Week 2 - The Network Layer Flashcards

1
Q

How do nodes on a LAN communicate with each other?

A

MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How long are IP addresses? How is each number represented?

A

32 bits long (4 octets long)

Represented by decimal numbers 0-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are IP addresses assigned and distributed?

A

distributed in large sections to organizations and companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Do IP addresses belong to the networks or the devices attached?

A

The networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Would your IP address change if you were at your house and if you were at a cafe?

A

Yes, IP address changes depending on network connected to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a dotted decimal notation?

A

When the IP address has numbers larger than what could be represented by 8 bits

example, would need 9-10 bits for the numbers 456 or 789

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does DHCP stand for? What does it do?

A

Dynamic Host Configuration Protocol

It assigns an IP address to a new connected device automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a static IP address? What is it usually assigned to?

A

An IP address that must be assigned manually

Usually assigned to servers and network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a dynamic IP address? What is it usually assigned to?

A

assigned automatically by the DHCP

usually to a client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a data packet at the Network layer called?

A

an IP datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a fragmented datagram called?

A

a packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define what an IP datagram is?

A

a highly structured series of fields that are strictly defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 2 primary sections of an IP datagram?

A
  1. header
  2. payload
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many total bytes is an IP datagram header?

A

32 bytes (includes the 0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the first 3 fields in an IP datagram? Explain them.

A
  1. Version - 4 bits. What version of internet protocol is being used (IPv4 is common)
  2. Header Length - Almost always 20 bits long in IPv4. Declares how long the entire header is.
  3. Service type - 8 bits. Specifies QoS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the minimum size for a header?

A

20 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define what is QoS?

A

Quality of Service

service that allows routers to make decisions about which IP datagram is more important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are fields 4 and 5 in an IP datagram?

A
  1. Total Length - 16 bits. Indicates total length of IP datagram.
  2. Identification - 16 bits. Used to group messages together.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the max size for an IP datagram?

A

65,535 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What field is used when data is split up? How does that field help?

A

The identification field is used so receiving end understands that every packet with the same value in that field is part of the same transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are fields 6, 7, and 8?

A
  1. Flags - indicates whether datagram is allowed to be fragmented or already fragmented
  2. Fragmentation - process of taking a single datagram and splitting it up into smaller datagrams
  3. TTL (time to live) - 8 bits. How many router hops the datagram can make before it’s thrown away.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does the receiving end put back fragmented packets in the correct order?

A

It takes values from the fragmentation offset field and uses the identification field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why would you need to fragment a datagram?

A

When a network that allows a larger datagram size crosses into a network that allows a smaller datagram size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the main purpose of the TTL field?

A

when an endless loop happens due to misconfiguration, the datagram isn’t continuously bounced between routers forever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are fields 9 and 10 in an IP datagram?

A
  1. Protocol - 8 bits. Contains data about what transport layer protocol is being used (TCP, UDP)
  2. Header Checksum - like Ethernet checksum, its the checksum of contents of the entire IP datagram header
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When does the header checksum field change?

A

at every router along with the TTL as it has to be recomputed at every router it touches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are fields 11, 12, 13, and 14 of an IP datagram?

A
  1. Source IP address (32 bits)
  2. Destination IP address (32 bits)
  3. IP Options - optional field used to set special characteristics for datagrams for testing purposes
  4. Padding - uses series of 0s to make sure header is correct total size in case there is no IP options field (optional)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is encapsulation?

A

The entire contents of an IP datagram are encapsulated as the payload of an Ethernet frame (encapsulates payload/message from layers above it to send below)

(kind of like mashing all the information together and the layers that need any specific information will unwrap it otherwise they add their layer data and move data to layer below)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What 2 sections are IP address split into? Which is which?

A
  1. Network ID
  2. Host ID

The first octet (at least) is the Network ID out of 4 octets (32 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the address class system?

A

way of defining how the global IP address space is split up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the 3 types of address classes? Explain the difference

A
  1. Class A - first octet is the Network ID, rest are Host
  2. Class B - first 2 octets are Network ID, rest are Host
  3. Class B - first 3 octets are the Network ID, rest are Host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

If the very first bits of an IP address is 0, what address class does it belong to?

A

Class A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

If the first 2 bits of an IP address start with 10, what address class does it belong to?

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

If the first bits of an IP address are 110, what address class does it belong to?

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How do you know how many possible addresses there are for Class A?

A

Since there are 24 bits left as the Host ID space (first octet is Network ID), you calculate 2^24 = 16,777,216 individual addresses

Less for Class B and C as there’s less Host ID space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A Class A address is any address with the first octet between ?–?

A

0-127

First bit has to be 0 for class A, so the possible values are 0-127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A Class B address is any address with the first octet between ?–?

A

128-191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A Class C address is any address with the first octet between ?–?

A

192-223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A Class D address always begins with how many bits? What are the first octet numbers?

A

1110 bits

224-239

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are Class E addresses? What do they make up? Why are they used?

A

all remaining IP addresses but unassigned and only used for testing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What has this address class system mostly been replaced by?

A

CIDR (classless inter-domain routing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does ARP stand for and define it?

A

ARP - Address Resolution Protocol

a protocol used to discover the hardware address of a node with a certain IP address

(has the IP address, so sets out to find hardware address of a node)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Why would a fully formed IP datagram need a destination MAC address?

A

Once IP datagram is encapsulated inside Ethernet frame it needs the destination MAC address to complete the Ethernet Frame header

(knows where to send the frame)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is an ARP table?

A

a list of IP addresses and the MAC addresses associated with them that almost all network-connected devices have

(Contact information - correlate the house number (MAC) with rest of address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How does a system send information to a specific IP address that doesn’t have an entry in the ARP table to know its destination MAC address?

A

It sends out a broadcast ARP message to the MAC broadcast address (all F’s) and is delivered to all computers on the LAN

The network with that specific IP address answers the ARP broadcast and sends back an ARP response with the MAC address it needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Does a system store a MAC address in its local ARP table once it finds out the missing address associated with the IP address?

A

Yes it will likely store it for future use so it doesn’t have to send an ARP broadcast next time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

When do ARP tables expire?

A

After a short amount of time to make sure network is refreshed and updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Define what is subnetting?

A

Subnetting is the process of taking a large network and splitting it up into many smaller subnets or subnetworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Explain the communication process in 4 steps from system to system: (for an address class system)

A
  1. System wants to communicate with specific IP address
  2. Core routers know this IP belongs to the Class A,B,C network
  3. Core routers route message to gateway router responsible for that network by looking at Network ID
  4. Packet gets to gateway router, router looks at Host ID to get data to proper system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is a gateway router’s role?

A

Serves as the entry and exit path to a certain network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What do you do when there’s too many IPs for one router to handle?

A

split up large networks into many subnets with their own gateway routers with their own entry and exit point for each subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

How does subnetting change how an IP address is read?

A

some bits of the IP address that would normally comprise the Host ID are used for the subnet ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

How are subnet IDs calculated?

A

via subnet masks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What are subnet masks?

A

32 bit numbers that are normally written out as 4 octets in decimal

so subnet masks are binary numbers that have 2 sections (1111 1111) and tells us what is the subnet ID and the 0s tell us what to keep as Host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What and why does the subnet mask tell you to ignore?

A

tells us to ignore the section with 1s and the part with 0s we can keep as Host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is the purpose of a subnet mask?

A

to tell a router what part of an IP address is the subnet ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

How is the size of a subnet defined?

A

By its subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A single 8 bit number can represent how many different numbers in decimal?

A

256

0-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Only which total numbers are available to be assigned as a Host?

A

1-254

but still refer to total number of hosts available as 256 not 254 because the other IPs are still IP addresses even if they aren’t assigned directly to a node on that subnet

60
Q

What number is reserved as a broadcast address for a subnet?

A

255

61
Q

What number is generally not used in a subnet for a Host ID?

A

0

62
Q

What’s the shorthand way of writing subnet masks? Example, 27 1s

A

/27

63
Q

What’s the trick to figure out how many decimal numbers can be represented by a certain number of bits? 8 bits, 4 bits, and 16 bits

A

8 bits: 2^8 = 256 (0-255)
4 bits: 2^4 = 16
16: 2^16 = 65, 536

2 digital total ^ # of bits

64
Q

How do you calculate a base 10 number with 2 columns of digits?

A

10 ^2

(how many numbers you can represent with 2 columns of decimal digits which is 0-99)

65
Q

How do you calculate a base 10 number with 3 columns of digits?

A

10 ^3

3 columns of decimal digits, 0-999

66
Q

What are the only 4 possible outcomes in binary addition?

A
  1. 0+0 = 0
  2. 0+1 = 1
  3. 1+0 = 1
  4. 1+1 = 10

carry a digit to the next column once you reach 2 (1+1)

67
Q

What are the 2 most important operators?

A

AND

OR

68
Q

What’s the formula for OR operator?

A

X OR Y = Z

if x or y is true, then z is true otherwise it’s false

1 OR 0 = 1
0 OR 0 = 0

69
Q

What’s the formula for the AND operator?

A

X AND Y = Z

If x and y are true, then z is true

1 and 1 = 1
1 and 0 = 0
0 and 0 = 0

70
Q

How does a subnet mask use AND operators?

A

to determine if an IP address exists on the same network

Host ID is auto known as it’s the leftovers

71
Q

What does it mean to use subnet masks to demarcate networks?

A

to set something off

72
Q

What is a demarcation point?

A

to describe where one network or system ends and another one begins

73
Q

What is the name for the slash notation?

A

CIDR notation

74
Q

Difference between old network model and CIDR?

A

previous relied on network id, subnet id, and host id to deliver IP datagram

with CIDR the network ID and subnet ID are combined into one (network mask)

75
Q

CIDR allows an address to be defined by how many IDs?

A

2 individual IDs

76
Q

What are the 3 benefits of using CIDR?

A
  1. can combine address space into 1 contiguous chunk with a net mask using CIDR notation
  2. routers only need to know 1 entry in routing table to deliver traffic instead of 2
  3. you get additional available hosts IDs
77
Q

You always lose ___ host IDs per network

A

2

78
Q

What’s the formula to check how many Host ID addresses are available?

A

2^(# of 0s)-2

79
Q

Define what a router is and does?

A

it’s a network device that forwards traffic depending on the destination address of that traffic

80
Q

What does a router need in order to do its job?

A

At least 2 network interfaces since it needs to be connected to 2 networks to do its job

81
Q

Describe the 5 basic Routing steps: (Router received the data)

A
  1. router receives a data packet on one of its interfaces
  2. router examines the destination IP of the packet
  3. router looks up the destination IP network in the routing table
  4. router uses info from the routing table to forward traffic to the destination through the closest interface to the remote network
  5. repeat until traffic reaches destination
82
Q

When a computer knows a destination IP address isn’t on its local subnets, where does it send the data packet?

A

to the MAC address of its (own) gateway (router)

83
Q

What does a router do when it first receives a data packet to find the destination IP address?

A

the router strips away the data link layer encapsulation to leave the network layer content leftover which is the IP datagram and inspects it for the IP address

84
Q

How does a router find the destination IP address in an IP datagram?

A

it directly inspects the de-encapsulated IP datagram’s header for the destination IP field

85
Q

What does a router look for and in what after it finds the destination IP address in an IP datagram? 2 things (traffic flow)

A

router looks at routing table to find:
1. the correct network for the destination IP address
2. MAC address associated

86
Q

What is the 1st thing the router does after it has the correct IP destination network and MAC address?

A

router needs to form a new packet to forward to the correct network

87
Q

What are the 8 steps to a router forming a new packet to forward to a Network? (after de-encapsulation)

A
  1. router takes all the data from 1st IP datagram
  2. duplicates data
  3. detriments TTL field by 1
  4. calculates a new checksum
  5. encapsulates the new IP datagram inside of a new Ethernet frame
  6. router sets its own MAC address as source
  7. router sets the destination MAC address it looked up in the ARP table
  8. packet is sent out of its interface and gets delivered to the right node
88
Q

How would you still be able to build your own router today? 3 things

A
  1. have a computer with 2 network interfaces (point of interconnection between computer and public/private network like with a NIC)
  2. bridge the 2 networks
  3. manually update routing table
89
Q

Routers vary depending on what 2 things?

A

make and class of the router but share similar routing tables

90
Q

What are the 4 columns a basic routing table has in order?

A
  1. Destination Network
  2. Next Hop
  3. Total Hops
  4. Interface
91
Q

What is the destination network in a routing table for?

A

Destination-based static routes use the destination network to determine what path to take to get the traffic to the final destination

a row for each IP address the router knows about

92
Q

What is the Next Hop in a routing table used for?

A

Shows the IP address of the next router that’s in line to receive data on the way to the destination network

93
Q

What is the Total Hops in a basic routing table?

A

Keeps track of how far away the destination network is so that the route is always updated to the best and shortest route with any new data from nearby routers

94
Q

What is the Interface on a basic routing table?

A

Lists the network interface that matches the destination network that traffic will be forwarded to

95
Q

What are routing protocols?

A

special protocols routers use to share information with each other

96
Q

What are the 2 main routing protocol categories?

A
  1. Interior Gateway Protocols
  2. Exterior Gateway Protocols
97
Q

What are interior gateway protocols purpose?

A

used by routers to share information within a single autonomous system

98
Q

What is an autonomous system?

A

a single network operator (like a router) that controls a collection of networks

(known and defined collections of networks)

99
Q

What are 2 examples of an autonomous system?

A
  1. ISP employs many routers to reach many networks on a national scale
  2. Large corporation needs to route data between many offices with its own LAN
100
Q

What are exterior gateway protocols purpose?

A

used for the exchange of information between independent autonomous systems (the edge)

101
Q

In computer science, what’s the definition of a vector?

A

a list

102
Q

What is the distance-vector protocol? What does it do?

A

it sends a list of distances to networks

router takes routing table and distributes it to neighboring routers

103
Q

What’s a downside of a distance-vector protocol? What problem does this cause?

A

They don’t know much about the state of the world outside their neighboring system

so a router might be slow to react to a change in the network far away from it

104
Q

What do Link State protocols do?

A

they advertise the state of the link of each of its interfaces to every router or direct connection (to networks) to every router in the autonomous system

105
Q

What does a router do with the information gained from link state protocols?

A

each router runs algorithms against the larger set of information provided to find the best path to any destination network

106
Q

How does a link state protocol differ from a distance-vector protocol?

A

distance-vector protocols only distributes its distance vector to neighbors to find the best path (outdated)

link state protocol:
1. updates every router in the system about the link states (direct connections, other router connections)
2. runs algorithms against the information provided to find the best path.
3. Also needs more memory and processing power.

107
Q

Why do core internet routers need to know about autonomous systems?

A

in order to properly forward traffic

108
Q

What’s the number 1 goal of a core internet router in terms of autonomous systems?

A

Getting data to the edge router of an autonomous system

109
Q

What does IANA stand for? What does it do?

A

Internet Assigned (that’s mine!) Numbers Authority

non-profit org that helps manage things like IP address allocation and ASN

110
Q

How does the IANA prevent chaos?

A

Prevents anyone from using any IP space they want

111
Q

What does ASN stand for? who manages it?

A

autonomous system number allocation

managed by the IANA

112
Q

Define what ASN is? How long is the number?

A

Autonomous system number allocation

32 bit numbers assigned to individual autonomous systems

113
Q

How are ASN and IP addresses the same?

A

Both are 32 bits

114
Q

How are ASN and IP addresses different? 3

A
  1. IP addresses need to be split into 4 octets to represent Network/Host IDs
  2. ASN never change, only core routing tables need to be updated to know what the ASN represents
  3. Looked at by humans far less than IP addresses
115
Q

What are the 2 common distance-vector protocols? What do they stand for?

A
  1. RIP (routing information protocol)
  2. EIGRP (enhanced interior gateway routing protocol)
116
Q

How does the RIP protocol prevent routing loops? How often does it broadcast routing table updates? What protocol does it use to send information?

A
  1. has a limit on number of hops allowed, max amount is 15 (limited network size)
  2. broadcasts routing table updates every 30 seconds
  3. User datagram protocol (UDP)
117
Q

Does the EIGRP share information manually or automatically?

A

automatically, dynamic routing table protocol

118
Q

How is the EIGRP different from RIP in terms of updates?

A

EIGRP sends incremental updates when something changes, and only what has changed not the entire routing table

119
Q

What did EIGRP replace in 1993? Why?

A

IGRP (interior gateway routing protocol) because it could not support classless IPv4 addresses

120
Q

What are the 2 tables a EIGRP uses? What’s the difference?

A
  1. Neighbor Table
  2. Topology Table

Neighbor doesn’t store routers connected to this router indirectly, not considered neighbors
Topology table stores routes it learned from the neighbor table but not all routes.

121
Q

What does it mean when EIGrP is active?

A

still calculating best path

122
Q

What does it mean when EIGRP is passive?

A

path for the route has finished processing

123
Q

When are routes from the topology table able to be used?

A

only after they’re inserted into the routing table

124
Q

When two connected routers are both running EIGRP, what is their relationship called? What initially happens?

A

adjacency

the entire routing table is exchanged between both routers, then only differential changes are sent

125
Q

Which routing protocol is known as the hybrid?

A

EIGRP because of its incremental changed-based updates

126
Q

What is an OSPF? how does it work?

A

open shortest path first is a common link state protocol

gathers link state information and constructs topology map of the network presented as a routing table

127
Q

What does OSPF support?

A

IPv4, IPv6, CIDR

128
Q

Where is OSPF widely used?

A

in large enterprise networks

(IS-IS is used in large service provider networks)

129
Q

How long does it take for OSPF to detect changes?

A

seconds

130
Q

How does OSPF simplify administration?

A

it divides the network into routing areas and admins usually select the IP address of a main router in an area as the area identifier

131
Q

Which gateway protocol does not use a transport protocol? what does it use instead?

A

OSPF open shortest path first

it uses its own transport error detection/correction and instead encapsulates its data directly in IP packets with protocol number 89

132
Q

how does OSPF distribute route information within a broadcast domain?

A

uses multicast addressing, and for routing multicast traffic it supports the MOSPF (multicast open shortest path first) protocol

133
Q

Why do network operators need ASN? 2 things

A

Network operators need Autonomous System Numbers (ASNs) to:
1. control routing within their networks
2. to exchange routing information with other Internet Service Providers (ISPs).

134
Q

What is dotted decimal notation?

A

The format of IPv4 address octets separated by a dot

135
Q

What Class address is used for multicasting?

A

Class D addresses

136
Q

Define a subnet mask (not about broken down networks):

A

A subnet mask is a set of identifiers that returns the network address’s value from the IP address by turning the host address into zeroes.

137
Q

What does CIDR do?

A

Classless or Classless Inter-Domain Routing (CIDR) addresses use variable length subnet masking (VLSM) to alter the ratio between the network and host address bits in an IP address.

Uses subnet masks to mark where one network ends and another begins

138
Q

What does CIDR stand for?

A

Classless inter-domain routing

139
Q

What devices keep an ARP table?

A

Almost all network connected devices

140
Q

What is an ARP table? What does it contain?

A

Address Resolution Protocol

Contains a list of IP addresses and the MAC address associated with them

141
Q

When would your computer receive an ARP response?

A

After your computer sent out an ARP MAC broadcast message to all nodes on a network and the device with the IP you were searching for responds with its MAC address (so you can prepare your Ethernet frame to be sent to that IP using its MAC address)

142
Q

What stops computers from sending out ARP broadcast messages all the time?

A

They store previously received data in an ARP table to use for the future until those tables expire

143
Q

What do core routers only care about when forwarding data traffic to a gateway router?

A

Network ID

144
Q

What does a gateway router look at in order to forward traffic to the right destination when the Network ID matches its own network?

A

The host ID

looked at by the last router closest to the destination host ID

145
Q

What does a computer use to determine if an IP address exists on the same network?

A

AND operators with the subnet mask

146
Q

With CIDR, what IP address ID’s are combined into one?

A

Network ID and subnet ID

147
Q

What’s a routing table benefit of CIDR?

A

Routers only need to know 1 entry in the routing table to deliver traffic instead of 2