CIN 2103 - Chapter 8 (Subnetting)
*______ boundary is very popular in subnetting because of number of hosts.* A. /24 B. /25 C. /26 D. /27
/24
*This is the prefix, or network portion of the address that is assigned by the provider.* A. /48 global routing prefix B. 16 bit subnet ID C. 64 bit interface ID.
/48 global routing prefix
*Networks are most easily subnetted at the octet boundary of ______* A. /8, /16, and /24 B. /16, /32, and /48
/8, /16, and /24
IPv6 global unicast address normally consists of ______ List all 3 portions.
1- /48 global routing prefix 2- 16 bit subnet ID 3- 64 bit interface ID.
Planning IP address assignment requires decision on ______. List 3 elements.
1- Each subnet in terms of size 2- The number of hosts per subnet 3- How host addresses will be assigend
List 4 devices that require addresses.
1- End user clients 2- Servers 3- Intermediary devices 4- Gateway
Devices use broadcasts in an Ethernet LAN to locate ______. List 2 elements.
1- Other devices 2- Services
List 3 benefits of planning address allocation.
1- Prevent duplication of addresses 2- Monitor security and performance 3- Provide and control access
List 2 reasons for subnetting.
1- Reduces overall network traffic and improves network performance. 2- Enables an administrator to implement security policies such as which subnets are allowed or not allowed to communicate together.
List 2 problems associated with large broadcast domains.
1- Slow network operations due to the significant amount of traffic it can cause. 2- Slow device operations because a device must accept and process each broadcast packet.
List 3 ways of subnetting
1- Subnetting by location 2- Subnetting by device type 3- Subnetting by network requirements
Calculate the number of hosts in subnet mask 255.255.0.0
2^16-2 = 65,534
Calculate the number of hosts in prefix length /8
2^24-2 = 16,777,214
Calculate the number of subnets when 4 bits are borrowed.
2^4 = 16
Calculate the number of hosts when 7 bits remain in the host portion.
2^7-2 = 126
Calculate the number of hosts in the following subnet mask which is in a binary format: 11111111.11111111.11111111.00000000
2^8-2 = 254
What is the formula for calculating the number of subnets?
2^n n is the number of borrowed bits
What is the formula for calculating the number of hosts?
2^n-2 n is the number of bits remaining in the host field
*Layer ______ address assigned to a server can be used to control access to that server.* A. 1 Static B. 2 Dynamic C. 3 Static D. 4 Dynamic
3 Static
What is the magic number of the /26?
64
*______ sends Layer 2 broadcasts to a known IPv4 address on the local network to discover the associated MAC address.* A. Address Resolution Protocol (ARP) B. Dynamic Host Configuration Protocol (DHCP)
Address Resolution Protocol (ARP)
*IPv6 global unicast address ______ be subnetted.* A. Can B. Cannot
Can
*Subnets ______ borrow bits from any host bit position to create other masks.* A. Can B. Cannot
Can
*IPv6 end user clients use ______.* A. ICMPv6/FLAAC B. DHCPv6/SLAAC
DHCPv6/SLAAC
*______ sends broadcasts on the local network to locate a DHCP server.* A. Address Resolution Protocol (ARP) B. Dynamic Host Configuration Protocol (DHCP)
Dynamic Host Configuration Protocol (DHCP)
*Can be set for DHCP to save time and manual errors.* A. End user clients B. Servers C. Intermediary devices D. Gateway
End user clients
*Switches propagate broadcasts out all interfaces ______ the interface on which it was received.* A. Including B. Except
Except
*______ is the router interface used to exit the network.* A. End user clients B. Servers C. Intermediary devices D. Gateway
Gateway
*Subnets are created by borrowing ______.* A. Host bits for network bits B. Network bits for host bits
Host bits for network bits
*______ are set with static addresses for remote management.* A. End user clients B. Servers C. Intermediary devices D. Gateway
Intermediary devices
*Magic number is the place value of the ______ one in the subnet mask* A. First B. Last
Last
*______ of hosts means network traffic is examined for source IP addresses that are generating or receiving excessive packets.* A. Prevent duplication of addresses B. Monitor security and performance C. Provide and control access
Monitor security and performance
*The more host bits borrowed, the ______ subnets that can be defined.* A. Less B. More
More
*You ______ provide and control access to servers from internal hosts and external hosts.* A. Must B. Must not
Must
*Prefix length and the subnet mask are different ways of identifying the ______ portion of an address.* A. Host B. Network
Network
*IPv6 link-local address is ______ subnetted. * A. Always B. Never
Never
*IPv6 subnetting is ______ with conserving address space.* A. Concerned B. Not concerned
Not concerned
*______ addresses are translated to ______ addresses if they are accessible from the Internet.* A. Public, Private B. Private, Public
Private, Public
How can you solve problems associated with large broadcast domains?
Reduce the size of the network to create smaller broadcast domains.
*Typically, ______ assign a /48 global routing prefix to ISPs and customers* A. Regional Internet Registeries (RIRs) B. Continental Internet Registeries (CIRs)
Regional Internet Registeries (RIRs)
*A change in the subnetting scheme ______ reconfiguration of DHCP server.* A. Requires B. Doesn't require
Requires
*______ are usually configured with static addresses.* A. End user clients B. Servers
Servers
*Magic number technique is used to calculate ______* A. Hosts B. Subnets
Subnets
*To solve large broadcast domain problem, you must reduce the size of the network to create smaller broadcast domains. These smaller network spaces are called ______.* A. Smallnets B. Subnets
Subnets
Calculate the number of subnets and hosts in prefix length /28
Subnets: 2^4 = 16 Hosts: 2^4-2 = 14
https://i.imgur.com/8HebsAC.png *Which type of subnetting is this?* A. Subnetting by location B. Subnetting by device type C. Subnetting by network requirements
Subnetting by device type
https://i.imgur.com/pmVpDHq.png *Which type of subnetting is this?* A. Subnetting by location B. Subnetting by device type C. Subnetting by network requirements
Subnetting by location
https://i.imgur.com/XFIwJQb.png *Which type of subnetting is this?* A. Subnetting by location B. Subnetting by device type C. Subnetting by network requirements
Subnetting by network requirements
*IPv6 subnetting is about building an addressing hierarchy based on the number of ______ needed.* A. Subnetworks B. Hosts
Subnetworks
*Each host in an internetwork must have a ______ address.* A. Unique B. Duplicate
Unique
*Traditional Subnetting ______ addresses* A. Doesn't wastes B. Wastes
Wastes