IP addresses Flashcards

(32 cards)

1
Q

what does IPV4 use

A

octets(group of 8 bits) and its a 32 bit number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

summarise unusable/reserved addresses

A

Some IP addresses cannot be used for individual devices or hosts on a network.

127.x.x.x is the loopback range, used for diagnostics on the local machine, not routable outside the device.

x.x.x.0 is the network identifier (network address) for the subnet — it identifies the whole network, not a host.

x.x.x.255 is the broadcast address on that subnet — used to send data to all hosts simultaneously.

x.x.x.1 is commonly used as the default router/gateway address, but this can vary depending on network setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

parts of an IP address

A

networkID - left hand bits used to define the network where nodes are communicating
HostID - right hand bits, used to identify the nodes on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

summarise classful addressing

A

Each class has fixed network and host portions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

classful vs classless addressing

A

classful : number of hostID’s are fixed, the use of the suffix “/24” enables IP addresses to be used with varying proportions of host and network IDs

classless: number of hostID are variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

summarise subnet masking

A
  • a subnet mask is used with an IP add to identify the 2 unique parts of the address
  • subnet mask has all network ID bits set to 1, and all host IDs set to 0
  • bitwise AND is used with the IP and the network is identified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is subnetting and why is it used

A
  • the process of dividing a large network into smaller, more manageable sub-networks, or subnets
  • reducing traffic and increasing control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

advantages of subnetting

A
  • improves efficiency by routing data through one segment only
  • reduces the size of the broadcast domain, which can improve security
  • can reduce data collisions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

public vs private IPs

A

Public IP: globally unique, routable over the internet.

Private IP: used within LANs, not routable on the internet.
- Not allocated centrally
- impossible to connect
to over Internet // fromoutside
network

following are considered private:
- 10.0.0.1 - 10.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

advantages of private IPs

A

Conserve public IPs: Many devices can use private IPs internally without needing public ones.

Enhance security: Private IPs are not directly accessible from the internet, reducing exposure.

Allow network flexibility: Private IP ranges can be reused in different networks without conflict.

Simplify internal network management: Easier to organize and control devices inside a local network.

Support NAT functionality: Private IPs work with NAT to connect to the internet via a shared public IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

number of possible hosts

A

2^32 - 2
because they cane end in 255 or 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

why is network address translation (NAT) used

A

Conserves public IP addresses by allowing multiple devices to share one public IP.

Enhances security by hiding internal IP addresses from the external network.

Enables use of private IP addresses within local networks.

Allows communication between different IP address schemes (private and public).

Simplifies IP address management within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

advantages of NAT

A

allows a single public IP address to be shared by any number of hosts with a private IP

Conserves IP addresses: Allows multiple devices on a local network to share a single public IP address.

Improves security: Hides internal IP addresses from external networks, reducing attack surface.

Enables private networks: Allows use of private IP addresses internally without conflict on the internet.

Simplifies IP management: Internal IPs can remain unchanged even if the external IP changes.

Supports IP address reuse: Private IP addresses can be reused across different networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NAT process

A
  • the translation device records the source and destination socket address for each request
  • it then communicates on the hosts with the destination IP address
  • when a response returns, it is passed back to the host that made the original request
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is port forwarding

A
  • a networking technique that allows external devices to access services on a private network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the purpose of a DHCP system

A

to automate the configuration of hosts connecting to a TCIP/IP network

17
Q

advantages of a dhcp system

A
  • reduces the need for expert knowledge when configuring a host
  • reduced the time required to configure host
  • facilitates efficient use of a limited pool of IP addresses
18
Q

how does a DHCP system work

A
  • The host sends a request to discover a DHCP server
  • DHCP servers offer configuration to host
  • host accepts offer of configuration from server
  • DHCP server confirms that configuration has been allocated to host.
  • The host configures its network interface using the IP address and configuration details provided by the server.
19
Q

explain how an external router would be configured so that a web server can be accessed by computers outside of the network

A
  • traffic arriving on the HTTP port must be forwarded by
  • the external router to the IP address of the web server
20
Q

Explain how:
* Computer A will use a subnet mask to determine whether or not it can send the
packet directly to Computer B across the LAN or if the packet must be sent via the
Internet

A
  • AND operation of subnet mask with Computer A’s IP address
  • AND operation of subnet mask with Computer B’s IP address
  • result (of each AND operation) is the network/subnet ID
  • network/subnet IDs compared
  • as they are different, then packet must be sent via gateway, Computer B is not on the same subnet
  • if they were the same, then Computer B
    is on the same subnet.
21
Q

explain how a packet will be routed across the Internet

A
  • hierarchical organisation of routers
  • path to take selected by each router
  • (possible) repackaging of packet to use different protocol
  • use of router tables to determine next hop
  • router decrementing “time to live” of packet
  • route determined using IP addresses
22
Q

how can the checksum be used to determine if the received packet has been changed
during the transmission.

A

checksum produced when packet transmitted
* (hash) value calculated from packet contents
* this value appended to packet
* computer B recalculates checksum
* received and calculate checksum compared
* if these match packet contents/data are accurate . if these differ the data has been
changed // if these differ there is an error in the data.

23
Q

explain how two or more computers connected to the Internet can have the same IP address and still communicate with each other

A
  • the computers have private IP addresses
  • so NAT will be performed
  • so that the computers can communicate on the internet
24
Q

reasons why IPv6 has been introduced to replace IPv4

A
  • There are not enough (unique) addresses in IPv4
  • Eliminate need for NAT / network address translation
  • more efficient routing is possible;
  • Improved facilities for multicasting;
  • Automatic configuration possible without DHCP;
  • Allows bigger packet sizes;
25
private IP addresses:
10.0.0.1 - 10.255.255.255 172.16.0.1 -172.31.255.255 192.168.0.1 - 192.168.255.255
26
Explain how a computer located outside an LAN can access the web server, despite the fact that the web server is identified by a non routable IP address
Computers will use the public IP address of the router / 186.7.2.31 (to access the web server); (The router will perform) port forwarding; Router maintains a port mapping table
27
Describe how NAT processes the outgoing request and returned data when using FTP
**When request sent:** (When the router receives the FTP request from the computer), router will replace the IP address of the computer The router replaces the (source) port number with a port number it generates; The router adds the mapping ) it has created to its NAT translation table **When reply received** When a reply is received from the FTP server, it is recognised by its destination port number (If the port number is present in the NAT translation table) the reply is forwarded to the computer that made the original request (If the port number is present in the NAT translation table) the router replaces its IP address
28
Why are private IP addresses not routable over the internet?
they are reserved for use within private networks and are not globally unique
29
disadvantage of DHCP
potential for IP spoofing If the DHCP server fails, devices may not be able to connect to the network. Security risks: Unauthorized devices can connect if network access isn’t controlled. IP address conflicts: Can occur if leases overlap or are mismanaged.
30
Explain why it might be undesirable to allow the network settings of the web server to be configured by a DHCP server.
The IP address of the web server might be changed (by the DHCP server); If the IP address of the web server changes, port forwarding will no longer work;
31
why is nat not needed with ipv6
There are enough (IPv6) addresses for every device (in the world) to have a unique/public/routable (IP) address
32
how does port forwarding work
**Router receives external request**: A device from the internet tries to connect to your public IP on a specific port. **Router checks port forwarding rules**: It looks for a rule matching that port number. **Request is forwarded**: The router forwards the data to the correct internal (private) IP and port inside the local network. **Device responds**: The internal device sends a response back through the router to the external device. Used for hosting: Common for allowing access to local services like game servers, CCTV, or web servers from outside.