1/101
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is the primary function of the network layer?
It provides inter-network communication by forwarding packets between devices on separate networks and enabling end-to-end communication.
How does this differ from the Data Link layer Protocols?
In Data Link layer protocols like Ethernet or 802.11, Frame Headers are removed at each hop
What is an IP address?
A 32-bit number that uniquely identifies a device on the internet. Each device on the internet has one
Who assigns IP addresses?
Internet Service Providers (ISPs) temporarily lease them to users from their available address pools in return for payment.
Do you always have the same IP address?
No, unless you pay for business-class internet with a static IP address
How many unique IPv4 addresses exist?
Roughly 4.2 billion (2^32)
What does the host portion identify?
An individual device within a network, allowing them to have the same prefix
What happens when the network portion is smaller?
More devices are allocated to a single host, allowing them to have more connected devices
What are the implications of fewer bits in the Network Portion?
There are more bits allocated for the host component allowing for more devices, but it reduces the total number of unique networks (contributing to the IPv4 Exhaustion Problem
What was the historical IP addressing system?
Classful addressing
How were addresses divided in classful addressing?
At every 8 bits (1 octet)
What range of first octets defines Class A addresses?
0–126. (1 Network Octet, 3 Host Octets)
What range of first octets defines Class B addresses?
128–191. (2 Network Octets, 2 Host Octets)
How many devices can a Class B network support?
2^16 - 2 = 65,534 Devices
What range of first octets defines Class C addresses?
192–223 (3 Network Octets, 1 Host Octets)
What was the main problem with classful addressing?
It had only three fixed network sizes
What problem did small companies face under classful addressing?
They could outgrow their Class C allocation and need multiple blocks, either needing another Class C address or upgrade to a Class B address
Why was upgrading between classes inefficient?
It created huge jumps in available addresses (256× more)
How many total Class A networks could exist?
Only 126 Class A networks
How does CIDR improve flexibility?
Instead of changing entire octets, a single bit is moved from the Networks to the Hosts
What are the two forms of IP addresses in CIDR?
CIDR network addresses (with Network and Host portions and a subnet identifier) and individual host IP addresses.
Example of a CIDR Address: 64.64.0.0/20, what does /20 mean?
20 bits are allocated for the network, while the remaining 12 bits are allocated for the hosts
How are CIDR and regular IP Host addresses different?
CIDR addresses have a subnet identifier while IP hosts don’t, as uniqueness is the only thing that matters for IP addresses
What is the key difference between CIDR and regular IP addresses?
IP addresses identify individual machines while CIDR addresses identify entire networks (ranges of IPs)
How does CIDR fix allocation problems?
It allows resizing networks by shifting bits to expand or shrink host capacity without wasting address space. (Making network upscaling/downscaling easier)
Example: What happens when changing from /20 to /19?
The network portion shrinks by one bit, allows for twice as many hosts while ensuring that all devices share the same network prefix
What does the IPv4 datagram contain?
32 bits. The header includes control information like version, IHL,Type of Se3rvice
What happens to the IPv4 datagram before transmission?
It’s payload is encapsulated with a Data Link layer header before being sent over for transmission.
What do the first four bits of the IP header represent?
The IP version, Internet Head Length (IHL), Type of Service, and Total Length
It indicates the size of the IP header. The header length is variable because of the options field
20 bytes
What does the Type of Service field represent?
It specifies information for Quality of Service technologies
The total size of the entire IP packet
65,535 bytes
What does the Identification field do?
It collects and groups together fragments of a packet so they can be reassembled correctly at the destination.
Reserved bit (always 0), Don’t Fragment bit (indicates whether datagram can be fragmented, More Fragments (indicates more fragments)
What is the Fragment Offset field?
13 bit field that helps sequence fragmented packets, indicates where in the message each fragment should be placed
What does the TTL (Time to Live) field do?
8 bit field that represent how many router hops a datagram can traverse before its discarded
It prevents routing loops and endlessly circulating packets caused by misconfigured routers by decrementing after each hop and dropping at 0
64 hops
What is the Protocol field?
8 bit field that determines the transport layer protocol used in the header above
What does is the Header Checksum?
16 bit field that provides Basic data integrity verification. Not found in IPv6 (handled by DLL)
Because Ethernet and 802.11 already handle integrity through Frame Check Sequences
It checks if the destination is on its own network and makes the final delivery. If not it will forward the message to the next router on a specified interface
A special 'catch-all' route used when no other routing rule matches, usually the ISP’s IP.
Before sending data to the next hop on a specified interface
Loopback address range — used for a host to send messages to itself (Used in Netcode dev)
A typical local area network (LAN) address block supporting up to 256 devices
Another private LAN range for larger networks
IP multicast
What is IP Multicasting
Uses a one-to-many association to route datagrams simultaneously in a single transmission to multiple recipients, message is sent once and received on multiple machines through specified IPs
CCTVs, PC hosting, Software Updates, Conference Calls
Automatically assigns a temporary (dynamic) IP addresses to devices on a local network.
Discover, Offer, Request, Acknowledgment
The new device broadcasts a request containing its MAC address to find available IPs
Servers with available IPs respond with offers to lease an address
The client accepts the first offer received, assuming the first has the least latency
The server logs the lease in the DHCP Table to keep track of in use local IP addresses and sends an acknowledgement containing exp. dates
Temporary IPs assigned via DHCP that revert back to the server once expired
Devices that don’t require consistent local addresses (Laptops)
A manually assigned address that doesn’t expire unless revoked
DHCP automatically connects a device to an IP address in its pool, so it’s good for devices that others connect to (Network Printers)
If a printer’s IP address changes because DHCP gives it a new one, the print job may be sent to the wrong location
They belong to the network, devices lease them temporarily
The MAC address is permanent and hardware-specific, it doesn’t change across networks.
What is ARP (Address Resolution Protocol) used for?
DLL Protocol used to map a known IPv4 address to a device’s MAC address on the local network, cannot be used outside Local Networks
A list of IP and MAC addresses associated with each device
Yes, they expire after a short window of time to account for network changes