol used to send data packets between devices over a network such as the Internet. carries the majority of traffic in today’s networks.

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a connectionless Transport-layer protocol in the IP suite. Faster than TCP because it uses a smaller, simpler header than TCP does and it is a connectionless protocol so it does not wait for acknowledgment. this protocol is commonly used in streaming media such as VoIP, Real-time video and network management applications in which a device is polled regularly for its health. Used when performance is more important than the ability to receive all of the data.

A

User Datagram Protocol (UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a Network Layer protocol that is responsible for sending data packets across a network. this protocol is responsible for packet formatting, routing individual datagrams, and the logical addressing scheme. it can carry either TCP or UDP as its payload.

A

Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an IP protocol that attempts to report on the condition of a connection between two hosts. A common example of is using the ping utility to check connectivity and the traceroute command. It works at the Network Layer of the OSI model.

A

Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Maps an IP address to a physical or MAC address recognized within a local network. resides at the Data Link Layer (Layer 2) of the OSI model, encapsulated by an Ethernet header. enables you to dynamically discover the mapping of a Network Layer (Layer 3) IP address to a Layer 2 MAC address. supports IP by resolving IP address to MAC address.

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Steps in the ARP process

A
  1. ARP (Layer 2) receives an IP address from IP (Layer 3).
  2. ARP checks the ARP cache for the MAC address that is associated with that IP address.
    a. ) If ARP has the MAC address in its cache, it returns it to IP (Layer 3).
    b. ) If not, it issues a Layer 2 broadcast (FF:FF:FF:FF) to resolve the IP address. The target host with the corresponding IP address responds with a Layer 2 unicast that includes its MAC address.
  3. ARP adds the MAC address to its cache and then sends it to IP as requested.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the practice of duplicating all traffic on one port in a switch to a second port, effectively sending a copy of all the data to the node connected to the second port.

A

Port Mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a unique binary address assigned to a device so that it can communicate with other devices on a TCP/IP network.

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a number assigned to each host for dividing the IP address into network and host portions. This segregation makes TCP/IP routable. You use this to remove the host ID from the IP address, leaving just the network portion.

A

Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the process of logically dividing a network into smaller subnetworks or subnets, with each subnet having a unique address.

A

Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Benefits of Subnetting

A

Conserve IP addresses to be used in separating networks. Improve network performance. Provides a more secure network environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Benefits of Subnetting

A

Conserve IP addresses to be used in separating networks. Improve network performance. Provides a more secure network environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP Address Assignment Rules

A

The host part of an IP address cannot be all 1s or all 0s. All 1s is reserved for broadcasts. All 0s is reserved for the network ID. The IP address 127.0.0.1 is reserved for testing and cannot be used as a host ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • range from 1.0.0.0 to 126.255.255.255.
  • can have up to 126 networks, each with up to 16,777,214 hosts.
  • The practical range is from 1.0.0.0 to 126.255.255.255. The actual range is from 0.0.0.0 to 127.255.255.255.
  • Both 0 and 127 in the first octet are reserved for special purposes and are not assigned to hosts.
  • The default subnet mask for id networks is 255.0.0.0
A

Class A addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • range from 128.0.0.0 to 191.255.255.255.
  • can have up to 16,382 networks each with up to 65,534 hosts.
  • The default subnet mask is 255.255.0.0.
A

Class B addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • range from 192.0.0.0 to 223.255.255.255.

- can have up to 2,097,150 networks each with 254 hosts. -The default subnet mask for a is 255.255.255.0

A

Class C addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • 224.0.0.0 to 239.255.255.255.

- addresses are set aside to support multicast transmissions.

A

Class D addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • 240.0.0.0 to 255.255.255.255.

- set aside for research and experimentation

A

Class E addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

addresses that organizations use for hosts within enterprise networks requiring IP connectivity and not external connections to the Internet

A

Private IP addresses

20
Q

Compare Public and Private IP Addresses

A
  • Public IP addresses are issued by your ISP for use anywhere on the Internet.
  • while private IP addresses are used for internal network communication only.
  • You can use public IP addresses between networks, such as between your network and any other Internet address.
  • Private IP addresses never leave your internal network.
21
Q

an IP address assigned to a router that forwards remote traffic from its local subnet to remote networks.

A

Default Gateways

22
Q

Custom subnet masks are sometimes referred to as this.

A

Variable Length Subnet Masks (VLSMs)

23
Q

a classless addressing method that considers a custom subnet mask as a 32-bit binary word.

A

Classless inter-domain routing (CIDR)

24
Q

CIDR Subnet Mask Values for a Class C address

A

/24
254 hosts
255.255.255.0 11111111.11111111.11111111.00000000

25
Q

CIDR Subnet Mask Values for a Class B address

A

/16
65,534 hosts
255.255.0.0 11111111.11111111.00000000.00000000

26
Q

CIDR Subnet Mask Values for a Class A address

A

/8
16,777,214 hosts
255.255.0.0 11111111.00000000.00000000.00000000

27
Q

When you move the subnet mask one bit to the right

A

you are dividing one network in half, giving you two subnets

28
Q

If you move the subnet mask two bits to the right

A

you are dividing the network twice, giving you four subnets.

29
Q

If you move the subnet mask three bits to the right

A

you are dividing the network three times, giving you eight subnets.

30
Q

Subnet ID’s resulting from moving a /24 one bit to the right

A

Subnet ID’s would be 192.168.1.1 /25 and 192.168.1.128 /25

31
Q

includes new features, such as simplified address headers, hierarchical addressing, support for time-sensitive network traffic, required security, and a new structure for unicast addressing.

A

IPv6 address

32
Q

IPv6 Transmission type with a single address identifying a single interface.

A

Unicast

33
Q

IPv6 Transmission type delivered to every address in a group

A

Multicast

34
Q

IPv6 Transmission type sent from server to the nearest host in a group which then transmits it to the next nearest host in the group.

A

Anycast

35
Q

Type of IPv6 Unicast address that is globally routable

A

Global Addresses

36
Q

Type of IPv6 Unicast address used for internal networks that are not routable on the internet. The equivalent of the IPv4 private, nonroutable address blocks.

A

Site-Local Addresses

37
Q

Type of IPv6 Unicast address that is used to communicate and automatically assigned on private network segments with no router. Usually begin with FE80

A

Link-Local Addresses

38
Q

IPv6 Address Rules/Examples

A
  • 2001:0db8:85a3:0000:0000:8a2e:0370:7334
  • (not valid if letter above F)
  • (you can remove a group of 0’s but only one group)
  • (you can omit any leading 0’s in an octet)
  • 2001:db8:85a3:::8a2e:370:7334 (example using above rules)
39
Q

IPv4 and IPv6 are not compatible. One of the ways that IPv6 can be implemented on IPv4 networks is through this process. Like encapsulation it envelops a data packet in a form that is acceptable to the carrier. In this instance, you are encapsulating IPv6 packets to traverse IPv4 networks such as the Internet.

A

IPv6 Tunneling

40
Q

With IPv6 this is used to make sure the packets can travel across all ISP’s, the client encapsulates the IPv6 packets into IPv4

A

Toredo tunneling on Windows OS and Miredo tunneling on Linux and Mac OS

41
Q

A host computer running IPv6 can use this IEEE standard to self-assign its interface addresses. the MAC address is padded in the center with FFFE, extending it to 64 bits in length. For instance a MAC address of 01-00-11-22-33-44 would be changed to 0100:11FF:FE22:3344 to become the last 64 bits of the host’s IPv6 address.

A

Extended Unique Identifier (EUI-64)

42
Q

The IPv6 discovery process that uses Internet Control Message Protocol (ICMPv6) messages and solicited-host multicast addresses to:

  • Determine the link-layer address of a host on the local link
  • Verify that a neighbor host can be reached
  • Track neighboring devices
A

Neighbor Discovery

43
Q

Assigning a protocol to a network interface card (NIC) is referred to as this

A

Protocol Binding

44
Q

IPv6 Loopback Address

A

::1

45
Q

Convert the binary address 10011011 to decimal

A

155

46
Q

Convert the decimal address 155 to binary

A

10011011