TSM 343 - Chapter 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

To use CIDR address on any network routers in routing domain must?

"understand" CIDR notation"

Examples of subnet calculators

- Bitcricket IP Calculator - SolarWinds IP Subnet Calculator

What are three address space saving techniques?

- Classless Inter-Domain Routing (CIDR) - Trade in existing IP network addresses - RFC 1918

What are the two types of subnet masking techniques?

- Constant-length subnet masking (CLSM) - Variable-length subnet masking (VLSM)

IPv4 broadcast packets have two destination address fields. They are?

- Data Link layer destination - Destination network

Most organizations need public IP addresses only for what two classes of equipment?

- Devices that permit organizations to attach networks to the Internet - Servers designed to be accessible to the Internet

Does IPv6 require subnetting? Is it possible?

- No - Yes

What is the three part addressing scheme used by IP?

- Symbolic - Logical - Physical Numeric

How many networks are on a Class A network?

1

What is the total private hosts on a Class B network?

1,048,544

Address Range of a Class A network

10.0.0.0 - 10.255.255.255

IPv6 addresses are ___ bits long.

128

How many networks are on a Class B network?

16

What is the total private hosts on a Class A network?

16,777,214

"IPv6 uses groups of four ___ numbers called ""words""."

16-bit

Address Range of a Class B network

172.16.0.0 - 172.31.255.255

Example of Logical numeric

172.16.1.10

Address Range of a Class C network

192.168.0.0 - 192.168.255.255

RFC 2732 was originally proposed in ___?

1999

Default subnet mask for Class A network

255.0.0.0

Default subnet mask for Class B network

255.255.0.0

Default subnet mask for Class C network

255.255.255.0

How many networks are on a Class C network?

256

A scope identifier is a ___ bit field.

4

What is the total private hosts on a Class C network?

65,024

The computer must have a global IPv4 address connected, and the host must provide encapsulation of any IPv6 packets being transmitted and decapsulation of any IPv6 packets it receives.

6to4 tunneling

This is a method used to facilitate IPv4 to IPv6 migration by allowing IPv6 packets to be sent over IPv4 networks, including the Internet, without the need to explicitly configure tunneling.

6to4 tunneling

Permits computers to translate numeric IP addresses to MAC layer addresses

Address Resolution Protocol (ARP)

May be performed by boundary devices that include proxy server capabilities

Address masquerading

Can be combined with other addresses into a single entry in the router table.

Aggregatable global unicast address

Packets addressed to an anycast address go to the nearest single instance of that address.

Anycast address

Hardware used by switches to make decisions

Application Specific Integrated Circuits (ASICs)

The ability for this to be applied to firewall rules is a reason for using

Binary boundaries

Wanting to classify your traffic to apply QoS or policies of some sort is a reason for using

Binary boundaries

Wanting to implement Layer 3 switching to reduce the broadcast traffic is a reason for using?

Binary boundaries

Address that all hosts on a network must read

Broadcast address

Seldom forwarded from one physical network to another.

Broadcast traffic

What are the five classes IP addresses are subdivided into?

Class A - Class E

These addresses are reserved entirely for experimental use.

Class E

Addresses commonly applied to Class C addresses

Classless Inter-Domain Routing in IPv4

Network addresses must be contiguous

Classless Inter-Domain Routing in IPv4

When reviewing RFCs, you should make special note of?

Depreciated and obsolete information and documents

Hardware vendors tend to use the modified ___ format.

EUI-64

Bit 6 = 1 and Bit 7 = 1 means?

Globally unique, group

Bit 6 = 1 and Bit 7 = 0 means?

Globally unique, individual

CIDR address blocks work best when they come in sets that are?

Greater than 1 and equal to some lower-order bit pattern that corresponds to all 1s

Assigns MAC layer addresses for use in network interfaces.

ICANN

Manages all IP-related addresses, protocol numbers, and well-known port addresses

ICANN

IP addressing scheme contraints include the availability of ___.

IP addresses

Router or other device that will forward traffic to the host's physical network.

IP gateway

Switching addresses on every machine that uses address form old ISP to unique address obtained from new ISP.

IP renumbering

Eliminates the need for NAT.

IPv6

Has modernized routing support and natively allows for expansion along with the growing Internet.

IPv6

Provides a vast abundance of IP addresses and better management of its address space.

IPv6

Supports network security by using authentication and encryption extension headers

IPv6

Contains a network portion and a host portion

IPv6 addresses

Netowkr and host portion depend on whos looking at it and where they are located.

IPv6 addresses

String that uniquely identifies one single network interface on the global Internet.

IPv6 addresses

Generates a link-local IPv6 address from a computer's IPv4 address and can perform IPv6 neighbor discovery on top of the IPv4 protocol.

ISATAP

Manages what source addresses appear in outbound packets that pass through it.

Important service that proxy server provides.

Implements the layer-3 logic from the software into its own ASICs

Layer-3 Switch

Allows you to partition a large network into many smaller subnets with almost no loss of performance.

Layer-3 switch

The first 10 (leftmost) bits set to 1111111010

Link-local address

Bit 6 = 0 and Bit 7 = 1 means?

Locally unique, group

Bit 6 = 0 and Bit 7 = 0 means?

Locally unique, individual

Class D addresses are used for ___ communications.

Multicast

Host listens on the multicast and broadcast addresses besides its own.

Multicast Packet and Address Structures

Used to send an identical message to multiple hosts.

Multicast addresses

Meant to be used for IPv4-to-IPv6 transition, allowing IPv6 packets to be sent back and forth across IPv4 networks.

NAT-PT

RFC 4966 depreciated this technology.

NAT-PT

Lets networks use private IP addresses internally and maps them to public IP address externally

Network Address Translation (NAT)

"Any IP address where all host bits are ""0"""

Network address

Some IP services require a secure end-to-end connection

Private IP address limitation

May be in the form of IP network addresses

Private IP addresses ranges

Remain important for identifying all servers or services that must be accessible to the Internet.

Public IP addresses

This type of address is issued by ISPs

Public IP addresses

Reserves three ranges of IP addresses for private use.

RFC 1918

Describes a method to express IPv6 addresses in a form compatible with HTTP URLs.

RFC 2732

uses square brackets, to enclose a literal IPv6 address.

RFC 2732

Software makers, including Microsoft, use the privacy format defined in?

RFC 4941

Contains a summary of carious other RFCs regarding special usage of IPv6 addresses.

RFC 5156

Describe the methods, innovations, and standards that are applied to every aspect of the Internet, including IPv6

Request for Comments (RFC)

Permits the proxy server to front for servers inside the boundary

Reverse proxying

Translates MAC layer addresses into numeric IP addresses.

ReverseARP (RARP)

Defines the portion of the Internet to which the multicast group pertains.

Scope Identifier

Limits the valid range for a multicast address.

Scope Identifier

The first 10 (leftmost) bits set to 1111111011

Site-local address

Example of Physical numeric

Six-byte numeric address, burned into firmware by network interface manufacturers.

"Special bit pattern that ""blocks off"" the network portion of an IP address with an all-ones pattern."

Subnet mask

Stealing (borrowing) bits form the host portion to further subdivide the network portion of an address.

Subnetting

Allows contiguous networks to be added to a routing table with one entry to reduce the size of Internet routing tables

Supernetting

Stealing bits from the network portion, using them to create a single, larger contiguous address space for host addresses.

Supernetting

Allows IPv6 datagrams to be encapsualted in IPv4 UDP packets

Teredo tunneling

Allocated multicast addresses on a controlled basis.

The Internet Corporation for Assigned Names and Numbers (ICANN)

The extent to which you can subnet an IPv6 address depnds on?

The length of the prefix

How you apportion the host addressing depends on?

The prefix length

Sent to one network interface.

Unicast address

IPv6 requires that every network interface have its own ___?

Unique identifier

These addresses are all zeroes and can be represented as two colon characters (::) in normal notation

Unspecified address

Different subnets may have different extended network prefixes in this addressing scheme.

Variable-length subnet masking (VLSM)

Addresses in IPv6 are also ___ numbers.

binary

Computers deal with network addresses as ___ patterns.

bit

IP addressing scheme contraints include the amount of ___ traffic at each location.

broadcast

"IPv6 ""words"" are seperated by a ___ character."

colon (:)

Numeric IPv4 addresses use the ___ ___ notation

dotted decimal

IPv6 address are expressed using ___ notation

hexadecimal

Class A is divided as _._._._

n.h.h.h

Class B is divided as _._._._

n.n.h.h

Class C is divided as _._._._

n.n.n.h

Numeric IPv4 addresses take the form of _._._._ where _ is guaranteed to be between 0 and 255.

n.n.n.n

IP addressing scheme contraints include the number of ___ devices at each location.

network

Duplication is ___ allowed with numeric IPv4 addresses

not

Numeric IPv4 addresses is where each number is an 8-bit number called an ___?

octet

IP addressing scheme contraints include the number of ___ locations.

physical

It is a security concern if the ___ portion of your IPv6 address is based on the computer's MAC or hardware address.

right-hand

IP addressing scheme contraints include the delay caused by ___ from one network to another.

routing

Example of Symbolic

support.dell.com


Set pelajaran terkait

Enterococcus faecalis and E. faecium

View Set

NUR 221 Pharm EAQ - Chapter 81: Vitamins

View Set

Comprehensive Biology SOL Review 1

View Set

Management of EMS full, EMS Incident Management (NIMS), Management of EMS Education, EMS: Terrorism & Disaster Managment, Management of EMS Chapter 1, Management of EMS Chapter 2, EMS 315 test 2, Management of EMS Chapter 1, EMS Management Mid-Term,...

View Set

Biology Unit 9 Test Questions (the rest)

View Set